Upwind raises $250M Series B to secure the cloud for the world →
Get a Demo

It’s not about how application programming interfaces (APIs) work. It’s not even about API security. It’s about what shadow or orphaned APIs are live right now — and how your teams can tell. As API use has grown substantially over the past few years, it’s become too easy to lose sight of how many APIs are active and how they are being used. Since teams can easily create new API connections or leave unused ones exposed, the actual number of APIs may be far higher than expected, and many of those pose real risks.

So let’s talk about getting every single API on the radar.

A key component of both application security and system architecture hardening, API discovery is the process of identifying and documenting all API connections within a network. This article covers best practices for API discovery, what security teams can expect to find, and the pitfalls to look out for while conducting this process. 

Why API Discovery Matters

APIs are the connective tissue of modern software. They handle communication between countless services across the hybrid and multi-cloud. Today, everything has an API.

Research findings estimate that API calls make up anywhere from 70% to 85% of modern internet traffic.

Though public APIs get the lion’s share of attention, companies use 6 to 7 times the number of internal APIs compared to public ones, and they’re often undocumented and unmanaged. 

Given their tremendous influence on traffic, APIs present a significant security risk to an organization’s system architecture. And traditional security tools were never built to track them dynamically. 

 But API blindspots matter. They:

API management only works when teams know what APIs exist. Otherwise, any number of APIs could be left vulnerable, and without monitoring and tools like API gateways, rate limiting, and auth policies, they can’t reach shadow, zombie, and undocumented APIs. 

Bring Shadow APIs into the Light

Upwind offers runtime-powered API discovery so you get real-time visibility into traffic flow to every active endpoint, including shadow and ephemeral APIs, plus contextualized risk analysis, data flow mapping, and root cause insights up to 10X faster than traditional discovery methods.

Get a Demo

The Development of API Visibility

Given the ubiquity of APIs and the security risks they present, knowledge about the number and scope of these connections is a vital part of securing an organization’s digital architecture.

APIs present a number of security risks to an organization. By their nature, APIs create openings into internal systems — security holes that serve a purpose but also carry risk. As the number of APIs grows, so does the surface area exposed to potential abuse.

And historically, API visibility relied on:

As a result, most organizations had old, unmonitored APIs, those created outside governance, and partner or 3rd-party APIs with poor visibility. They also lacked visibility into ephemeral or autoscaled APIs from containers and serverless functions.

With some Cloud-Native Application Protection Platforms (CNAPPs) of today, organizations may still lack visibility. When? 

Today, runtime CNAPPs with eBPF sensors to inspect live traffic do much of the work of API discovery, with one caveat: teams won’t see every potential API route in the codebase, just those actually used in production. That’s a minor issue, since APIs in production are what matter for risk.

This API endpoints viewer shows APIs with unauthenticated endpoints, and APIs associated with sensitive data. In a world where most tools monitor only declared APIs, automatic observability can help identify shadow APIs and other overlooked risks.
This API endpoints viewer shows APIs with unauthenticated endpoints, and APIs associated with sensitive data. In a world where most tools monitor only declared APIs, automatic observability can help identify shadow APIs and other overlooked risks.

Complete visibility also allows teams to shift their view from endpoint-level API discovery to behaviors at the network level, for a deeper understanding of how APIs are being used in their environment. They’ll be able to break down which internal services are generating the most traffic, for example, and whether it’s in-cluster or exposed via internet ingress.

Which services are calling which APIs most actively? Which ports and protocols are serving traffic? Which external actors are involved? It’s all important for not only seeing APIs but prioritizing risk, mitigating anomalies, and detecting abuse.
Which services are calling which APIs most actively? Which ports and protocols are serving traffic? Which external actors are involved? It’s all important for not only seeing APIs but prioritizing risk, mitigating anomalies, and detecting abuse.

Risks Without Full API Visibility

Many organizations assume their inventory of APIs is accurate, but without continuous runtime discovery, they’re often left in the dark. And in a production environment where APIs are spun up dynamically and evolve with every deploy, those gaps aren’t rare. In fact, they’re constant. When APIs are invisible, they introduce the invisible risk of an API attack. Some of the more common security risks presented by APIs include: 

Compliance Challenges

And all these risks combine to make for compliance challenges. Especially for APIs that connect data to systems used throughout the enterprise, it is critical that deployments are secure.

It’s incumbent on security teams to ensure compliance in all API connections, and API discovery is essential for identifying all APIs within an organization. By gaining full visibility, security and compliance teams can ensure that data flows align with privacy regulations such as GDPR, CPRA, or HIPAA. Discovery also helps enforce internal policies by monitoring access, data exposure, and usage patterns across all APIs.

Moreover, organizations must also follow specific deployment guidelines set by API protocol providers. For example, OpenAPI requires standardized schema definitions to ensure compatibility and security across services.

How API Discovery Works

Of course, in a perfect world, teams wouldn’t have to worry about how API discovery works. Tools would handle it automatically at runtime, surfacing every active API without relying on gateways or guesswork.

But for teams still stitching together discovery manually, or evaluating whether their current tools are enough, it’s worth understanding the methods behind API inventory building, and why some approaches fall short.

Manual vs. Automated Methods

In general, API discovery can be conducted manually or via automation. 

