Cybersecurity regulations, such as those issued by the New York Department of Financial Services (NYDFS), are widely seen as frameworks that guide national and even international laws. Companies in banking, insurance, and financial services will soon be impacted by an amendment to NYDFS 2017 Cybersecurity Regulation 23 NYCRR § 500 that tightens up regulations and imposes stiffer penalties. This pending regulatory update includes a new requirement to compile and maintain a complete asset inventories of all information systems and software – which most security experts understand to include an inventory of APIs. API endpoints are prime targets for bad actors, raising risk levels throughout the enterprise.
The problem with identifying and documenting API endpoints (internal APIs, remote APIs, REST APIs, REST endpoints, and even “shadow” APIs) is that you can’t inventory what you don’t know is there. Better endpoint protection and security starts with understanding the full picture of your software structure. Large organizations grapple with application complexity arising from legacy codebases combined with new development, tribal knowledge that left with developers long gone, and increasing use of third-party services and applications, among other challenges. Nobody can possibly know every application endpoint.
Existing API management tools and source code scans don’t have the capabilities to seek out APIs that may only become apparent in compiled applications. APIs may surface from code injected during or after compilation; external databases, servers, and APIs; and third-party libraries.
CodeLogic surpasses simple API endpoint detection, using proprietary binary and runtime scanning to analyze the architecture of software applications. Going below the surface of source code and documentation, CodeLogic examines everything from post-compile binaries and runtime application behavior to database schemas, stored procedures, calls to cloud services, and other points of communication between applications and services. Once CodeLogic scans applications, it’s simple to produce a report of all API endpoints that have been discovered.
With more stringent cybersecurity regulations on the horizon, now is the time for organizations to discover and document all their API endpoints. Thanks to increased cyber-threats in our increasingly connected world, understanding exposure can ensure better endpoint protection, which can ultimately help strengthen endpoint security. CodeLogic can simplify this effort by providing continuous identification of new or changing endpoints that may represent new vulnerabilities.
Governing endpoints (internal APIs, remote APIs, REST APIs, REST endpoints) is not a new problem. If you’re a new company building your first products, you can easily enjoy a clean, well-managed, and secure software environment — But if you’re anything else, you probably know that even the best API Management tools all have a similar underlying limitation: they can’t manage what they don’t know exists.