Phone : +91 95 8290 7788 | Email : sales@itmonteur.net

Register & Request Quote | Submit Support Ticket

Home » Cyber Security News » CISOs unpack API security strategy to secure digital transformation efforts, ET CISO

CISOs unpack API security strategy to secure digital transformation efforts, ET CISO

CISOs unpack API security strategy to secure digital transformation efforts, ET CISO

APIs truly make the digital world go round. They are the backbone of digital transformation for both digital native and traditional businesses. But this also makes them a prime target for security threats. From API sprawl to Shadow APIs, the challenges are many. And strategies like Open authentication, Zero Trust models, rate limiting, etc. too are discussed widely. But what’s the blueprint of a CISOs strategy to secure APIs?

The scale at which Paytm operates and the massive number of transactions processed daily, API sprawl and Shadow APIs can pose significant risks. How does Amit Malhotra, CISO, Paytm Group address this challenge, especially when managing third-party integrations and microservices architectures?

Malhotra says, “APIs interact and can communicate sensitive information too- can be financial transactions, personal info too. It’s imperative as a security officer to protect these APIs. We should have an integrated approach of managing both API security and application security together- where we take help from DevSecOps. If you perform all security testing properly, I believe the vulnerabilities that can be exploited through API exploitation cannot happen.”

“API sprawl means you have a certain explosion and are not able to manage properly. API sprawl happens due to hybrid computing and microservices operating and continuous deployment. We may not be able to control but manage with API governance strategy. You can have an API gateway that can give central control. Have a single source of truth for API discovery hosted within your organization. You can have proper documentation and seek better visibility into the data transacting with the APIs. You must implement API security at scale,” adds Malhotra.

Security and privacy by design

As both the CISO and DPO, Pushkal Mishra, CISO & DPO, Dr Lal Path Labs has to align security with data privacy. How does Mishra then leverage API gateways? “API security strategy is one element. Security is a way to ensure there are loopholes of APIs contained. Privacy ensures that the party on the other side sees only what’s required. Security is instrumental in driving privacy strategy.”

“APIs have different stakeholders- consumer, developer, admin, vendors. How would you stitch it without a common platform to interact with? You need to have a way to discover shadow APIs beyond WAF. API gateway is probably the way to create a holistic experience. API gateways are instrumental in delivering valuation specific to APIs,” says Mishra.

“Compliance is one more trigger to ensure I take care of my APIs well. APIs might have sensitive information. Security elements become more pronounced with privacy. Data minimization and non security elements come together with API strategy,” he adds.

Securing APIs that are part of complex, interconnected systems involving multiple stakeholders is also a challenge. “Stick to the basics, shift left as much as possible and ensure developers building APIs have a clear line of sight,” says Sriram Lakshmanan, Dy CISO, Genpact.

  • Published On Oct 14, 2024 at 11:15 AM IST

Join the community of 2M+ industry professionals

Subscribe to our newsletter to get latest insights & analysis.

Download ETCISO App

  • Get Realtime updates
  • Save your favourite articles


Scan to download App

Information Security - InfoSec - Cyber Security - Firewall Providers Company in India

 

 

 

 

 

 

 

 

 

 

 

 

What is Firewall? A Firewall is a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. At its most basic, a firewall is essentially the barrier that sits between a private internal network and the public Internet.

 

Secure your network at the gateway against threats such as intrusions, Viruses, Spyware, Worms, Trojans, Adware, Keyloggers, Malicious Mobile Code (MMC), and other dangerous applications for total protection in a convenient, affordable subscription-based service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services. Stateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols.

 

Firewall Firm is an IT Monteur Firewall Company provides Managed Firewall Support, Firewall providers , Firewall Security Service Provider, Network Security Services, Firewall Solutions India , New Delhi - India's capital territory , Mumbai - Bombay , Kolkata - Calcutta , Chennai - Madras , Bangaluru - Bangalore , Bhubaneswar, Ahmedabad, Hyderabad, Pune, Surat, Jaipur, Firewall Service Providers in India

Sales Number : +91 95 8290 7788 | Support Number : +91 94 8585 7788
Sales Email : sales@itmonteur.net | Support Email : support@itmonteur.net

Register & Request Quote | Submit Support Ticket