Backups vs. Retention
We often run into situations where different staff in an institution have different understandings of the goals and operations of their backup...
Application programming interfaces, or APIs, enable applications to exchange data and functionality easily with other applications and users in or outside an organization. Examples of APIs you may be familiar with are travel sites with pull-in information on reservations from various sources, IoT applications that allow your phone to talk to your refrigerator and Google maps pulling in location information.
They are quickly becoming common because of the benefits and convenience they offer, and as such are also becoming favorite targets for hackers. A recent survey from Cloudentity noted 44% of surveyed organizations experienced considerable security issues with APIs including data leakage and exposure of private information. To add fuel to the fire, studies also found that organizations are not confident in their ability to properly secure APIs (only 2%), attacks are significantly increasing (up to 6x over a year of study), and demand for API programming continues to grow. No doubt these trends are the reason the FFIEC has included guidance on API development security and management in the new AIO booklet.
If you are considering APIs to enhance your integrations or mobile services, please consider the following advice to build in these controls prior to go-live:
A great way to ensure you have the proper controls and mitigations in place is to perform a risk assessment prior to go-live. Examiners are beginning to look for these ahead of your annual risk assessment so performing one ahead of your API deployment is a great idea. Here’s a previous blog post to help refresh your memory: The Regular Risk Assessment Revolution.
If you need help with your risk assessment, please contact us at support@bedelsecurity.com.
https://www.darkreading.com/vulnerabilities-threats/api-security-issues-hinder-application-delivery
We often run into situations where different staff in an institution have different understandings of the goals and operations of their backup...
In August, the FFIEC released new guidance titled “Authentication and Access to Financial Institution Services and Systems”. Because the guidance...
News this week brought us word of something very disappointing, a breach in a large player in the identity services company, Okta. If I’m being 100%...