<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Jamie Beckland</title>
    <description>The latest articles on Forem by Jamie Beckland (@beckland).</description>
    <link>https://forem.com/beckland</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1050552%2Fa733c680-d973-4b86-867a-d8e2e609c741.jpg</url>
      <title>Forem: Jamie Beckland</title>
      <link>https://forem.com/beckland</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/beckland"/>
    <language>en</language>
    <item>
      <title>Why Every Level of the API Context Maturity Model Matters</title>
      <dc:creator>Jamie Beckland</dc:creator>
      <pubDate>Wed, 06 Sep 2023 09:00:00 +0000</pubDate>
      <link>https://forem.com/contxt/why-every-level-of-the-api-context-maturity-model-matters-2ojn</link>
      <guid>https://forem.com/contxt/why-every-level-of-the-api-context-maturity-model-matters-2ojn</guid>
      <description>&lt;p&gt;&lt;strong&gt;By: Mayur Upadhyaya &amp;amp; Jamie Beckland&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Welcome back to our ongoing exploration of the &lt;a href="https://bycontxt.com/blog/introducing-the-api-context-maturity-model?utm_source=DevTo"&gt;API Context Maturity Model&lt;/a&gt;. As we've navigated the diverse landscape of API maturity, it's become clear that each level, from open public API calls to open standards compliance, holds unique value and challenges. Today, we'll delve into why every level of our API Maturity Model is crucial to your organization's API security and effectiveness.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Foundation: Open, Public API Calls
&lt;/h3&gt;

&lt;p&gt;At Level 0, open public API calls form the bedrock of the API journey. An executive from a global retailer emphasized that while this level offers ease of accessibility and innovation, it's a double-edged sword, with potential data exposure risks. This level matters because it's where organizations learn the fundamentals of APIs and the inherent necessity for effective management tools, like Contxt.&lt;/p&gt;

&lt;h3&gt;
  
  
  Showing Progress: Authenticated API Calls
&lt;/h3&gt;

&lt;p&gt;Next, we see authenticated API calls at Level 1. This level introduces a layer of security, helping to verify who is accessing the APIs. However, as the representative from an Oil and Gas multinational highlighted, it's not without its challenges, particularly around creating user-friendly authentication measures. This stage is vital as it emphasizes the importance of balancing user experience with robust security.&lt;/p&gt;

&lt;h3&gt;
  
  
  A Power Shift: Authorized API Calls
&lt;/h3&gt;

&lt;p&gt;Moving to Level 2, the introduction of authorization adds another dimension to API security. Here, organizations learn to manage not just who can access APIs, but also what they can do. The Head of Engineering from a data scaleup shared the complexities of implementing granular access controls, underlining why this level is crucial for organizations to master.&lt;/p&gt;

&lt;h3&gt;
  
  
  Toward Clarity: Purpose and Use Defined
&lt;/h3&gt;

&lt;p&gt;Level 3 ushers in a significant shift where organizations define the purpose and use of their APIs. As a finance expert recounted, this step is critical to ensure compliance, especially under regulations like GDPR. This level, therefore, is pivotal in helping organizations understand the importance of transparency and control in their API strategy.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Culmination: Open Standards Compliance
&lt;/h3&gt;

&lt;p&gt;Finally, at Level 4, organizations grapple with open standards compliance. This level is the zenith of API maturity, where the focus is on ensuring APIs are not just secure but also interoperable and forward-compatible. The CTO of a tech enterprise underscored the challenges and the imperative nature of adopting these standards.&lt;/p&gt;

&lt;p&gt;The journey through the API Context Maturity Model is more than just a progressive roadmap. It's a recognition that each level presents opportunities for growth and learning. As organizations move through these stages, they learn to manage APIs more effectively and securely, preparing themselves for the ever-evolving landscape of API-driven innovation.&lt;/p&gt;

&lt;p&gt;Throughout this journey, Contxt is your trusted partner, providing the tools and insights needed at each level. Remember, every level matters because each one adds a layer of understanding, security, and effectiveness to your API strategy, leading to a more robust, compliant, and future-proof API ecosystem.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>New U.S. Regulations Highlight the Importance of Collecting Personal Data Purpose and Use</title>
      <dc:creator>Jamie Beckland</dc:creator>
      <pubDate>Thu, 31 Aug 2023 15:00:44 +0000</pubDate>
      <link>https://forem.com/contxt/new-us-regulations-highlight-the-importance-of-collecting-personal-data-purpose-and-use-4691</link>
      <guid>https://forem.com/contxt/new-us-regulations-highlight-the-importance-of-collecting-personal-data-purpose-and-use-4691</guid>
      <description>&lt;p&gt;Today, the White House hosted a roundtable on data broker practices that harm consumer privacy, in particular, selling “credit header data,” which can contain sensitive personal information such as name, Social Security number, and date of birth. Simultaneously, the Consumer Financial Protection Bureau (CFPB) announced it will propose new regulations to limit the operations of data brokers under the Fair Credit Reporting Act (FCRA). This move aims to safeguard consumer rights and privacy while bringing data brokers under more stringent control.&lt;/p&gt;

