Back to Blog
Cybersecurity

API Security: Why Your Legacy WAF Is No Longer Enough

APIs carry 83% of web traffic. But your WAF was built for web pages, not APIs. Learn the 5 attacks WAF misses and how to fix each one.

Cybersecurity
Use Case
8 min read
47 views

Why API Security Is Different from Web Security

Today, APIs carry 83% of all web traffic (Cloudflare 2024). Yet most firms still guard them with a WAF built for web pages. Clearly, that is a big gap. API security is not the same as web page security. In fact, the threats are different. Also, the attack methods are different. So the tools you need are different too.

In short, a WAF checks for things like SQL attack code and cross-site scripting. In short, these are web page attacks. But APIs face a whole other set of risks. Then there are broken login checks. Also, leaked data fields. And abuse of app logic. A WAF can’t catch these because it doesn’t know how your API works. So your API security depends on tools built for APIs — not web pages.

This guide shows you the 5 attacks your WAF misses. It also covers the OWASP API Top 10 in plain words. And it gives you a checklist to fix each gap.


How APIs Differ from Web Pages

Basically, a web page sends HTML to a browser. Then a user clicks buttons. So the WAF watches that traffic. But an API sends raw data between systems. There is no browser. And there are no clicks. Instead, it is just code talking to code. So the WAF rules that work for web pages don’t apply to API calls.

Also, APIs expose more data than web pages. For example, a web page shows one customer’s name. But an API call might return 10,000 records if the access check is weak. This is why API security needs its own controls.

What Your WAF Misses — 5 API Security Attacks WAF Cannot Stop

Your WAF is good at what it does. But it was not built for API security. Below are 5 common API attacks that your WAF will miss.

1. BOLA — Broken Object Access
An attacker changes an ID in the API call to see another user’s data. For example, they change /user/123 to /user/456. The WAF sees a valid request. But the API gave away data it shouldn’t have.
2. Broken Login Checks
Weak login flows let attackers guess tokens or steal sessions. The WAF can’t tell a real token from a stolen one. So the attacker gets in with valid-looking access.
3. Too Much Data in the Response
The API sends back more fields than the app needs. For example, it returns full card numbers when the app only shows the last 4 digits. The WAF doesn’t check what the API sends back.
4. No Rate Limits
Without rate limits, an attacker can call your API millions of times. They can scrape all your data or crash your server. A WAF may have basic rate limits — but not per-route limits.
5. Server-Side Request Forgery (SSRF)
An attacker tricks your API into calling an private system. This lets them reach systems that should be private. The WAF sits at the edge and can’t see inner API calls.
Why WAF Cannot Protect APIs

A WAF looks at traffic patterns. But API attacks abuse business logic — valid requests that return data they shouldn’t. So the WAF says “looks fine” while your data walks out the door.

WAF vs API Security: A Side-by-Side Look

Here is a clear view of what a WAF covers and what it misses for API security.

ThreatWAFAPI Security Tools
SQL Injection✓ Blocks it✓ Blocks it
Cross-Site Scripting✓ Blocks it✓ Blocks it
BOLA (data access abuse)✕ Misses it✓ Catches it
Broken login and tokens✕ Misses it✓ Catches it
Too much data in response✕ Misses it✓ Catches it
No rate limits per route◐ Basic only✓ Per-endpoint control
SSRF (inner calls)✕ Misses it✓ Catches it
Shadow API search✕ No visibility✓ Full API map
Bot and scraping abuse◐ Basic rules✓ ML-based detection

The OWASP API Security Top 10 in Plain English

OWASP (Open Web App Security Project) put out a list of the top 10 API risks. But most write-ups are very technical. Here is each one in simple terms.

  1. Broken Object Access (BOLA): Users can see other users’ data by changing an ID in the API call.
  2. Weak Login Flows: Poor auth lets attackers steal or guess access tokens.
  3. Object Property Abuse: The API lets users change fields they shouldn’t — like their own role or price.
  4. No Resource Limits: No cap on API calls. So attackers can flood or scrape at will.
  5. Missing Function Checks: Normal users can call admin-only API routes.
  6. Server-Side Request Forgery: The API is tricked into calling private internal services.
  7. Bad Security Setup: Missing headers, open CORS, debug mode left on in live systems.
  8. No Input Checks: The API accepts bad or risky data without checking it first.
  9. Poor Asset Management: Old or test APIs left live in live systems — nobody knows they exist.
  10. Unsafe API Use: Your API trusts data from other APIs without checking it.
Most Breaches Use the Top 3

BOLA, broken login, and too-much-data account for most API breaches. So if you fix only three things, fix these three first.

