{"id":16017,"date":"2026-03-30T10:07:12","date_gmt":"2026-03-30T10:07:12","guid":{"rendered":"https:\/\/newestek.com\/?p=16017"},"modified":"2026-03-30T10:07:12","modified_gmt":"2026-03-30T10:07:12","slug":"apis-are-the-new-perimeter-heres-how-cisos-are-securing-them","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=16017","title":{"rendered":"APIs are the new perimeter: Here\u2019s how CISOs are securing them"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Recent breaches suggest attackers are shifting beyond traditional endpoints to target application programming interfaces (APIs). But typical perimeter protections can completely miss this vector.<\/p>\n<p>\u201cWe used to talk about defense-in-depth and endpoint protection,\u201d says <a href=\"https:\/\/www.linkedin.com\/in\/seanmurphy092009\/\">Sean Murphy<\/a>, CISO at BECU, a nationwide credit union. \u201cThat morphed into identity, and now the API is the new perimeter.\u201d<\/p>\n<p>BECU\u2019s backend architecture is heavily based on microservices and APIs, making this an important \u2014 and widening \u2014 surface to secure. \u201cThey\u2019re your front door, and if you don\u2019t know what the inventory of your APIs is, the attackers surely will find them.\u201d<\/p>\n<p>With API-first development on the rise, API portfolios have <a href=\"https:\/\/thenewstack.io\/what-is-api-sprawl-and-why-is-it-important\/\">quietly ballooned<\/a> throughout large enterprises. Conservative estimates place the average number of APIs within a large company at 250 to 500, but it\u2019s not uncommon for enterprises to <a href=\"https:\/\/apievangelist.com\/2024\/11\/26\/how-many-apis-does-the-average-enterprise-have\/\">run thousands<\/a>.<\/p>\n<p>These useful interfaces often connect backend systems, partners, and customer data. Yet their access is frequently ungoverned, insecure, or misconfigured. A <a href=\"https:\/\/salt.security\/api-security-trends\">2025 report from Salt Security<\/a> found that nearly one in three organizations experienced an API breach in the past 12 months. They also found <a href=\"https:\/\/salt.security\/press-releases\/salt-labs-state-of-api-security-report-reveals-99-of-respondents-experienced-api-security-issues-in-past-12-months\">95% of attacks<\/a> originate from authenticated sources, often using stolen API keys or credentials.<\/p>\n<p>Traditional security approaches, such as <a href=\"https:\/\/www.csoonline.com\/article\/568045\/what-is-edr-endpoint-detection-and-response.html\">endpoint detection and response (EDR)<\/a> and web application firewalls (WAFs), often miss these attacks because they lack the context needed to detect business-logic abuse. To these systems, API abuse often looks like normal, valid traffic.<\/p>\n<p>\u201cEDR and WAFs were built for yesterday\u2019s problems: malware on endpoints and basic web exploits,\u201d says <a href=\"https:\/\/www.linkedin.com\/in\/elliottfranklin\/\">Elliott Franklin<\/a>, CISO at Fortitude Re, a reinsurance company. \u201cWithout a deep understanding of business logic and identity context, traditional tools miss credential stuffing, token theft, or data scraping.\u201d<\/p>\n<p>CISOs say addressing the problem at scale requires new tooling, practices, and governance frameworks. It\u2019ll also take an identity-aware shift to hedge for tomorrow\u2019s problems, which revolve around the use of <a href=\"https:\/\/www.cio.com\/article\/4018578\/why-cios-see-apis-as-vital-for-agentic-ai-success.html\">APIs in agentic AI<\/a>.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>APIs are the new attack surface<\/h2>\n<p>APIs drive <a href=\"https:\/\/thehackernews.com\/2024\/03\/apis-drive-majority-of-internet-traffic.html\">the majority of internet traffic<\/a>, and cybercriminals are taking advantage. In the <a href=\"https:\/\/www.theregister.com\/2024\/06\/21\/optus_data_breach_faulty_api\/\">2024 Optus breach<\/a>, attackers exposed 9 million customer records due to broken API access control. Over the past two years, API exploits have also hit <a href=\"https:\/\/apisecurity.io\/issue-285-api-hack-at-avelo-airlines-3-5-billion-leak-at-whatsapp-f5-api-security-survey-ai-generated-code-risks\/\">WhatsApp<\/a>, <a href=\"https:\/\/nordpass.com\/blog\/trello-data-breach\/\">Trello<\/a>, <a href=\"https:\/\/www.hipaajournal.com\/6-9-million-23andme-users-affected-by-data-breach\/\">23andMe<\/a>, <a href=\"https:\/\/alexschapiro.com\/security\/vulnerability\/2025\/11\/20\/avelo-airline-reservation-api-vulnerability\">Avelo Airlines<\/a>, and <a href=\"https:\/\/www.csoonline.com\/article\/3631055\/volkswagen-massive-data-leak-caused-by-a-failure-to-secure-aws-credentials.html\">Volkswagen<\/a>.