<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: mayurContxt</title>
    <description>The latest articles on Forem by mayurContxt (@mayurcontxt).</description>
    <link>https://forem.com/mayurcontxt</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1095918%2F81595bb1-734d-46a2-a5f5-6c7545459301.png</url>
      <title>Forem: mayurContxt</title>
      <link>https://forem.com/mayurcontxt</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/mayurcontxt"/>
    <language>en</language>
    <item>
      <title>Mapping Your Journey to API Maturity With Contxt</title>
      <dc:creator>mayurContxt</dc:creator>
      <pubDate>Wed, 30 Aug 2023 09:00:00 +0000</pubDate>
      <link>https://forem.com/contxt/mapping-your-journey-to-api-maturity-with-contxt-5h4a</link>
      <guid>https://forem.com/contxt/mapping-your-journey-to-api-maturity-with-contxt-5h4a</guid>
      <description>&lt;p&gt;&lt;strong&gt;By: Mayur Upadhyaya &amp;amp; Jamie Beckland&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In the dynamic world of technology, companies are racing to harness the power of APIs to innovate and deliver seamless experiences. However, achieving API maturity is a journey that requires navigating many complexities and challenges.&lt;/p&gt;

&lt;p&gt;Our series, "Ask the Experts: Understanding the &lt;a href="https://bycontxt.com/blog/introducing-the-api-context-maturity-model?utm_source=DevTo"&gt;API Context Maturity Model&lt;/a&gt;," has garnered insights from industry leaders across the globe, shedding light on the practicalities of progressing through the different levels of API maturity. What resonates through these conversations is the necessity for a strategic partner to guide this journey, which is where Contxt can help.&lt;/p&gt;

&lt;h3&gt;
  
  
  Navigating Open, Public API Calls
&lt;/h3&gt;

&lt;p&gt;Starting at Level 0 of our API Context Maturity Model, we see the use of open, public API calls. These are the first steps into the API world, offering access to data and services. However, an interviewee from a global retailer highlighted the inherent risks in this level, citing challenges in managing data exposure. Contxt helps organizations strike the perfect balance between openness and security by providing visibility and control over API usage.&lt;/p&gt;

&lt;h3&gt;
  
  
  Advancing With Authenticated API Calls
&lt;/h3&gt;

&lt;p&gt;Level 1 introduces authentication to APIs, which addresses some of the security concerns of Level 0. An executive from an Oil and Gas multinational reflected on the challenges in implementing robust and user-friendly authentication measures. Contxt assists by ensuring authentication is not a stumbling block but a stepping stone to higher API maturity levels.&lt;/p&gt;

&lt;h3&gt;
  
  
  Empowering With Authorized API Calls
&lt;/h3&gt;

&lt;p&gt;At Level 2, APIs become more refined with the introduction of authorization. While this enhances security, the Head of Engineering at a data scaleup mentioned the complexities in implementing fine-grained access controls. Contxt simplifies this by offering intuitive tools to manage API permissions effectively.&lt;/p&gt;

&lt;h3&gt;
  
  
  Defining Purpose and Use
&lt;/h3&gt;

&lt;p&gt;As organizations reach Level 3, the need for transparency and control becomes paramount. A finance sector expert shared experiences of grappling with purpose and use definitions for APIs, crucial for compliance with regulations like GDPR. Contxt's unique capabilities provide the much-needed clarity in defining the purpose and use of APIs, ensuring organizations stay on the right side of compliance.&lt;/p&gt;

&lt;h3&gt;
  
  
  Embracing Open Standards Compliance
&lt;/h3&gt;

&lt;p&gt;Finally, at Level 4, we explore the adoption of open standards, a cornerstone of modern API development. A CTO from a technology enterprise echoed the challenges in adopting and maintaining compliance with these standards. Contxt aids organizations to not only understand these standards but also to implement them effortlessly.&lt;/p&gt;

