Subscribe to our blog.

Subscribe Now

How Martial Arts Can Help You Eliminate API Vulnerabilities

Chris WestphalChris Westphal
Aug 21, 2019

In college a good friend of mine got deeply involved in the martial art Aikido. Unlike other martial arts I was familiar with one of the things that stuck out for me was the concept of using an attacker’s momentum against them. Instead of directly attacking, the defender would wait for a move from their opponent, like a lunge, and harness that momentum to take control.

Most teams take a proactive approach to eliminating  API vulnerabilities. This might include activities like security awareness training for developers as well as employing code scanning solutions, penetration testing and bug bounty programs to find potential vulnerabilities. While these are all important to help you ship secure applications they can take significant time and energy while leaving teams with the challenge of prioritization. In the end, often times, significant vulnerabilities still remain.

Learn about the security implications of modern apps and what you need to protect your APIs.

Turning Attackers Into Penetration Testers

At Salt Security we use a similar concept to what my friend learned in Aikido. We say we turn attackers into penetration testers. During reconnaissance an attacker probes your API to learn about the logic and to look for vulnerabilities. Much like in Aikido we harness this activity and use it in our favor to not only stop them but also to provide insight into what the attacker has found. These insights are then used to generate remediation instructions to help security teams and developers understand where vulnerabilities exist and how to eliminate them at their source.

The Advantages

This approach of using an attackers activity in your favor has a few big advantages:

  • No effort to find vulnerabilities – attackers do all of the work as they perform reconnaissance looking for vulnerabilities. There’s no time, effort or expertise needed to set up scanning solutions, run penetration tests or manage bug bounty programs.
  • Prioritization is done for you – vulnerabilities found are those uncovered by real attackers and can be considered a high priority for remediation.
  • Comprehensive coverage – vulnerabilities are uncovered wherever attackers find them and not where you decide to scan which often times can be limited based on time, budget and resources.
  • Quick remediation – insights include details on where the vulnerability exists, normal expected behavior and a suggestion to remediate therefore minimizing the need to research a solution.
  • Bridging the security and developer gap – the insights help security and development teams get on the same page to understand where vulnerabilities exist and why they’re critical.
  • Developers learn – insights help developers understand how real attackers think and how they can avoid similar gaps in future projects.
The Solution

Remediation is just one of the core components of the Salt Security solution. This coupled with the discovery of APIs and the ability to prevent attacks from advancing provide you with a comprehensive solution for building and delivering secure modern applications.

Want to learn more about how we can help you harness the efforts of attackers to make your APIs more secure? Check out our Remediaton Solution Brief or contact us for a demo. We’d love to show you how we can help you deliver secure APIs and  innovate securely.

Go back to blog

Download this guide for advice on evaluating key capabilities in API Security

Learn everything you need to know to keep your APIs secure

We have updated and re-designed our Privacy Policy as of  March 2024 to make it easier to understand how we collect and use your personal data.

Get the guide
Read the new policy
Back