<\/p>\n<p>These threats have many CISOs viewing APIs as a primary attack surface. \u201cAPIs have become the most critical and rapidly expanding attack surface for the modern enterprise,\u201d says <a href=\"https:\/\/www.linkedin.com\/in\/senthilesr\/\">Senthil Subramaniam<\/a>, global CISO and assistant VP at Infinite Computer Solutions, an IT services company. \u201cMany API security incidents arise from flaws like injection attacks and broken authorizations.\u201d<\/p>\n<p>A key contributor to the rise in exploits is the ubiquity of APIs, which now act as connective tissue across enterprises, linking SaaS platforms, cloud workloads, and internal applications. \u201cThat ubiquity makes them a natural focus for attackers,\u201d says Fortitude Re\u2019s Franklin.<\/p>\n<p>The openness of APIs and their proximity to sensitive data and critical systems also make them attractive to attackers. \u201cAPIs have absolutely become one of the primary attack surfaces today,\u201d says <a href=\"https:\/\/www.linkedin.com\/in\/jamesfaxon\/\">James Faxon<\/a>, a principal advisor at Risk &amp; Insight Group and previously CISO of NukuDo, a cybersecurity talent development company. \u201cIn many environments, APIs now represent a much more direct path to business systems than endpoints ever did.\u201d<\/p>\n<p>\u201cAn attacker doesn\u2019t need to compromise a laptop or deploy malware to gain leverage,\u201d adds Faxon. By simply obtaining a token, he explains, an attacker could exploit a misconfiguration or flawed authorization logic to move laterally and extract data without triggering traditional endpoint controls.<\/p>\n<p>To make matters worse, many organizations lack proper API inventories, making it easy for APIs to fall outside normal oversight. A <a href=\"https:\/\/www.scworld.com\/news\/it-organizations-document-apis\">2023 study<\/a> from Enterprise Management Associates found that roughly 70% of enterprises have just 30% of their APIs documented. That figure does not include <a href=\"https:\/\/nordicapis.com\/the-risks-of-shadow-apis-how-unmanaged-endpoints-bypass-your-ci-cd-checks\/\">shadow APIs<\/a> outside normal security governance.<\/p>\n<p>\u201cMost teams don\u2019t have clear visibility into how their APIs are working behind the scenes,\u201d says <a href=\"https:\/\/www.linkedin.com\/in\/cmazal\/\">Chaim Mazal<\/a>, chief AI and security officer at cloud security company Gigamon. Without a clear understanding of how APIs communicate and the data they expose, developers can inadvertently create exploitable attack paths.<\/p>\n<p>Others see growing urgency amid AI-driven shifts. \u201cAPIs may not yet be the primary attack surface, but it\u2019s becoming more urgent in recent years,\u201d says <a href=\"https:\/\/www.linkedin.com\/in\/andreas-gaetje-b47ab944\/\">Andreas Gaetje<\/a>, CISO at K\u00f6rber, a provider of intelligent manufacturing and supply chain solutions, who notes hyperautomation and agentic AI make API security more pressing.<\/p>\n<p>Still, the number of reported API security incidents doesn\u2019t outweigh credential theft, phishing, and endpoint compromise, notes <a href=\"https:\/\/www.linkedin.com\/in\/mark-dorsi-242916b\/\">Mark Dorsi<\/a>, CISO at Netlify, a cloud computing company. But the threat level is changing as autonomous systems <a href=\"https:\/\/www.cio.com\/article\/4123497\/what-cios-in-finance-do-to-navigate-ai-agents.html\">gain higher-value capabilities<\/a>.<\/p>\n<p>\u201cAs agentic systems increasingly interact with services through APIs, including Model Context Protocol, agent-to-agent workflows, and automated integrations, APIs will see a material uplift in both usage and exposure,\u201d says Dorsi.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Legacy defenses can\u2019t keep up<\/h2>\n<p>Traditional perimeter-based defenses are often insufficient against API-layer attacks. Traditional security defenses, such as EDR, XDR, and WAF, \u201cprimarily focus on clients, hardware, and software endpoints, looking at IP-based attack vectors,\u201d explains BECU\u2019s Murphy. \u201cAPIs bring us into the world of business logic and runtime types of issues.\u201d<\/p>\n<p>Others agree that legacy defenses leave a gap for API-first architectures. For example, EDR misses east-west traffic, content within API flows, and gateway-level attacks, while WAFs mainly detect malicious payload patterns and miss important context around authorization, identity, and caller intent, says Infinite Computer Solutions\u2019 Subramaniam.