API & Web Application Security
Together, we can reinvent your business
IT security and cybersecurity consulting services to help your company achieve the needed security posture that addresses today’s vast array of sophisticated threats.
Web applications present the highest security risk to businesses, and legacy web application firewalls (WAFs) can no longer secure modern cloud-native applications or APIs.

Comprehensive API & Web Application Security
API Security Top 10 2023
Here is a sneak peek of the 2023 OWASP version:
-
API1:2023 – Broken Object Level Authorization
APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface of Object Level Access Control issues. Object level authorization checks should be considered in every function that accesses a data source using an ID from the user.
-
API2:2023 – Broken Authentication
Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or to exploit implementation flaws to assume other user’s identities temporarily or permanently. Compromising a system’s ability to identify the client/user, compromises API security overall.
-
API3:2023 – Broken Object Property Level Authorization
This category combines API3:2019 Excessive Data Exposure and API6:2019 – Mass Assignment, focusing on the root cause: the lack of or improper authorization validation at the object property level. This leads to information exposure or manipulation by unauthorized parties.
-
API4:2023 – Unrestricted Resource Consumption
Satisfying API requests requires resources such as network bandwidth, CPU, memory, and storage. Other resources such as emails/SMS/phone calls or biometrics validation are made available by service providers via API integrations and paid for per request. Successful attacks can lead to Denial of Service or an increase of operational costs.
-
API5:2023 – Broken Function Level Authorization
Complex access control policies with different hierarchies, groups, and roles, and an unclear separation between administrative and regular functions, tend to lead to authorization flaws. By exploiting these issues, attackers can gain access to other users’ resources and/or administrative functions.
-
API6:2023 – Unrestricted Access to Sensitive Business Flows
APIs vulnerable to this risk expose a business flow – such as buying a ticket, or posting a comment – without compensating for how the functionality could harm the business if used excessively in an automated manner. This doesn’t necessarily come from implementation bugs.
-
API7:2023 – Server-Side Request Forgery
Server-Side Request Forgery (SSRF) flaws can occur when an API is fetching a remote resource without validating the user-supplied URI. This enables an attacker to coerce the application to send a crafted request to an unexpected destination, even when protected by a firewall or a VPN.
-
API8:2023 – Security Misconfiguration
APIs and the systems supporting them typically contain complex configurations, meant to make the APIs more customizable. Software and DevOps engineers can miss these configurations, or don’t follow security best practices when it comes to configuration, opening the door for different types of attacks.
-
API9:2023 – Improper Inventory Management
APIs tend to expose more endpoints than traditional web applications, making proper and updated documentation highly important. A proper inventory of hosts and deployed API versions also are important to mitigate issues such as deprecated API versions and exposed debug endpoints.
-
API10:2023 – Unsafe Consumption of APIs
Developers tend to trust data received from third-party APIs more than user input and so tend to adopt weaker security standards. In order to compromise APIs, attackers go after integrated third-party services instead of trying to compromise the target API directly.

Khader Mohammed
Cybersecurity Lead

Why Choose API & Web Application Security
- Proactive defense against emerging threats.
- Tailored solutions that align with your goals and industry.
- Increased organizational resilience and readiness.
- Support for achieving and maintaining regulatory compliance.
Our API & Web Application Security Process
We offer services to guide your firm to simplify deployments with agent-based and agentless deployment options for all cloud-native applications, delivering full, customizable support for the OWASP Top 10.
Secure web applications from top security risks:
Cover SQL injection, cross-site scripting, code injection and more.
Identify applications and APIs in any compute format:
Automatically discover web-facing services and API risks to determine protection.
Enforce application security on microservices locally:
Automatically enforce WAAS at the service level to keep up with auto-scaling, ephemeral environments.
Leverage full, customizable protection:
Select which enforcement mechanism – alert, prevent or ban – to apply for each security scenario.
Deploy agents as a part of your DevOps workflow:
Use code-based deployment mechanisms to enable automatic deployment of protection with every code push.
Take a unified approach to cloud-native security:
Use a single, unified cloud security solution for superior protection compared to point products.

Understanding Your Security Needs and Goals
We start by thoroughly assessing your current security landscape, including infrastructure, systems, and processes. We work to understand your business objectives and industry-specific compliance requirements to ensure our solutions align with your operational goals.

Uncovering Gaps and Vulnerabilities
Once we have a clear picture of your environment, we conduct a detailed analysis to identify gaps and vulnerabilities. This step involves evaluating potential risks in your systems, processes, and policies to uncover areas that could expose your organization to cyber threats.

