|
| 1 | +--- |
| 2 | +title: Microsoft Defender for APIs overview |
| 3 | +description: Learn about the benefits and features of Microsoft Defender for APIs |
| 4 | +ms.date: 04/05/2023 |
| 5 | +author: elazark |
| 6 | +ms.author: elazark |
| 7 | +ms.topic: overview |
| 8 | +--- |
| 9 | + |
| 10 | +# Overview of Microsoft Defender for APIs |
| 11 | + |
| 12 | +Microsoft Defender for APIs is a plan provided by Microsoft Defender for Cloud that offers full lifecycle protection, detection, and response coverage for APIs. |
| 13 | + |
| 14 | +The service empowers security practitioners to gain visibility into their business-critical APIs, understand their security posture, prioritize vulnerability fixes and detect active runtime threats within minutes. Currently the service supports APIs published in Azure API Management. |
| 15 | + |
| 16 | +Defender for APIs will provide a unified view of APIs published in Azure API Management and a range of security insights, detections, and response capabilities in a central console, making it easier for security teams to manage their API inventory and prioritize remediation efforts. |
| 17 | + |
| 18 | +Key capabilities in Defender for APIs |
| 19 | + |
| 20 | +API Inventory: Discover and catalog aggregated view of all managed APIs. |
| 21 | + |
| 22 | +API Security Insights: Analyze the APIs for security insights including identifying external, unused and/or unauthenticated APIs, attack paths and create recommendations to harden risk surface. |
| 23 | + |
| 24 | +API Data Classification: Classify APIs receiving or responding with sensitive data to support risk prioritization. |
| 25 | + |
| 26 | +OWASP API Top 10 Threat Detection: Detect exploits of the OWASP API top 10 vulnerabilities through runtime observation for anomalies using ML-based and rule-based detections. Detect runtime threats by ingesting API traffic and monitoring the traffic for compromise. |
| 27 | + |
| 28 | +Threat response: Integrate or export detection alerts into SIEM systems for investigation for continuity of existing threat response workflows. Learn more. |
| 29 | + |
| 30 | +Integration with Cloud Security Graph in Defender Cloud Security Posture Management (DCSPM): Enable security teams to easily query API inventory, insights and recommendations within the cloud security graph for prioritized remediation and further determine the scope of potential breach through attack path analysis. |
| 31 | + |
| 32 | +Native API security integration in Azure API Management: Enable Defender for APIs plan and receive API security recommendations and alerts natively in Azure API Management portal. |
| 33 | + |
| 34 | + |
| 35 | + |
| 36 | +## Next steps |
| 37 | + |
| 38 | +In this article, you learned about Microsoft Defender for Storage. |
| 39 | + |
| 40 | +> [!div class="nextstepaction"] |
| 41 | +> [Enable Defender for Storage](enable-enhanced-security.md) |
0 commit comments