YouTube Icon

How To Monitor & Manage API Logging Challenges




How To Monitor & Manage API Logging Challenges

With the increased use of APIs to connect an association’s core business systems and data with guests, mates, and third parties, the threat continues to grow for fraud and abuse, says Edward Roberts, VP of marketing, Neosec. 
 
 utmost associations use APIs. moment, it's rare to find an operation that doesn't use APIs and rarer still to produce a new operation not exercising them. Digital business enterprise virtually demand using APIs to insure flawless services and the most over- to- date information. Unfortunately, utmost of these APIs are unmonitored. 
 
 Discover Your APIs First 
 One reason for not covering APIs is that numerous associations don't know about utmost APIs in use. APIs come into play with new operations or agreements to link operations or data sources to guests, mates, suppliers, and other necessary third parties. In either case, it’s common for new APIs to get added to an association’s attack face without the involvement or knowledge of IT, security, or threat associations. For this reason, IT and security professionals tend to underrate it by 50 or further when asked about the number of APIs a company has in use. 
 
 Trying to perform an API force can be tremendously vexing. utmost associations warrant the proper tools, know- how, or procedures to conduct a full discovery at any time. Doing this on an ongoing base is indeed more delicate. APIs are continually added, and being bones
 may go through significant changes without warning, making the task indeed more delicate. 
 
 Knowing all APIs is the starting place. Like all effects in security, one can not secure what you can not see. APIs can not be covered and managed if they're unnoticeable to the association. An entire API force enables the capability to log details, as utmost security and compliance practices would mandate. The standard practice of logging exertion has a long history of proven value. Logging these API relations represents the means for associations to conduct behavioral monitoring and trouble stalking. 
 
 See further Chancing excrescencies in Business Logic How bushwhackers Are Abusing Your operations and APIs 
 
 The Importance of Recording API exertion 
 Logging API relations enables both to cover for meaningful anomalies and conduct forensics. Logs enable an disquisition to see what happed and when. Logs give a kind of paper “ data ” trail for farther examination. 
 
 The Open Web Application Security Project( OWASPOpens a new window) identifies API logging as crucial for “ responsibility, visibility, incident waking, and forensics ” and a demand for compliance. CWE- 788 identifies inadequate logging as a common insufficiency, along with “ indecorous affair neutralization for logs ”( CWE- 117) and “ insertion of sensitive information into the log train( CWE- 532). 
 
 See further Why the API Frugality Is roaring Q&A With Postman Chief Evangelist Kin Lane 
 
 The OWASP ‘ inadequate Logging ’ Problem 
 Insufficient logging is called out in the OWASP API Top 10 list of common miscalculations and bad practices. One reason for inadequate logging is the volume and cost of storing the data through a SIEM tool like Splunk. This is further of a business concern rather than a technological bone
 . The data isn't too large to be cumbrous or ungovernable, but it may drive significant cost increases. maybe these charges are the new cost of doing business. APIs are core to digital business enterprise involving near coupling between businesses and suppliers, mates, and guests. APIs are also the “ connective towel ” between the microservices and modules that comprise the construction of ultramodern operations. These machine- to- machine connections expose a company’s most precious means, making them vulnerable to abuse, abuse, and fraud. Monitoring APIs is decreasingly pivotal. 
 
 Another reason for inadequate logging is enterprises over PII and other regulated data or personal information that will be captured and expose farther vulnerabilities. Some associations sweat the very act of logging will put them out of compliance. As a result, numerous companies chose the poltroon approach and don't log API relations. 
 
 So the issue is logging in while securing data and avoiding compliance issues. In other words, how can one have its API covering “ cutlet ” through logging while icing that the logs don't violate compliance rules and norms or put nonpublic data at threat? One possibility is picky logging to insure that regulated or personal data isn't entered into logs. But this isn't ideal for behavioral analytics, which requires full data sets to descry anomalies from normal operation. trouble stalking and examinations on partial data would be indeed more problematic. Log data must give meaningful information about who penetrated data or performed an operation, what records were penetrated or manipulated, and how. 
 
