API Security
Together, we can reinvent your business
StonyPoint provides an integrated approach to web application and API security.
By nature, APIs expose application logic and sensitive data such as Personally Identifiable Information (PII) and because of this have increasingly become a target for attackers. Without secure APIs, rapid innovation would be impossible.
API Security focuses on strategies and solutions to understand and mitigate the unique vulnerabilities and security risks of Application Programming Interfaces (APIs).
- Automatic visibility and comprehensive protection
- Inline and out-of-band deployment
- Full lifecycle protection at scale

Comprehensive API Security
“Today’s enterprises are managing an exploding number of apps and APIs across an increasingly complex hybrid, multicloud environment. At StonyPoint, we call the growing risk and complexity the “ball of fire.”
API Security Top 10 2023
Here is a sneak peek of the 2023 OWASP version:
API1:2023 – Broken Object Level Authorization
APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface of Object Level Access Control issues. Object level authorization checks should be considered in every function that accesses a data source using an ID from the user.
API2:2023 – Broken Authentication
Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or to exploit implementation flaws to assume other user’s identities temporarily or permanently. Compromising a system’s ability to identify the client/user, compromises API security overall.
API3:2023 – Broken Object Property Level Authorization
This category combines API3:2019 Excessive Data Exposure and API6:2019 – Mass Assignment, focusing on the root cause: the lack of or improper authorization validation at the object property level. This leads to information exposure or manipulation by unauthorized parties.
API4:2023 – Unrestricted Resource Consumption
Satisfying API requests requires resources such as network bandwidth, CPU, memory, and storage. Other resources such as emails/SMS/phone calls or biometrics validation are made available by service providers via API integrations, and paid for per request. Successful attacks can lead to Denial of Service or an increase of operational costs.
API5:2023 – Broken Function Level Authorization
Complex access control policies with different hierarchies, groups, and roles, and an unclear separation between administrative and regular functions, tend to lead to authorization flaws. By exploiting these issues, attackers can gain access to other users’ resources and/or administrative functions.
API6:2023 – Unrestricted Access to Sensitive Business Flows
APIs vulnerable to this risk expose a business flow – such as buying a ticket, or posting a comment – without compensating for how the functionality could harm the business if used excessively in an automated manner. This doesn’t necessarily come from implementation bugs.
API7:2023 – Server Side Request Forgery
Server-Side Request Forgery (SSRF) flaws can occur when an API is fetching a remote resource without validating the user-supplied URI. This enables an attacker to coerce the application to send a crafted request to an unexpected destination, even when protected by a firewall or a VPN.
API8:2023 – Security Misconfiguration
APIs and the systems supporting them typically contain complex configurations, meant to make the APIs more customizable. Software and DevOps engineers can miss these configurations, or don’t follow security best practices when it comes to configuration, opening the door for different types of attacks.
API9:2023 – Improper Inventory Management
APIs tend to expose more endpoints than traditional web applications, making proper and updated documentation highly important. A proper inventory of hosts and deployed API versions also are important to mitigate issues such as deprecated API versions and exposed debug endpoints.
API10:2023 – Unsafe Consumption of APIs
Developers tend to trust data received from third-party APIs more than user input, and so tend to adopt weaker security standards. In order to compromise APIs, attackers go after integrated third-party services instead of trying to compromise the target API directly.

Khader Mohammed
Cybersecurity Partner

Why Choose API Security
- Proactive defense against emerging threats.
- Tailored solutions that align with your goals and industry.
- Increased organizational resilience and readiness.
- Support for achieving and maintaining regulatory compliance.
Our API Security Process
Holistic Security Framework
Learn how to implement a comprehensive API security strategy that covers all critical components.
Mitigate Risks
Gain insights into identifying and mitigating API vulnerabilities to protect your data and applications.
Improve Compliance
Understand the importance of governance and how to ensure your APIs meet regulatory requirements.
Enhance Detection and Response
Discover effective methods for detecting API attacks and responding to security incidents in real time with key capabilities such as API discovery and automated protection.
Our cybersecurity consulting process is designed to provide a holistic approach to protecting your organization. From assessing your current security landscape to implementing tailored solutions and ensuring continuous improvement, we guide you through every step of the journey. With a focus on understanding your unique needs and addressing vulnerabilities, our methodology ensures your business stays resilient against evolving threats while aligning with your operational goals.