&lt;p&gt;Through the course of these conversations, it's evident that the journey to API maturity is one of continuous evolution, with new challenges at each level. At Contxt, we get to be a reliable partner, guiding organizations at each step of this journey, transforming challenges into opportunities for growth and innovation. Stay tuned to our blog as we delve deeper into each level, sharing more insights and practical solutions from industry experts and the Contxt team.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Ask the Experts: Understanding the API Context Maturity Model - Level 3 - Purpose and Use Defined API Calls</title>
      <dc:creator>mayurContxt</dc:creator>
      <pubDate>Wed, 16 Aug 2023 09:00:00 +0000</pubDate>
      <link>https://forem.com/contxt/ask-the-experts-understanding-the-api-context-maturity-model-level-3-purpose-and-use-defined-api-calls-55co</link>
      <guid>https://forem.com/contxt/ask-the-experts-understanding-the-api-context-maturity-model-level-3-purpose-and-use-defined-api-calls-55co</guid>
      <description>&lt;p&gt;&lt;strong&gt;By: Mayur Upadhyaya &amp;amp; Jamie Beckland&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Continuing with our journey up the API Context Maturity Model, we've arrived at Level 3 - Purpose and Use Defined API Calls. As our API usage expands, so does the complexity and potential security concerns. Now, we take our API security strategy a step further by focusing on the defined purpose and use of each API call.&lt;/p&gt;

&lt;p&gt;As a reminder, we have distilled key comments from the hundreds of technology leaders we consulted to develop the &lt;a href="https://bycontxt.com/blog/introducing-the-api-context-maturity-model?utm_source=DevTo"&gt;Context Maturity Model&lt;/a&gt;, and we are sharing their thoughts anonymously to give you the most unfiltered view of the current state of APIs.&lt;/p&gt;

&lt;p&gt;Defining the purpose and use of API calls may seem intuitive, but it is a level that many organizations struggle to reach. At Level 3, each API call is associated with a specific purpose and use. This ensures that the system only allows API calls that match the defined purpose and use, further reducing the risk of data leaks or misuse.&lt;/p&gt;

&lt;p&gt;One IT leader at a global retailer conveyed how defining purpose and use made a difference. "Once we began associating specific uses with each API call, we gained a better understanding of our data flows. It also helped us spot abnormal behaviors much quicker."&lt;/p&gt;

&lt;p&gt;However, there are challenges as well. Defining the purpose and use for each API call requires a detailed understanding of the business operations and comprehensive mapping of data flows, which can be a complex process for larger organizations.&lt;/p&gt;

&lt;p&gt;A CISO of a multinational healthcare company described their journey: "Mapping our data flows and aligning them with our API calls was quite a challenge. But the visibility it provided in terms of our data processing activities was worth it."&lt;/p&gt;

&lt;p&gt;As organizations start defining the purpose and use of their API calls, they take a significant step toward achieving more secure and manageable API ecosystems.&lt;/p&gt;

&lt;p&gt;In the next post of this series, we will explore the final level of the API Context Maturity Model - Level 4, where organizations achieve compliance with open standards. Stay tuned to learn about the benefits and challenges that come with reaching the peak of API maturity. As always, we encourage you to reach out with any questions or comments on your journey to better API security.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Ask the Experts: Understanding the API Context Maturity Model - Level 1 - Authenticated API Calls</title>
      <dc:creator>mayurContxt</dc:creator>
      <pubDate>Wed, 02 Aug 2023 09:00:00 +0000</pubDate>
      <link>https://forem.com/contxt/ask-the-experts-understanding-the-api-context-maturity-model-level-1-authenticated-api-calls-50a9</link>
      <guid>https://forem.com/contxt/ask-the-experts-understanding-the-api-context-maturity-model-level-1-authenticated-api-calls-50a9</guid>
      <description>&lt;p&gt;&lt;strong&gt;By: Mayur Upadhyaya &amp;amp; Jamie Beckland&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Welcome back to 'Ask the Experts: Understanding the API Context Maturity Model.' In our &lt;a href="https://bycontxt.com/blog/g9t2130mj7gn23bu32drhtesqzuny8?utm_source=DevTo"&gt;first post of the series&lt;/a&gt;, we explored the foundation of the model: Open, Public API calls. Now, we will move up a rung on the ladder to Level 1 - Authenticated API calls. As a reminder, we are distilling key comments from the hundreds of technology leaders we consulted to develop the &lt;a href="https://bycontxt.com/blog/introducing-the-api-context-maturity-model?utm_source=DevTo"&gt;Context Maturity Model&lt;/a&gt;, and we are sharing their thoughts anonymously to give you the most unfiltered view of the current state of APIs.&lt;/p&gt;

&lt;p&gt;As organizations become more aware of the inherent security risks associated with entirely open APIs, they begin to implement authentication measures. API calls at Level 1 require valid credentials, adding a basic layer of security and control over who can access the API.&lt;/p&gt;

&lt;p&gt;Drawing from our expert interviews, a CIO from a healthcare tech firm shared their experiences navigating Level 1. They remarked, "The addition of authentication measures provided a much-needed layer of security. It marked our first step towards a more secure API environment, but it quickly became clear that authentication alone was not enough."&lt;/p&gt;

