SaltSecurity-Checklist-API Security Best Practices
SaltSecurity-Checklist-API Security Best Practices
This API Security Checklist from Salt Security will help you close the gaps in your API security strategy. Each item in the API Security Checklist is
arguably just as critical as the next, but don’t get overwhelmed. This API Security Checklist is provided to help you navigate through the top items in
area of best practices, and you may opt to emphasize sets of best practices where you already have technology investments or manpower. Here are
some suggestions on how to scope the problem and prioritize activities:
Security test your APIs, but know that you will also need posture governance to catch changes that don’t go through standard build process and
abuses that testing tools aren’t designed to find.
Ensure that you are covering all of your environments and your digital supply chain, which is more than just the APIs mediated by your API
gateways or API management suite.
If you do nothing else, focus on posture governance as a way to lower risk, create API security guardrails, and buy time for application and API
teams.
A: API secure design and development
You don’t need to reinvent the wheel with security requirements. The OWASP Application Security Verification Standard (ASVS) is a good source that is useful for all types of application designs. For this part of the API Security Checklist, be sure to include API integration,
and streamline threat modeling of APIs.
B: API documentation
You don’t need to reinvent the wheel with security requirements. The OWASP Application Security Verification Standard (ASVS) is a good sourDocumentation is useful for the application and API teams that are building or integrating APIs. Adequate documentation also
provides benefits to a range of activities including design reviews, security testing, operations, and protection.ce that is useful for all types of application designs. For this part of the API Security Checklist, be sure to include API integration, and streamline threat modeling of
APIs.
Posture governance refers to the ongoing assessment of your API security posture and how well it aligns with industry best practices. It includes processes and tools to maintain visibility into your API landscape and ensure compliance with security standards.
H: Network security
A primary goal of zero trust architecture is to enforce concepts of least privilege and restrict network access dynamically. However, connectivity must be present for APIs to function, and many API attacks still occur in trusted channels and authenticated sessions.
I: Data security
Data security approaches aim to provide confidentiality, integrity, and authenticity of data, but 85% of organizations lack confidence that they know which APIs expose sensitive data (see the Q3 2021 State of API Security report). Use this API Security Checklist to reduce
exposures of sensitive data, which can lead to significant regulatory penalties, large-scale privacy impacts, and brand damage.
K: Runtime protection
Any runtime protection you consider deploying should be dynamic and learn continuously. Use this API Security Checklist to enforce protections that identify misconfigurations in API infrastructure as well as behavior anomalies such as credential stuffing, brute forcing, or
scraping attempts.
K3 – Go beyond traditional runtime controls that are dependent on rules, and make use of AI/ML and behavior analysis
engines to detect API attacks
L: Security operations
SOC analysts must often depend on application development and API project teams who best know the application architecture and logic of APIs. That details application and business logic are critical in digital forensics and incident response. You will need to emphasize
the people and process aspects of SecOps more than technology, and don’t just approach the exercise as “get a feed into Splunk.”
In many cases, purpose-built API security tooling can make it easier and more automatic to address the many elements of API security. Such platforms
support a range of capabilities throughout the API lifecycle and provide the necessary context to stop attacks and data exposures for your organization’s
unique API business logic.