●
Routing defect tracking tickets to appropriate owners and speeding
up remediation
●
Informing API management policies and monitoring capabilities
●
Informing data security protections
3.
Include the API dependencies of your APIs:
expand beyond just
homegrown APIs to also include APIs from open-source software, acquired
application packages, and third-party SaaS services. API security concerns
don’t begin and end with just your custom-built APIs. Vendor risk attestation
and contractual language are useful primarily as reactive measures that
provide for legal recourse, and they provide minimal guarantee at the
technology layer. Organizations are inherently limited by the configuration
options that are within their realm of control for third-party services. This
limitation does not absolve the organization from security risk though.
Significant gaps often exist between perceived design of an application and
its APIs as opposed to the delivered, integrated system. The combination of
built, integrated, and acquired APIs defines the digital supply chain that all
organizations work within.
4.
Dostları ilə paylaş: