that allow you to maintain traffic visibility while still mitigating security risk
of encryption protocol attacks.
2.
Set IP address allow and deny lists for small numbers of API consumers:
a
common control used to restrict what API callers can even make a network
connection to your API, let alone authenticate or transact with it, is the IP
address allow and deny list. This network security control is often found
within APIM, API gateways, and network infrastructure elements like a load
balancer. The lists may also be based on threat intelligence feeds of known
malicious IP addresses. IP address allow and deny lists can be useful if your
API is interacted with by a limited set of partners or consumers. If your API
is public or open though, it is extremely difficult to scale this type of control
for the larger Internet. You may opt to block certain blocks of IP addresses
allocated to geographical regions, but know that attackers can circumvent
IP address deny lists with proxies and VPNs. Attackers will also spin up
ephemeral workloads in cloud providers to launch their attacks, which is
often allowed address space as organizations adopt cloud technology.
Attackers may also use networks of compromised endpoints to perpetuate
attacks. In practice, IP address allow and deny lists need to be much more
dynamic and paired with behavior analysis and anomaly detection engines
to be effective.
3.
Dostları ilə paylaş: