F5 API Security: Discovery and Protection
Introduction
APIs are everywhere, accounting for around 83% of all internet traffic today, with API calls growing nearly 300% faster than overall web traffic. Last year, the F5 Office of the CTO estimated that the number of APIs being deployed to production could reach between 500 million to over a billion by 2030. At the time, the notion of over a billion APIs in the wild was overwhelming—made even more concerning by estimates indicating that a significant portion were unmanaged or, in some cases, entirely undocumented. Now, in the era of AI-driven development and automation, that estimate of over a billion APIs may prove to be a significant understatement. According to recent research by IDC on API Sprawl and AI Enablement, "Organizations with GenAI enhanced applications/services in production have roughly 5x more APIs than organizations not yet investing significantly in GenAI". That all makes for a very large and complicated attack surface, and complexity is the enemy of security.
Discovery, Monitoring, and Protection
So, how do we begin securing such a large and complex attack surface? It requires a continuous approach that blends visibility, management, and enforcement. This includes multi-lens Discovery and Learning—to detect unknown or shadow APIs, determine authentication status, identify sensitive data, and generate accurate OpenAPI schemas. It also involves Monitoring—to establish baselines for endpoint parameters, behaviors, and characteristics, enabling the detection of anomalies. Finally, we must Protect—by blocking suspicious requests, applying rate limiting, and enforcing schema validation to prevent misuse. The API Security capabilities of the F5 product portfolio are essential for providing that continuous, defense in depth approach to protecting your APIs from DevTime to Runtime.
F5 API Security Essentials
Additional Resources
F5 API Security Article Series:
Out of the Shadows: API Discovery
Beyond Rest: Protecting GraphQL
Deploy F5 Distributed Cloud API Discovery and Security:
F5 Distributed Cloud WAAP Terraform Examples GitHub Repo
Deploy F5 Hybrid Architectures API Discovery and Security:
F5 Distributed Cloud Hybrid Security Architectures GitHub Repo
F5 Distributed Cloud Documentation:
F5 Distributed Cloud Terraform Provider Documentation
F5 Distributed Cloud Services API Documentation
1 Comment
- Janibasha
Employee
Great introduction article covering great insights !