Skip to content

NIST CSF 2.0 Dashboard (Beta)

The NIST cybersecurity framework (CSF), created by the National Institute of Standards and Technology, defines key pillars for an effective security strategy. Wallarm's services align with the most of NIST pillars, ensuring comprehensive protection for our customers. Our dashboard demonstrates this alignment and assists in configuring the platform's features.

Identify

Wallarm provides the tools designed to understand your company's business landscape, resources, and potential security vulnerabilities. These tools illuminate your attack surface and assist in ranking assets according to their risk scores:

  • API attack surface management is a set of capabilities that allows you to enumerate, assess, and manage the public attack surface presented by your APIs.

  • API Discovery crafts a precise inventory of your application's REST API based on real-time usage, effectively identifying zombie, orphan, and shadow APIs.

  • API risk scoring: Wallarm automatically assigns risk scores for your API endpoints based on factors like data exposure and vulnerability presence, but also provides customization by letting you adjust the significance of these factors.

Protect

Wallarm provides robust protection against a wide range of known and emerging threats:

  • Application and API Protection (WAAP) offers advanced security for applications and APIs across environments. It supports various API protocols including REST, SOAP, GraphQL, and more, utilizing deep packet inspection to address the OWASP Top 10 and beyond.

  • API Threat Prevention focuses on stopping unauthorized access and misuse of APIs by blocking malicious bots, protecting against credential stuffing and fake account creation, and allowing access only to legitimate users.

  • API Specification Enforcement ensures your APIs adhere to OpenAPI specifications by detecting discrepancies between endpoint descriptions and actual REST API requests. Upon identifying inconsistencies, it automatically enforces predefined security measures.

Detect

To identify anomalies, indicators of compromise, and other potential adverse events, Wallarm emphasizes consistent monitoring of assets as follows:

  • Vulnerability detection: Wallarm uses real Internet traffic to proactively identify and report security vulnerabilities. By analyzing attacker attempts and conducting exploitation tests, it uncovers both immediate and potential weaknesses, enabling real-time security monitoring.

  • API leaks: Wallarm's Security Issues Detection module scans public repositories to identify exposed API tokens. Upon detecting leaks, Wallarm alerts you, allowing prompt analysis and action.

  • OpenAPI Security Testing automates API security checks within the software development lifecycle by seamlessly integrating with CI/CD pipelines via Docker. It creates test requests to expose vulnerabilities in endpoints, as defined in your OpenAPI specification, allowing you to address security issues before the API goes into production.

Respond

Wallarm's arsenal equips you to aptly respond to identified security threats:

  • Active blocking to prevent malicious activities from reaching your APIs.

  • API risk management: Wallarm enables streamlined management of detected vulnerabilities by enabling you to swiftly update vulnerability statuses for better security oversight.

  • Integrations and alerts allowing you to craft and route security alerts to your SIEM, SOAR, and other systems.