API Security

Blocking Compromised Tokens with Wallarm

In our Annual API ThreatStats report, we highlighted the increasing threat of API Leaks. An API Leak is the disclosure of sensitive API information, such as a token, credential, or private schema. These leaks can occur directly via the API itself, but also via third party tools used to manage source code, such as Github or Postman. API Leaks came in at number 4 in our dynamic top 10 list of API Security issues. Almost more interesting is that the ranking of API leaks steadily increased throughout 2023, indicating that it’s an increasingly problematic issue for organizations.

On February 1st, we saw the breaking story that Cloudflare had been compromised by attackers using a stolen authentication token from the Okta breach. While not exactly a leak, the incident is still relevant to how organizations can protect themselves from compromised tokens like these. 

Wallarm provides the ability to block the use of specific authentication tokens in traffic. Wallarm users can create Virtual Patch rules that block based on a regular expression in a specific header or request point. In other words, if you know the token or tokens that are compromised, and the authentication mechanism for those tokens, you can create a rule to block their use before they even get to your application. Here’s an example of what a rule might look like:

Additionally, the API Leak Detection capability can proactively find leaked tokens for which you can seamlessly create a virtual patch. 

To find out more about what’s possible in Wallarm rules, check out the documentation.

Recent Posts

6 Lessons Security Leaders Must Learn About AI and APIs

Most organizations treating AI security as a model problem are defending the wrong layer. Security…

1 day ago

The Governance Gap: How the EU AI Act Makes API Security a Compliance Imperative

Your legal team just handed you a 400-page document and said "figure out compliance." The…

5 days ago

Attacking the MCP Trust Boundary

Every secure API draws a line between code and data. HTTP separates headers from bodies.…

1 week ago

Why API Discovery Is the First Step to Securing AI

TL;DR AI risk doesn’t live in the model. It lives in the APIs behind it.…

1 week ago

CISO Spotlight: Dimitris Georgiou on Building Security that Serves People First

Dimitris Georgiou has been a self-professed computer geek since the early 80s. At university, he…

1 month ago

The CISO’s Dilemma: How To Scale AI Securely

Your board wants AI. Your developers are building with it. Your budget committee is asking…

2 months ago