Skip to main content

      Application Programming Interfaces (APIs) are the technical interfaces that modern digital systems use to communicate with each other. They connect mobile applications with backend systems, orchestrate microservices and enable the integration of external partners into digital ecosystems. With the increasing spread of cloud applications and microservice architectures, the importance of secure API communication is growing significantly and the focus is shifting to the resilient protection of interfaces, both from a technical and organisational perspective. 

      API‑security encompasses all measures aimed at protecting interfaces from misuse, unauthorised access and attacks. This includes recognising anomalies, checking request patterns, validating data flows and permanently monitoring API transactions. A central principle of modern security architectures is not to protect APIs in isolation, but in combination with web applications, identity context and telemetry. This creates a consistent picture of the context of use and thus a reliable basis for decision-making. 

      Why evolved API‑landscapes pose a structural security risk

      Companies today operate a steadily growing number of productive APIs. In many organisations, interfaces have grown historically and are sometimes inadequately documented, outdated or incompletely monitored. At the same time, attackers are using AI‑assisted methods to scale attacks faster and create more complex patterns. 

      The risks arise in particular from: 

      Instead of presenting itself solely as a technical challenge, the risk arises from a combination of several factors: APIs now serve as the primary interface to business-critical systems, which makes them particularly attractive for automated attacks. These attacks systematically test endpoints and exploit vulnerabilities in a targeted manner. In addition, modern bot‑traffic is increasingly good at mimicking legitimate use and thus bypassing traditional detection mechanisms. DDoS (Distributed Denial of Service) attacks are also frequently used as a cover, while data theft or manipulation takes place in the background. At the same time, regulatory requirements are increasing the pressure on companies because they demand rapid reporting and robust evidence. 

      This complexity makes API security a task that encompasses both technical control and governance. 

      KPMG develops and anchors security architectures according to Zero Trust principles - from assessment and design to implementation


      How integrated security models bring together Web‑ and API‑risks

      Modern API‑security is increasingly based on Web Application and API Protection (WAAP). This model combines four security-relevant functions in a common analysis‑ and protection path. 

      • Web application firewall (WAF) functions analyse web‑requests and protect against known attack patterns.
      • API‑security modules collect inventory data, validate schemes and monitor processes.
      • DDoS‑protection mechanisms recognise volumetric attacks and attacks on the application layer (layer 7).
      • Bot‑management identifies automated interactions through behavioural analysis.

      The decisive technological advance lies in the joint evaluation of telemetry data. When signals from the web application, API‑endpoint, identity context, anomaly detection and sequence analysis are combined, a consistent picture of the actual behaviour is created. This holistic telemetry model makes it possible to recognise complex attack chains that would appear inconspicuous if viewed in isolation. 

      APIs are thus not only statically tested, but also continuously monitored during operation. This allows protection to be dynamically adapted to actual usage behaviour. 


      What concrete effects integrated API‑security has on operations and governance

      API‑security delivers direct business and technical added value. For the first time, integrated security models create complete transparency across all productive APIs, including their versions, sensitivities and responsibilities. Through the continuous validation of processes, roles and contexts, the misuse of business logic is reliably recognised. At the same time, bot attacks can be classified more precisely because behavioural data is evaluated instead of static signatures. Creeping attacks and data leaks can also be detected earlier, as web and API signals converge in the same analysis path. In addition, services remain more stable because DDoS signals are interpreted in the context of the actual API behaviour. Last but not least, the consistent data situation facilitates compliance with regulatory requirements - from reporting channels to audit evidence. The benefits can be seen both in a reduced attack surface and in improved governance. This makes API‑security measurable. 

      Where API‑security is particularly business-critical today

      API‑security plays a key role in almost all sectors of the economy. In the financial sector, for example, it is used to protect sensitive transaction processes and mobile banking APIs, which are often the target of logic abuse or bot attacks. Insurance companies use API‑security measures to monitor customer interfaces, partner portals and API‑gateways for anomalies. Healthcare organisations, on the other hand, need to secure personal patient data - especially in FHIR APIs and connected backend systems. In industry, API‑Security protects IoT‑interfaces through which machines are identified, controlled and monitored, and prevents DDoS‑stealth attacks from jeopardising production data. Public administrations are also dependent on reliable API security to protect citizen portals, register access or AI-supported administrative services from automated attacks. The common challenge here lies in visibility, continuity and continuous monitoring. 

      Why API‑security must be part of the overarching security strategy in the future

      The increasing complexity of APIs and AI‑supported attacks leads to several structural challenges. Organisations not only need a complete and continuously maintained API inventory, but also need to embed their interfaces more closely in governance structures and risk management. 

      The increasing speed and automation of attacks makes it necessary to automate the response mechanisms as well. It is important that these mechanisms are clearly rule-based and can be completely cancelled at any time. At the same time, AI‑supported attack patterns significantly increase the requirements for adaptability, contextual understanding and behavioural analysis. In addition, regulatory requirements such as EU‑directives, NIST‑frameworks or OWASP‑classifications must be seamlessly integrated into process chains, test paths and verification systems. 

      API‑security is thus no longer understood as an isolated discipline, but as an integral part of an identity- and context-based security architecture in which inventory, target images, governance and technical protection mechanisms are considered together, especially in practice, in order to consistently coordinate operational implementation, identity models and regulatory requirements.  

      Cloud Security & Zero Trust

      KPMG advises you on the development and implementation of security solutions for your cloud environment.

      Wolke

      Your contact