&lt;p&gt;While authenticated API calls significantly reduce the risk of unauthorized access, they do not provide granular access control, i.e., what specific data or functions a particular user can access. Therefore, while Level 1 improves upon the openness of Level 0, it still poses limitations.&lt;/p&gt;

&lt;p&gt;An executive from a data scaleup echoed this sentiment. They stated, "Despite implementing authentication, we still faced incidents where users could access more data than necessary. The issue was not about who could access our API but about what they could access once they were in."&lt;/p&gt;

&lt;p&gt;It's important to note that these limitations aren't indicative of any failing at Level 1. Instead, they highlight the incremental nature of the API Context Maturity Model. Each level is a step forward, addressing limitations of the previous level while setting the stage for more advanced practices.&lt;/p&gt;

&lt;p&gt;Join us for our next installment where we'll delve into Level 2 - Authorized API Calls - where we will discuss how organizations can enhance their security measures by controlling not just who can access the API, but also what they can access.&lt;/p&gt;

&lt;p&gt;As always, if you're looking for more insights on API security and best practices, we're here to help. Until next time!&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Navigating the Evolving API Landscape: Insights From the New Stack and the API Context Maturity Model</title>
      <dc:creator>mayurContxt</dc:creator>
      <pubDate>Wed, 14 Jun 2023 23:00:00 +0000</pubDate>
      <link>https://forem.com/contxt/navigating-the-evolving-api-landscape-insights-from-the-new-stack-and-the-api-context-maturity-model-ga3</link>
      <guid>https://forem.com/contxt/navigating-the-evolving-api-landscape-insights-from-the-new-stack-and-the-api-context-maturity-model-ga3</guid>
      <description>&lt;p&gt;In a recent article published by &lt;a href="https://thenewstack.io/api-management-is-a-commodity-whats-next/"&gt;The New Stack&lt;/a&gt;, Eric Newcomer poses an intriguing question: &lt;a href="https://thenewstack.io/api-management-is-a-commodity-whats-next/"&gt;"API Management Is a Commodity: What’s Next?"&lt;/a&gt; His insightful analysis prompts a thoughtful examination of the API industry's trajectory. In response, we've chosen to align these observations with the stages of the &lt;a href="https://bycontxt.com/blog/introducing-the-api-context-maturity-model?utm_source=DevTo"&gt;API Context Maturity Model&lt;/a&gt;, providing a comprehensive roadmap for businesses seeking to navigate the complexities of API management effectively.&lt;/p&gt;

&lt;h2&gt;
  
  
  APIs as a Strategic Product: Level 0 &amp;amp; 1 of the Maturity Model
&lt;/h2&gt;

&lt;p&gt;Newcomer's argument begins with a significant claim: API management has reached a level of commoditization. His assertion reflects a mature industry where APIs are no longer viewed as novel innovations but as essential components of a business's digital strategy. This perspective aligns with Level 0 of the API Context Maturity Model, which denotes APIs that are open, public, and require minimal information before delivering a response.&lt;/p&gt;

&lt;p&gt;However, Newcomer also recognizes that the future of API management will rely heavily on security and accountability measures. The need for APIs to deliver personalized data and the increasing importance of monitoring API usage signifies a transition to Level 1 of the Maturity Model. Level 1 introduces authenticated API calls that provide requester-specific information, a necessity in today's digital ecosystem.&lt;/p&gt;

&lt;p&gt;At this juncture, Contxt can provide a significant boost. Tools like Contxt help businesses discover all APIs across their enterprise, implement integrated change control mechanisms, and manage authentication requirements, helping navigate the transition from Level 0 to Level 1.&lt;/p&gt;

&lt;h2&gt;
  
  
  APIs as Business Infrastructure: Progressing to Level 2
&lt;/h2&gt;

&lt;p&gt;In his article, Newcomer goes a step further, painting a picture where APIs form the foundation of a business's infrastructure. Such a scenario corresponds to Level 2 of the Maturity Model, a stage where API calls transition from being merely authenticated to becoming authorized.&lt;/p&gt;

&lt;p&gt;At Level 2, APIs carry specific permissions, adhering to precise requester expectations. Security becomes paramount, with businesses needing to consider data location regulations and proactive classification of sensitive data. Here, Contxt’s security features can play a critical role, providing robust data risk management capabilities to maintain compliance and protect data integrity.&lt;/p&gt;

&lt;h2&gt;
  
  
  APIs in Heavily Regulated Sectors: Embracing Level 4
&lt;/h2&gt;

