SlideShare a Scribd company logo
1 of 41
Download to read offline
1
Take the "F*^!"
Out of ShiFt Left
Christine Bevilacqua, API Security Evangelist
APIsec University
2
Shift Left API Security
• Why Shift Left?
• 3 Pillars of API Security
• Dev + Sec, Educate & Empower
• Real World Successes
• Best Practices
3
Why Shift Left?
4
API Security Requires Shifting Left
83% of all
internet traffic
is from APIs
Regulations mandate
privacy, vulnerability
detection, testing
Regulatory
Compliance
2022: APIs
“most frequent
attack vector”
Major Attack
Target
High-profile
API breaches
announced weekly
High Profile
Breaches
Explosive
Growth
5
Your API Security Problem isn’t Shrinking
93% of professional developers use APIs
(that’s 21.9M developers using APIs in enterprise projects)
76% or 95% have experienced an API security incident in the past 12 months
34% lack any kind of API security strategy
Of 117,000 cybersecurity incidents, API insecurity was responsible for annual losses
of between $41- 75 billion globally and $12-23 billion in the US.
6
Why Attackers Target APIs
Mobile
App
API
Web
App
Application
Public
API
Micro
Services
Internal
APIs:
• Direct access to sensitive data
• Often “over-permissioned”
• Vulnerable to logic flaws
7
When do you want to find API
vulnerabilities?
8
What’s Being Stolen?
9
10
3 Pillars of API Security
11
The 3 Pillars of API Security
Developing
secure APIs
Ensuring APIs are
free of flaws
Detecting threats in
production
Governance Testing Monitoring
12
Governance
• Goals:
• Consistency
• Setting expectations
Awareness
• Know your APIs
• Know your data
• Know your risks
Policy
• Engineering process
• API documentation
• Style guides
• Enforcing security
• Establishing standard processes
13
Know Your APIs
• Get full inventory APIs
• Purpose, owner, documentation
• Standardize and enforce API deployment process
• Existence of “shadow/rogue” APIs sign of weak governance
• APIs only deployed in approved ways, with proper validation
• Enforce governance at Gateway, Marketplace
• Mandate API Documentation
• Make sure APIs are consistent and reusable
• Define documentation requirements
• Create API Development standards
• Style guides, authentication requirements, versioning, PII tracking
14
Know Your Risks (Threat Modeling)
• Identify: APIs, data, access paths -> potential threats
• Assess: vulnerabilities, logic flaws, access controls, 3rd party risk
• Probability: examine the likelihood of an attack
• Impact: understand the damage, loss, consequences of an attack
• Mitigation: develop a plan to address the risk
15
Style Guides: Promote Governance, Consistency
• Design Style and Specification – API type: REST, GraphQL
• Authentication and Authorization – how to implement (OAuth 2.0)
• Endpoint Naming – URIs as nouns, Methods as verbs, pluralization,
hierarchy, lowercase, language, naming (no jargon), no abbreviations
• Error Codes – status codes, reference ID, human readable messages
• Versioning – when to increment, when not, types of versions
• Units, Formats, Standards – date/times
16
Style Guide
Example
17
Style Guide
Example
18
OpenAPI Specification (Swagger)
• De facto standard for API
documentation
• Aids development and 3rd party
integration
• Manually or auto-generated
• Used with REST APIs
• Machine-readable (YAML, JSON)
• Defines API capability (contract)
• Title, description, version
• Base-URL
• Endpoints, paths
• Parameters
• Methods
• Data types
• Request, response payloads
• Authentication requirements
19
20
Testing
• Where do you want to find API vulnerabilities?
• Pre-production
• Production
• “Standard playbook” test categories offer limited value
• Cross-site scripting, injection, buffer overflow
• Important to run these tests to avoid bot-based attacks
• API breaches rarely exploit these
• Major breaches typically business logic flaws
21
The Need for
API-First Testing
21
Backend
API
Web
App
Mobile
App
Pen Test,
Web Scan
Attacker
22
Testing Categories
API Security
• Unsecured Endpoints
• Authentication exploits
• Enumeration
• App DOS, rate limiting
• Missing TLS, SSL issues
• Injection, fuzzing
• Fuzzing, input validation
• Server-side resource forgery
• Server properties leaks
Business Logic
• Cross-account access
• API function abuse
• Role-based access control
• Pen-testing
Data Security
• Access control
• Excessive data exposure
• Sensitive data exposure
• Personal, health, bank data
• File, directory exposure
• Encryption at rest
• Data exfiltration
23
API-First Testing
• Critical to attack simulate
• Examine business processes and
create attack scenarios
• Exercise all object/user/action
combinations
Unauthorized trading
Account data harvesting
Excess data exposure
Account takeover
Account tampering
SEC reporting
Ransom
3rd party exposure
24
APIsec University
• API Pen-Testing course
• www.apisecuniversity.com
25
Monitoring
• Critical to monitor API traffic
• Uncover anomalies and active attacks
• Identify resource abuse – harvesting, scraping
• Detect fraudulent transactions
• Alert on brute force attacks
• Identify distributed attacks
• e.g., rotating IPs to make thousands of disparate requests look legitimate
• Monitoring is reactive
• Tools typically used in non-blocking mode
• Best practice is to test wherever possible
26
API Discovery
• API Discovery is not a point-in-time activity
• Monitoring can help
• However, organizations should discover APIs from multiple sources:
• Gateway
• Code repository
• Traffic analysis
• Web Application Firewall
• Application testing, crawling
• Monitoring
• Reliance on traffic based-discovery misses:
• Unexercised endpoints
• East-West APIs – internal API traffic not seen by traffic analysis tool
27
Educate and Empower
Developers
28
28
Regulatory Compliance Competing Challenges
Privacy:
• Consumer data protection
• Breach notification requirements
• Massive penalties for violations
(GDPR: 4% of company revenue)
Accessibility:
• Global push to make data accessible
• Ensure interoperability among providers
• “Information Blocking” penalties
• Banking:
FFIEC, OCC, Open Banking, FDX
• Payment Card Industry: PCI
• Healthcare:
HIPAA/HITRUST/Interoperability
• Privacy: GDPR, CCPA, PIPEDA
• Federal: FedRAMP
• Standards, Frameworks:
NIST 800-53, ISO 27001, SOC 2
29
APIsec University
• API Security Fundamentals
• www.apisecuniversity.com
30
2023 OWASP API Security Top 10
API1 Broken Object Level
Authorization
API2 Broken Authentication
API3 Broken Object Property Level
Authorization
API4 Unrestricted Resource
Consumption
API5 Broken Function Level
Authorization
API6 Server-Side Request Forgery
API7 Security Misconfiguration
API8 Lack of Protection from
Automated Threats
API9 Improper Assets
Management
API10 Unsafe Consumption of APIs
31
Network Endpoint Application Data
Web/Messaging Identity Detection Cloud
Firewall
NAC
Threat Protection
Deception
EDR
Anti Malware/Virus
Vulnerability
Management
SAST, DAST
SCA, Container Security
WAF
API Security
Encryption
DLP
Access Control
Email Gateway
Web Gateway
Authentication
PIM
Identity Governance
SIEM
SOAR
Incident Response
CASB
Infrastructure Security
Cybersecurity Landscape
32
Application Security
• How apps are tested typically:
• Code scanning – looking for poor coding practices, hygiene
• Library analysis – looking for vulnerable 3rd party code
• Dynamic testing (DAST) – looks for common vulnerabilities
• 2 key issues with these solutions:
1. Don’t look at what’s actually exploitable
2. Don’t evaluate the most exploited aspect – business logic
33
Develop Deploy Operate
Static Code Analysis
• Coding weaknesses
• Injection flaws
• Weak authentication
• Configuration issues
Software Composition
Analysis
• 3rd party vulnerabilities
• Licensing issues
• Outdated components
API Security Testing
• OWASP testing
• Business logic
• Authentication testing
• Authorization testing
• Attack simulation
API Gateway
• Authentication
• Authorization (limited)
• Rate limiting
• Traffic filtering
• Logging
API Monitor/Firewall
• Attack detection
• API discovery
• Anomaly detection
• Traffic blocking
Production
Pre-Production
Recommendations:
• Shift Left: find issues as early as possible
• Validate security controls in production
• Automate as much as possible
34
Real World Examples
35
36
37
38
Best Practices
39
Best Practices
1. Enforce API governance and establish central API control
• Gateway, marketplace platform
• No API goes live without passing gates (docs, testing, security)
2. Create comprehensive testing program
• Test every endpoint across all OWASP attack types and more
• Evaluate every data object, user type and function for logic flaws
• Leverage automation for comprehensive test coverage
40
Best Practices
3. Implement automated, continuous testing
• Although APIs rarely change, code & infrastructure does
• Every release needs functional AND security testing
• Integrate testing into CI/CD pipeline
4. Develop API security metrics and assess progress
• Total APIs managed – new, existing, retired
• Vulnerabilities identified, outstanding, fixed
41
Thank you!
Contact me: christine@apisecuniversity.com
API Pen-Test course: www.apisecuniversity.com
API Fundamentals course: COMING SOON