&lt;p&gt;Data brokers vacuum up and sell personal information, often without our explicit consent, and sometimes even without our knowledge or awareness. These brokers often rely on data with an unknowable chain of custody, mixing together data from a variety of sources, and often relying on blanket permissions from parties that are not authorized to grant them.&lt;/p&gt;

&lt;p&gt;The CFPB’s initiative reinforces the need for high quality data collection practices, in particular, the need to collect purpose and use consent alongside data attributes. Many digital product owners would never consider selling their customer data, but the reality is that personal data often leaks from poorly constructed and monitored APIs.&lt;/p&gt;

&lt;p&gt;Internal and external teams often have access to sensitive data over APIs, including marketing and data analytics teams. These new rules further highlight the need to limit customer data exposure with better tooling.&lt;/p&gt;

&lt;p&gt;This comes on the heels of the Securities and Exchange Commission (SEC) adopting new rules earlier this month that require companies to disclose cybersecurity incidents on Form 8-K within just four business days.&lt;/p&gt;

&lt;p&gt;There’s no question the regulatory cost of mishandling sensitive customer data is increasing.&lt;/p&gt;

&lt;p&gt;For most API product teams, the challenge has been they don’t have a good understanding of API misconfigurations; and they can’t control data flow at a granular enough level.&lt;/p&gt;

&lt;p&gt;At Contxt, we know that trust starts with discovery. Our first step is always to understand what data actually flows over your APIs.&lt;/p&gt;

&lt;p&gt;Once we have established a baseline, we empower you to collect and document the intended purpose of data usage. This aligns with the CFPB's goal of ensuring companies comply with authorized data uses, as specified by the FCRA.&lt;/p&gt;

&lt;p&gt;Then, Contxt's capabilities extend beyond data collection and reporting. We enable you to enforce proper usage downstream, ensuring that the data's purpose remains consistent throughout its journey.&lt;/p&gt;

&lt;p&gt;To learn more about Contxt's capabilities and how we can help your business prepare for the dynamic regulatory environment, &lt;a href="https://darkspark.io/signup?utm_source=DevTo"&gt;sign up for an account for free&lt;/a&gt;.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Ask the Experts: Understanding the API Context Maturity Model - Level 4 - Open Standards Compliant API Calls</title>
      <dc:creator>Jamie Beckland</dc:creator>
      <pubDate>Wed, 23 Aug 2023 09:00:00 +0000</pubDate>
      <link>https://forem.com/contxt/ask-the-experts-understanding-the-api-context-maturity-model-level-4-open-standards-compliant-api-calls-51nd</link>
      <guid>https://forem.com/contxt/ask-the-experts-understanding-the-api-context-maturity-model-level-4-open-standards-compliant-api-calls-51nd</guid>
      <description>&lt;p&gt;&lt;strong&gt;By: Mayur Upadhyaya &amp;amp; Jamie Beckland&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Welcome to the final stage of our API Context Maturity Model journey - Level 4, where Open Standards Compliance reigns. It is at this stage that organizations reach the pinnacle of API maturity, where the established API ecosystem adheres to recognized industry standards.&lt;/p&gt;

&lt;p&gt;In order to share key comments from the hundreds of technology leaders we consulted to develop the &lt;a href="https://bycontxt.com/blog/introducing-the-api-context-maturity-model?utm_source=DevTo"&gt;Context Maturity Model&lt;/a&gt;, we have anonymized their thoughts to give you the most unfiltered view.&lt;/p&gt;

&lt;p&gt;Adhering to open standards means the API calls are designed and operated in accordance with accepted industry best practices. These standards include mechanisms to ensure secure data transmission, robust authentication protocols, and well-defined data structures.&lt;/p&gt;

&lt;p&gt;A technology lead from a global financial services firm shared, "Adopting open standards helped us establish a common language and baseline for security within our API infrastructure. It's like a safety net that ensures we're following best practices."&lt;/p&gt;

&lt;p&gt;However, transitioning to Level 4 is not without its challenges. It demands an in-depth understanding of the standards, significant alignment effort, and continuous monitoring for adherence.&lt;/p&gt;