&lt;p&gt;Newcomer spotlights the financial sector's increasing reliance on APIs, a trend indicative of the progression to Level 4 of the Maturity Model. This level denotes API calls that need to comply with rigorous public standards, a requirement often observed in heavily regulated sectors like finance.&lt;/p&gt;

&lt;p&gt;Level 4 brings unique challenges such as proving consistent compliance and maintaining detailed API documentation. Contxt offers solutions to these challenges with features designed for auto-documentation and demonstration of compliance, enabling businesses to thrive in this regulatory environment.&lt;/p&gt;

&lt;h2&gt;
  
  
  APIs and Event-Driven Architectures: Moving Towards Level 3
&lt;/h2&gt;

&lt;p&gt;In the future landscape envisioned by Newcomer, event-driven APIs and Large Language Models (LLMs) take center stage. These innovations correspond to Level 3 of the Maturity Model, where APIs are defined based on purpose and use.&lt;/p&gt;

&lt;p&gt;In this context, the exchange of data becomes dynamic, evolving to meet the specific requirements of each request. Such a shift requires advanced tools capable of tracking and managing data flows in real-time. Contxt's robust capabilities, designed to effectively handle dynamic data exchanges, provide a significant advantage as businesses transition towards Level 3.&lt;/p&gt;

&lt;h2&gt;
  
  
  Bridging Thought Leadership and Industry Practice
&lt;/h2&gt;

&lt;p&gt;The alignment of the API Context Maturity Model with Newcomer's industry trends provides a practical roadmap for organizations to navigate the increasingly complex world of API management. As the industry moves towards an era where APIs transition from being technical tools to strategic business assets, businesses will require robust and flexible solutions to ensure seamless, secure, and compliant API operations.&lt;/p&gt;

&lt;p&gt;Newcomer's commentary, backed by our practical alignment with the &lt;a href="https://bycontxt.com/blog/introducing-the-api-context-maturity-model?utm_source=DevTo"&gt;API Context Maturity Model&lt;/a&gt;, prepares businesses for this transition, highlighting the steps they can take and the tools they can leverage, like Contxt, to meet the demands of a rapidly evolving API landscape.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Guided Journey: Leveraging Identity Standards for API Security and Mitigating OWASP API:2019 Flaws</title>
      <dc:creator>mayurContxt</dc:creator>
      <pubDate>Sun, 11 Jun 2023 23:00:00 +0000</pubDate>
      <link>https://forem.com/contxt/guided-journey-leveraging-identity-standards-for-api-security-and-mitigating-owasp-api2019-flaws-ed9</link>
      <guid>https://forem.com/contxt/guided-journey-leveraging-identity-standards-for-api-security-and-mitigating-owasp-api2019-flaws-ed9</guid>
      <description>&lt;p&gt;&lt;strong&gt;Building on an insightful dialogue at The European Identity and Cloud Conference, I had the privilege of sharing the stage with industry experts Ingo Schubert (RSA), Ward Duchamps (Thales Digital Identity and Security), and Mark Haine (OpenID Foundation). With stimulating questions from Martin Kuppinger and Mike Schwartz, we dug deep into contemporary topics. Continuing from our &lt;a href="https://bycontxt.com/blog/maximizing-ciam-investments-a-layered-approach-to-api-security?utm_source=DevTo"&gt;previous panel-related post&lt;/a&gt;, this post presents the next chapter of our in-depth conversation.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In today's digital landscape, APIs (Application Programming Interfaces) are the cornerstone of business communication. They enable software applications to interact, opening up vast possibilities for integration and innovation. However, this also introduces an array of security vulnerabilities. To fortify defenses and mitigate these risks, we can harness the power of identity standards like FAPI2 (Financial-grade API). In this guided blog post, we'll explore the role of FAPI2 in addressing the flaws highlighted by the Open Web Application Security Project (OWASP) in their API:2019 report.&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 1: Understand the Role of Identity Standards in API Security
&lt;/h2&gt;

&lt;p&gt;Identity standards provide a framework for secure data sharing and interoperability. According to Mayur Upadhyaya, Co-founder &amp;amp; CEO of Contxt, "Standards like OpenID Connect and FAPI2 play an integral role in ensuring safe data sharing and enabling interoperability."&lt;/p&gt;

&lt;p&gt;Action Item: Review your organization's current API security strategy. Determine whether and how identity standards are currently being used.&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 2: Address OWASP API:2019 Flaws With FAPI2
&lt;/h2&gt;

