Regulations are constantly evolving, becoming more punitive with larger fines and penalties every year. As a result, there is a collective industry movement toward the continuous improvement of cybersecurity in business and their ecosystem. This includes understanding what policies and processes must be implemented to remain compliant.
However, this is not simply a tick-box exercise; it’s about ensuring that organizations have effective safeguards in place to protect their business, their ecosystem of partners, and their customers.
There’s a wealth of new EU legislation in the pipeline designed to tackle cybersecurity risk in critical sectors. The Digital Operational Resilience Act (DORA) focuses on cybersecurity in the finance sector and the Cyber Resilience Act (CRA) concentrates on reducing risk within hardware and software products.
The Network and Information Security 2 Directive (NIS2), looks to raise cybersecurity standards and incident response capabilities in a wide range of critical industries such as energy, communications, water, banking, health, and transport.
Both the DORA regulation and the NIS2 Directive prescribe that businesses must demonstrably protect everything that is valuable to the organization, such as finances, systems, and intellectual property. DORA complements the NIS2 Directive as well as the General Data Protection Regulation (GDPR).
Regulation as a Competitive Advantage
As every CISO knows, cybersecurity is a multi-aspect, multidisciplinary activity and no organization will ever succeed in entirely preventing attacks and breaches. What businesses can do—and what the regulations require—is implement programs to manage and minimize risk and demonstrate that they are effective.
Rather than view regulation as an onerous task, achieving compliance enables organizations to gain a competitive advantage. Indeed, as new regulations come into force, organizations are likely to find that many of their partners will require proof of compliance before doing business with them.
Achieving compliance with NIS2 and DORA will be a lengthy process, therefore getting started sooner rather than later is imperative. Additionally, the more resilient the organization becomes against cybercriminals and risks, the easier it will be to pass regulatory audits.
The Implications of DORA for API Security
DORA is a crucial legislative framework that mandates operational resilience for financial operations such as banks, credit institutions, insurance companies or insurance intermediaries, pension funds, investment firms, payment service providers, and e-money institutions, within the EU. Our research indicated that 44% of financial services organizations received regulatory fines resulting from an API security incident in 2023.
Coming into force in January 2025, it requires organizations to prepare for and withstand operational disruptions, including cyberattacks and technology failures. In addition, DORA also applies to third-party IT providers, such as data centers or cloud service providers that deliver services into this sector. In total, more than 22,000 financial institutions and IT service providers in the EU are affected.
DORA sets out several requirements that have implications for API security, namely:
Digital operational stability: This involves organizations implementing regular testing programs that identify potential gaps, vulnerabilities, and/or deficiencies with digital operational stability such as network security tests, penetration tests, web-app tests, and more. Conducting mandatory reviews based on threat-led penetration testing (TLPT), depending on the size, risk, and business profile of the financial enterprise is important, as is regularly testing your APIs for vulnerabilities.
DORA outlines examples of security testing which include web-based application and API testing. This includes utilising public-facing resources such as the Open Web Application Security Project (OWASP) top 10 threats, which helps to identify errors in configuration, weaknesses, logic flaws, and code issues that may allow threat actors to gain access, manipulate, or otherwise control organizational resources.
Governance and strategy: There is now increased responsibility for management bodies regarding IT risk management and compliance with security regulations. This includes increased audit plans and specialized training.
NIS2 a Step Forward for EU Cyber Resilience
Coming into force in October 2024, the NIS2 Directive is the most comprehensive European cybersecurity directive to date. It has stricter requirements for risk management and incident reporting, covers a wider remit of industries, and features increasingly hard-hitting financial penalties for non-compliance.
While it does not specifically mention APIs, NIS2’s requirements for enhanced cybersecurity, risk management, incident reporting, and supply chain security have significant implications for the security and management of APIs in organizations subject to the directive. For example:
- Increased Security Requirements: NIS2 imposes stricter security requirements on organizations, including those related to the protection of information systems. As APIs are integral to the functioning of many digital services, ensuring their security becomes crucial under NIS2.
- Risk Management: Organizations are required to adopt appropriate and proportionate technical and organizational measures to manage the risks posed to the security of network and information systems. Since APIs can be potential attack vectors, they need to be included in risk management strategies.
- Incident Reporting: NIS2 mandates the reporting of significant cybersecurity incidents. As APIs can be involved in or affected by such incidents, organizations need to have mechanisms in place to monitor, detect, and report API-related incidents.
- Supply Chain Security:The directive emphasises the importance of securing the supply chain, which includes third-party services and software. As APIs are often used to integrate external services, ensuring their security is essential for compliance.
- Critical Sectors: NIS2 extends its scope to cover more sectors, including digital infrastructure and digital services providers. For these sectors, where APIs are extensively used for integration and service delivery, ensuring API security becomes a priority.
APIs are critical to business transformation and lie at the heart of corporate strategies for growth and innovation. However, they also represent a considerable security risk. Traditional controls like API gateways and web application firewalls (WAFs) leave APIs vulnerable to targeted attacks or malicious abuse, making them a top attack vector for web applications. Attacks that cause data breaches or compromise performance can lead to regulatory fines, reputational damage, and lost revenue.
With the escalating regulation requirements, companies must also look at what they need to put in place through the lens of API security. API security should be a priority for every in-scope organization if they are going to remain compliant with NIS2 and DORA.