&lt;p&gt;A cybersecurity executive from a multinational logistics company explained their journey: "It was a massive task to align our existing API landscape to open standards. We found a few gaps during the transition, but it also helped us to uncover some hidden vulnerabilities."&lt;/p&gt;

&lt;p&gt;Achieving Level 4 maturity not only improves API security but also enhances interoperability, a significant advantage in today's increasingly interconnected world. It is the realization of a robust, secure, and efficient API ecosystem.&lt;/p&gt;

&lt;p&gt;While it's important to aim for Level 4 maturity, the journey through each level provides invaluable insights. With each step, organizations become more aware of their API ecosystem, uncovering vulnerabilities and enhancing security measures.&lt;/p&gt;

&lt;p&gt;This marks the conclusion of our 'Ask the Experts' series on the API Context Maturity Model. We've examined each level, the benefits, and challenges involved, and shared expert insights. No matter where you are in your API journey, remember that the aim is continuous improvement and security. As always, we encourage you to reach out with any questions or thoughts on your API journey.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Ask the Experts: Understanding the API Context Maturity Model - Level 2 - Authorized API Calls</title>
      <dc:creator>Jamie Beckland</dc:creator>
      <pubDate>Wed, 09 Aug 2023 09:00:00 +0000</pubDate>
      <link>https://forem.com/contxt/ask-the-experts-understanding-the-api-context-maturity-model-level-2-authorized-api-calls-3324</link>
      <guid>https://forem.com/contxt/ask-the-experts-understanding-the-api-context-maturity-model-level-2-authorized-api-calls-3324</guid>
      <description>&lt;p&gt;&lt;strong&gt;By: Mayur Upadhyaya &amp;amp; Jamie Beckland&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Welcome back to our 'Ask the Experts: Understanding the API Context Maturity Model' series. We've made our way up from open public API calls to authenticated API calls, and now we're ready to unpack Level 2 - Authorized API Calls. As a reminder, we have distilled key comments from the hundreds of technology leaders we consulted to develop the &lt;a href="https://bycontxt.com/blog/introducing-the-api-context-maturity-model?utm_source=DevTo"&gt;Context Maturity Model&lt;/a&gt;, and we are sharing their thoughts anonymously to give you the most unfiltered view of the current state of APIs.&lt;/p&gt;

&lt;p&gt;After establishing an authentication system at Level 1, the next challenge for organizations is to establish an authorization system. With authorization in place, API calls can be made by authenticated users with specific permissions. This reduces the risk of users accessing data or functions that they aren't supposed to, adding another layer of security and control to the API environment.&lt;/p&gt;

&lt;p&gt;A CTO of a fintech start-up shared their experience moving to Level 2. "After incorporating authentication measures, we soon realized the need for further granularity in API access. We needed to ensure that authenticated users could only access data and functions relevant to their roles. Transitioning to authorized API calls helped us achieve that."&lt;/p&gt;

&lt;p&gt;This level of authorization is crucial in environments where data sensitivity varies or where roles differ significantly in their access requirements. For instance, an executive at a multinational banking corporation highlighted how implementing authorization measures was a game-changer in their highly regulated industry.&lt;/p&gt;

&lt;p&gt;They said, "In our industry, data sensitivity varies enormously, and so does role-based access requirements. With authorized API calls, we were able to ensure that our employees could access only the data and functions that were pertinent to their work. This move dramatically improved our data security posture."&lt;/p&gt;

&lt;p&gt;However, like every step in the maturity model, Level 2 comes with its own set of challenges. The more granular the access control, the more complex the system can become. Organizations often struggle with managing a large number of roles and permissions, which can lead to misconfigurations.&lt;/p&gt;

&lt;p&gt;In our next post, we'll delve into Level 3 - Purpose and Use Defined API Calls, where we will discuss how organizations can deal with complex role and permission challenges by defining the purpose and use of each API call.&lt;/p&gt;

&lt;p&gt;Till then, stay tuned, and as always, feel free to reach out for more insights on API security and best practices.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Ask the Experts: Understanding the API Context Maturity Model - Level 0 - Open, Public API Calls</title>
      <dc:creator>Jamie Beckland</dc:creator>
      <pubDate>Fri, 28 Jul 2023 09:00:00 +0000</pubDate>
      <link>https://forem.com/contxt/ask-the-experts-understanding-the-api-context-maturity-model-level-0-open-public-api-calls-4n75</link>
      <guid>https://forem.com/contxt/ask-the-experts-understanding-the-api-context-maturity-model-level-0-open-public-api-calls-4n75</guid>
      <description>&lt;p&gt;&lt;strong&gt;By: Mayur Upadhyaya &amp;amp; Jamie Beckland&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Welcome to our new series, 'Ask the Experts: Understanding the API Context Maturity Model.' In the course of developing the &lt;a href="https://bycontxt.com/blog/introducing-the-api-context-maturity-model?utm_source=DevTo"&gt;Context Maturity Model&lt;/a&gt;, we spoke with hundreds of technology leaders across a variety of industries. In this series, we hear from some of these experts in their own words. Throughout this series, we will share their candid thoughts and feedback anonymously, to give you the most unfiltered view of the current state of APIs.&lt;/p&gt;