More Related Content

Similar to APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilacqua (APIsec)

Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application SecurityJim Kaplan CIA CFE
 
How to Test for The OWASP Top Ten
 How to Test for The OWASP Top Ten How to Test for The OWASP Top Ten
How to Test for The OWASP Top TenSecurity Innovation
 
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
Css sf azure_8-9-17-protecting_web_apps_stephen coty_alCss sf azure_8-9-17-protecting_web_apps_stephen coty_al
Css sf azure_8-9-17-protecting_web_apps_stephen coty_alAlert Logic
 
CSS17: Houston - Protecting Web Apps
CSS17: Houston - Protecting Web AppsCSS17: Houston - Protecting Web Apps
CSS17: Houston - Protecting Web AppsAlert Logic
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile WorldDavid Lindner
 
5 step plan to securing your APIs
5 step plan to securing your APIs5 step plan to securing your APIs
5 step plan to securing your APIs💻 Javier Garza
 
Enterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceEnterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceSPAN Infotech (India) Pvt Ltd
 
Web Application Penetration Test
Web Application Penetration TestWeb Application Penetration Test
Web Application Penetration Testmartinvoelk
 
Combatting API Vulnerabilities with the 3 Pillars of API Security
Combatting API Vulnerabilities with the 3 Pillars of API SecurityCombatting API Vulnerabilities with the 3 Pillars of API Security
Combatting API Vulnerabilities with the 3 Pillars of API SecurityNordic APIs
 
API Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIsAPI Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIsAaronLieberman5
 
2022 APIsecure_Hackers with Valid Credentials
2022 APIsecure_Hackers with Valid Credentials2022 APIsecure_Hackers with Valid Credentials
2022 APIsecure_Hackers with Valid CredentialsAPIsecure_ Official
 
CSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsCSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsAlert Logic
 
Outpost24 webinar - Api security
Outpost24 webinar - Api securityOutpost24 webinar - Api security
Outpost24 webinar - Api securityOutpost24
 
APIsecure 2023 - The Importance of Real-Time Protection in API Security, Jere...
APIsecure 2023 - The Importance of Real-Time Protection in API Security, Jere...APIsecure 2023 - The Importance of Real-Time Protection in API Security, Jere...
APIsecure 2023 - The Importance of Real-Time Protection in API Security, Jere...apidays
 
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityAnne Oikarinen
 
Using SurfWatch Labs' Threat Intelligence to Understand Dark Web Threats
Using SurfWatch Labs' Threat Intelligence to Understand Dark Web ThreatsUsing SurfWatch Labs' Threat Intelligence to Understand Dark Web Threats
Using SurfWatch Labs' Threat Intelligence to Understand Dark Web ThreatsSurfWatch Labs
 
Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?Virtual Forge
 
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...WSO2
 

Similar to APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilacqua (APIsec) (20)

Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application Security
 
Deep-Dive: Secure API Management
Deep-Dive: Secure API ManagementDeep-Dive: Secure API Management
Deep-Dive: Secure API Management
 
How to Test for The OWASP Top Ten
 How to Test for The OWASP Top Ten How to Test for The OWASP Top Ten
How to Test for The OWASP Top Ten
 
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
Css sf azure_8-9-17-protecting_web_apps_stephen coty_alCss sf azure_8-9-17-protecting_web_apps_stephen coty_al
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
 
CSS17: Houston - Protecting Web Apps
CSS17: Houston - Protecting Web AppsCSS17: Houston - Protecting Web Apps
CSS17: Houston - Protecting Web Apps
 
How to produce more secure web apps
How to produce more secure web appsHow to produce more secure web apps
How to produce more secure web apps
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile World
 
5 step plan to securing your APIs
5 step plan to securing your APIs5 step plan to securing your APIs
5 step plan to securing your APIs
 
Enterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceEnterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and compliance
 
Web Application Penetration Test
Web Application Penetration TestWeb Application Penetration Test
Web Application Penetration Test
 
Combatting API Vulnerabilities with the 3 Pillars of API Security
Combatting API Vulnerabilities with the 3 Pillars of API SecurityCombatting API Vulnerabilities with the 3 Pillars of API Security
Combatting API Vulnerabilities with the 3 Pillars of API Security
 
API Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIsAPI Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIs
 
2022 APIsecure_Hackers with Valid Credentials
2022 APIsecure_Hackers with Valid Credentials2022 APIsecure_Hackers with Valid Credentials
2022 APIsecure_Hackers with Valid Credentials
 
CSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsCSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web Applications
 
Outpost24 webinar - Api security
Outpost24 webinar - Api securityOutpost24 webinar - Api security
Outpost24 webinar - Api security
 
APIsecure 2023 - The Importance of Real-Time Protection in API Security, Jere...
APIsecure 2023 - The Importance of Real-Time Protection in API Security, Jere...APIsecure 2023 - The Importance of Real-Time Protection in API Security, Jere...
APIsecure 2023 - The Importance of Real-Time Protection in API Security, Jere...
 
What Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software SecurityWhat Every Developer And Tester Should Know About Software Security
What Every Developer And Tester Should Know About Software Security
 
Using SurfWatch Labs' Threat Intelligence to Understand Dark Web Threats
Using SurfWatch Labs' Threat Intelligence to Understand Dark Web ThreatsUsing SurfWatch Labs' Threat Intelligence to Understand Dark Web Threats
Using SurfWatch Labs' Threat Intelligence to Understand Dark Web Threats
 
Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?
 
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
 

More from apidays

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - The secrets to Graph success, by Leah Hurwich Adler, ...
Apidays New York 2024 - The secrets to Graph success, by Leah Hurwich Adler, ...Apidays New York 2024 - The secrets to Graph success, by Leah Hurwich Adler, ...
Apidays New York 2024 - The secrets to Graph success, by Leah Hurwich Adler, ...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - API Discovery - From Crawl to Run by Rob Dickinson, G...
Apidays New York 2024 - API Discovery - From Crawl to Run by Rob Dickinson, G...Apidays New York 2024 - API Discovery - From Crawl to Run by Rob Dickinson, G...
Apidays New York 2024 - API Discovery - From Crawl to Run by Rob Dickinson, G...apidays
 
Apidays Singapore 2024 - Building with the Planet in Mind by Sandeep Joshi, M...
Apidays Singapore 2024 - Building with the Planet in Mind by Sandeep Joshi, M...Apidays Singapore 2024 - Building with the Planet in Mind by Sandeep Joshi, M...
Apidays Singapore 2024 - Building with the Planet in Mind by Sandeep Joshi, M...apidays
 
Apidays Singapore 2024 - Connecting Cross Border Commerce with Payments by Gu...
Apidays Singapore 2024 - Connecting Cross Border Commerce with Payments by Gu...Apidays Singapore 2024 - Connecting Cross Border Commerce with Payments by Gu...
Apidays Singapore 2024 - Connecting Cross Border Commerce with Payments by Gu...apidays
 
