2023 OWASP High-10 Collection: API10:2023 Unsafe Consumption of APIs – Supply: securityboulevard.com

Welcome to the eleventh submit in our weekly sequence on the brand new 2023 OWASP API Security Top-10 listing, with a specific give attention to safety practitioners. This submit will give attention to API10:2023 Unsafe Consumption of APIs.

On this sequence we’re taking an in-depth take a look at every class – the small print, the impression and what you are able to do about it. To see earlier posts you might need missed, click here.


APIs are supposed to work together with different APIs, but when your API is blindly trusting different APIs, you then’re partaking in unsafe consumption and would possibly fall sufferer to assaults from a compromised API.

The Particulars

Enter validation and sanitization are hardly new ideas. Encrypting communications isn’t a novel thought both. So why are these a specific concern for APIs? The reply has to do with their utilization. APIs are usually constructed to work together programmatically, and most frequently with different APIs. In any case, after we count on a human being to make use of an software, we usually construct an interface for them. Whereas we perceive that human beings are inherently unpredictable and infrequently malicious, there’s a bent to imagine that different functions and their APIs are the other: predictable and benign. That’s not at all times the case, nonetheless.

Actually, API10 is all about implementing fundamental finest practices when interacting with different APIs. This OWASP entry is supposed to seize all of the fundamentals you would possibly select to skip should you suppose “it’s just another API; what could go wrong?”

Encrypting communications ought to appear to be an apparent finest apply. When you’re not contemplating it a fundamental requirement, you then’re placing your APIs in danger.

Useful resource administration is one other fundamental finest apply. There’s positively overlap right here with API4:2023 Unrestricted Resource Consumption. When you’re not implementing restrictions on how different APIs can use your assets, you then’re placing your APIs in danger.

Enter validation is a much bigger matter when in comparison with among the different points addressed by API10. The assaults that leverage lacking enter validation are usually injection assaults, which has been subsumed into API10 within the 2023 replace. We’ll handle injection threats extra instantly in our subsequent submit within the sequence.

Suffice it to say, lack of enter validation has been inflicting issues in code for many years, and APIs are not any exception. If a third-party API has been compromised by an attacker, then it is likely to be used to assault different APIs to which it has entry. This OWASP API Safety High 10 vulnerability is meant to seize this case.

Ultimately, these are simply examples of how an API is likely to be an unsafe shopper of different APIs. It’s necessary to grasp the precept that simply since you’re interacting with an API, doesn’t imply you’re not in danger.

What’s the Impression?

This OWASP entry isn’t only a single vulnerability, however a set of situations, and so the impression can be a set of doable outcomes. A scarcity of encryption results in lack of confidentiality within the knowledge transmitted between APIs. A scarcity of useful resource administration ends in a denial of service, or the lack of availability.

Of the examples we’ve mentioned, the injection flaws are arguably probably the most severe as a result of they supply the power to instantly compromise an software or entry the information behind it. Ultimately, particular impression is set by the menace mannequin for the precise software, however the lack of confidentiality, integrity, and availability are all doable.

What Can You Do About It?

Potential actions to mitigate API10 fall into two classes: remediating your personal APIs and managing the chance of third-party APIs.

For APIs that you just management, implementing fundamental finest practices like encrypted communications and granular entry management are the appropriate method. Make a guidelines of controls that needs to be in place and consider APIs towards them. After all, detecting and blocking assaults, no matter their supply, is a key management to implement.

For APIs that you just don’t management, whether or not third-party companions with which you combine, APIs in business off-the-shelf-software, or open-source merchandise, an identical method can work, besides you’re validating as a substitute of implementing. In different phrases, create that very same guidelines, however ask the accomplice or vendor to adjust to it. Earlier than partaking in these conversations, set up your response plan when a vendor/accomplice doesn’t meet the necessities. This guidelines needs to be a part of your total vendor safety course of, and the sooner you collect solutions, the higher.

How Wallarm Can Assist

Wallarm detects and blocks the assaults which might be a part of this OWASP entry. The Wallarm nodes monitor API visitors to establish and block distant code execution, SQL injection, server-side request forgery, and extra. Wallarm additionally tests your APIs and endpoints for vulnerabilities that may make them prone to a lot of these assaults. By using energetic blocking and vulnerability evaluation, Wallarm can assist shield your small business essential functions whereas concurrently serving to you cut back threat.

Study Extra

Come again subsequent week as we dig into the small print of one other class of the brand new 2023 OWASP High-10 API Safety Dangers listing – or click here to see earlier posts you might need missed.

Within the meantime, listed here are another assets which could assist in your journey to end-to-end API safety:

Defend Your APIs from OWASP API Safety High-10 Threats

Wallarm Finish-to-Finish API Safety resolution gives complete safety towards the OWASP API Safety High-10 threats. And in 2023, we’ve made it even simpler for you!

The Wallarm 2023 OWASP API Safety High-10 Dashboard gives you with full visibility into the safety state of your APIs, simple identification of your most important safety dangers, and talent to right away apply protecting measures.

If you’re taken with studying extra about how we can assist you shield your APIs, please schedule a demo with one in all our safety specialists as we speak!

The submit 2023 OWASP Top-10 Series: API10:2023 Unsafe Consumption of APIs appeared first on Wallarm.

*** It is a Safety Bloggers Community syndicated weblog from Wallarm authored by wlrmblog. Learn the unique submit at: https://lab.wallarm.com/api102023-unsafe-consumption-of-apis/

Unique Put up URL: https://securityboulevard.com/2023/09/2023-owasp-top-10-series-api102023-unsafe-consumption-of-apis/

Class & Tags: Utility Safety,Safety Bloggers Community,owasp,OWASP APIsec High-10 2023 Collection,OWASP High 10 – Utility Safety,Safety Bloggers Community,owasp,OWASP APIsec High-10 2023 Collection,OWASP High 10

Author: wlrmblog
Date: 2023-09-30 22:46:07

Source link



Related articles

Alina A, Toronto
Alina A, Torontohttp://alinaa-cybersecurity.com
Alina A, an UofT graduate & Google Certified Cyber Security analyst, currently based in Toronto, Canada. She is passionate for Research and to write about Cyber-security related issues, trends and concerns in an emerging digital world.


Please enter your comment!
Please enter your name here