Manual API Discovery MethodsAutomated API Discovery Methods 
Network Traffic Monitoring – Network traffic can be monitored to identify APIs based on requests and responses. API Discovery Tools – A solution that automatically identifies and documents APIs, including unknown or “shadow” APIs.
Documentation Review – Collect documentation from teams on the APIs they have deployed in the organization. API Gateways – API gateways act as central points for managing and monitoring API traffic along with developer portals that serve as a centralized hub for accessing APIs and related resources.
Network scanning – Scan network endpoints to see which ones respond to requests and map out their capabilities. API runtime log monitoring – Monitoring API runtime logs can help build an automated inventory of APIs in use throughout the company. 

Getting Started with Automated Tools in API Discovery

For teams not using a runtime CNAPP tool that fulfills their API discovery needs, they may find they are piecing together visibility using multiple tools, each solving part of the problem, but none providing full, live coverage. Here’s how the traditional stack breaks down:

Automated Discovery Tools

Effective API Discovery Best Practices

Even with a runtime CNAPP providing continuous visibility into live API activity, organizations still need structured processes to operationalize that visibility. Discovery is the start of the process, but it feeds a system that also includes governance, monitoring, and automation, and that reduces risk and improves response time.

Centralized, Runtime-Driven Inventory

A non-negotiable step toward security, compliance, and resilience is establishing a centralized API inventory. This comprehensive catalog should house critical information about all APIs in the organization, both internal and external, including:

The inventory isn’t built once; it’s continuously updated to reflect only live APIs in production.

Continuous Monitoring at Runtime

Once teams have created the inventory, the next critical step is continuous monitoring. APIs are dynamic; they change, evolve, and can become vulnerable over time. Continuous monitoring ensures organizations stay ahead of potential threats and maintain a secure API ecosystem.

Key practices include:

This is where runtime platforms help: rather than relying on logs of gateway metadata, they observe actual traffic at layer 7, delivering alerts as threats emerge.

Automation Strategies for Resilience

Augment runtime monitoring with automation across the API lifecycle, especially when it comes to security controls, documentation, and testing.

Best practices include: 

Beyond finding APIs, automation tools help teams automatically respond to risk and verify their posture with less manual effort.

Upwind Tracks APIs at Runtime

Upwind helps teams discover APIs, but it also shows them how those APIs behave in real-world conditions. By analyzing runtime traffic at Layers 3, 4, and 7, Upwind continuously surfaces active APIs, classifies their sensitivity, and maps data flows, including regulated data like PCI, PII, and PHI. This visibility is generated passively by Upwind’s in-cluster sensors, which inspect traffic without exporting payload data, so teams get better security and deeper analysis.

Want to stop relying on scanning, logs, or declared schemas? See what’s running in production and what’s putting your organization at risk. Schedule a demo to see how you can get streamlined API discovery, even when APIs aren’t declared.

FAQ

How can I discover all my APIs?

Embarking on API discovery requires a structured approach. Here’s a step-by-step guide to get you started:

  1. Define Your Goals: Teams need to clearly identify what they hope to achieve with API discovery, such as focusing on security, compliance, or efficiency in development. They must also establish measurable objectives to track progress and success.
  2. Inventory Existing APIs: Prior to implementing a tool, organizations should conduct a preliminary inventory of their known APIs. This helps with identifying potential gaps and silos and to gain an overview of the scope of their API landscape. 
  3. Choose the Right Tool: Teams should evaluate available tools based on their specific needs. Factors to consider could be features, scalability, and integration capabilities. Ultimately, teams should test their top candidates based on specific organizational needs. 
  4. Configure and Integrate: Configure the chosen tool, whether open source or enterprise, to scan the network and discover APIs. These tools should be integrated with existing systems, such as API gateways and CI/CD pipelines, for seamless data flow.
  5. Automate Discovery and Documentation: Teams should leverage the tool’s automation features to discover new APIs and update API documentation continuously. This ensures that the inventory remains up to date. 
  6. Establish Governance Policies: Always define and implement governance policies for API usage, security, and compliance. The discovery tool can be used to enforce these policies and monitor adherence.
  7. Monitor and Analyze: Lastly, teams should continuously monitor API usage, performance, and security. In addition, organizations should analyze the data to identify trends, potential issues, and areas for improvement.

What does the future hold for API discovery?

The field of API discovery is constantly evolving, driven by technological advancements and changing business needs. A few future trends to watch include: 

How do you manage shadow APIs?

Shadow APIs can’t be managed until they’re discovered, so the first step is continuous runtime visibility that reveals every active endpoint, not just those registered in gateways or documentation. 

Once surfaced, security teams can classify, assess, and govern these APIs, just like any other production asset.

What are the key implementation challenges?

The biggest challenges in implementing API discovery and security revolve around how to integrate with dynamic environments and maintain continuous visibility without disrupting performance. Teams also struggle with ownership, tool sprawl, and inconsistent enforcement across environments. The challenges to solve include:

How does API discovery integrate with API security?

API discovery integrates with API security because it enables comprehensive visibility into the organization’s API landscape — the first step to securing it. Knowing what’s in the environment informs security practices like vulnerability mitigation, risk reduction, and overall improvement in proactive security.