 Compliance Problems Specific to APIs 
 The tokenization of API data may be further than just an perpetration fashion but, rather, part of a comprehensive frame for treating APIs. The compliance concern isn't just a matter of implicit exposure or lack of protection for data for behavioral analytics. Regulations themselves may produce exposure issues. Within finance, for illustration, one regulation growing around the world is open banking. presently, open banking is more current in Europe than in North America. It forces fiscal institutions to expose their core capabilities through APIs. It requires them to allow the different companies that share in the ecosystem be suitable to pierce their APIs, indeed if they do n’t know them. The challenge becomes one of enabling access while retaining visibility and control. 
 
 Healthcare is another area where regulations may also force implicit data exposure. In the US, insurance companies are needed by regulation to expose PHI information for interoperability purposes so that they can pierce and reuse details from providers automatically and without a paper trail. That means that providers have to expose their most sensitive data in a way that they can authentically control precisely how it’s penetrated but in a certain way. What happens if these APIs are exploited and abused? 
 
 See further API perpetration 4 Key Areas To insure Good Security Hygiene 
 
 Is Tokenization a Possible result? 
 Another result may be to log all details while using tokenization to befog sensitive data so that it would make no sense to anyone without the capability to convert the commemoratives back into accurate data. Tokenization is the well- established process of substituting a sensitive data element, like a credit card or social security number, for anon-sensitive original with no natural or exploitable value or meaning. This approach enables complete logging without concession or fear of indecorous exposure. The data would be under the control of each association. 
 
 While further computationally ferocious, ultramodern approaches can tokenize data readily without inordinate outflow. Indeed if there's a tailback
 , the logging isn't an in- line process so nothing would beget a detention to any process or data exchange being conducted through APIs. In addition, tokenization done this way would not present any walls or impediments to scalability. Since it's completely defended, the tokenized logs could be stored within the association’s structure or by some third party. The key is that only the association can convert the commemoratives back into accessible data. 
 
 With a larger frame for API data, companies could use tokenization to establish further acceptable controls over who accesses defended data and give a recordkeeping medium for checkups and ongoing enforcement of securing regulated data. 
 
 The API logging challenge is commodity that all or nearly all associations will have to reckon with. Using new technologies and establishing procedures and practices will enable ongoing monitoring and help uphold compliance conditions. The question isn't to log or not to log. With careful planning and medication, associations can have their API monitoring cutlet and eat it too. 
 



Author Biography.

Editorial Team
Editorial Team

Content Writer

Join Our Newsletter.

Subscribe to CrowdforThink newsletter to get daily update directly deliver into your inbox.

CrowdforGeeks is where lifelong learners come to learn the skills they need, to land the jobs they want, to build the lives they deserve.

CrowdforGeeks

CrowdforThink is a leading Indian media and information platform, known for its end-to-end coverage of the Indian startup ecosystem.

CrowdforThink

Our mission is "Har Koi Dekhe Video, Har Ghar Dekhe Video, Ghar Ghar Dekhe Video" so we Provide videos related to Tutorials, Travel, Technology, Wedding, Cooking, Dance, Festivals, Celebration.

Apna Video Wala
CFT

News & Blogs

2c5f2e78aa72edc8061bce16e707d4e3.jpeg

How AI Is Already Supporting Native App Develop...

AI is revolutionizing app development by streamlining processes, furnishing design suggestions, a...

b360b72840c307237e0dc2b36ee67ff5.jpeg

The Impact of Artificial Intelligence on Health...

The integration of AI in healthcare is transforming the way medical professionals diagnose, treat...

be40fc85912204694c26f2b61bf2795b.jpeg

The Evolution and Impact of Artificial Intellig...

Artificial Intelligence (AI) has experienced a remarkable evolution since its inception, leaving ...

Top Authors

Lamia Rochdi is the Marketing Manager at Bell Flavors & Fragrances EMEA. A successful family-...

Lamia Rochdi

I’m Mertin Wilson a technician in a camera company and certified expert of different P...

Mertin Wilson

Zakariya has recently joined the PakWheels team as a Content Marketing Executive, shortly after g...

Zakariya Usman

Pankaj Singh is a Senior Digital Marketing Consultant with more than 2 years of experience in SEO...

Pankaj Singh
CFT

Our Client Says

WhatsApp Chat with Our Support Team