&lt;p&gt;Our journey begins at Level 0 - Open, Public API Calls. APIs at this level are accessible to anyone and can be called freely. They serve as the foundation for organizations entering the realm of APIs, creating an open-ended environment for data sharing but also posing significant potential risks.&lt;/p&gt;

&lt;p&gt;A technology lead at a multinational oil and gas company offered insight into their experience at this level. He noted, "APIs initially seemed like a simple way to share data and establish connections. However, we quickly realized that without proper control measures, our exposure to risk was far greater than necessary."&lt;/p&gt;

&lt;p&gt;These sentiments underscore the trade-offs businesses must consider at Level 0. While open, public API calls can accelerate digital transformation, they also emphasize the importance of implementing secure API practices from the outset.&lt;/p&gt;

&lt;p&gt;Another perspective came from a manager at a global retailer, who described an incident where public access to an API led to its misuse and unnecessary exposure of a significant amount of data. This experience further highlights the potential pitfalls at this level.&lt;/p&gt;

&lt;p&gt;Open, public API calls are incredibly useful, but they should only be used once you have confirmed that there is no risk of proprietary or sensitive data leaks.&lt;/p&gt;

&lt;p&gt;As we progress through the &lt;a href="https://bycontxt.com/blog/introducing-the-api-context-maturity-model?utm_source=DevTo"&gt;Context Maturity Model&lt;/a&gt; in subsequent posts, we will explore how to navigate these challenges and adopt more secure and sophisticated API practices. The journey from open, public API calls to achieving open standards compliance has many considerations, but by understanding each level's unique challenges, your organization can confidently navigate the path to API maturity.&lt;/p&gt;

&lt;p&gt;Join us in our next post as we delve into Level 1 - Authenticated API Calls. As always, if you'd like more information on API security and best practices, feel free to reach out. We're here to help!&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Introducing the API Context Maturity Model</title>
      <dc:creator>Jamie Beckland</dc:creator>
      <pubDate>Mon, 12 Jun 2023 23:00:00 +0000</pubDate>
      <link>https://forem.com/contxt/introducing-the-api-context-maturity-model-5gp9</link>
      <guid>https://forem.com/contxt/introducing-the-api-context-maturity-model-5gp9</guid>
      <description>&lt;p&gt;&lt;strong&gt;By: Mayur Upadhyaya and Jamie Beckland&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Every API call has context around it.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Who is making the API call?&lt;/li&gt;
&lt;li&gt;What data are they requesting or attempting to post?&lt;/li&gt;
&lt;li&gt;Is that data public or private?&lt;/li&gt;
&lt;li&gt;Do we need to check with anyone else before permitting the request?&lt;/li&gt;
&lt;li&gt;Does the data transfer have any legal or ethical considerations or constraints?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Our goal should be to provide the right response, in the right context, every time.&lt;/p&gt;

&lt;p&gt;But, for the past decade, &lt;a href="https://bycontxt.com/blog/blog/apis-are-growing-faster-than-developers-can-handle?utm_source=DevTo" rel="noopener noreferrer"&gt;APIs have moved at the speed of business&lt;/a&gt;. APIs have grown so quickly because they have proven their value in creating flexibility and functionality.  The cost, however, has been with inconsistent security, privacy, and performance rigor.&lt;/p&gt;

&lt;p&gt;That’s why there have been so many &lt;a href="https://bycontxt.com/blog/pii-and-you-why-appdevs-need-to-protect-it?utm_source=DevTo" rel="noopener noreferrer"&gt;data issues&lt;/a&gt;, &lt;a href="https://bycontxt.com/blog/t-mobile-is-in-hot-water-again-another-breach-this-time-due-to-insecure-api?utm_source=DevTo" rel="noopener noreferrer"&gt;breaches&lt;/a&gt;, and &lt;a href="https://bycontxt.com/blog/blog/so-you-have-an-api-vulnerability-what-does-that-mean-and-what-can-be-done?utm_source=DevTo" rel="noopener noreferrer"&gt;leaky APIs&lt;/a&gt; recently. Bad actors know that the APIs are the weak link in protecting your customers’ and your business’ data assets.&lt;/p&gt;