<\/p>\n<p>\u201cAPI attacks often exploit business logic, not payload patterns,\u201d he adds. \u201cThey exploit broken authentication or authorization, abuse of legitimate endpoints, excessive data exposure, and mass enumeration.\u201d These requests often appear valid individually, but together form a malicious sequence.<\/p>\n<p>\u201cAPI attacks are typically logical, valid requests made with stolen or over-permissioned credentials that abuse business logic rather than breaking HTTP rules,\u201d Risk &amp; Insight Group\u2019s Faxon says. For example, an attacker might abuse a long-lived, over-permissioned token for a financial API. \u201cAPI abuse can often blend into normal traffic until the damage is already done,\u201d he adds.<\/p>\n<p>Netlify\u2019s Dorsi agrees. \u201cTraditional controls lack the context to understand intent, misuse, or abuse across API calls,\u201d he says.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>How CISOs are responding<\/h2>\n<p>CISOs are deploying a range of strategies to mitigate API threats. This goes beyond buying new-fangled cloud-native tools \u2014 it requires an <a href=\"https:\/\/www.cio.com\/article\/1305658\/why-cios-back-api-governance-to-avoid-tech-sprawl.html\">API governance strategy<\/a> involving organization-wide policies, API inventories, automated checks, and strong identity and access control.<\/p>\n<p>For example, BECU has implemented an API governance structure, adopting a single policy for all developers. \u201cWe started building in governance before the technology was leveraged,\u201d explains Murphy. This is critical to reduce the possibility for misconfigurations, he says, which remains a leading risk in the <a href=\"https:\/\/owasp.org\/API-Security\/editions\/2023\/en\/0x11-t10\/\">OWASP Top 10 API Security Risks<\/a>.<\/p>\n<p>In large enterprises, shared security guidance helps maintain least-privilege access and avoid exposing internal secrets. While all engineers and API builders are subject to BECU\u2019s internal policy, it\u2019s continually evolving, Murphy adds.<\/p>\n<p>\u201cStrong API governance is key,\u201d agrees Franklin. \u201cAt Fortitude Re, we\u2019re building API security into our broader identity and access management strategy.\u201d A key area of focus is <a href=\"https:\/\/www.csoonline.com\/article\/2132294\/what-are-non-human-identities-and-why-do-they-matter.html\">tracing non-human identities<\/a>, which helps inventory and classify APIs in use. \u201cThe biggest gap I see is shadow APIs,\u201d he adds.<\/p>\n<p>To reduce that risk, visibility is critical. K\u00f6rber\u2019s Gaetje recommends taking proactive steps to enhance visibility by cataloging your surface area. \u201cThe most important activity is to gain visibility into exposed APIs,\u201d he says. \u201cWhat you cannot see, you cannot control.\u201d<\/p>\n<p>For Faxon, security begins with a full inventory of what APIs exist, who owns them, and what data they expose. \u201cThe most effective organizations treat APIs as first-class security assets,\u201d he says.<\/p>\n<p>In practice, implementing holistic API governance involves multiple tools and developer touchpoints. Infinite Computer Solutions uses specialized <a href=\"https:\/\/www.infoworld.com\/article\/3529600\/how-do-you-govern-a-sprawling-disparate-api-portfolio.html\">API gateways<\/a> for processing traffic and adopts advanced security features to run risk assessments, Subramaniam says.<\/p>\n<p>\u201cOur security tools are also embedded into the CI\/CD pipeline,\u201d he adds, noting that API specifications must pass automated security validation checks, which helps ensure compliance with security standards.<\/p>\n<p>Dorsi says Netlify takes a disciplined approach to understanding how APIs are used, emphasizing strong authorization maturity through practices like limiting scopes, rotating credentials, and continually reassessing trust.<\/p>\n<p>\u201cWe treat APIs as critical infrastructure, not just plumbing,\u201d he says. \u201cStrong identity and authorization design is foundational. That means explicit ownership models, least privilege scopes, and consistent auth patterns across APIs.\u201d<\/p>\n<p>All in all, CISOs indicate that API security requires deep forethought. \u201cWe treat APIs as part of our operational surface, not just our software stack,\u201d says Faxon. \u201cEvery API we build is documented, threat-modeled, and owned, with least-privilege access as the default and permissions continuously re-evaluated as systems evolve.