{"id":1150,"date":"2022-03-16T22:16:18","date_gmt":"2022-03-16T22:16:18","guid":{"rendered":"https:\/\/apimike.com\/?p=1150"},"modified":"2022-12-12T21:58:53","modified_gmt":"2022-12-12T21:58:53","slug":"rogue-apis-vs-zombie-apis","status":"publish","type":"post","link":"https:\/\/apimike.com\/rogue-apis-vs-zombie-apis","title":{"rendered":"Rogue APIs VS zombie APIs"},"content":{"rendered":"\n

Rogue and zombie APIs are a fact of life for every organization. A rogue API is an API that was not authorized by the organization. A zombie API is an API that was authorized but is no longer being used.<\/p>\n\n\n\n

While both types of APIs can cause security and other problems, rogue APIs are particularly dangerous because they can be exploited by malicious abusers to steal data or gain access to an organization’s systems. They need to be sure to keep track of all of the APIs that are in use in order to identify and mitigate the risks posed by rogue and zombie APIs.<\/p>\n\n\n\n

What is a rogue API?<\/h2>\n\n\n\n

A rogue API is an API that is not authorised or approved by the company that owns the data or content that the API provides access to. For example, a rogue API could provide unauthorised access to customer data from a CRM systemA rogue API is an API that is not authorised or approved by the company that owns the data or content that the API provides access to. Using a rogue API could let people get customer data from a CRM system without permission, or they could be able to bypass security controls on a site.<\/p>\n\n\n\n

What is a zombie API?<\/h2>\n\n\n\n

There are many different types of zombie APIs, but they all share one common trait: they are no longer maintained or supported by the original provider. As a result, these APIs are often unreliable, outdated, and difficult to use.<\/p>\n\n\n\n

Some examples of zombie APIs include the following:<\/p>\n\n\n\n