&lt;p&gt;Our approach to API context maturity comes from understanding that you are building the plane while you fly it. You need to move quickly, and enable teams to deliver business objectives. One approach is to slow teams down by asking them to be experts in security and privacy (in addition to all of the other functions that they need to be experts in).&lt;/p&gt;

&lt;p&gt;We think you get better outcomes faster when you ensure that there are adequate guardrails, so teams can’t make egregious mistakes, while maintaining velocity.&lt;/p&gt;

&lt;p&gt;Then, incrementally, we can raise the guardrails to enforce higher standards for use cases where more protection is necessary.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwyo0pnvcz0qw7ifmm7l2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwyo0pnvcz0qw7ifmm7l2.png" alt="A graph with the y-axis labeled: Maturity and the x-axis labeled: Capacity with five different boxes plotted on the graph going diagonally up and right. The first box says: Level 0 - Open APIs. The second box says: Level 1 - Authenticated APIs. The third box says: Level 2 - Authorized APIs. The fourth box says: Level 3 - Purpose Defined. The final box says: Level 4 - Standards Compliant."&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The API Context Maturity Model breaks down building and maintaining APIs with an increasingly sophisticated understanding of the context surrounding the API call.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Level 0 - Open, public API calls.&lt;/strong&gt; These calls require no information from the requester before delivering a response. This may be totally appropriate for many (or most!) API calls. An API call that delivers weather for a location, or the cost of a flight, may not need any special protections, and Level 0 works well. It is fast and efficient, and ensures that the barrier to deploy and maintain these services is as low as possible. However, if an API call contains personal or sensitive data, or if it requires authentication, Level 0 is not appropriate.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Level 1 - Authenticated API calls.&lt;/strong&gt; These calls have an understanding of who the requester is, and can provide information specific to that requester. There are lots of reasons that an API call should be authenticated. Perhaps a customer wants to know information about their account. Or you need to monitor the usage of the API call, so you need to understand how much each user is calling the service. Or there is proprietary pricing and inventory information that you only want to expose to certain employees and partners. Regardless of the reason, any API that needs to be authenticated should have validation of authentication every time it is delivered. There are many ways to authenticate an API call, and different levels of authentication should apply to different APIs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Level 2 - Authorized API calls.&lt;/strong&gt; These calls have specific permissions and requester expectations attached to them. For example, maybe you offer different bulk pricing discounts to different partners, based on the level of commercial relationship. You want to make sure that pricing information is not shared with every user and system from the partner, but customize the response based on the authorization scope. Another example is when you have different services calling the same API endpoint, and want to return different information. If your get_customers endpoint is used by your internal analytics tool, you may want to share birthdate, mailing address, and other personal information. But, when your advertising partners call that same endpoint, you need to reduce the scope of the payload to avoid sharing PII.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Level 3 - Purpose and use defined.&lt;/strong&gt; These calls rely on an understanding of why and how the data in the payload will be used. Perhaps the subject of the data request needs to consent for the requester to have the data, or to use the data in certain ways. You may need to collect consent from a patient to share their health data with their doctor or other provider. Or, with proper customer consent, you actually can share PII with advertisers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Level 4 - Open standards compliant.&lt;/strong&gt; These calls are critical to core business operations, and as such, they need to conform to rigorous public standards. In many markets, standards that have been developed and hardened in public working groups are now being adopted as regulatory requirements for operations. Regulators in finance, health, and other areas may want to periodically review API calls to ensure compliance.&lt;/p&gt;

&lt;p&gt;The API Context Maturity Model requires an understanding of each individual API call; and also of the specific circumstances of that call. As APIs move through the levels in the model, the complexity to and assurance does not go up linearly. It is much more complex to interpret changing regulations than simple authentication.&lt;/p&gt;

&lt;p&gt;But, the framework provides a glidepath for Enterprises to incrementally improve their risk posture, and demonstrate conformance quickly.&lt;/p&gt;

&lt;p&gt;Implementing this maturity model becomes dramatically easier when you have an accurate understanding of your existing APIs, because the highest risk becomes clear quickly.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Existing API Maturity Models - Overview and Limitations</title>
      <dc:creator>Jamie Beckland</dc:creator>
      <pubDate>Mon, 05 Jun 2023 15:13:20 +0000</pubDate>
      <link>https://forem.com/contxt/existing-api-maturity-models-overview-and-limitations-37b3</link>
      <guid>https://forem.com/contxt/existing-api-maturity-models-overview-and-limitations-37b3</guid>
      <description>&lt;p&gt;In 2023, it seems that &lt;a href="https://bycontxt.com/blog/blog/apis-are-growing-faster-than-developers-can-handle?utm_source=DevTo"&gt;every company is in the middle of an API transformation&lt;/a&gt;. Which makes sense, after all, because APIs have become the primary mode of communication for all connected services. And as a result, &lt;a href="https://bycontxt.com/blog/blog/api-security-is-now-more-important-than-web-application-security?utm_source=DevTo"&gt;they are the primary attack vector for bad actors online&lt;/a&gt;. Teams need to up their API security, and quickly.&lt;/p&gt;