Understanding Your Security Needs and Goals
Summary of API Visibility Capabilities
• Single pane-of-glass dashboard monitors the entire API infrastructure across all gateways, data centers and clouds.
• Track all API activity and associates’ traffic to each user identity–with all APIs, URLs, tokens and IP addresses used by each user.
• Discover APIs including shadow APIs, forgotten APIs and old API versions still active.
• Deep activity insights are delivered for auditing, forensic and governance reports.

Uncovering Gaps and Vulnerabilities
Summary of API Anomalies Detection
Capabilities
• AI-based detection of API issues and vulnerabilities before they become costly and embarrassing, or worst exploited by hackers.
• Track all API activity and associates traffic to each user identity–with all APIs, URLs, tokens and IP addresses used by each user.
• Discover APIs including shadow APIs, forgotten APIs and old API versions still active.
• Deep activity insights are delivered for auditing, forensic and governance reports.

Crafting a Tailored Security Strategy
Some examples of common application and data attacks include:
• Data extraction or theft: When a hacker programs an attack to hit multiple accounts for information as opposed to going after just one.
• Account takeover attack: When hacker used its credentials to work out the API and reach other accounts.
• Fraud: When a hacker leverages the stolen account information for financial gain.
• Broken object level authorization: When a hacker finds vulnerabilities by manipulating API calls to access data, which should be restricted to authorized users.
• Data deletion or manipulation: When a hacker or employee erases or changes data to compromise or sabotage a system.
• Data injected into application service: When a hacker attempts to overload an API service by injecting excessive data, malicious code such as a keylogger or loading overly large data files.
• Query string or API header manipulation: When a hacker modifies the query string or headers to access unauthorized services or disrupt API processing.
• Targeted API DoS/DDoS Attacks: Hackers tune attacks to stay below rate limits, which can disable services provided by APIs and/or damage the user experience.
• API DDoS attacks are created to overwhelm services and take them offline. Hackers use many machines to send normal amounts of traffic to an API service, making it very difficult to detect; especially if they stay below the rate limits. Altogether, it creates a massive traffic overload.
• While API gateways specifically implement rate limiting to control individual activity, they generally cannot view aggregate traffic rates involving multiple clients. Therefore, they are powerless against a distributed DDoS attack.
• DDoS attacks target session management, login and other services key to application reliability, disrupting the application and hugely impacting both customer access and computing costs.

Implementing Solutions for Stronger Protection
As APIs are now being deployed across multiple datacenters, private clouds and public clouds, organizations need to evolve their approach on how to protect the valuable resources they interface.
This requires businesses to leverage AI/ML to centralize all monitoring and traffic analysis to create a single pane of-glass of API traffic, alongside anomaly and attack detection and remediation.
An Intelligent Approach to API Security Ultimately, taking an intelligent approach to API security enables your business to protect essential digital infrastructures against mishaps and hackers, while enabling teams to demonstrate compliance with internal policies and regulations.

Ensuring Continuous Security Improvement
Cybersecurity is a continuous journey. Our experts work with you to monitor your security environment, refine strategies, and adapt to emerging threats. We help you implement ongoing improvements to ensure your defenses remain robust and effective.
Take the First Step Toward Enhanced Cybersecurity
Protect your business, safeguard your data, and build resilience against evolving threats with StonyPoint’s expert cybersecurity solutions.
Cybersecurity Consulting in Action
API Gateway and Load Balancer Integrations
You can leverage your existing API infrastructure investments with integrations available to connect to a wide variety of API gateways and some load balancers.
An agent is used to capture your gateway clusters’ traffic metadata for processing by the AI engine deployed in the cloud or on-premise, depending on your deployment choice.
You can deploy with your API gateways in two ways:
• Sideband mode where the agent is placed next to the gateways to minimize network and infrastructure modifications.
• Inline mode with the agent deployed as a high performance reverse proxy. When deployed inline, the solution also supports APIs that are implemented directly on application servers and not on an API gateway.
Cybersecurity Program Assessments evaluate the maturity, effectiveness, and readiness of your organization’s security framework. These assessments identify gaps, align your program with …
A global manufacturing company achieved a 90% improvement in its security posture after implementing recommendations from a StonyPoint Cybersecurity Program Assessment. Use …
Cybersecurity Consulting empowers organizations to identify vulnerabilities, implement proactive strategies, and build resilient defenses. At StonyPoint, our consultants partner with your team …