Subscribe to the Salt blog to learn about the latest developments in API Security

Blog Post

Salt Labs

API Security Incidents Nearly Universal Finds Latest “State of API Security” Report

Salt Labs
Aug 3, 2022

It’s no secret that APIs are at the core of every modern application, and that makes them an enormously enticing attack target. Unfortunately, most organizations are unprepared to protect this ever-expanding attack surface, according to findings from the fourth edition of the Salt Labs pioneering “State of API Security” report.

The data, drawn from a combination of survey responses and empirical data from Salt Security customers, highlights a daunting scenario: exploding attack activity, insufficient existing practices, and overwhelmed teams who feel ill-prepared to deal with the API security issues.

The most eye-opening finding from the Salt Labs bi-annual report was that 94% of survey respondents admit that they have experienced security problems in production APIs within the past year; sadly, 20%  have suffered a data breach resulting from API security gaps. In addition, the report found that API attack traffic has doubled in the past 12 months. Together, these findings highlight that existing solutions and API security tactics focused on shift-left strategies are failing to adequately protect APIs.

Other key highlights from the fourth edition of the report include:

  • Salt customers experienced a 117% increase in API attack traffic while their overall API traffic grew 168%
  • API attack traffic now accounts for 2.1% of the overall API traffic for Salt customers
  • Among Salt customers, 34% endure 100+ API attack attempts per month, with 8% more than 1000
  • More than half of survey respondents (54%) indicated they've had to slow the rollout of new applications because of API security concerns
  • Nearly a third of respondents (31%) admit they've experienced sensitive data exposure or a privacy incident within their API production over the past year, a sharp increase compared to last year's 19%
  • The ability to stop attacks was rated a “highly important” attribute of an API security platform by most respondents (41%), compared to only 22% who rated shift-left capabilities a top need
  • 91% of APIs running within the Salt customer base are exposing PII or sensitive data
  • API changes are on the rise with 11% of respondents updating their APIs daily and 31% updating them weekly
  • 38% of respondents ranked security as their top concern in their API strategy, and 61% admit to lacking any API security strategy or to having only a basic one
  • Only 18% of respondents believe their existing tools are “very effective” in preventing API attacks
  • Only 55% of respondents highlight the OWASP API Security Top 10 as a focus area of their security program, which is unfortunate given that 62% of attempted attacks within the Salt customer base leveraged at least one of the methods on that list
  • 86% of respondents lack confidence that their API inventory is complete, and 14% admit they are unaware of which APIs expose PII
  • 64% of respondents say that API security has helped security collaborate and even embed with DevOps teams

Get the latest API Security report and see how you compare

Next steps for enterprises

This type of industry data is most useful when you leverage it to make strides in your own API security program. The survey results and Salt customer data contain a lot of interesting - and frankly daunting - findings, but they also help shine a light on the path forward. Here are some implications and recommendations to keep in mind:

  1. Define a robust API security strategy: Most security teams - and survey respondents - rely upon traditional tools like WAFs and API gateways to manage their APIs and protect against application attacks. But with API attacks increasing, it is clear that these tools and processes leave significant gaps when defending against API attacks. You need to define and execute an API security strategy that covers the complete API lifecycle and addresses cross-functional responsibilities.
  2. Assess your current level of risk: API security risks are real and the stakes are high, so do some poking and prodding of your own to see where your gaps are. Emulate the tactics of well-known API security incidents of 2021 and 2022 to see whether similar business logic flaws exist in your APIs. Validate current API designs against API security best practices, checking whether authentication and authorization controls are in place throughout the sequence of API calls for a given business function, for example. Launch attacks based on the OWASP API Security Top 10 list and see whether your WAF or API gateway can detect them.
  3. Enable frictionless API security across all your application environments: With APIs being the foundation of all application development today, you can’t afford to leave some of your environments unprotected. You must be able to apply API discovery and runtime protection on applications running on-prem and in the cloud and on legacy apps, as well as your container and Kubernetes deployments. How you connect the API security tooling into your environments is also crucial – avoid inline deployments, agents, or the need to instrument code to keep your API security platform from being blamed for any application impact.
  4. Tap the power of cloud-scale big data, AI, and ML to pinpoint the subtle probing of API attackers: Attackers must perform extensive reconnaissance to understand how each API works, and identify vulnerabilities and gaps in business logic that can be exploited. You need to leverage the power of big data and automation to identify this reconnaissance activity over a prolonged time period and stop attackers before they reach their objective.
  5. Don’t over-rotate on shift-left tactics: Shift-left and secure build pipeline approaches have their merits. But many API security gaps cannot be detected as part of code review – they can be detected only in runtime. Look for an API security platform that complements pipeline testing and analysis with robust runtime protection. Shift-left tactics take much longer to deliver value and ultimately offer limited value as they identify only a fraction of API security risk and leave your security teams dependent on developers to work through a backlog of vulnerability fixes. Get your APIs protected today with runtime security – then you can make hardening APIs over time a realistic goal.

Get your copy of the full report

We invite you to download the full report so you can better understand how your organization’s API practices and priorities compare against the industry. We trust that you will find some interesting insights as you chart your path to a robust API security program.

And, if you’re interested in taking the next step, you can request an API Security Gap Assessment to better understand your API landscape and gain personalized remediation insights.

Tags

Salt Security Blog

Sign up for the Salt Newsletter for the latest resources and blog posts.

November 5, 2024

Eric Schwake
Head of Product Marketing

Industry

API Security: The Non-Negotiable for Modern Transportation

Airlines and transportation companies heavily rely on APIs to handle sensitive data, from customer information to payment details and flight schedules. While crucial for efficient operations, these APIs are also prime cyberattack targets.

Read more

October 31, 2024

Alexandria Nicosia
Social Media Manager

Industry

Securing APIs in Retail: Safeguarding Customer Data

In the fast-paced retail industry, where customer trust and data protection are critical, API security must be a top priority to ensure both reliability and a seamless customer experience, confidence, and trust in digital services.

Read more

October 30, 2024

Eric Schwake
Head of Product Marketing

Customer

Salt Security and Dazz: A Powerful Partnership for API Security

Integrating Salt Security and Dazz provides a robust solution for organizations aiming to enhance their API and application security.

Read more

Download this guide for advice on evaluating key capabilities in API Security

Get the guide
Back