\u201d<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>AI exacerbates preexisting risks<\/h2>\n<p>Another driver of today\u2019s API vulnerabilities is the rise of AI. While large language models (LLMs) and coding assistants empower software engineers, they also empower adversaries, complicating the API security landscape and requiring new approaches beyond traditional endpoint defenses.<\/p>\n<p>\u201cAI is fundamentally reshaping the threat landscape,\u201d says Gigamon\u2019s Mazal. \u201cAI has enabled the democratization of offensive tooling, meaning that anyone, regardless of skill level, can now exploit API weaknesses without writing a single line of code.\u201d With a growing API attack surface and lower barriers, organizations should assume a breach posture, he adds.<\/p>\n<p>For instance, AI can amplify an attacker\u2019s ability to discover and exploit API vulnerabilities like misconfigurations or over-permissioning, says Murphy. This reality has influenced BECU to take a deliberate approach to API visibility, deploying monitoring tools to discover and track its entire API catalog.<\/p>\n<p>Another element of BECU\u2019s policy requires developers to use a sanctioned API gateway with enforced security controls. \u201cWe make it as difficult as possible for an adversary to exploit us in any shape or form,\u201d says Murphy, adding they apply identity and access control, monitoring, and alerting, regardless of API type.<\/p>\n<p>\u201cInternal doesn\u2019t mean an external adversary can\u2019t access it,\u201d adds Murphy. As such, BECU is vigilant with all APIs, regardless of whether they\u2019re internal APIs used for backend system-to-system communication or external-facing APIs that power customer interactions on mobile banking apps.<\/p>\n<p>Beyond amplifying external threats, AI is increasingly embedded within enterprise software stacks, introducing a new vector to cover. A <a href=\"https:\/\/softwarefinder.com\/resources\/state-of-software-stacks\">2025 study from Software Finder<\/a> found that 56% of IT leaders expect their software stack to be AI-powered by 2030. As agentic AI begins to consume APIs, the <a href=\"https:\/\/www.csoonline.com\/article\/4109999\/agentic-ai-already-hinting-at-cybersecuritys-pending-identity-crisis.html\">risks around unauthorized access<\/a> and unintended sensitive data exposure rise as well.<\/p>\n<p>As Subramaniam explains, \u201cAI agentic systems, which autonomously access APIs to perform tasks, complicate API security by expanding the attack surface, enabling dynamic and unpredictable interactions, and amplifying existing vulnerabilities through high-speed, automated actions.\u201d Preventing unauthorized access by agents will require more granular control and more time-bound <a href=\"https:\/\/www.csoonline.com\/article\/572177\/what-is-rbac-role-based-access-control-explained.html\">role-based access control (RBAC)<\/a>.<\/p>\n<h1 class=\"wp-block-heading\"><a><\/a>Securing third-party tool usage<\/h1>\n<p>Other API risks stem from the broader software supply chain. In 2025, JPMorganChase CISO Patrick Opet published an <a href=\"https:\/\/www.jpmorganchase.com\/about\/technology\/blog\/open-letter-to-our-suppliers\">open letter<\/a> about diminishing standards for SaaS providers, writing that the SaaS delivery model is \u201cquietly enabling cyber attackers\u201d and creating a \u201csubstantial vulnerability that is weakening the global economic system.\u201d<\/p>\n<p>Third-party API consumption can open an organization to sensitive data exposure. According to Gartner, 71% of organizations use APIs provided by third parties such as SaaS vendors, making third-party APIs another major risk vector.<\/p>\n<p>\u201cFor third-party APIs, we already require vendor security reviews and contractual security assurances,\u201d says Fortitude Re\u2019s Franklin, noting that this is part of a broader SaaS security program that provides visibility into the SaaS systems employees use.<\/p>\n<p>The onus, however, is also on the consuming organization to implement better token-handling processes to secure API connections to SaaS platforms. This is especially important, as developers are often reckless with API keys and secrets. In 2024, Escape discovered <a href=\"https:\/\/escape.tech\/blog\/how-we-discovered-over-18-000-api-secret-tokens\/\">18,000 API secrets and tokens<\/a> floating around on the open web.<\/p>\n<p>Some CISOs are actively addressing this. \u201cOur team centralizes and encrypts all third-party credentials \u2014 API keys, tokens \u2014 within the API management layer,\u201d says Subramaniam. \u201cWe never distribute raw credentials to our internal development teams.