Need cloud computing? Get started now

Think Beyond the Perimeter: Secure Your APIs with East-West Visibility

Akamai Wave Blue

Written by

Abigail Ojeda and Jacob Abrams

April 26, 2024

Abigail Ojeda headshot

Written by

Abigail Ojeda

Abigail Ojeda is a Product Marketing Manager at Akamai.

Jacob Abrams headshot

Written by

Jacob Abrams

Jacob Abrams is a Product Marketing Manager at Akamai working with the Zero Trust security products, specifically Akamai Guardicore Segmentation. Prior to Akamai, he worked with Israeli tech startups to generate sales pipeline and facilitate marketing content creation and promotion. He is based in Somerville, MA.

When it comes to both east-west network traffic and API use, effective information discovery is a building block for your visibility, detection, and policy enforcement approach.
When it comes to both east-west network traffic and API use, effective information discovery is a building block for your visibility, detection, and policy enforcement approach.

Extend east-west visibility and policy controls to APIs

As more and more organizations take a digital-first approach, business application workloads are increasing in both quantity and sensitivity. Typically, the first line of defense for these digital assets is a strong perimeter security posture — both on-premises and in the cloud.

This can take a variety of forms, including, but not limited to:

  • Next-generation firewalls

  • Web application and API protection (WAAP) platforms

  • Cloud-native security policies

Although these security mechanisms remain as important as ever, they are not sufficient on their own. Even for well-defended data center and cloud environments, breaches are an inevitable fact of life. It’s not a matter of if ... it’s a matter of when.

A new category of east-west API communication

Many security teams realize this and are increasing their focus on monitoring and securing east-west communication within the network or cloud perimeter. Most commonly, this begins with greater scrutiny of network-level communication among internal endpoints and workloads. However, the explosive growth in internal API use has created a second category of east-west communication, as internal applications and services communicate with one another programmatically.

Even though most organizations recognize the problem, many are still struggling to solve it. The volume of east-west network traffic, which generally exceeds north-west traffic by a wide margin, is one of the biggest complicating factors.

And, now, the introduction of a new category of east-west API communication is making the problem even bigger and more complex. APIs have very different risks and attack vectors than traditional network-based threats. In addition, since this new category consists of automated, machine-to-machine communication, the traffic volume can grow to become even more substantial.

The danger of east-west visibility gaps

As convenient as it was in the past to assume that all internal traffic can be implicitly trusted, this no longer reflects the realities of today’s threat landscape. Threat actors will inevitably exploit data center and cloud security weaknesses to gain unauthorized network, cloud, or system access. Whether or not these breaches will escalate into large-scale incidents hinges on an organization’s ability to detect threats in east-west traffic.

The sheer volume of east-west traffic, along with the fact that it is often assumed to be legitimate, work to the advantage of threat actors. Once they establish a foothold in a trusted environment, they will generally attempt to move laterally toward higher-value assets.

These efforts sometimes advance quickly, but they may also unfold over several months, with the threat actors blending their activities in with legitimate east-west traffic. What’s more, APIs add an entire new dimension to the east-west visibility and monitoring challenges.

Ignoring API traffic is no longer an option

Internal APIs are now widely used to make sensitive data and business workflows accessible to multiple applications. Internal APIs are likely assumed to be “safer,” since they should not be available outside the organization. But how would you know if they have been compromised?

You need to see and assess their behavior to know if your organization is safe. Ignoring API traffic is no longer an option. APIs provide a new and potentially devastating attack vector for threat actors attempting to move laterally within an on-premises or cloud environment.

In a more traditional breach scenario, a threat actor may need to go through the effort of escalating privileges and exploiting system-level vulnerabilities to move laterally. Internal APIs, however, make available an entirely new set of attack techniques.

Vulnerabilities in API implementations are common

In some cases, internal APIs may be implemented without the necessary security controls in place, since they are assumed to be inaccessible by outside parties. But even when sound security practices are used, vulnerabilities in API implementations are common. Too frequently, internal east-west APIs are misconfigured and unknowingly left exposed to the internet. If found, what was an east-west API can quickly become the source of a data breach.

Some attacks may not even require an API vulnerability; instead, the threat actor may simply abuse standard API functionality. This is particularly difficult to detect since it’s nearly indistinguishable from sanctioned API use. And even if an organization has a dedicated WAAP platform in place, it is generally focused on north-south API activity only.

