How to Manage API Security

How to Manage API Security
Protecting the places where application services meet is critical for protecting enterprise IT. Here's what security pros need to know about "the invisible glue" that keeps apps talking to each other.

"There is a crack in everything / That's how the light gets in" — Anthem, Leonard Cohen


When it comes to enterprise applications, the cracks are certainly there, but it's not light finding its way through the gaps — it's criminals and their malware assistants. Some of the enterprise cracks appear through vulnerabilities in application code or firmware, but hundreds, if not thousands, of potential cracks exist in the places where apps and functions come together in an overall application — namely, APIs.


Application programming interfaces (APIs) are the formal, regularly stated ways that pieces of applications talk to one another. This means there is at least one API for every component in an application.


More than half of the APIs used in enterprise applications are developed internally, according to the "2019 Postman State of the API Report," for which more than 10,000 developers were surveyed.  Another 28% of the APIs come from partner organizations, while roughly 19% are publicly available.


"If you think of any infrastructure today in enterprise applications and the components that support it, there is usually a mobile component, a website component, and a myriad of databases and services that support them, and all of this happens with APIs," says Mehul Revankar, director of product management at SaltStack. "And so the API is in some way the invisible glue which keeps all of these things working toge ..

Support the originator by clicking the read the rest link below.