https://www.techtarget.com/searchsecurity/tip/How-to-discover-and-manage-shadow-APIs
Access to APIs -- connectors that enable disparate systems and applications to share data and communicate -- is business-critical. And because APIs have access to sensitive information, it's important that security teams know about every API in use -- yet this isn't always the case.
Employees commonly use technologies and tools without the security team's sanction -- known as shadow IT -- and APIs are no different. Like other unauthorized components, shadow APIs are created or deployed outside of official processes, often by internal teams, contractors or legacy systems.
Security teams need to know how to prevent, identify and manage shadow APIs to avoid the significant security threats posed by these undocumented and frequently unmonitored interfaces.
The number of APIs in organizations is skyrocketing. According to API platform Postman, each business application is powered by 26 to 50 APIs, and API intelligence platform Trebble estimated the average enterprise maintains more than 1,000 APIs, most of which perform in-house functions.
The numbers seem unmanageable even before shadow APIs are considered. The dynamic nature of DevOps and microservices make shadow APIs even more prevalent through continuous integration/continuous delivery (CI/CD) pipelines.
While shadow APIs are not necessarily malicious, they are a prime target for attackers because they bypass governance and security controls. Shadow APIs are problematic for the following reasons:
Several high-profile breaches in recent years, including the January 2024 data scraping attack on the Trello project management platform, have been traced back to unmanaged APIs. Without the ability to track these hidden endpoints, security teams can't accurately assess risk, apply controls or ensure regulatory compliance. Discovery and ongoing monitoring are therefore critical to maintain an accurate and secure API inventory.
To identify shadow APIs, organizations should adopt a multilayered approach that relies on both network traffic analysis and integration with their existing development and cloud infrastructures.
Follow these key steps:
With shadow API discovery completed, implement a combination of policy, governance and technical enforcement to manage and reduce shadow API usage. Do the following:
Shadow APIs are an inevitable byproduct of modern development, but they don't have to be a liability. Organizations can rein in these unauthorized interfaces by employing real-time shadow API discovery techniques, a strong governance model and a collaborative DevSecOps culture.
Dave Shackleford is founder and principal consultant at Voodoo Security, as well as a SANS analyst, instructor and course author and GIAC technical director.
25 Jul 2025