Get east-west visibility and policy enforcement

Through our heritage as a leader in content delivery, we are well-known for our ability to optimize the performance, scalability, and security of north-south application activity. And through our strategic acquisitions, such as the Guardicore and Neosec acquisitions, we have also gained a highly differentiated set of capabilities to visualize and secure east-west activity.

Together, Akamai Guardicore Segmentation and Akamai API Security address the key elements of east-west traffic discovery, analysis, and threat detection in a highly complementary manner.

 

Akamai Guardicore Segmentation

Akamai 

API Security

Discovery

Discover endpoint and application flows

Find every API in use across the organization

East-west visibility

See lateral movement on the network

See the APIs that connect internal apps

Threat detection

Detect anomalous and noncompliant network activity

Detect API vulnerabilities and noncompliant API usage

Policy enforcement

Enforce agent-based and agentless integration with network controls

Enforce agentless integration with API gateways and WAAP platforms

Threat hunting

Get data-driven infrastructure-level threat hunting as a service

Get data-driven API threat hunting as a service

Comprehensive discovery is the foundation of east-west visibility and protection

Akamai Guardicore Segmentation

When it comes to both east-west network traffic and API use, effective information discovery is a building block for your visibility, detection, and policy enforcement approach. Even if effective security capabilities are in place for east-west traffic, they will not be effective if they are operating with incomplete data.

Akamai Guardicore Segmentation uses an extensive collection of techniques to ensure that all endpoints and application workloads, as well as all the information flows between them, are discovered. This includes network-level collectors, host-based agents, cloud provider API integrations, and more.

Akamai API Security

Akamai API Security uses a similarly broad approach to discover all APIs in use across the organization, including rogue or shadow APIs that bypass standard systems and practices. This includes log collection from all available sources, including API gateways, content delivery networks, network devices, cloud platforms, and more.

Collectively, the discovery capabilities of Akamai Guardicore Segmentation and Akamai API Security help ensure that you have a complete view of east-west activity at multiple levels of your application stack.

Prevent lateral movement in data center and cloud environments

Akamai Guardicore Segmentation allows you to visualize all the communication flows in your data center and/or cloud environments with a high degree of detail. You can use these insights to create granular Zero Trust segmentation policies that tightly control the communication flows between endpoints and application workloads.

In addition to blocking activity that does not comply with your segmentation policies, Akamai Guardicore Segmentation also uses Akamai threat intelligence to detect and alert you when suspicious activity appears in your east-west data center and cloud traffic.

Extend east-west visibility and policy controls to APIs

Just as Akamai Guardicore Segmentation allows you to visualize and manage communication flows, Akamai API Security provides visibility into all your API activity, including east-west API use, and uses sophisticated behavioral analytics to detect API abuse that would otherwise be hidden within legitimate activity.

Akamai API Security generates information-rich alerts when suspicious API use is detected. It can also perform automated policy responses, such as revoking credentials or implementing rate limiting, through integrations with Akamai or third-party WAAP platforms.

Conclusion

Gaining visibility and control over east-west communication is one of the highest-impact improvements that organizations can make to their security posture. Doing it well requires east-west visibility across a multitude of areas — from the more traditional networks in on-premises and cloud environments to the new network of interconnected APIs.

Together, Akamai Guardicore Segmentation and Akamai API Security make it easy to:

  • Gain east-west visibility at all levels of your network and application stack

  • Detect malicious activity that is attempting to hide in east-west traffic

  • Implement granular policies that prevent threat actors from moving laterally and abusing APIs

Read more about API security in a Zero Trust world.



Akamai Wave Blue

Written by

Abigail Ojeda and Jacob Abrams

April 26, 2024

Abigail Ojeda headshot

Written by

Abigail Ojeda

Abigail Ojeda is a Product Marketing Manager at Akamai.

Jacob Abrams headshot

Written by

Jacob Abrams

Jacob Abrams is a Product Marketing Manager at Akamai working with the Zero Trust security products, specifically Akamai Guardicore Segmentation. Prior to Akamai, he worked with Israeli tech startups to generate sales pipeline and facilitate marketing content creation and promotion. He is based in Somerville, MA.