Extend Application Security Visibility from Code to Runtime
Akamai and Apiiro have announced an integration combining Akamai's App & API Protector with Apiiro's Application Security Posture Management (ASPM) platform. This collaboration aims to provide organizations with comprehensive visibility and correlated security insights across the entire software lifecycle, from code development to runtime execution.
Source:Akamai
Key Takeaways
- Akamai and Apiiro have integrated their platforms to connect runtime protection with Application Security Posture Management (ASPM).
- Web attacks reached 113.03 billion in Q4 2025, representing a 43% year-over-year increase.
- The integration provides security teams with a correlated view of the application attack surface from code to runtime.
- Organizations can prioritize vulnerability remediation based on real-world exposure and business impact.
Affected Systems
- Web Applications
- APIs
- Cloud Native Environments
- Microservices Architectures
Detection Availability
- YARA Rules: No
- Sigma Rules: No
- Snort/Suricata Rules: No
- KQL Queries: No
- Splunk SPL Queries: No
- EQL Queries: No
- Other Detection Logic: No
No detection rules are provided in this product announcement.
Detection Engineering Assessment
EDR Visibility: None — The article discusses web application and API protection (WAAP) and ASPM, which are network and code-level controls rather than endpoint-level (EDR) controls. Network Visibility: High — Akamai's App & API Protector operates at the network layer (Layer 7) to provide WAF, API discovery, and DDoS protection. Detection Difficulty: N/A — This is a product announcement, not a threat report detailing specific detection mechanisms for a novel attack.
Required Log Sources
- WAF Logs
- API Gateway Logs
- CI/CD Pipeline Logs
Hunting Hypotheses
| Hypothesis | Telemetry | ATT&CK Stage | FP Risk |
|---|---|---|---|
| Adversaries may attempt to exploit undocumented or shadow APIs exposed to the internet that lack proper runtime protection. | API Gateway Logs, WAF Logs | Initial Access | High (Requires a strong baseline of normal API traffic and architecture mapping to distinguish malicious probing from legitimate but undocumented internal usage) |
Control Gaps
- Lack of visibility between development (code) and runtime environments
- Undocumented or shadow APIs exposed to the internet
Recommendations
Immediate Mitigation
- N/A
Infrastructure Hardening
- Deploy Web Application and API Protection (WAAP) to defend against Layer 7 attacks, bot management, and credential abuse.
- Implement Application Security Posture Management (ASPM) to map software architecture and service relationships.
User Protection
- N/A
Security Awareness
- Encourage collaboration between development, application security, and runtime security teams using shared insights.