Read the press release announcing the early release of Wallarm API Leak Management
The recent surge in hacks involving leaked API Keys and other API secrets such as credentials, passwords, certificates, tokens and encryption keys has put everyone involved on notice – organizations need a way to discover, remediate and provide on-going protection against hacks in the event of a leak.
The Wallarm API Leak Management solution, now in early release, provides a comprehensive answer to this problem by automatically discovering leaked API keys and secrets, implementing controls to block their use, and monitoring any follow-on attacks. This allows organizations to prevent unauthorized access to sensitive data and to protect their internal operations and end customers from unauthorized use of that data.
If you’re concerned about this issue and want immediate help, we are offering a complimentary API Leaks Assessment. Register to get yours today!
In recent months the industry has been abuzz with news about attacks involving leaked API keys and other API secrets. For instance:
While API Key leakage incidents are not new, they seem to be accelerating now. Why?
Leakage of API keys and other secrets can happen for many reasons – due to developers’ mistakes, missing repository access controls, insecure use of public services, and data disclosure accidents by contractors, partners and users – which makes it extremely difficult to manage and protect against. It’s important because such leaks can pose a significant security threat to companies, as they can expose sensitive information, lead to account or system takeover, or worse.
Even if a leak is detected, it can be difficult to locate where the key is defined and revoke it in a timely manner. And it can be challenging to determine if the token was (mis)used before or after revocation, and to track any actions taken with the leaked information. These issues can be time-consuming and resource-intensive to address, making prevention an important consideration.
Today, Wallarm is introducing our new proactive API Leak Management capability, part of our End-to-End API Security bundle. Now in early release, the API Leak Management capability will provide alerts when a leak is detected, and enable you to quickly and easily block the leaked key through the interface.
You also have access to a registry of all detected leaks, allowing you to keep track of and manage potential security risks. This will not only save you time and effort, but also provides you with the peace of mind of knowing that you have a security control in place against leaks of API keys and other secrets.
There are three main scenarios:
The Wallarm API Leak Management solution is integrated with other Wallarm capabilities – including API Discovery, API Threat Prevention, and Cloud-Native WAAP. Customers get full-spectrum visibility, detection, and protection for their entire web application and API portfolio, regardless of protocol or environment, via our API Security Platform to reduce tool sprawl and cost while improving risk management and supporting innovation.
As the CISO of a large US enterprise said after getting a sneak peek, “I have to give Wallarm all the credit and praise for finding our API leaks, an issue we’ve been working relentlessly on for some time now. And the ability to deliver all this capability on a single platform is certainly unique in our estimation.”
Existing customers who are interested in taking advantage of early access to the Wallarm API Leak Management can reach out directly to our customer support team or their account executive.
Get a thorough understanding of your risk exposure due to leaked API keys and other secrets by registering for our free API Leaks Assessment. We will scour out 20+ sources for any leaked API keys and other secrets – all with no impact on your APIs themselves. We expect to get a full report on your risk exposure due to leaked API keys and other secrets within 72 hours, pending confirmation of your domain ownership.