Shadow APIs: The Biggest API Security Risk You Can’t See

Shadow APIs are APIs that run in live but nobody on the security team knows about. In fact, Salt Security found that 30% of APIs in a average firm are unknown to the security team. These are old test APIs, forgotten beta routes, or APIs built by a team that left.

Why Shadow APIs Are So Dangerous

Obviously, you can’t protect what you don’t know about. So shadow APIs have no WAF rules, no rate limits, no login checks, and no watching. As a result, they are wide open. So attackers find them fast using simple API scanning tools.

How to Find Shadow APIs

First, run an API search scan across all your traffic. Then match what you find against your API docs. The gap between the two is your shadow API risk. Also, check old staging and test sites — they often have live APIs that were never shut down.

83%
Of web traffic is now API calls (Cloudflare 2024)
30%
Of APIs in firms are unknown to security (Salt 2024)
137%
Growth in API attacks year on year (Salt 2023)

An API Security Checklist for Business Teams

Below is a simple API security checklist. Use it to find and fix the most common gaps in your API security setup.

  1. Map all your APIs. Find every API in production — known and unknown. You can’t guard what you can’t see.
  2. Add auth to every endpoint. No API should be open without a login check. Use OAuth 2.0 or API keys at minimum.
  3. Check access on every call. Don’t just check “is this user logged in.” Also check “can this user see this data.” This stops BOLA.
  4. Set rate limits per endpoint. Cap how many calls one user or IP can make per minute. This stops scraping and floods.
  5. Cut extra fields from replies. Only return the data the app needs. Don’t send full records when the app shows a summary.
  6. Test APIs before go-live. Run OWASP API Top 10 tests in your CI/CD build process. Catch flaws before they reach production.
  7. Monitor API traffic at live. Use live API security tools that watch live traffic for abuse patterns — not just known attack known patterns.
Key Takeaway

API security is not a WAF upgrade — it is a new layer. WAF stops web page attacks. API security stops business logic abuse, data leaks, and access flaws that WAF can’t see. You need both.

How Signisys Delivers API Security for Enterprise

Specifically, Signisys helps firms find, test, and protect every API in their estate. Here is how the service works.

API Discovery and Risk Mapping

First, we scan all your traffic to find every API — known and shadow. Then we map each one to the OWASP API Top 10 risks. So you get a clear picture of where your gaps are and which ones to fix first.

API Security Testing

Next, we run tests against every API for BOLA, broken auth, data leaks, and rate limit flaws. Also, we test both live APIs and CI/CD pipeline builds. So flaws are caught before they reach production.

Managed WAAP with API Protection

Signisys deploys cloud-based WAAP that covers both web pages and APIs. This includes runtime API watch tools, bot defence, rate limits per endpoint, and format checks. Also, all controls map to RBI API guidelines and DPDP Act needs. So audit-ready proof comes built in.

Talk to an ExpertSpeak with a Signisys AppSec Architect About API Security Assessment

Common Questions About API Security

Frequently Asked Questions
Why can’t a WAF protect APIs?
A WAF checks for web page attack patterns like SQL injection. But API attacks abuse business logic — valid calls that return data they shouldn’t. So the WAF sees nothing wrong while data leaks out.
What is the OWASP API Security Top 10?
It is a list of the 10 most common API risks. BOLA (data access abuse) is #1. Broken auth is #2. The list is updated by OWASP and used as a test standard worldwide.
What are shadow APIs?
Shadow APIs are APIs in production that the security team doesn’t know about. About 30% of APIs in a typical firm are shadow APIs. Since nobody watches them, they have no access checks and no rate limits.
How do you secure APIs in production?
First, map all APIs. Then add auth and access checks to each one. Next, set rate limits per endpoint. Also, cut extra data from responses. Finally, use runtime API monitoring to catch abuse in real time.
Is API security required for RBI compliance in India?
Yes. RBI requires security controls for payment APIs and internet banking systems. Also, the DPDP Act holds firms liable for personal data exposed through APIs. So API security is both a best practice and a compliance need.
Weekly Briefing
Security insights, delivered Tuesdays.

Join 1 million+ security professionals. Practical, vendor-neutral analysis of threats, tools, and architecture decisions.