Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business ResilienceSecurity Education & Training

The integration security paradox: Strategies to protect data

By Buzz Hillestad
Vertical lines of light

Image via Unsplash

August 21, 2024

As the adage goes, an organization is only as secure as its weakest link. With the growing emphasis on software integration, B2B SaaS companies are adding many links to their chains, creating new access points for attackers. The Crowdstrike tech outage demonstrates just how interdependent systems are, and the SolarWinds hack in 2020 highlighted the vulnerabilities in supply chain security and the potential consequences of large-scale cyberattacks.

Third-party attacks accounted for nearly 30% of all breaches in 2023, and 98% of organizations have business ties to a third-party vendor that has experienced a breach. Yet integrations are imperative to a successful technology platform as customers increasingly demand cohesive tech stacks. Developers must find a way to secure these integrations. 

Common security pitfalls

Unfortunately, despite their best efforts, the growing integration ecosystem prevents organizations from achieving complete security. Several factors can introduce additional security vulnerabilities. 

  • Third-party vendor vetting: Failure to properly evaluate a vendor's security posture creates significant gaps in protection. 
  • Misconfigurations: Integration builders can create complex integrations without fully understanding the implications for security and data integrity.
  • APIs: Securing APIs is incredibly difficult due to their complex nature and extensive data exposure. While APIs are not currently hackers' prime target, it's likely only a matter of time before that changes. 
  • Developer awareness: Fast-paced developer workflows and rapidly changing technologies can contribute to a lack of security awareness from developers, resulting in inadvertent vulnerabilities.

Only connect with trusted sources

Vetting a third party before connecting is foundational to building secure integrations. Customers’ data must be exchanged exclusively through trusted and verified applications. Unsigned or unverified third-party apps anywhere in the ecosystem create risk. 

SOC 2 reports should be a baseline requirement for vendors. Compliance with these rigorous security standards demonstrates a company’s ability to handle data securely and responsibly. Other frameworks, including ISO 27001 and the NIST (National Institute of Standards and Technology) Cybersecurity Framework, also provide security reassurance. 

Beyond certification, evaluate the SaaS providers’ additional security efforts, such as audits and penetration tests. 

Strategies for integration security

Organizations must set realistic goals. Achieving complete security is challenging, and substantial risk mitigation can be costly. First and foremost, dev teams should work to prevent inevitable attacks from turning into full-blown breaches. They can achieve this with layered security controls using the following practices.

  • Use complex authentication: Setting up unique API keys with specific scopes for each company and user accessing the integration is an adequate safeguard, but OAuth 2.0 is more secure. This framework uses authentication tokens from an authorization server to grant limited access to specific resources. Each company and individual user should receive unique OAuth 2.0 credentials. 
  • Store credentials separately from source code and data: Code, data and credentials should never mix. There have been several instances of private API keys published in hard code, opening the integration up to serious risk. Managing the many credentials and API keys for multiple integrations requires dedicated vaults with proper access management.
  • Validate all inputs: To ensure data integrity, establish a comprehensive validation process for all API interactions. This effort includes defining strict input requirements in the API documentation and implementing rigorous checks within the integration to enforce these rules.
  • Implement the principle of least privilege: Every integration module should only have access to the information and resources necessary to run successfully. Restricting access protects sensitive information, decreases potential vulnerabilities and contains damage from compromised modules. Security leaders can turn this principle inward to address risks posed by low-code/no-code environments by limiting users’ ability to create, modify or delete integrations.
  • Monitor and log system metadata: Observing system activity can flag potential attacks, and system logs pinpoint the source of the problem. However, the recorded data should only include metadata about integrations and their executions, not the user information passing through.

Implementing multiple security controls at various levels — data, application and user — creates a formidable defense strategy. These multi-layered approaches act as speed bumps, giving organizations time to detect and contain an attack. Dev teams should have a response plan in place, such as shutting down layers or systems to prohibit bad actors from accessing additional data or applications. Once the threat is neutralized, teams can eradicate the issue and install new protections.

Regular audits and education

Integration strategies and security threats evolve. A comprehensive audit approach combining automated tools, manual review and ongoing security testing is essential for maintaining the integrity and security of APIs and the development process.

Developer education is also imperative. Even experienced programmers may not always be aware of the latest ways attackers can manipulate systems. Training them to always follow secure design principles and creating awareness of new vulnerabilities allows them to be cognizant of best practices in their development.  

Despite best efforts, organizations cannot entirely avoid risk exposure from third-party integrations. Prioritizing multi-layered security strategies, building containment and recovery strategies and continuous code and process evaluation gives an organization the best chance of protecting its software from a major breach. Building resilience into the development strategy will allow organizations to provide customers with convenience and security. 

KEYWORDS: auditing best practices integrated security solutions integration

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Buzz hillestad headshot

Buzz Hillestad is the CISCO at Prismatic. Image courtesy of Hillestad 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • data-center

    Strengthening the frontlines for unstructured data security: Protect it first

    See More
  • Email, Spymail, Cybersecurity, Cyber espionage

    Using Machine Learning to Fight Fraud, Redirect Security Strategies and Protect Users

    See More
  • robots

    Data, Integration and Smarter Environments – What to Expect at GSX 2019

    See More

Events

View AllSubmit An Event
  • September 29, 2025

    Global Security Exchange (GSX)

     
  • April 23, 2025

    Employee Perceptions of Workplace Safety in 2025

    ON DEMAND: Workplace safety continues to be a critical concern in 2025, with employees across industries expressing growing concerns about their safety at work.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!