“Gartner predicts that by 2022, application programming interface (API) attacks will become the most-frequent attack vector, causing data breaches for enterprise web applications,” the research firm said in a recent webinar.
The API Attack Surface Calculator is a free self-assessment tool designed to help organizations measure their attack surface, according to Data Theorem, the company behind the service. The calculator asks seven questions and performs a first-level security analysis based on the supplied answers in less than five minutes. Questions include asking if the organization has APIs for public web and mobile applications, what kind of APIs are in use (REST, GraphQL, etc), which public clouds and cloud services the organization uses, which web application framework the developers rely on, and which regulatory and compliance standards apply to the organization. Data Theorem’s Analyzer Engine takes the answers and generates ratings around potential API exposures across the multiple applications layers: client, data transport, and cloud. The calculator doesn’t help with API discovery, but it gives security teams a starting point for understanding how their APIs contribute to the organization’s attack surface. A thorough understanding of the type of APIs in use would help security leaders build a modern API security program, Data Theorem says. Find the calculator here. https://www.cisa.gov/publication/insider-risk-self-assessment-tool
Insider threats pose significant risk to the safety and security of America’s critical infrastructure and the organizations that keep infrastructure operational. The Insider Risk Self-Assessment is a tool to assist owners and operators or organizations, especially small and mid-sized ones who may not have in-house security departments, to gauge their vulnerability to an insider threat incident. The tool is a downloadable PDF that asks users key questions about their existing enterprise, focusing on the domains of Program Management, Personnel and Training, and Data Collection and Analysis. The interactive PDF, from which CISA collects no data or personal information, will allow users to receive scores representing maturity indicators that objectively evaluate their immunity to insider threat incidents. The response also includes guidance to interpret the numbers and provides suggested measures. The Insider Risk Self-Assessment is one more way CISA is working with public and private stakeholders at the federal, state, local, and community levels to prevent and mitigate risk to our Nation’s critical infrastructure. Insider Risk Mitigation Program Evaluation (IRMPE): Assessment Instrument (.pdf, 5.7MB) Insider threat risks, which can be malicious or accidental, can have a significant impact considering the level of damages they can inflict on an organization if not detected and blocked in due time. Typically, insider threats are a current or former employee, a third-party contractor, or a business partner who has (or had) access to an organization's network and/or data and uses that access for malicious purposes (unwittingly or not). "Consequences can include compromised sensitive information, damaged organizational reputation, lost revenue, stolen intellectual property, reduced market share, and even physical harm to people," CISA added. Further info and tools to mitigate insider threat risks can be found on CISA's infrastructure security website. In June, the federal agency also released a ransomware self-assessment security audit tool which helps orgs assess how well they are equipped to defend against and recover from ransomware attacks targeting their information technology (IT), operational technology (OT), or industrial control system (ICS) assets. |
Author: <see article>
These links serve as tributes to those who have written them. Please find contributor details in the links provided Archives
April 2024
Categories |