&lt;p&gt;OWASP's API:2019 report identifies the top ten API security risks. To combat these, FAPI2 offers valuable guidance. As Martin Kuppinger, Principal Analyst at KuppingerCole, puts it, "FAPI2 provides guidelines that help developers avoid common pitfalls associated with the OWASP API:2019 flaws. It's like a blueprint for secure API development."&lt;/p&gt;

&lt;p&gt;Action Item: Analyze the OWASP API:2019 report and identify any vulnerabilities in your API that align with the report's top ten risks. Consider how FAPI2 guidelines can be used to address these vulnerabilities.&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 3: Choose the Right Standards
&lt;/h2&gt;

&lt;p&gt;Not all standards offer the same level of security. "It's essential to choose one that meets your organization's specific needs and industry requirements," advises Michael Schwartz, Founder of Gluu.&lt;/p&gt;

&lt;p&gt;Action Item: Assess your organization's needs and industry requirements. Based on these, determine the most suitable identity standards to implement.&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 4: Balance Security and Usability
&lt;/h2&gt;

&lt;p&gt;While robust API security is paramount, it shouldn't compromise usability. Ingo Schubert, Global Cloud Identity Architect at RSA, echoes this sentiment, "We must balance security with usability. Overly complex security measures can deter users, while lax ones can lead to security breaches."&lt;/p&gt;

&lt;p&gt;Action Item: Evaluate your current API security measures. Look for opportunities to enhance security without negatively impacting usability.&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 5: Contribute to the Development of Standards
&lt;/h2&gt;

&lt;p&gt;Participating in the development of standards like FAPI2 allows organizations to influence the security landscape. Mark Haine, Distinguished Engineer at the OpenID Foundation, encourages organizations to take an active role, "API security is a shared responsibility."&lt;/p&gt;

&lt;p&gt;Action Item: Explore opportunities for your organization to contribute to the development of identity standards.&lt;/p&gt;

&lt;h2&gt;
  
  
  Step 6: Implement a Layered Security Approach
&lt;/h2&gt;

&lt;p&gt;Finally, a layered security approach, incorporating standards like FAPI2 as one of many defenses, can bolster your API security. Alejandro Leal, Research Analyst at KuppingerCole, and Ward Duchamps, Senior Product Strategist at Thales Digital Identity and Security, both endorse this strategy.&lt;/p&gt;

&lt;p&gt;Action Item: Design a layered security strategy for your APIs. Ensure that the use of identity standards is an integral part of this strategy.&lt;/p&gt;

&lt;p&gt;By following this guided journey, organizations can effectively leverage identity standards like FAPI2 to secure APIs and mitigate the flaws highlighted in the OWASP API:2019 report.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Securing Your Applications and API Keys: An Organizational Guide</title>
      <dc:creator>mayurContxt</dc:creator>
      <pubDate>Tue, 06 Jun 2023 11:10:35 +0000</pubDate>
      <link>https://forem.com/contxt/securing-your-applications-and-api-keys-an-organizational-guide-26l2</link>
      <guid>https://forem.com/contxt/securing-your-applications-and-api-keys-an-organizational-guide-26l2</guid>
      <description>&lt;p&gt;&lt;strong&gt;Building on an insightful dialogue at The European Identity and Cloud Conference, I had the privilege of sharing the stage with industry experts Ingo Schubert (RSA), Ward Duchamps (Thales Digital Identity and Security), and Mark Haine (OpenID Foundation). With stimulating questions from Martin Kuppinger and Mike Schwartz, we dug deep into contemporary topics. Continuing from our &lt;a href="https://bycontxt.com/blog/maximizing-ciam-investments-a-layered-approach-to-api-security?utm_source=DevTo"&gt;previous panel-related post&lt;/a&gt;, this post presents the next chapter of our in-depth conversation.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In our previous discussion on API discovery, we laid the foundation for understanding your organization's application and API landscape. Once we've achieved this understanding, the subsequent critical step is securing these applications and API keys effectively. This blog post is intended to guide you through this essential process, using insights from our esteemed panelists.&lt;/p&gt;

&lt;h2&gt;
  
  
  Understanding the Importance of Security Awareness:
&lt;/h2&gt;

&lt;p&gt;API security is not just a technical problem to solve; it also requires an organizational shift towards security awareness. Mayur Upadhyaya, Co-founder &amp;amp; CEO of Contxt, pointed out during our panel discussion that "there is a clear owner for identity and security, but who in the enterprise owns APIs?" This question underlines the challenge of API ownership within an enterprise and underscores the necessity for an organizational awareness of API security.&lt;/p&gt;

&lt;h2&gt;
  
  
  Recognizing the Potential Risks:
&lt;/h2&gt;