Crafting a Tailored Security Strategy
The key to comprehensive protection is accuracy, precision and depth. With WAAS, you can enable customizable protection spanning the OWASP Top 10, API protection, risk profiling, file uploads, geolocation-based controls and more.
Auto-discover web applications and APIs:
Automatically detect web-facing and API services to protect, even in ephemeral environments.
API risk profiling:
Identify API risk factors, sources of risk, vulnerabilities and changes to prioritize remediation or protection.
Secure APIs against Layer 7 attacks:
Simplify enforcement of positive API definitions based on OpenAPI, Swagger file or manual customization.
Configure fully for each API endpoint:
Customize the level of alerting and blocking for the unique use cases of your applications.

Implementing Solutions for Stronger Protection
Bot risk management
The internet is full of bots, but not all bots are malicious. Gain visibility into bot activity to allow known-good bots, such as search engine crawlers, to go through while other malicious bots are blocked.
Allow and monitor known bots:
Allow good bots such as search engine crawlers and news bots to crawl your applications, but monitor and block abusive behavior.
Control unknown bots:
Alert or block requests originating from bots with unknown intent, including headless browsers, command-line tools and good bot impersonators.
Define custom bots:
Create bot definitions for bots your team decides are known-good or malicious.
Configurable for each application:
Set application- or individual-service-level configurations for bot protection rules.

Ensuring Continuous Security Improvement
Continuous visibility
Gaining visibility into protected and unprotected web applications and APIs is the first step to comprehensive protection. That’s why we implement solutions to automatically identify the protection status of web apps in our centralized Radar with a simple, straightforward UI to quickly enable customizable protection.
Find and protect your entire web app and API surface:
Use WAAS to detect unprotected web applications and flag them for protection.
Reduce noise by identifying only public-facing APIs:
Automatically detects web app and API behavior and does not flag services without an API.
Leverage advanced analytics for investigations:
Use analytics to observe WAAS audits in aggregate from different points of view, filter them and dive into individual events for incident investigations.
View all security events in a single console:
Identify vulnerabilities, compliance violations, runtime events and WAAS events in one dashboard.
Virtual patching
When vulnerabilities are discovered, exploit kits are often released before a patch is available. Protect against unpatched vulnerabilities at the service level.
Reduce risk until official patches are released:
Use virtual patching to create a safeguard against exploits until the underlying service can be patched.
Add custom WAAS rules for signatures from your team:
Take advantage of custom rules, a guided, auto-complete way to secure against exploits when your research teams identify vulnerabilities.
Protect against zero-day exploits:
Automatically receive updated WAAS rules from our Labs and choose whether to apply them.
Access Control
Protecting your application from unwanted access is a top priority for application security teams. WAAS allows for control over how applications and end users communicate with the protected web application.
Control inbound access to the application:
Network controls allow administrators to deny inbound access to the application as well as allowed IPs.
Block request based on headers:
WAAS lets you block or allow requests that contain specific strings in HTTP headers.
Protect against malicious files:
Protect your applications against malware dropping by restricting uploads to just the files that match any allowed content types.
Take the First Step Toward Enhanced Cybersecurity
Protect your business, safeguard your data, and build resilience against evolving threats with StonyPoint’s expert cybersecurity solutions.
Cybersecurity Consulting in Action
- API design and development: Creating well-structured, documented, and secure APIs using Boomi’s API Management tools.
- API Gateway configuration: Setting up a unified entry point for managing API traffic and access control.
- API lifecycle management: Managing API versions, updates, and deprecation strategies
- Data mapping and transformation: Transforming data between different systems to ensure compatibility with API interactions.
- Integration with existing systems: Connecting Boomi APIs to on-premise and cloud applications.
- Security and authentication: Implementing robust security measures for API access and data protection
- Monitoring and analytics: Tracking API performance, usage, and error analysis
- Improved data connectivity: Seamless integration between diverse applications and data sources
- Faster time to market: Rapid development and deployment of APIs
- Enhanced business agility: Adapting to changing business needs with flexible API solutions
- Increased efficiency: Automating data flows and workflows through APIs
- Improved customer experience: Providing consistent and reliable access to data through APIs
Cybersecurity Program Assessments evaluate the maturity, effectiveness, and readiness of your organization’s security framework. These assessments identify gaps, align your program with …
A global manufacturing company achieved a 90% improvement in its security posture after implementing recommendations from a StonyPoint Cybersecurity Program Assessment. Use …
Cybersecurity Consulting empowers organizations to identify vulnerabilities, implement proactive strategies, and build resilient defenses. At StonyPoint, our consultants partner with your team …