\u201d<\/p>\n<p>Maintaining safe integrations requires ongoing discipline, too. \u201cWe apply the same rigor to third-party APIs: Credentials are tightly scoped, regularly rotated, and monitored for behavioral drift,\u201d adds Faxon. \u201cIf an integration begins acting outside its expected pattern, it\u2019s treated as a security event, not a technical anomaly.\u201d<\/p>\n<p>For Murphy, avoiding third-party API gaps requires careful vendor evaluation and tooling decisions. \u201cYou trust but verify.\u201d The same intentions must be applied to assessing API management tools, too \u2014 maintaining too many niche products increases complexity and brings scalability challenges, and requires stitching them together to obtain a cohesive API security view.<\/p>\n<p>\u201cThe more complexity, and the more differentiated monitoring, the higher risk you\u2019re going to mess up,\u201d says Murphy. \u201cBut, diversity in the platform is good, too, since compartmentalizing can help with a tiered aspect to security oversight.\u201d One top item in BECU\u2019s roadmap for 2026 is automating between their exposure management platform, vulnerability management platform, and security operations center, he adds.<\/p>\n<h1 class=\"wp-block-heading\"><a><\/a>API standards must evolve<\/h1>\n<p>As APIs become a core aspect of modern business operations, their security risks are becoming more pronounced. \u201cEvery API misconfiguration is not just a security gap,\u201d says Faxon. \u201cIt\u2019s a business decision being executed at machine speed, without human oversight.\u201d<\/p>\n<p>Responding to this new era of threats requires moving beyond traditional perimeter defenses. Organizations will need new approaches to secure non-human identities \u2014 machines, bots, and agents that increasingly interact with systems and data at a business application level.<\/p>\n<p>\u201cThe real shift isn\u2019t just from endpoints to APIs,\u201d says Franklin. \u201cIt\u2019s from human-driven access to non-human identities like APIs, service accounts, and machine-to-machine connections.\u201d Although these identities now outnumber humans in most enterprises, he adds, they lack rigorous governance, <a href=\"https:\/\/www.csoonline.com\/article\/4089732\/rethinking-identity-for-the-ai-era-cisos-must-build-trust-at-machine-speed.html\">requiring rethinking to secure this new attack surface<\/a>.<\/p>\n<p>The challenge is further complicated by the diversity of API environments. APIs may be distributed across multiple clouds, platforms, and locations, each with different security controls. As Mazal explains, \u201cThe challenge is that as development accelerates and the pace of innovation increases, not all APIs follow the same set of controls.\u201d<\/p>\n<p>Edge-based IoT APIs, for instance, may not allow the same types of traffic enforcement found in centralized environments. \u201cThe resulting gaps in interconnectivity make it difficult to manage APIs holistically and consistently across the ecosystem.\u201d For him, real-time threat monitoring and visibility of network telemetry are still essential to correct visibility gaps.<\/p>\n<p>Ultimately, CISOs shouldn\u2019t abandon traditional security tools. But they do need to extend security deeper into the development and design process, embedding checks early, strengthening identity-based authorization, and improving real-time visibility into business-layer interactions.<\/p>\n<p>By combining governance, identity controls, and visibility, CISOs can adequately prepare for the security realities of an API-driven world.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Recent breaches suggest attackers are shifting beyond traditional endpoints to target application programming interfaces (APIs). But typical perimeter protections can completely miss this vector. \u201cWe used to talk about defense-in-depth and endpoint protection,\u201d says Sean Murphy, CISO at BECU, a nationwide credit union. \u201cThat morphed into identity, and now the API is the new perimeter.\u201d BECU\u2019s backend architecture is heavily based on microservices and APIs,&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=16017\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-16017","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/16017","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16017"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/16017\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16017"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16017"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}