&lt;p&gt;Without robust security measures, your organization's APIs could be exposed to significant risks. Ingo Schubert, Global Cloud Identity Architect at RSA, cautioned that using a standard doesn't guarantee security. "You can do a poor job implementing OpenID Connect and still be unsecure," he pointed out, stressing the need for comprehensive security measures beyond merely adhering to standards.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Role of Standards and Certifications in API Security:
&lt;/h2&gt;

&lt;p&gt;While standards and certifications play an essential role in API security, they are not the be-all and end-all solution. As Michael Schwartz, Founder of Gluu, pointed out, the certification test suite that Open ID publishes is beneficial, but it doesn't give you a level of assurance about security. Mark Haine, Distinguished Engineer at the OpenID Foundation, echoed this sentiment, highlighting the value of the OpenID Foundation's test suite but also the need for organizations to contribute to its development.&lt;/p&gt;

&lt;h2&gt;
  
  
  Practical Steps to Secure Your Applications and API Keys:
&lt;/h2&gt;

&lt;p&gt;With an understanding of the importance of security and the role of standards and certifications, what practical steps can your organization take to secure your applications and API keys effectively?&lt;/p&gt;

&lt;p&gt;Martin Kuppinger, Principal Analyst at KuppingerCole, discussed emerging regulatory pressures. He highlighted the importance of organizations being able to demonstrate their compliance with a range of best practices, which are being applied more rigorously.&lt;/p&gt;

&lt;p&gt;Alejandro Leal, Research Analyst at KuppingerCole, advocated for a layered API security approach. This approach can help manage API visibility, change control, and compliance integration. Ward Duchamps, Senior Product Strategist at Thales Digital Identity and Security, provided a complementary perspective, underscoring the importance of edge monitoring, multicloud security, and schema detection in improving your organization's API security posture.&lt;/p&gt;

&lt;p&gt;In summary, securing your applications and API keys is a multifaceted task requiring an organizational shift towards security awareness, an understanding of the limitations of standards and certifications, and the adoption of practical, robust security measures. By following the insights provided by our panelists, your organization can make strides towards a more secure API landscape.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Protecting Your APIs: Lessons From Max Schrems’ Keynote at the European Identity and Cloud Conference</title>
      <dc:creator>mayurContxt</dc:creator>
      <pubDate>Tue, 06 Jun 2023 11:05:09 +0000</pubDate>
      <link>https://forem.com/contxt/protecting-your-apis-lessons-from-max-schrems-keynote-at-the-european-identity-and-cloud-conference-3n27</link>
      <guid>https://forem.com/contxt/protecting-your-apis-lessons-from-max-schrems-keynote-at-the-european-identity-and-cloud-conference-3n27</guid>
      <description>&lt;p&gt;Data privacy and the protection of personal data transmitted over APIs (Application Programming Interfaces) have become pressing concerns in our interconnected digital world. This reality was brought into sharp focus by the recent enforcement action against &lt;a href="https://iapp.org/news/a/meta-fined-gdpr-record-1-2-billion-euros-in-data-transfer-case/"&gt;Meta&lt;/a&gt;, which resulted in a GDPR record fine of 1.2 billion euros. The case underscores the importance of effectively managing APIs and safeguarding data transfers.&lt;/p&gt;

&lt;p&gt;At the recent European Identity and Cloud Conference (EIC) hosted by KuppingerCole Analysts, renowned privacy advocate and NOYB Chairman, Max Schrems, &lt;a href="https://www.kuppingercole.com/watch/eu-us-data-transfers-eic2023"&gt;shed light&lt;/a&gt; on the evolving landscape of data protection and the strategic measures that organizations need to take.&lt;/p&gt;

&lt;h2&gt;
  
  
  The API Landscape in Your Organization
&lt;/h2&gt;

&lt;p&gt;Modern organizations utilize a vast array of APIs across different platforms, from multiple clouds and API gateways to containers and integrations like MuleSoft and UiPath. This intricate landscape necessitates a robust discovery process, which forms the first step in building an effective API management strategy. It's imperative to know where all your APIs reside and how they are interconnected.&lt;/p&gt;

&lt;p&gt;Once you have a comprehensive inventory of APIs, the next step involves enriching this catalog with relevant traffic metadata. This valuable information allows you to audit the jurisdiction rights associated with data transfers, identify potential vulnerabilities, and gain insights into how your APIs are utilized and by whom.&lt;/p&gt;

&lt;h2&gt;
  
  
  Compliance and Data Transfers
&lt;/h2&gt;

