API Blocking
Enhance your application security by blocking vulnerable APIs. K2 will help uncover and block Vulnerable APIs at your infrastructure perimeter.
In this section, we outline the steps to block an malicious API calls from attackers with K2 Platform.
Step 1 : Checkout Policy Page
Policy page keeps all the configuration related to vulnerability detection and runtime protection for your applications.
Policy | K2 Portal
Step 2 : Edit your default Policy under Policies View
Click on edit button on your default policy.
You will see three sections at the top Agent Config, Agent Policies and Global Policy Parameters.
Click on Agent Policy and head on to step 3.
Step 3 : Protection Mode : API Blocking
K2 Portal Protection Mode Policy Now we can see all the Protection Mode.
In order to block malicious API calls,
Enable API Blocking. Under API Blocking choose one of the policy and enable
Protect all API's - Enables blocking and protection of all the functions/APIs
Protect attacked API's - Enables blocking and protection against previously attacked functions/APIs only
Protect known vulnerable API's - Enables blocking and protection against known vulnerable functions/APIs only
Learn next about IP Blocking with K2 Platform
IP Blocking