Skip to main content
Live update
DispatchEditorial feature

API Security Is Now Application Security: Defending the Interface Economy

Every modern application is a collection of APIs, and every API is an attack surface. Securing them requires new thinking about authentication, authorization, and the boundaries between services.

API Security Is Now Application Security: Defending the Interface Economy
Application Security / 13 min readBlog index
Analysis

The OWASP Top 10 used to focus on web forms and server-side rendering vulnerabilities — SQL injection through form fields, cross-site scripting in page output, session management flaws in cookie handling. That threat model reflected how web applications actually worked in 2003 or 2010. Today's applications look fundamentally different: single-page apps that call REST and GraphQL endpoints, mobile clients consuming JSON APIs, microservices communicating through internal service meshes, third-party integrations that expect programmatic access, IoT devices reporting telemetry through MQTT or CoAP. The attack surface has migrated to the interfaces between these components, and security programs that have not updated their thinking are defending the wrong perimeter.

The scale of the API economy makes this urgent. Cloudflare reported in its 2023 API Security & Management Report that API traffic now accounts for 57% of all internet traffic it processes, up from 52% the previous year. Akamai's 2023 State of the Internet report found that API attacks grew 137% year-over-year, accounting for a significant portion of all web application attacks. Salt Security's 2023 State of API Security report found that 94% of organizations experienced a security problem with APIs in production in the previous year. These numbers reflect the reality that APIs have become both the primary business interface and the primary attack surface for modern organizations.

The strongest signal is not a single event. It is the pattern that keeps appearing across institutions.

Reporting Note

OWASP published its API Security Top 10 in 2019 and updated it in 2023, reflecting observed attack patterns. The most critical vulnerability remains Broken Object Level Authorization (BOLA, also called IDOR — Insecure Direct Object Reference). BOLA occurs when an API endpoint accepts a resource identifier in the request without verifying that the authenticated user actually has rights to access that specific resource. A request like GET /api/invoices/1234 should verify not just that the caller is authenticated but that they are authorized to view invoice 1234 specifically. When this check is missing or incomplete, an attacker who is a legitimate user can iterate through identifiers — 1234, 1235, 1236 — and access data belonging to other users. The 2019 breach of T-Mobile Australia exposed 15,000 customer records through exactly this vulnerability: a simple API endpoint that returned customer data based on a phone number parameter without verifying that the requesting account was associated with that number.

Advertisement

Broken Authentication is the second major API vulnerability category. Authentication mechanisms designed for human users with browsers behave differently when machines make thousands of requests per second. API keys that never expire create permanent credentials that persist indefinitely if compromised. JWT tokens with weak signing algorithms (particularly the 'none' algorithm vulnerability or weak HS256 keys) can be forged. Refresh token rotation failures leave long-lived tokens in circulation after they should have been invalidated. OAuth 2.0 implementations with missing state parameters are vulnerable to CSRF attacks. The intersection of authentication complexity with machine-speed request patterns creates a rich attack surface that traditional application security testing frequently misses.

Web Application Firewalls have evolved substantially to meet the API challenge. First-generation WAFs understood HTTP patterns — request methods, header values, common injection payloads in query strings. They had no concept of API semantics: what a valid request body for a specific endpoint looks like, whether a particular parameter should be a UUID or an integer, whether a specific sequence of API calls follows a legitimate workflow. Next-generation WAFs — from vendors including F5, Imperva, Akamai App & API Protector, and AWS WAFv2 — now offer API schema enforcement. You upload an OpenAPI (Swagger) specification, and the WAF validates that incoming requests conform to it: body structure matches the expected schema, parameter types are correct, required fields are present, enum values are from the defined set. Requests that violate the schema are blocked before they reach application code.

Machine learning augments schema enforcement with behavioral analysis. An ML model trained on normal API traffic for a particular endpoint learns the distribution of parameter values, the time-of-day usage patterns, the geographic distribution of callers, the sequence of endpoints typically called in a session. When a user suddenly calls an endpoint they have never used before from a new country, or when a scraper calls a paginated endpoint 10,000 times in an hour, or when a specific parameter value has an anomalous distribution compared to historical requests, the ML model flags or blocks the request. This is particularly valuable for detecting account takeover — the attacker has valid credentials but behaves differently from the legitimate user.

OAuth 2.0 and OpenID Connect provide the authentication and authorization framework, but the security of the implementation depends entirely on the correctness of the details. Token lifetime is a fundamental decision: access tokens with short lifetimes (15 minutes) limit the exposure window if a token is stolen, but require more frequent refresh operations. Refresh tokens with long lifetimes (30 days) improve user experience but create persistent credentials. Token binding — cryptographically binding a token to a specific client device — prevents token replay attacks when a token is intercepted in transit. The Proof Key for Code Exchange (PKCE) extension, originally designed for mobile apps that cannot securely store client secrets, is now recommended for all OAuth 2.0 authorization code flows as protection against authorization code interception attacks.

JWT (JSON Web Token) validation failures represent a consistently exploited class of vulnerability. JWTs carry claims about the authenticated user and are signed by the issuing authority. Servers that trust JWTs must validate the signature, verify the algorithm is one they accept (preventing the 'none' algorithm attack where a malicious token claims no signature is needed), check the expiration time, verify the audience claim matches the intended recipient, and confirm the issuer is a trusted authority. Servers that skip any of these checks are vulnerable. The 2022 Okta breach originated when threat actors compromised a customer support engineer's laptop that had access to the Okta administrative console — demonstrating that even sophisticated identity providers face the human and operational dimensions of authentication security, not just technical implementation flaws.

