Think Beyond the Perimeter: Secure Your APIs with East-West Visibility
Extend east-west visibility and policy controls to APIs
As more and more organizations take a digital-first approach, business application workloads are increasing in both quantity and sensitivity. Typically, the first line of defense for these digital assets is a strong perimeter security posture — both on-premises and in the cloud.
This can take a variety of forms, including, but not limited to:
Next-generation firewalls
Web application and API protection (WAAP) platforms
Cloud-native security policies
Although these security mechanisms remain as important as ever, they are not sufficient on their own. Even for well-defended data center and cloud environments, breaches are an inevitable fact of life. It’s not a matter of if ... it’s a matter of when.
A new category of east-west API communication
Many security teams realize this and are increasing their focus on monitoring and securing east-west communication within the network or cloud perimeter. Most commonly, this begins with greater scrutiny of network-level communication among internal endpoints and workloads. However, the explosive growth in internal API use has created a second category of east-west communication, as internal applications and services communicate with one another programmatically.
Even though most organizations recognize the problem, many are still struggling to solve it. The volume of east-west network traffic, which generally exceeds north-west traffic by a wide margin, is one of the biggest complicating factors.
And, now, the introduction of a new category of east-west API communication is making the problem even bigger and more complex. APIs have very different risks and attack vectors than traditional network-based threats. In addition, since this new category consists of automated, machine-to-machine communication, the traffic volume can grow to become even more substantial.
The danger of east-west visibility gaps
As convenient as it was in the past to assume that all internal traffic can be implicitly trusted, this no longer reflects the realities of today’s threat landscape. Threat actors will inevitably exploit data center and cloud security weaknesses to gain unauthorized network, cloud, or system access. Whether or not these breaches will escalate into large-scale incidents hinges on an organization’s ability to detect threats in east-west traffic.
The sheer volume of east-west traffic, along with the fact that it is often assumed to be legitimate, work to the advantage of threat actors. Once they establish a foothold in a trusted environment, they will generally attempt to move laterally toward higher-value assets.
These efforts sometimes advance quickly, but they may also unfold over several months, with the threat actors blending their activities in with legitimate east-west traffic. What’s more, APIs add an entire new dimension to the east-west visibility and monitoring challenges.
Ignoring API traffic is no longer an option
Internal APIs are now widely used to make sensitive data and business workflows accessible to multiple applications. Internal APIs are likely assumed to be “safer,” since they should not be available outside the organization. But how would you know if they have been compromised?
You need to see and assess their behavior to know if your organization is safe. Ignoring API traffic is no longer an option. APIs provide a new and potentially devastating attack vector for threat actors attempting to move laterally within an on-premises or cloud environment.
In a more traditional breach scenario, a threat actor may need to go through the effort of escalating privileges and exploiting system-level vulnerabilities to move laterally. Internal APIs, however, make available an entirely new set of attack techniques.
Vulnerabilities in API implementations are common
In some cases, internal APIs may be implemented without the necessary security controls in place, since they are assumed to be inaccessible by outside parties. But even when sound security practices are used, vulnerabilities in API implementations are common. Too frequently, internal east-west APIs are misconfigured and unknowingly left exposed to the internet. If found, what was an east-west API can quickly become the source of a data breach.
Some attacks may not even require an API vulnerability; instead, the threat actor may simply abuse standard API functionality. This is particularly difficult to detect since it’s nearly indistinguishable from sanctioned API use. And even if an organization has a dedicated WAAP platform in place, it is generally focused on north-south API activity only.
Get east-west visibility and policy enforcement
Through our heritage as a leader in content delivery, we are well-known for our ability to optimize the performance, scalability, and security of north-south application activity. And through our strategic acquisitions, such as the Guardicore and Neosec acquisitions, we have also gained a highly differentiated set of capabilities to visualize and secure east-west activity.
Together, Akamai Guardicore Segmentation and Akamai API Security address the key elements of east-west traffic discovery, analysis, and threat detection in a highly complementary manner.
Akamai Guardicore Segmentation |
Akamai API Security |
|
---|---|---|
Discovery |
Discover endpoint and application flows |
Find every API in use across the organization |
East-west visibility |
See lateral movement on the network |
See the APIs that connect internal apps |
Threat detection |
Detect anomalous and noncompliant network activity |
Detect API vulnerabilities and noncompliant API usage |
Policy enforcement |
Enforce agent-based and agentless integration with network controls |
Enforce agentless integration with API gateways and WAAP platforms |
Get data-driven infrastructure-level threat hunting as a service |
Get data-driven API threat hunting as a service |
Comprehensive discovery is the foundation of east-west visibility and protection
Akamai Guardicore Segmentation
When it comes to both east-west network traffic and API use, effective information discovery is a building block for your visibility, detection, and policy enforcement approach. Even if effective security capabilities are in place for east-west traffic, they will not be effective if they are operating with incomplete data.
Akamai Guardicore Segmentation uses an extensive collection of techniques to ensure that all endpoints and application workloads, as well as all the information flows between them, are discovered. This includes network-level collectors, host-based agents, cloud provider API integrations, and more.
Akamai API Security
Akamai API Security uses a similarly broad approach to discover all APIs in use across the organization, including rogue or shadow APIs that bypass standard systems and practices. This includes log collection from all available sources, including API gateways, content delivery networks, network devices, cloud platforms, and more.
Collectively, the discovery capabilities of Akamai Guardicore Segmentation and Akamai API Security help ensure that you have a complete view of east-west activity at multiple levels of your application stack.
Prevent lateral movement in data center and cloud environments
Akamai Guardicore Segmentation allows you to visualize all the communication flows in your data center and/or cloud environments with a high degree of detail. You can use these insights to create granular Zero Trust segmentation policies that tightly control the communication flows between endpoints and application workloads.
In addition to blocking activity that does not comply with your segmentation policies, Akamai Guardicore Segmentation also uses Akamai threat intelligence to detect and alert you when suspicious activity appears in your east-west data center and cloud traffic.
Extend east-west visibility and policy controls to APIs
Just as Akamai Guardicore Segmentation allows you to visualize and manage communication flows, Akamai API Security provides visibility into all your API activity, including east-west API use, and uses sophisticated behavioral analytics to detect API abuse that would otherwise be hidden within legitimate activity.
Akamai API Security generates information-rich alerts when suspicious API use is detected. It can also perform automated policy responses, such as revoking credentials or implementing rate limiting, through integrations with Akamai or third-party WAAP platforms.
Conclusion
Gaining visibility and control over east-west communication is one of the highest-impact improvements that organizations can make to their security posture. Doing it well requires east-west visibility across a multitude of areas — from the more traditional networks in on-premises and cloud environments to the new network of interconnected APIs.
Together, Akamai Guardicore Segmentation and Akamai API Security make it easy to:
Gain east-west visibility at all levels of your network and application stack
Detect malicious activity that is attempting to hide in east-west traffic
Implement granular policies that prevent threat actors from moving laterally and abusing APIs
Read more about API security in a Zero Trust world.