&lt;p&gt;Once you start building a work program, however, you quickly find that there are many competing approaches to putting order and structure to your API estate. Some options include:&lt;/p&gt;

&lt;h2&gt;
  
  
  Richardson Maturity Model
&lt;/h2&gt;

&lt;p&gt;The (Leonard) Richardson Maturity Model defines four levels of API maturity:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Level 0 - No APIs:&lt;/strong&gt; At this level, there are no APIs in place, and all data exchange happens through a user interface or direct database access.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Level 1 - Resources:&lt;/strong&gt; At this level, APIs are designed as basic resource endpoints. They are accessed over HTTP and can be thought of as simple web pages that provide information.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Level 2 - HTTP Verbs:&lt;/strong&gt; At this level, APIs are designed to use HTTP verbs such as GET, POST, PUT, and DELETE to perform operations on resources.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Level 3 - Hypermedia Controls:&lt;/strong&gt; At this level, APIs are designed to include hypermedia controls, which provide links to related resources and enable clients to discover and navigate the API dynamically.&lt;/p&gt;

&lt;p&gt;The Richardson model is not very useful for making a plan to organize and secure an existing set of APIs for an enterprise, because it looks at API development and management as a linear pattern. But, most organizations have multiple teams and applications, with varied maturity and resourcing, which means that your API status will always contain elements at all four levels.&lt;/p&gt;

&lt;h2&gt;
  
  
  APIOps Cycles
&lt;/h2&gt;

&lt;p&gt;The APIOps Cycles, created by Marjukka Niinioja, Jarkko Moilanen, and others, is a framework that focuses on the entire API lifecycle, from design to retirement. It’s focused on a product development and product management approach to API design and construction. It consists of eight stages:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Business First with API Canvas&lt;/strong&gt; - This stage is focused on aligning business needs and customer journeys.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Mind the Developer Experience&lt;/strong&gt; - In this stage, the focus is on making sure your APIs can be found, used, and supported.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Minimum Viable API Architecture&lt;/strong&gt; - This stage is focused on making nonfunctional requirements as easy to accomplish as possible.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Build APIs&lt;/strong&gt; - Here, the work is focused on designing simple-to-use interaction models, focusing on design styles and open standards.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;API Audit&lt;/strong&gt; - In this stage, APIs are compared against checklists of the previous stages as well as security.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Publish API&lt;/strong&gt; - Here, the team makes the API available for the first time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Monitor, Measure, and Analyze&lt;/strong&gt; - This stage is focused on collecting metrics and KPIs to understand how your APIs are being used.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Learn and Improve&lt;/strong&gt; - This final stage is about speeding up cycle time and improving quality of the APIs incrementally.&lt;/p&gt;

&lt;p&gt;The APIOps Cycles framework emphasizes the importance of a holistic approach to API development and management, where each stage builds upon the previous one. It comes from lean/agile product development, and is focused on building APIs as products. This is very useful if you are mapping how mature your API development process is, but it doesn’t give you any information on the quality and maturity of the APIs themselves. The best development methodology can still create security and privacy vulnerabilities.&lt;/p&gt;

&lt;h2&gt;
  
  
  The API Security Maturity Model
&lt;/h2&gt;

&lt;p&gt;Jacob Idesvog shared his API Security Maturity Model in 2019, as a response to trying to articulate the increased security risk from the proliferation of inadequate API construction and management. It has four phases:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Level 0: API Keys and Basic Authentication&lt;/strong&gt; - If an API request presents an API key, then that key should be valid and should be trusted. It does not question the resources making the calls to the API at all.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Level 1: Token-Based Authentication&lt;/strong&gt; - When an API call is accompanied with a token, the token can be used to authenticate the requestor before providing a response.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Level 2: Token-Based Authorization&lt;/strong&gt; - In addition to an authentication, the API call is also expected to include a token that authorizes the requester to take certain actions (and to prevent them from taking other actions). This allows a lot of granularity in validating requests before delivering responses.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Level 3: Centralized Trust Using Claims&lt;/strong&gt; -  By introducing claims of veracity, we give the API the ability to independently assess the veracity of the authorization. Signed JSON Web Tokens (JWTs) are commonly used to present to share claims by using their in-built scopes capability. Third parties can leverage encrypted keys to validate payloads even after they are delivered.&lt;/p&gt;