&lt;p&gt;Ensuring compliance with data privacy laws like the GDPR requires a clear understanding of how personal data is transmitted over APIs. Schrems' keynote at the EIC conference emphasized the need for organizations to establish robust safeguards for data transfers, a point illustrated by the Meta case.&lt;/p&gt;

&lt;p&gt;Schrems suggested that while establishing separate EU entities to hold data may appear to be an easy solution for many organizations, it does not address the broader issue of managing data in a globally integrated digital ecosystem. It is crucial to have a comprehensive strategy that takes into account the legal and technological aspects of data protection.&lt;/p&gt;

&lt;h2&gt;
  
  
  A Practical Action Plan
&lt;/h2&gt;

&lt;p&gt;The path towards secure and compliant API management can seem daunting, but having a clear action plan can make the journey more manageable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Start with your Content Delivery Network (CDN):&lt;/strong&gt; Your CDN is the most accessible starting point, as it typically handles a significant amount of your data traffic. Review and audit the APIs on your CDN to get a clear picture of how data is flowing and what safeguards are currently in place.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Move on to your API Gateways:&lt;/strong&gt; API gateways manage the communication between your applications and your backend services. Evaluating the APIs on these gateways gives you deeper insights into your data processing and transfer mechanisms.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Turn to Compliance Standards:&lt;/strong&gt; Standards and regulations like the GDPR provide clear guidelines on data protection. Utilize these as a roadmap to structure your API security and compliance strategies.&lt;/p&gt;

&lt;p&gt;The evolving digital landscape, along with regulatory actions like the Meta case, underline the importance of having a robust API management strategy. By taking a systematic and informed approach, organizations can ensure data protection compliance and build a secure digital ecosystem. As the insights from Max Schrems' keynote suggest, the journey may be complex, but it is an essential part of operating in today's digital world.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Getting Started With API Discovery: A Comprehensive Guide From CDN to Application-Level Insights</title>
      <dc:creator>mayurContxt</dc:creator>
      <pubDate>Tue, 06 Jun 2023 10:56:27 +0000</pubDate>
      <link>https://forem.com/contxt/getting-started-with-api-discovery-a-comprehensive-guide-from-cdn-to-application-level-insights-4b29</link>
      <guid>https://forem.com/contxt/getting-started-with-api-discovery-a-comprehensive-guide-from-cdn-to-application-level-insights-4b29</guid>
      <description>&lt;p&gt;&lt;strong&gt;Building on an insightful dialogue at The European Identity and Cloud Conference, I had the privilege of sharing the stage with industry experts Ingo Schubert (RSA), Ward Duchamps (Thales Digital Identity and Security), and Mark Haine (OpenID Foundation). With stimulating questions from Martin Kuppinger and Mike Schwartz, we dug deep into contemporary topics. Continuing from our &lt;a href="https://bycontxt.com/blog/maximizing-ciam-investments-a-layered-approach-to-api-security?utm_source=DevTo"&gt;previous panel-related post&lt;/a&gt;, this post presents the next chapter of our in-depth conversation.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;API discovery is a fundamental part of the API security journey, yet it often gets overlooked. As businesses become more reliant on APIs for their core functions, ensuring a robust and secure API ecosystem is no longer optional, it's a necessity. This guide will walk you through the initial steps of API discovery, from auditing and whitelisting APIs in the Content Delivery Network (CDN) to application-level authentication analysis.&lt;/p&gt;

&lt;h2&gt;
  
  
  CDN - The Starting Point
&lt;/h2&gt;

&lt;p&gt;The journey of API discovery begins at the CDN level. As Mark Haine, Distinguished Engineer at OpenID Foundation, highlighted in a recent panel discussion, "It's crucial to start with an API inventory at the CDN level." This process involves auditing your CDN for all existing APIs and establishing a whitelist. It's a foundational step in achieving visibility and control over your API ecosystem.&lt;/p&gt;

&lt;p&gt;"APIs are now the primary interface for software. It's as if we've taken all the internal methods of our classes and made them public," said Ingo Schubert, a Global Cloud Identity Architect at RSA. This increased exposure necessitates careful API management, starting with discovery and monitoring at the CDN level.&lt;/p&gt;

&lt;h2&gt;
  
  
  Authentication Assessment
&lt;/h2&gt;

&lt;p&gt;Once you've established your API inventory and scrutinized it at the CDN level, the next step is a closer look at the authentication level of each application. Mayur Upadhyaya, CEO at Contxt, emphasized the importance of this step: "We give API developers the keys to the kingdom. And one of the challenges you have in an enterprise is there is a clear owner for identity, a clear owner for security, &lt;strong&gt;but who in the enterprise owns APIs&lt;/strong&gt;?"&lt;/p&gt;