Apidays Singapore 2024 - Privacy Enhancing Technologies for AI by Mark Choo, ...
Apidays Singapore 2024 - Privacy Enhancing Technologies for AI by Mark Choo, ...Apidays Singapore 2024 - Privacy Enhancing Technologies for AI by Mark Choo, ...
Apidays Singapore 2024 - Privacy Enhancing Technologies for AI by Mark Choo, ...apidays
 
Apidays Singapore 2024 - Blending AI and IoT for Smarter Health by Matthew Ch...
Apidays Singapore 2024 - Blending AI and IoT for Smarter Health by Matthew Ch...Apidays Singapore 2024 - Blending AI and IoT for Smarter Health by Matthew Ch...
Apidays Singapore 2024 - Blending AI and IoT for Smarter Health by Matthew Ch...apidays
 
Apidays Singapore 2024 - OpenTelemetry for API Monitoring by Danielle Kayumbi...
Apidays Singapore 2024 - OpenTelemetry for API Monitoring by Danielle Kayumbi...Apidays Singapore 2024 - OpenTelemetry for API Monitoring by Danielle Kayumbi...
Apidays Singapore 2024 - OpenTelemetry for API Monitoring by Danielle Kayumbi...apidays
 
Apidays Singapore 2024 - Connecting Product and Engineering Teams with Testin...
Apidays Singapore 2024 - Connecting Product and Engineering Teams with Testin...Apidays Singapore 2024 - Connecting Product and Engineering Teams with Testin...
Apidays Singapore 2024 - Connecting Product and Engineering Teams with Testin...apidays
 
Apidays Singapore 2024 - The Growing Carbon Footprint of Digitalization and H...
Apidays Singapore 2024 - The Growing Carbon Footprint of Digitalization and H...Apidays Singapore 2024 - The Growing Carbon Footprint of Digitalization and H...
Apidays Singapore 2024 - The Growing Carbon Footprint of Digitalization and H...apidays
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Apidays Singapore 2024 - API Monitoring x SRE by Ryan Ashneil and Eugene Wong...
Apidays Singapore 2024 - API Monitoring x SRE by Ryan Ashneil and Eugene Wong...Apidays Singapore 2024 - API Monitoring x SRE by Ryan Ashneil and Eugene Wong...
Apidays Singapore 2024 - API Monitoring x SRE by Ryan Ashneil and Eugene Wong...apidays
 
Apidays Singapore 2024 - A nuanced approach on AI costs and benefits for the ...
Apidays Singapore 2024 - A nuanced approach on AI costs and benefits for the ...Apidays Singapore 2024 - A nuanced approach on AI costs and benefits for the ...
Apidays Singapore 2024 - A nuanced approach on AI costs and benefits for the ...apidays
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Apidays Singapore 2024 - How APIs drive business at BNP Paribas by Quy-Doan D...
Apidays Singapore 2024 - How APIs drive business at BNP Paribas by Quy-Doan D...Apidays Singapore 2024 - How APIs drive business at BNP Paribas by Quy-Doan D...
Apidays Singapore 2024 - How APIs drive business at BNP Paribas by Quy-Doan D...apidays
 

More from apidays (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The secrets to Graph success, by Leah Hurwich Adler, ...
Apidays New York 2024 - The secrets to Graph success, by Leah Hurwich Adler, ...Apidays New York 2024 - The secrets to Graph success, by Leah Hurwich Adler, ...
Apidays New York 2024 - The secrets to Graph success, by Leah Hurwich Adler, ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - API Discovery - From Crawl to Run by Rob Dickinson, G...
Apidays New York 2024 - API Discovery - From Crawl to Run by Rob Dickinson, G...Apidays New York 2024 - API Discovery - From Crawl to Run by Rob Dickinson, G...
Apidays New York 2024 - API Discovery - From Crawl to Run by Rob Dickinson, G...
 
