Need cloud computing? Get started now

API Gateway Security

A centralized way to manage APIs

APIs are everywhere today, allowing various software systems to communicate in ways that power our increasingly connected world. APIs, or application programming interfaces, provide a set of rules and tools that enable diverse software programs written in different languages to exchange information and share functionality. API gateways provide a centralized point for managing, securing, and optimizing API calls — both requests and responses.

Because they are critical to so many processes and often connect to sensitive data, APIs have become a favorite target of malicious actors. As a result, security teams must adopt protocols, practices, and measures that ensure API gateway security and protect the underlying microservices and back-end services that APIs support.

What is an API?

An API is a set of protocols and definitions that allow software components from different systems or written in different languages to nevertheless communicate easily and share information. By standardizing the way that applications communicate, APIs allow one application to access and incorporate data and functions provided by another application. For example, when developers want to include the latest weather information on a website, they can use an API to access data from a weather-related source rather than creating their own separate application to collect and interpret weather data. APIs are involved in almost every online action and transaction, from ecommerce and mobile payments to social media platforms and cloud services, which means they create a large attack surface.

What are threats to APIs?

Hackers now target APIs because they often provide access to sensitive data or may allow attackers unauthorized access to larger systems. With the rapid proliferation of APIs, security teams often are unaware of all the APIs in their organization’s digital ecosystem, making it more difficult to adequately protect each API with security controls and regular patches and updates. API security can be jeopardized by a variety of risks, including vulnerability exploits, authorization errors, authentication issues, and denial-of-service attacks.

What is an API gateway?

An API gateway is a layer of software that serves as a single entry point for managing API calls or client requests and returning responses from API endpoints. API gateways route incoming requests to the appropriate microservice or back-end service, combining multiple requests into a single request or splitting single requests into multiple requests to fulfill a client’s need most efficiently. API gateways also translate protocols between different apps and microservices and may serve as a load balancer to optimize API performance.

What is API gateway security?

An API gateway can perform a broad range of security functions to prevent API abuse and attacks, and enhance an organization’s security posture.

  • Authentication. API gateways may validate credentials such as ID tokens to authenticate the identity of all API requests.
  • Rate limiting and throttling. API gateway security measures include the ability to limit the number of times an API can be called within a specific period of time to ensure that processing capacity is not exceeded or overwhelmed. This helps prevent denial-of-service attacks, as well as brute-force attacks and trial-and-error attacks, where hackers attempt to access systems by repeatedly trying various credentials.
  • Policy enforcement. API gateways can enforce policies and rules — especially around authentication, authorization, and access control — to be followed when accessing microservices and back-end services.
  • Signature-based protection. APIs can block certain threats by recognizing the signatures and patterns of known attacks.
  • Logging and monitoring. API gateways enable continuous monitoring of API traffic and metrics around API usage. Gateways may also maintain a log of all transactions that provides insight into usage and security issues.
  • Decoupling. To enhance security, an API gateway decouples back-end services from front-end applications to eliminate any direct contact between them. This can help to block SQL injection attacks, where malicious code is injected into back-end databases.

How effective is API gateway security?

While API gateways are an important part of a security program, they are only one layer of protection, so some security vulnerabilities remain a threat. Attacks like Broken Object Level Authorization (BOLA) may appear as normal traffic to an API gateway, leaving systems vulnerable to BOLA and Broken Object Property Level Authorization (BOPLA) attacks. Gateways also do not provide sufficient visibility into API inventory to ensure security teams are aware of all APIs, and that each API is protected by appropriate controls and policy. For this reason, many organizations use additional API protection solutions in concert with an API gateway to improve visibility of the attack surface.

What are API gateway security best practices?

Organizations and their security teams can improve API gateway security by adhering to these best practices.

  • Centralize authentication. By centralizing API authentication at the gateway, organizations can minimize the risk of each microservice attempting independently to manage access, token verification, and other elements of the authentication process, which can lead to complexity and security gaps.
  • Implement rate limiting. Controlling the number of API requests can prevent excessive requests — both malicious or legitimate — from overwhelming services and from succumbing to DoS or DDoS attacks.
  • Monitor continuously. Continuous monitoring and analytics can help to detect potential threats and solve client access and request issues.
  • Remove unused and deprecated APIs. Security teams can enhance API gateway security by keeping track of all APIs and removing APIs that are no longer used or that no longer support the latest security measures.
  • Enable a web application firewall (WAF). Deploying a WAF in networking and API security programs can block common threats like injection attacks and cross-site scripting by limiting access to APIs based on defined rules and conditions.
  • Leverage behavioral analytics. A SaaS-based behavioral analytics solution can record all API activity to determine a baseline for normal behavior. Then it can alert potential threats and recommend defensive or proactive responses.

 

Frequently Asked Questions (FAQ)

OpenAPI is an open standard and specification language for HTTP APIs that articulates structure and syntax in a way that’s not married to the programming language the API is created in. With OpenAPI, DevOps can easily communicate how an API works in a specification encoded in a JSON or YAML document. OpenAPI security refers to the various security schemes that restrict access to applications based on authentication and that may involve encryption, authorization, and other measures to protect the integrity, availability, and confidentiality of the API.

BOLA is an acronym for Broken Object Level Authorization, one of the most potent threats to API security and API gateway security. Part of the OWASP API Security Top 10 threats, this vulnerability enables hackers to manipulate input parameters like URL parameters or request payloads to access unauthorized data or perform unauthorized actions.

BOPLA stands for Broken Object Property Level Authorization. BOPLA differs from BOLA by referring to a property inside an object, whereas BOLA refers to a whole object. API security measures designed to protect against BOLA do not ensure API security against BOPLA, so it’s essential that security teams adopt solutions designed to defend against both types of attacks.

Why customers choose Akamai

Akamai powers and protects life online. Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every day. Akamai Connected Cloud, a massively distributed edge and cloud platform, puts apps and experiences closer to users and keeps threats farther away.

Explore all Akamai security solutions