How Martial Arts Can Help You Eliminate API Vulnerabilities
In college a good friend of mine got deeply involved in the martial art Aikido. Unlike other martial arts I was familiar with one of the things that stuck out for me was the concept of using an attacker’s momentum against them. Instead of directly attacking, the defender would wait for a move from their opponent, like a lunge, and harness that momentum to take control.
Most teams take a proactive approach to eliminating API vulnerabilities. This might include activities like security awareness training for developers as well as employing code scanning solutions, penetration testing and bug bounty programs to find potential vulnerabilities. While these are all important to help you ship secure applications they can take significant time and energy while leaving teams with the challenge of prioritization. In the end, often times, significant vulnerabilities still remain.
Learn about the security implications of modern apps and what you need to protect your APIs.
Download NowTurning Attackers Into Penetration Testers
At Salt Security we use a similar concept to what my friend learned in Aikido. We say we turn attackers into penetration testers. During reconnaissance an attacker probes your API to learn about the logic and to look for vulnerabilities. Much like in Aikido we harness this activity and use it in our favor to not only stop them but also to provide insight into what the attacker has found. These insights are then used to generate remediation instructions to help security teams and developers understand where vulnerabilities exist and how to eliminate them at their source.
The Advantages
This approach of using an attackers activity in your favor has a few big advantages:
- No effort to find vulnerabilities — attackers do all of the work as they perform reconnaissance looking for vulnerabilities. There’s no time, effort or expertise needed to set up scanning solutions, run penetration tests or manage bug bounty programs.
- Prioritization is done for you — vulnerabilities found are those uncovered by real attackers and can be considered a high priority for remediation.
- Comprehensive coverage — vulnerabilities are uncovered wherever attackers find them and not where you decide to scan which often times can be limited based on time, budget and resources.
- Quick remediation — insights include details on where the vulnerability exists, normal expected behavior and a suggestion to remediate therefore minimizing the need to research a solution.
- Bridging the security and developer gap — the insights help security and development teams get on the same page to understand where vulnerabilities exist and why they’re critical.
- Developers learn — insights help developers understand how real attackers think and how they can avoid similar gaps in future projects.
The Solution
Remediation is just one of the core components of the Salt Security solution. This coupled with the discovery of APIs and the ability to prevent attacks from advancing provide you with a comprehensive solution for building and delivering secure modern applications.
Want to learn more about how we can help you harness the efforts of attackers to make your APIs more secure? Check out our Remediaton Solution Brief or contact us for a demo. We’d love to show you how we can help you deliver secure APIs and innovate securely.