&lt;p&gt;Again, this model is useful when thinking through how to build and maintain protected API services. But, it falls short when we try to understand where risk lies within our existing environments. This model tells us what to do to make our APIs more secure, but it doesn’t tell us what APIs most need protecting, and to what extent.&lt;/p&gt;

&lt;h2&gt;
  
  
  A Different Approach
&lt;/h2&gt;

&lt;p&gt;At Contxt, we know that most companies must move quickly into an API-first IT model. External products, internal applications, and backend services all use APIs, and they are in various states of maturity at any given time.&lt;/p&gt;

&lt;p&gt;Several years ago, it was helpful to evaluate your APIs against these models to help you build APIs quickly and with high confidence.&lt;/p&gt;

&lt;p&gt;But now that you are managing so many live API systems, attentions are turning toward &lt;a href="https://bycontxt.com/blog/why-you-should-be-comparing-your-environments?utm_source=DevTo"&gt;identifying and remediating risky API construction&lt;/a&gt;, &lt;a href="https://bycontxt.com/blog/protect-your-data-a-guide-to-secure-transmissions-for-devs?utm_source=DevTo"&gt;data transfer&lt;/a&gt;, and permissions.&lt;/p&gt;

&lt;p&gt;Coming soon, we will share our model for API maturity, that is focused on building a mature monitoring, detection and response capability for APIs that we must have, but can never fully control.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Best practice is to send PII using POST, not GET…so why don’t more developers do it?</title>
      <dc:creator>Jamie Beckland</dc:creator>
      <pubDate>Thu, 23 Mar 2023 16:33:02 +0000</pubDate>
      <link>https://forem.com/contxt/best-practice-is-to-send-pii-using-post-not-getso-why-dont-more-developers-do-it-532h</link>
      <guid>https://forem.com/contxt/best-practice-is-to-send-pii-using-post-not-getso-why-dont-more-developers-do-it-532h</guid>
      <description>&lt;p&gt;One of the first principles developers learn when writing REST APIs is to use GET for retrieving data and POST for modifying data.&lt;/p&gt;

&lt;p&gt;Except, of course, GET exposes the parameters in the URL directly. And we never want to expose sensitive data like user credentials, PII, or PIFI. So they immediately must un-learn what they have learned, and put sensitive data in the body, using POST, to provide a slightly better default security and privacy posture.&lt;/p&gt;

&lt;p&gt;In an attempt to mitigate the risk, some organizations create policies to make using GET requests so cumbersome to deploy - with additional security checks and review queues - that they effectively ban them from use.&lt;/p&gt;

&lt;p&gt;Which, in turn, creates downstream problems. When all the requests are POST, then all the requests can modify the data. This gives many API users a lot of discretion and power.&lt;/p&gt;

&lt;p&gt;In the end, of course, the right way to solve the problem is to tokenize sensitive data, so it can be transmitted using any API call.&lt;/p&gt;

&lt;p&gt;But, as applications improve tokenization and context-awareness, we are left with a patchwork of half-secure, mostly-private applications talking to each other. Older applications may run on SSL or an outdated version of TLS. Rogue application developers may find ways to accidentally push unsecured http requests live. Relay APIs may sit outside of the security perimeter.&lt;/p&gt;

&lt;p&gt;In addition, external API consumers may only have GET permissions, they can consume data but they can’t change it. Or, an API call may not have a specific method defined, in which case many services will assume the request should be a GET request.&lt;/p&gt;

&lt;p&gt;If only one element is misconfigured, personal data is exposed, which is a security breach and also a privacy breach.&lt;/p&gt;

&lt;p&gt;It’s critical to improve the awareness and visibility of these security and privacy gaps, in order to make incremental improvements across the entire system. We need to be able to fixing privacy and security in post…by monitoring how actual calls are made in real, live operational systems.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Revised OWASP Top Ten shows how companies that live by the API also risk dying by the API</title>
      <dc:creator>Jamie Beckland</dc:creator>
      <pubDate>Thu, 23 Mar 2023 16:32:41 +0000</pubDate>
      <link>https://forem.com/contxt/revised-owasp-top-ten-shows-how-companies-that-live-by-the-api-also-risk-dying-by-the-api-4pee</link>
      <guid>https://forem.com/contxt/revised-owasp-top-ten-shows-how-companies-that-live-by-the-api-also-risk-dying-by-the-api-4pee</guid>
      <description>&lt;p&gt;Recently, the OWASP Foundation updated their list of the top 10 most common web application vulnerabilities, aka the &lt;a href="https://owasp.org/www-project-top-ten/"&gt;OWASP Top Ten&lt;/a&gt;. The new list is an update from the previous version, published in 2017, and was driven by the dramatic pace of change in web application development and the behaviors of bad actors.&lt;/p&gt;

