《Akamai:2024如何防范API漏洞白皮书:探索5类API漏洞及其防范方式(英文版)(15页).pdf》由会员分享,可在线阅读,更多相关《Akamai:2024如何防范API漏洞白皮书:探索5类API漏洞及其防范方式(英文版)(15页).pdf(15页珍藏版)》请在三个皮匠报告上搜索。
1、W H I T E PA P E RHow to Prevent an API BreachExploring 5 types of API breaches and how to secure against |2In this reportIntroduction 3What is an API breach?3Breach type:Known vulnerabilities 4How to prevent them 5How Akamai API Security helps yout 6Breach type:Shadow,rogue,zombie,and deprecated AP
2、Is 7How to prevent them 8How Akamai API Security helps you 8Breach type:External exposures 9How to prevent them 10How Akamai API Security helps you 10Breach type:Misconfigurations and operator errors 11How to prevent them 12How Akamai API Security helps you 12Breach type:Undiscovered vulnerabilities
3、 13How to prevent them 13How Akamai API Security helps you 145 breach types,5 prevention principles |3IntroductionAPIs connect your business by exchanging data with partners,suppliers,and customers.And yet,API security remains less than comprehensive in most organizations.In fact,vulnerable APIs hav
4、e become a targeted weakness for companies in recent years,with attackers abusing them to access sensitive data,sell it to other threat actors,or publish it for the world to see.In 2024,global brands across consumer telecom,enterprise computing,and virtual collaboration saw API breaches release huge
5、 amounts of customer and other sensitive data inflicting hefty financial and reputational costs.What is an API breach?Simply put,an API breach is any intentional misuse or abuse of an API,often to gain access to sensitive data.Types of API breaches can be subdivided according to various criteria.To
6、identify risks and avoid breaches in production operations,its useful to consider the following scheme,which breaks down risks into five categories:1.Known vulnerabilities Attackers exploit known vulnerabilities that havent been patched.2.Shadow,rogue,zombie,and deprecated APIs Unmanaged and forgott