Advertisement

GraphQL introduces security considerations that differ from REST. The flexible query language allows clients to request arbitrary combinations of data, which can enable attackers to extract large volumes of data through a single query. Introspection — the ability to query the schema itself — reveals the complete data model to any caller who can reach the endpoint. Deeply nested queries can trigger exponential database load (the 'batching attack'). Field-level authorization must be enforced for every resolved field, not just at the endpoint level. Persisted queries — where only pre-registered query patterns are allowed — significantly reduce the attack surface but require operational infrastructure to manage. GitHub's GraphQL API, one of the most used in production, has published extensive guidance on their own security measures.

Software Composition Analysis (SCA) addresses the dependency risk that underlies most application security postures. Modern applications depend on hundreds of open-source packages. Each package has its own vulnerability history. The transitive dependency tree — the dependencies of your dependencies — multiplies the exposure. SCA tools like Snyk, OWASP Dependency-Check, and GitHub's Dependabot continuously scan the dependency tree and alert when a component has a known CVE. The prioritization challenge is significant: a large application might surface 200 vulnerabilities in its dependency tree, but the majority may be in code paths that the application never executes or in components that are never exposed to external input. Reachability analysis — determining whether a vulnerable function is actually called by the application — is an emerging capability that several SCA vendors are adding to reduce noise.

API inventory management is a prerequisite that many organizations have not completed. Shadow APIs — endpoints created by development teams without going through formal design or security review — are present in virtually every large organization's production environment. The 2021 Peloton API vulnerability, which allowed any authenticated user to access other users' private account information, went undetected in part because the endpoint was not in the organization's primary API inventory and had not been included in penetration test scope. Tools that discover APIs through traffic analysis — observing what endpoints are actually receiving requests in production — complement documentation-based inventories. Salt Security, Noname Security, and Traceable AI all offer API discovery through traffic observation as a core capability.

Penetration testing for APIs requires different techniques than web application testing. Tools like Burp Suite, Postman, and OWASP ZAP have API-specific capabilities, but effective API penetration testing requires understanding the application's business logic — which sequences of API calls represent legitimate workflows, which parameter combinations are meaningful to the business. Pure automated scanning misses the authorization logic vulnerabilities that require understanding business context. Manual testing informed by documentation and developer interviews finds BOLA, mass assignment vulnerabilities (where APIs accept and apply request parameters that should not be client-modifiable), and business logic flaws that no automated tool can discover.

Rate limiting and throttling protect against brute force and automated abuse but must be implemented thoughtfully. Endpoint-level rate limits without account-level tracking allow an attacker to distribute requests across many sessions. Rate limits based solely on IP address are defeated by distributed attacks. Effective rate limiting combines endpoint limits, account-level limits, and behavioral signals — the same account making 500 requests per minute is suspicious even if no single endpoint sees more than 50. Exponential backoff for repeated failures, account lockout with recovery procedures, and CAPTCHA challenges for suspicious patterns are complementary controls.

The organizational dimension of API security requires treating APIs as products. Security requirements must be defined as part of API design, not reviewed after implementation. API governance programs establish standards for authentication mechanisms, authorization patterns, data classification, and error handling. Security reviews happen as part of the API design review process — before code is written. The organizations winning at application security have API security champions embedded in development teams, security requirements integrated into API design templates, and automated security scanning as a standard gate in the API deployment pipeline. This is not easy work, but in an economy where APIs carry the vast majority of application logic and data flows, it is work that cannot be treated as optional or deferred.

Background

The forces behind this story have been building across several reporting cycles. What looks sudden on the surface is often the result of delayed investment, weak coordination, and incentives that rewarded short-term efficiency.

Implications

The next phase will be measured less by announcements and more by capacity: who can fund the response, who can execute it, and who absorbs the cost when older assumptions stop working.

Why It Matters

The pressure is moving from headlines into systems.

A single event can be dismissed as noise. Repeated stress across contracts, public agencies, infrastructure, and household decisions becomes a structural story. That is why this analysis tracks both the visible development and the slower institutional response behind it.

What to Watch
01

Whether institutions respond with durable policy or temporary statements.

02

How quickly markets, cities, and public systems adjust to the next visible pressure point.

03

Which signals repeat across multiple regions instead of staying isolated to one event.

Data Notes

Story Type

Analysis

Primary Desk

Application Security

Reader Use

Context and follow-up

Update Path

Related briefings

Advertisement
Bottom Line

The useful question is not only what changed, but who is prepared to operate as if the change is permanent.

AA
Author

Aman Anil

Founder & Polymath

Aman Anil connects research, climate exposure, public policy, technology, and the financial systems responding to scientific change.

More Contact

Have context, a correction, or a follow-up?

Send article notes, correction details, or additional source context to the editorial inbox. Include the article title and only the essential information needed for the inquiry.

Daily Intelligence

Never miss the story beneath the headline.

Support independent reporting to keep deep investigations and weekly strategic analysis flowing.

Support the Project