EC-MEA June 2023

Page 70

GUEST COLUMN

How to build an API with security in mind A business should protect their API endpoints by using an API gateway that provides robust authentication, authorization, and continuous auditing capabilities.

A

pplication programming interfaces (APIs) are the preferred means of connecting modern applications and have become an indispensable part of application development. Businesses rely on them to share data with developers, third parties, and customers. However, the data they handle and the endpoints they access also make them an attractive target for hackers looking to illegally access sensitive organization data. While you can add security features to APIs during or after deployment, it’s often not enough. To properly secure them, you need to include security in the design phase and build it from the ground up. This gives you a better chance of protecting your API from threats.

Build APIs with a security foundation Security is a constantly evolving challenge. Cybercriminals are always looking for new ways to exploit vulnerabilities to their benefit. This is why it is important to consider security requirements from the beginning. You must deliberately design what should and what should not be allowed rather than trying to patch things further on in the process.

Design security Building a secure API starts before a developer writes their first line of code. It begins when they design how the API will work, who it will serve, and what information it’ll carry. So, this

70

EC JUNE_2023.indd 70

MEA

should be addressed before development is in full swing. Thinking about it this way allows for the seamless application of security controls and practices as you build the API. One group that is almost always going to be affected by additional API security measures is the users. For instance, some security measures will require them to provide their credentials regularly. This jumping through hoops degrades the user experience. That’s why engaging users in the initial design stage is essential.

Security focal points There are three focal points that a developer has to consider while creating a secure API. They include authentication, authorization, and auditing. Let’s discuss what each one entails.

1. Authentication Authentication involves determining who a user is. Some methods that can be used to authenticate API users include API keys, HTTP basic authentication, OAuth authentication, and Multi-Factor authentication (MFA). l HTTP basic authentication: This involves combining a username and a password, encoding them, and including them as a special HTTP header in every request. Before a server can process a request, it verifies the client’s identity using the sent credentials. l API key authentication: This involves including a key with a long series of numbers and letters in the header of every request. The server grants an API key to each user and identifies the client making that request using their API key.

J U N E 2023

6/16/2023 5:37:16 PM


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

The rise of service robots

5min
pages 76-78

Right solutions, strategy and insights

3min
pages 74-75

Tips for CISOs to enable better business experiences and outcomes in 2023

3min
pages 72-73

How to build an API with security in mind

3min
pages 70-71

Navigating the trade-offs of cyber attribution

3min
pages 68-69

Technology is evolving fast and making the world a more connected place

3min
pages 66-67

6 Government IT trends to watch in 2023

3min
pages 64-65

Trellix launches comprehensive Endpoint Security Suite

1min
page 63

Infopercept launches Invinsense 4.0

1min
page 63

AVEVA announces launch of AVEVA Predictive Analytics software

1min
page 62

AI, and blockchain to streamline processes, reduce costs, and increase transparency

3min
pages 60-62

Supply chain: Automation plays a key role in promoting sustainability

3min
pages 58-59

Supply chain and digital transformation

2min
pages 56-57

Safeguarding data across borders

7min
pages 50-55

Tech trends, reshaping data storage

3min
pages 48-49

Business growth, sustainability insights: a road to success

3min
pages 46-47

SolarWinds adds transformative AI features to IT service management solutions

1min
pages 44-45

SunMoney Solar Group invests in a revolutionary tyre recycling technology

1min
page 44

Fake ChatGPT apps scam users out of thousands of dollars, Sophos reports

1min
page 43

SAS commits $1B to AI-powered industry solutions

1min
page 43

Porter announces first-ever international expansion with its foray into UAE

1min
page 42

IFZA joins forces with ZOHO to help businesses improve efficiency

1min
page 42

BenQ with instant products and solutions

1min
page 41

AVEVA recognized as a leader in the IDC market scape

1min
page 41

Veritas simplifies FY24 channel program to help partners drive growth

1min
page 40

Proofpoint’s 2023 Voice of the CISO report revelations

1min
page 40

New Pure Storage survey underscores importance of IT modernization

1min
page 39

Mindware expands distribution agreement with Trellix

1min
page 39

NetApp delivers simplicity and savings to block storage with new All-Flash SAN Array

1min
page 38

Nozomi Networks delivers industry’s first AI-powered cybersecurity analysis and response engine

1min
page 38

Gartner survey finds CEOs cite AI as the top disruptive technology impacting industries

1min
page 37

Salesforce drives customer transformation in the Middle East with latest AI, Data and CRM tools

1min
page 37

BeyondTrust global survey provides insights on identity issues

1min
page 36

Cloudflare equips organizations with the Zero Trust security

1min
page 36

Kissflow awards Middle East Business Partners with Tesla Model 3

1min
pages 34-35

GITEX Africa, the most influential tech event

1min
pages 32-33

UAE Cyber Security Council

3min
pages 22-23

7th edition of GCC Security Symposium Saudi Arabia

2min
pages 16-17

7th edition of GCC Security Symposium Qatar edition

2min
pages 10-11

CloudHost presents Fusion Cloud - Bringing unity in diversity

2min
page 9

Treasury Transformation: the trendsetting force

2min
pages 8-9

Embracing Limitless Possibilities

8min
pages 3, 5-8
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
EC-MEA June 2023 by GEC Media Group - Issuu