OWASP releases list of Top 10 API security risks

Share post:

The Open Worldwide Application Security Project (OWASP) has released the second edition of its Top 10 API Security vulnerabilities.

It’s the first update since 2019 and aims to be a comprehensive guide to help API developers, designers, architects and managers understand the risks and threats associated with their APIs, and how to secure them.

Application programming interfaces play a very important role in modern application architecture, the introduction to the list notes, adding, “But since innovation has a different pace than creating security awareness, we believe it’s important to focus on creating awareness for common API security weaknesses.”

Note the list doesn’t do risk analysis. Your organization will have to decide how much security risk from applications and APIs the organization is willing to accept, given your culture, industry, and regulatory environment, the report notes.

The Top 10 are

— broken object level authorization;
— broken authentication;
— broken object property level authorization
— unrestricted resource consumption
— broken function level authorization
— unrestricted access to sensitive business flows;
— server side request forgery;
— security misconfiguration;
— improper inventory management;
— unsafe consumption of APIs

APIs and cybersecurity go hand in hand, argues Mimecast. In fact, the company said in a blog, since they’re predominantly used over public networks, API security is a priority for developers at each stage of design, particularly since highly sensitive information such as login credentials is often shared between two pieces of software using the API. This means that integrating cybersecurity best practices when developing an API must be considered the benchmark upon release.

In a 2022 report, Imperva and Marsh McClennan Global Cyber Risk Analytics Center said that a lack of secure APIs could cost organizations around the world at least US$41 billion a year.

In January, U.S. wireless carrier T-Mobile admitted that a hacker leveraged an API to steal the personal information of 37 million customers over two months late last year. Malicious API requests targeting unprotected APIs are the top threat in the industry, a 2022 research report by Cequence Security revealed.

“The new API Top Ten may not be perfect,” said Jason Kent, hacker in residence at Cequece Security, “but it does show us exactly what we have known for several years now. The landscape of API security is changing, and organizations need to change with it. Whether it is knowing where your APIs are, testing them for flaws or mitigating bots attacking your unknown flows, API security needs to be a focus for everyone, and this new list is a great place to start.”

The post OWASP releases list of Top 10 API security risks first appeared on IT World Canada.
Howard Solomon
Howard Solomonhttps://www.itworldcanada.com
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.

SUBSCRIBE NOW

Related articles

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Cyber Security Today, May 15, 2024 – Ebury botnet still exploits Linux servers, Microsoft, SAP and Apple issue security updates

The Ebury botnet continues to exploit Linux servers, Microsoft, SAP and Apple issue security updates, and more. Welcome to...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways