Skip to content
.ca
3 mininfo

Extend Application Security Visibility from Code to Runtime

Akamai and Apiiro have announced an integration combining Akamai's App & API Protector with Apiiro's Application Security Posture Management (ASPM) platform. This collaboration aims to provide organizations with comprehensive visibility and correlated security insights across the entire software lifecycle, from code development to runtime execution.

Conf:lowAnalyzed:2026-03-30reports

Source:Akamai

Key Takeaways

  • Akamai and Apiiro have integrated their platforms to connect runtime protection with Application Security Posture Management (ASPM).
  • Web attacks reached 113.03 billion in Q4 2025, representing a 43% year-over-year increase.
  • The integration provides security teams with a correlated view of the application attack surface from code to runtime.
  • Organizations can prioritize vulnerability remediation based on real-world exposure and business impact.

Affected Systems

  • Web Applications
  • APIs
  • Cloud Native Environments
  • Microservices Architectures

Detection Availability

  • YARA Rules: No
  • Sigma Rules: No
  • Snort/Suricata Rules: No
  • KQL Queries: No
  • Splunk SPL Queries: No
  • EQL Queries: No
  • Other Detection Logic: No

No detection rules are provided in this product announcement.

Detection Engineering Assessment

EDR Visibility: None — The article discusses web application and API protection (WAAP) and ASPM, which are network and code-level controls rather than endpoint-level (EDR) controls. Network Visibility: High — Akamai's App & API Protector operates at the network layer (Layer 7) to provide WAF, API discovery, and DDoS protection. Detection Difficulty: N/A — This is a product announcement, not a threat report detailing specific detection mechanisms for a novel attack.

Required Log Sources

  • WAF Logs
  • API Gateway Logs
  • CI/CD Pipeline Logs

Hunting Hypotheses

HypothesisTelemetryATT&CK StageFP Risk
Adversaries may attempt to exploit undocumented or shadow APIs exposed to the internet that lack proper runtime protection.API Gateway Logs, WAF LogsInitial AccessHigh (Requires a strong baseline of normal API traffic and architecture mapping to distinguish malicious probing from legitimate but undocumented internal usage)

Control Gaps

  • Lack of visibility between development (code) and runtime environments
  • Undocumented or shadow APIs exposed to the internet

Recommendations

Immediate Mitigation

  • N/A

Infrastructure Hardening

  • Deploy Web Application and API Protection (WAAP) to defend against Layer 7 attacks, bot management, and credential abuse.
  • Implement Application Security Posture Management (ASPM) to map software architecture and service relationships.

User Protection

  • N/A

Security Awareness

  • Encourage collaboration between development, application security, and runtime security teams using shared insights.