&lt;p&gt;By conducting an in-depth assessment of your API authentication, you can ensure you're not only monitoring your APIs but also managing their security effectively. As Mike Schwartz, Founder of Gluu, warned, "Even if you're certified and we certified more than anyone, you'll still find that it doesn't give you a level of assurance about security."&lt;/p&gt;

&lt;p&gt;This journey from CDN to application-level insights is key to unlocking the full potential of your APIs and ensuring their security. As you traverse this path, remember these wise words from Ingo Schubert: "Just because you're using a standard doesn't mean it's secure and vice versa. It makes things easy in some sense for the developers, but it doesn't mean it's a secure system out of the door."&lt;/p&gt;

&lt;p&gt;Remember, your journey doesn't end at discovery, but it's a great place to start.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Maximizing CIAM Investments: A Layered Approach to API Security</title>
      <dc:creator>mayurContxt</dc:creator>
      <pubDate>Mon, 05 Jun 2023 14:38:42 +0000</pubDate>
      <link>https://forem.com/contxt/maximizing-ciam-investments-a-layered-approach-to-api-security-1i94</link>
      <guid>https://forem.com/contxt/maximizing-ciam-investments-a-layered-approach-to-api-security-1i94</guid>
      <description>&lt;p&gt;I was happy to join a group of industry experts for a great discussion at The European Identity and Cloud Conference recently. Ingo Schubert (RSA), Ward Duchamps (Thales Digital Identity and Security), Mark Haine (OpenID Foundation)  and audience questions from Martin Kuppinger and Mike Schwartz made the discussion incredibly insightful. We shared experiences securing application programming interfaces (APIs) and optimizing the return on investment from your Customer Identity and Access Management (CIAM) purchase. Throughout the discourse, a few pivotal themes emerged, reinforcing the importance of a layered approach to API security, and a keen understanding of multi-cloud security, schema detection, and managing API visibility and change control.&lt;/p&gt;

&lt;h2&gt;
  
  
  Layered API Security Approach
&lt;/h2&gt;

&lt;p&gt;APIs, as Ingo Schubert rightly noted, are "the lifeblood of modern digital infrastructure." As such, they are also an attractive target for cyber attackers. A layered approach to API security is necessary, involving securing the API endpoints, implementing robust authentication and authorization protocols, and employing monitoring tools to detect any anomalies and potential threats.&lt;/p&gt;

&lt;h2&gt;
  
  
  Multi-cloud Security and Schema Detection
&lt;/h2&gt;

&lt;p&gt;As businesses lean towards a multi-cloud strategy, the security of APIs across various cloud platforms becomes even more critical. As Mike Schwartz emphasized, "a solid understanding of multi-cloud security is vital in maintaining the integrity of APIs." Schema detection allows us to better understand the structure of the data being exchanged and helps identify potential security vulnerabilities.&lt;/p&gt;

&lt;h2&gt;
  
  
  API Visibility, Change Control, and Compliance Integration
&lt;/h2&gt;

&lt;p&gt;API visibility is a significant facet of managing security. As I mentioned during the discussion, “knowing what APIs exist, how they interact, and their potential vulnerabilities is the first step to securing them.” With the rapid pace of changes in APIs, having a robust change control mechanism is equally crucial.&lt;/p&gt;

&lt;p&gt;Moreover, integrating compliance measures into your API security strategy is no longer optional, considering the ever-changing regulatory landscape. Martin Kuppinger noted the increased importance of compliance integration due to landmark decisions like Schrems II, which has significantly impacted data transfer mechanisms between the EU and the US.&lt;/p&gt;

&lt;h2&gt;
  
  
  The API Security Adoption Journey
&lt;/h2&gt;

&lt;p&gt;Improving the API security posture isn't a one-time task but a journey. This journey should involve a thorough understanding of the current state, defining the desired end state, and charting a course to get there. The journey involves adopting best practices, integrating security into the API development life cycle, and continuously monitoring for threats.&lt;/p&gt;

&lt;p&gt;In conclusion, the panel underscored the importance of a strategic and layered approach to API security. As I reiterated during the talk, "investing in CIAM and ensuring its proper implementation and integration is not only a smart business move but also a necessity in today's digital landscape." It's integral to protect your data, maintain trust with your customers, and stay compliant with regulatory requirements.&lt;/p&gt;

&lt;p&gt;Stay tuned for more insights as we continue to explore the evolving world of API security and identity management.&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