&lt;p&gt;Here’s the full list of changes:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--SHho40j5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/nbp1aasc08vwzmew7n0u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--SHho40j5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/nbp1aasc08vwzmew7n0u.png" alt="OWASP Top Ten 2017 compared to OWASP Top Ten 2022" width="800" height="221"&gt;&lt;/a&gt;&lt;/p&gt;
OWASP Top Ten 2017 compared to OWASP Top Ten 2022



&lt;p&gt;There is not much in the way of good news. While several issues have been consolidated, like Cross-Site Scripting and Insecure Deserialization, none have dropped off the top ten list entirely. That means that the risks from 2017 are still risks today.&lt;/p&gt;

&lt;p&gt;But, in addition, there are several new risks and several risks that are placed much higher than previously. Broadly speaking, that is because the risks of APIs have never been adequately managed, even while their popularity continues to explode. &lt;/p&gt;

&lt;p&gt;In fact, due to the rise of microservices,  new digital businesses, and cloud deployments, &lt;a href="https://www.akamai.com/newsroom/press-release/state-of-the-internet-security-retail-attacks-and-api-traffic#:~:text=API%20calls%20represent%2083%20percent,and%20cloud%2Dbased%20application%20deployment"&gt;APIs are now 83% of all internet traffic&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;We have clearly passed the tipping point where APIs are critical operational elements in a technology stack. Which means they are a more attractive target than ever for bad actors.&lt;/p&gt;

&lt;p&gt;In short, as more and more companies live by the API, they also run the risk of dying by the API.&lt;/p&gt;

&lt;p&gt;To make things even more challenging, legacy security applications do a poor job managing these new vulnerabilities. It’s no longer enough to track the volume of API calls to identify a DDOS attack based on scale alone. Today’s attackers can probe slowly, and under the radar of brute force monitoring.&lt;/p&gt;

&lt;p&gt;The best solution would be for development teams who deeply understand their own application logic to instill security best practices consistently and perfectly. The “shift left” movement is improving tooling and education, but the reality is that business results can’t wait for millions of developers to collectively raise the bar for building secure applications.&lt;/p&gt;

&lt;p&gt;That’s why it’s necessary to continue to shield applications in the wild with a coherent security monitoring strategy. As attacks get more sophisticated, our responses must also  become more sophisticated. For most security teams, that means getting deeper into the API logic and capabilities, testing and probing to find vulnerabilities before bad actors do.&lt;/p&gt;

&lt;p&gt;We will expand on several of the OWASP top ten vulnerabilities over a series of blog posts, identifying both why these issues are more prevalent than ever, and also what to do about them. Stay tuned for more.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>API security is now more important than web application security</title>
      <dc:creator>Jamie Beckland</dc:creator>
      <pubDate>Thu, 23 Mar 2023 16:31:31 +0000</pubDate>
      <link>https://forem.com/contxt/api-security-is-now-more-important-than-web-application-security-7k</link>
      <guid>https://forem.com/contxt/api-security-is-now-more-important-than-web-application-security-7k</guid>
      <description>&lt;p&gt;We have been reviewing the OWASP Top Ten in some detail, which is the premier index of the most critical vulnerabilities in web applications.&lt;/p&gt;

&lt;p&gt;But, in 2019, the OWASP Foundation found that their traditional web application security vulnerability was simply not advanced enough to bring visibility to the fastest growing threat categories: API vulnerabilities.&lt;/p&gt;

&lt;p&gt;So, in response, the foundation published its first-ever &lt;a href="https://owasp.org/www-project-api-security/"&gt;API Top Ten&lt;/a&gt;. It’s quite staggering. Between 2017 and 2021, the vulnerability posture of APIs grew to overtake the traditional web application, to the extent that even the web application vulnerabilities often overlap with API vulnerabilities.&lt;/p&gt;

&lt;p&gt;In fact, if APIs were fully secured, it’s likely that web application breaches would fall by at least 66%.&lt;/p&gt;

&lt;p&gt;So, as an extension of our security vulnerabilities overview, we will extend and expand to review many of the OWASP API Top Ten.&lt;/p&gt;

&lt;p&gt;Since the majority of all internet traffic is over APIs, it makes sense that we would want to prioritize improving and hardening APIs above even many traditional web application vulnerabilities. APIs are more often exploited, and their preference as an attack vector continues to grow for bad actors.&lt;/p&gt;

&lt;p&gt;Stay tuned for a more detailed review of these risks and how to manage them without paralyzing your customer-facing initiatives.&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
