APIs (Application Programming Interfaces) are the unsung heroes in an interconnected digital world. They are the crucial communication channels enabling different software systems to talk to each other, powering everything from your mobile banking app to complex enterprise solutions. However, this vital role also makes them prime targets for malicious actors. While many organizations focus on human user authentication, a more insidious threat often goes unnoticed: Non-Human Interfaces (NHIs).
These NHIs, encompassing everything from automated scripts and web bots to compromised IoT devices and even other rogue APIs, can wreak havoc on your systems if not properly managed. They represent a "silent" threat because their activities can easily blend with legitimate automated traffic, bypassing traditional security measures focused on human interaction.
Non-Human Interfaces, by their very nature, operate differently from human users. They are automated, can run continuously, and often interact with APIs at a scale and speed that humans cannot replicate. This presents several unique challenges:
If your APIs are not specifically secured against these non-human threats, you could be leaving your digital doors wide open to abuse, data theft, and service degradation, all happening silently in the background.
It's true that some NHIs are good and we want to let them in. Here are some examples of “good” NHIs:
Internal automation scripts |
QA tests, CI/CD checks, monitoring |
Trusted partners’ integrations |
Access to limited API endpoints |
Analytics/data pipeline calls |
ETL or audit logs from known environments |
Third-party tools |
Postman, Zapier, custom dashboards |
Legacy systems |
Non-app clients that must call mobile APIs |
So all we need to do is allow good NHIs and block bad ones. The problem? Most backend tools can’t even tell a real mobile app from a fake one. NHIs often slip through firewalls, API gateways, or behavioral bot detection systems.
Backend API security has relied on two main signals to verify legitimate web crawlers from other types of automated traffic: user agent headers and IP addresses. The User-Agent header allows bot developers to identify themselves. However, user agent headers alone are easily spoofed and are therefore insufficient for reliable identification.
To address this, user agent checks often add IP address validation, the inspection of published IP address ranges to confirm a crawler's authenticity. But this is not always reliable either since connections from the crawling service might be shared by multiple users and the allocation of IP address ranges change over time.
This highlights one of the challenges presented by using a backend-only app sec solution. Because contextual information about what is happening in the client environment is missing, there is always ambiguity and your security team will spend an inordinate amount of time and energy juggling with false positives and negatives.
What is needed is a way for every request to be signed and checked for legitimacy at the API - a true Zero Trust approach.
The industry is recognizing the urgent need to move beyond simply guessing if traffic is human or bot. The goal is to enable explicit authentication and verification for all types of traffic, including legitimate automated services.
One interesting development in this area comes from Cloudflare with their Web-Bot-Auth proposal. This new standard aims to help distinguish "good" bots (like search engine crawlers or legitimate automated services) from malicious ones when they access web resources and APIs.
The concept is straightforward yet powerful:
Cloudflare's Web-Bot-Auth is a significant step towards making bot authentication explicit rather than relying on heuristic detection methods, which can be prone to errors. It’s a move towards a future where legitimate automated services can declare their identity transparently and securely for web-facing APIs.
One critical requirement that is not explicitly addressed by the Cloudflare proposal is the need for this to be dynamic and easy to manage: it must be easy to immediately change your categorization of NHIs from “good” to “bad”, and vice versa, as the landscape and your business evolves.
While Web-Bot-Auth offers a promising direction for web-based bot traffic, the mobile ecosystem presents a different set of challenges. Here, the primary concern isn't just distinguishing good web bots from bad ones, but ensuring that API requests truly originate from your genuine, untampered mobile app, and not from:
This is where solutions focused on mobile app attestation become critical.
Approov specializes in securing mobile API traffic by ensuring that your APIs are only accessed by genuine, untampered instances of your official mobile apps. This effectively cuts off automated threats trying to impersonate or exploit your mobile channel. Here’s how Approov tackles the NHI challenge specifically for mobile:
This attestation ensures that requests originate from a legitimate and healthy instance of your mobile app, not from a repackaged app, a script directly hitting your API, an emulator, or a compromised device.
This mechanism effectively blocks requests from unauthorized NHIs like bots, scripts, and automated attack tools that cannot pass the initial mobile app attestation process and therefore cannot obtain a valid token to make requests as if they were your mobile app.
Critically, all of this can be managed dynamically so that you can always be on top of which NHIs are allowed access and which are not.
Approaches like Cloudflare's Web-Bot-Auth and Approov's mobile app attestation are not mutually exclusive; rather, they address different facets of the NHI threat landscape:
In a comprehensive API security strategy, you might see Cloudflare (or similar WAF/bot management solutions) protecting your web frontends and APIs from general web-based bot traffic, while Approov specifically locks down API endpoints intended for exclusive use by your mobile apps.
By implementing Approov for your mobile channels, organizations can:
NHIs are an integral part of the modern digital ecosystem, but they also represent a significant and often underestimated threat vector for your APIs, whether they are web-facing or mobile-specific. Traditional security measures are frequently insufficient to counter these automated, stealthy attacks.
Initiatives like Cloudflare's Web-Bot-Auth signal a positive move away from flawed traditional approaches towards a more dynamic, consistent and effective identification of web bots.
For the critical mobile channel, solutions like Approov provide an indispensable layer of defense by ensuring that API requests originate only from genuine, untampered instances of your mobile applications. Approov helps you unmask and neutralize the silent threat of malicious NHIs targeting your mobile APIs. By adopting robust, specialized solutions, businesses can protect their APIs, their data, and their users in an increasingly automated world.
Let’s stop guessing. We can authenticate every request so let's do it!
NHIs won’t go away. But with Approov, the bad ones simply don’t get in. It's easy to integrate Approov with any back-end security solution to take back control of NHI access.