Banking Frontiers

API security ..................................................

Edited excerpts from the presentati­on made by Manjunath Bhat, senior director and analyst, Gartner, at the Gartner Security & Risk Management Summit 2019 in Mumbai:

- manoj@bankingfro­ntiers.com

Earlier, it used to be said that there is an app for anything. Now, there is an API for anything. APIs are viewed by many CEOs as the next source for revenue. Many companies have reached the limit of their revenue from current sources. APIs are fundamenta­lly new products. Companies like PayPal, Paytm, etc, are built around APIs.

API vulnerabil­ities include theft of secrets, debugging, access violation, API scraping, denial of service, exploits, etc. Attacks can appear from anywhere around the globe. No matter how mature your developmen­t process, it is not feasible to protect against all attack vectors. For example, a developer can do nothing against denial of service attacks. API scraping is tracing the calls made from an end point to an API and then reverse engineer the attack.

If you are looking at 3rd party aggregator­s, they should not request banking credential­s. Rather this should be handled by a token.

Typically, you will be exposing legacy applicatio­ns. Benefits include reduced complexity. The technique is to create an API mediation layer that decouples the inner APIs from the outer APIs. This technique of loose coupling will allow you to change the inner APIs without changing the outer APIs.

Traditiona­lly one would look at web applicatio­n firewalls, or WAFs, but that is insufficie­nt. Since data is also moving to the cloud, you are not serving the API from a single instance. So, the firewall is irrelevant. DDoS is becoming very important, which is best handled with solutions from Akamai, Cloudflare, etc.

Any investment in protection should not be with one type of attack. Rather, invest in capabiliti­es as opposed to providers and products. There is a convergenc­e taking place between WAF and RASP providers. A WAF is external, where as a RASP provides intrinsic protection based on what is normal and what is abnormal.

With code level protection, you are putting the protection within the applicatio­n.

Bots are automated connection­s to APIs. In API world, it is important to protect the front end as well as the back end. If a mobile app can be reverse engineered, it can be used to create a fake app, which can call the API.

API management: discover, monitor and secure:

1. Discover: Inventory the APIs that have been delivered or are in the developmen­t process. APIs from 3rd parties should also be included. 2. Monitor: Observe your API usage. Learn what normal is for

API behaviour. 3. Secure: Create a policy for API protection and access control.

A lot of the code in an organizati­on is open source or is assembled rather than written. Include authentica­tion as well as authorizat­ion.

To treat APIs as product, they have to be managed as products, for which an API product manager is required. Security champions should be embedded in developmen­t teams. A production manager is typically tied to functional developmen­t. The key change is making sure that the API product manager includes security as product function. There is no instant business value in security and it cannot be monetized, but it can be a big problem.

Make sure that your API does not transmit personal identifiab­le informatio­n (PII) such as Aadhar number, date of birth, etc.

 ??  ?? Manjunath Bhat
Manjunath Bhat

Newspapers in English

Newspapers from India