鈥淚f you build it, he will come鈥 is a notable line from the film , starring Kevin Costner and James Earl Jones. 鈥淗e鈥 in this case is 鈥淪hoeless鈥 Joe Jackson, who played for the Chicago White Sox in the early 1900s. As a result of the World Series scandal in 1919, during which Joe鈥檚 team was accused of throwing games, he was banned from the major leagues. It鈥檚 a film that offers memorable lessons, such as following your dreams even when you are the only one who believes in them, but also that even when you build something good, there may be unexpected pitfalls.
Attracting users to your products and services is the primary goal of most digital transformations. However, it is likely that you will also attract unauthorized users and attacks on your systems and resources unless you during and after migration to the cloud. With the explosion of API utilization, targeting this data transport channel has become a prime activity of unscrupulous actors in cyberspace. Therefore, it is imperative that you adopt a security-focused approach to API management.
Creating an effective API management security solution requires essential attributes, which we discuss in this article after first explaining the challenge of simultaneously providing and blocking access to users.
Over the last few years, several major corporations have experienced major breaches of their applications. These include , , , and . They were all avoidable and they should serve as a reminder that in order to utilize and take advantage of the many opportunities to improve the UX for customers, enterprises today must employ to guard against threats. This means acquiring and utilizing . Achieving this feat can be quite complicated, as it involves two opposing functionalities: accessibility and inaccessibility.
API accessibility is the allowing of users to interact with or extract information or data from an API. APIs are classified according to who has access:
As APIs expose system resources to users, access has to be restricted. The degree to which an API is inaccessible and for whom access is denied is based on its classification. Access may be necessary to some objects, but not all. An effective way to manage this type of varying access is by using an access protocol standard such as . OAuth enables federated application access without the need for a password that may be used to compromise additional data and information.
One of the most common threats to user accessibility are 鈥渄enial of service鈥 or DoS attacks. The purpose of these attacks is not to access sensitive information, but rather to disrupt or halt the ability of authenticated users from using your services by overwhelming your system or crashing it, respectively. The impact of these events can be significant in terms of workflow interruption, revenue impacts, and user dissatisfaction. To prevent these events and others, it is imperative that you make security a primary focus of your API architecture and management.
APIs are the gateways for optimization of the UX; however, there are bad actors that seek to utilize private and partner APIs to access Personally Identifiable Information (PII) of your customers and/or privileged organizational data. To help guard against these events, your API management must possess the following essential attributes:
In most cases, the best way for you to check off the list of API management security must-haves listed above is to partner with a expert that not only understands the cyberthreats that your enterprise faces, but has experience in employing the best techniques and tools to mitigate them.
听
听
听
Level up your Salesforce DevOps skills with our resource library.