A report by cyber security vendor Radware reveals that 92% of companies state they have a plan in place to adequately protect APIs from cyberattacks, yet 62% admit a third or more of APIs are undocumented
Radware’s 2022 State of API Security report survey, conducted with Enterprise Management Associates, reveals a false sense of security among organisations when it comes to API protection.
The survey includes responses from chief information officers, chief technology officers, vice presidents of IT, and IT directors from global organisations across North America, EMEA, and APAC.
According to the survey, API usage is on the rise. Ninety-two percent (92%) of the organisations surveyed have significantly or somewhat increased their API usage with 59% already running most of their applications in the cloud. Additionally, almost 97% of organisations use APIs for communications between workloads and systems, highlighting the growing reliance on APIs in day-to-day business operations.
The real and underestimated threat of undocumented APIs
While 92% of those surveyed believe they have adequate protection for their APIs and 70% believe they have visibility into applications that are processing sensitive data, 62% admit a third or more of APIs are undocumented. Undocumented APIs leave organisations vulnerable to cyber threats, such as database exposures, data breaches, and scraping attacks.
“For many companies, there is unequivocally a false sense of security that they are adequately protected from cyberattacks. In reality, they have significant gaps in the protection around unknown and undocumented APIs,” said Gabi Malka, Radware’s chief operations officer and head of research and development.
“API security is not a ‘trend’ that is going away. APIs are a fundamental component to most of the current technologies and securing them must be a priority for every organisation.”
Bot attacks remain a threat along with misperceptions about API protection
Nearly one third of companies (32%) surveyed stated automated bot attacks are one of the most common threats to APIs. In terms of detecting an API attack, 29% say they rely on alerts from an API gateway and 21% rely on web application firewalls (WAF).
Malka added: “The survey data indicates that API protection is not keeping up with API usage. Many organisations are basing their API security strategies on false assumptions — for example that API gateways and traditional WAFs offer sufficient protection. This leaves APIs vulnerable and exposed to common threats, like bot attacks.
A comprehensive API protection solution, that includes bot protection, will address these threats. But very few respondents indicated that they had solutions that actually did or even had the capability to provide effective security. Enterprise protection is only as strong as its weakest link.”
API attacks flying under the radar
Half of companies surveyed viewed their existing tools as only somewhat or minimally effective at protecting their APIs, with 7% reporting that the solutions they have in place did not identify any attacks at all. The inability of the existing tools to adequately protect APIs from common threats further adds to the false security narrative.
Open source contributes to security myth
Sixty-five percent (65%) of respondents believe that open-source code is more secure than proprietary code and nearly 74% believe that container-based deployments and microservice architectures are more secure than monolithic architectures and deployments by default.
According to Malka: “The belief that open source is more secure by design could explain why some organisations are lax when it comes to patch management. Yet, as we have seen with Log4j and Heartbleed, open source can have the same security flaws as proprietary code. Believing that open source is inherently more secure by default only further contributes to the false narrative that leaves organisations vulnerable to cyber-attacks.”