F5 is upgrading its customer support chat feature on My.F5.com. Chat support will be unavailable from 6am-10am PST on 1/20/26. Refer to K000159584 for details.

Runtime API Security: From Visibility to Enforced Protection

F5 Distributed Cloud API Security: Red vs Blue

Runtime Reality and Design Time Gaps

Many API security failures appear after deployment rather than during development. Specification drift, inconsistent authentication enforcement, and permissive input handling are common once services are exposed to real traffic. Secure coding practices and pre-deployment testing reduce risk but do not account for how APIs behave under scale, automation, or adversarial use. Runtime inspection is needed to find where behavior is different from what is supposed to be and where controls are not being used consistently.

Runtime Inventory and Evidence-Based Risk

An API inventory, continuously updated by runtime API discovery, provides a foundation and reflects actual usage rather than documented intent. By observing traffic, endpoints can be evaluated based on authentication behavior, data exposure, and interaction with hostile clients. This allows risk to be prioritized using observed behavior instead of static classification. Endpoints that appear low-risk in documentation may surface as high-risk once they are shown to accept unauthenticated requests, process sensitive data, or attract repeated attack traffic. Request-level telemetry removes ambiguity by confirming whether weaknesses are theoretical or actively exploited.

 

F5 Distributed Cloud API Security - API Inventory

Enforcement Using Schemas and Scoped Controls

Many API attacks succeed because specifications permit unsafe input. Fields defined without meaningful constraints provide no effective boundary between valid and malicious requests. Enforcing corrected schemas at runtime establishes an allow-list model that blocks malformed or unexpected input before it reaches application logic. For failures that schemas cannot address, such as authorization gaps or business logic abuse, narrowly scoped enforcement rules can be applied to require missing conditions or restrict value ranges. These controls limit exposure while application-level fixes are being developed.

F5 Distributed Cloud API Security - API Schema Validation List

Operational Impact and Strategic Use

Runtime enforcement reduces attack success, shortens investigation time, and limits blast radius without requiring immediate code changes. It also provides feedback on whether specifications are accurate and whether controls are applied as expected. A complete API security approach that combines secure development, specification validation, threat modeling, and post-deployment testing with continuous runtime observation and enforcement. Platforms such as F5 Distributed Cloud demonstrate this model, but the underlying principle is implementation-independent: API security improves when decisions are based on observed behavior and enforced through explicit, verifiable contracts.

Red vs Blue Demo

The accompanying demo shows a runtime focused API security workflow in practice, using live traffic to identify active exploitation and enforce controls based on observed behavior rather than static assumptions. It demonstrates how API inventory, risk scoring, and request-level evidence surface issues such as Server-Side Request Forgery, injection attacks, business logic abuse, and missing authorization enforcement, and how these are mitigated through schema enforcement and narrowly scoped runtime controls. The emphasis is on evidence-driven detection and containment that reduces attack success without requiring immediate application changes, illustrated using F5 Distributed Cloud API Security.

Additional Resources

F5 API Security Article Series:
F5 API Security: Discovery and Protection
Out of the Shadows: API Discovery
Beyond Rest: Protecting GraphQL

Deploy F5 Distributed Cloud API Discovery and Security:
F5 Distributed Cloud WAAP Terraform Examples GitHub Repo

Deploy F5 Hybrid Architectures API Discovery and Security:
F5 Distributed Cloud Hybrid Security Architectures GitHub Repo 

F5 Distributed Cloud Documentation:
F5 Distributed Cloud Terraform Provider Documentation 
F5 Distributed Cloud Services API Documentation 

Published Dec 23, 2025
Version 1.0
No CommentsBe the first to comment