Apidays Singapore 2024 - Building with the Planet in Mind by Sandeep Joshi, M...
Apidays Singapore 2024 - Building with the Planet in Mind by Sandeep Joshi, M...Apidays Singapore 2024 - Building with the Planet in Mind by Sandeep Joshi, M...
Apidays Singapore 2024 - Building with the Planet in Mind by Sandeep Joshi, M...
 
Apidays Singapore 2024 - Connecting Cross Border Commerce with Payments by Gu...
Apidays Singapore 2024 - Connecting Cross Border Commerce with Payments by Gu...Apidays Singapore 2024 - Connecting Cross Border Commerce with Payments by Gu...
Apidays Singapore 2024 - Connecting Cross Border Commerce with Payments by Gu...
 
Apidays Singapore 2024 - Privacy Enhancing Technologies for AI by Mark Choo, ...
Apidays Singapore 2024 - Privacy Enhancing Technologies for AI by Mark Choo, ...Apidays Singapore 2024 - Privacy Enhancing Technologies for AI by Mark Choo, ...
Apidays Singapore 2024 - Privacy Enhancing Technologies for AI by Mark Choo, ...
 
Apidays Singapore 2024 - Blending AI and IoT for Smarter Health by Matthew Ch...
Apidays Singapore 2024 - Blending AI and IoT for Smarter Health by Matthew Ch...Apidays Singapore 2024 - Blending AI and IoT for Smarter Health by Matthew Ch...
Apidays Singapore 2024 - Blending AI and IoT for Smarter Health by Matthew Ch...
 
Apidays Singapore 2024 - OpenTelemetry for API Monitoring by Danielle Kayumbi...
Apidays Singapore 2024 - OpenTelemetry for API Monitoring by Danielle Kayumbi...Apidays Singapore 2024 - OpenTelemetry for API Monitoring by Danielle Kayumbi...
Apidays Singapore 2024 - OpenTelemetry for API Monitoring by Danielle Kayumbi...
 
Apidays Singapore 2024 - Connecting Product and Engineering Teams with Testin...
Apidays Singapore 2024 - Connecting Product and Engineering Teams with Testin...Apidays Singapore 2024 - Connecting Product and Engineering Teams with Testin...
Apidays Singapore 2024 - Connecting Product and Engineering Teams with Testin...
 
Apidays Singapore 2024 - The Growing Carbon Footprint of Digitalization and H...
Apidays Singapore 2024 - The Growing Carbon Footprint of Digitalization and H...Apidays Singapore 2024 - The Growing Carbon Footprint of Digitalization and H...
Apidays Singapore 2024 - The Growing Carbon Footprint of Digitalization and H...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays Singapore 2024 - API Monitoring x SRE by Ryan Ashneil and Eugene Wong...
Apidays Singapore 2024 - API Monitoring x SRE by Ryan Ashneil and Eugene Wong...Apidays Singapore 2024 - API Monitoring x SRE by Ryan Ashneil and Eugene Wong...
Apidays Singapore 2024 - API Monitoring x SRE by Ryan Ashneil and Eugene Wong...
 
Apidays Singapore 2024 - A nuanced approach on AI costs and benefits for the ...
Apidays Singapore 2024 - A nuanced approach on AI costs and benefits for the ...Apidays Singapore 2024 - A nuanced approach on AI costs and benefits for the ...
Apidays Singapore 2024 - A nuanced approach on AI costs and benefits for the ...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays Singapore 2024 - How APIs drive business at BNP Paribas by Quy-Doan D...
Apidays Singapore 2024 - How APIs drive business at BNP Paribas by Quy-Doan D...Apidays Singapore 2024 - How APIs drive business at BNP Paribas by Quy-Doan D...
Apidays Singapore 2024 - How APIs drive business at BNP Paribas by Quy-Doan D...
 

Recently uploaded

一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理apekaom
 
Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Dewi Agency
 
一比一定制美国罗格斯大学毕业证学位证书
一比一定制美国罗格斯大学毕业证学位证书一比一定制美国罗格斯大学毕业证学位证书
一比一定制美国罗格斯大学毕业证学位证书A
 
Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsrahman018755
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理Fir
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理F
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理AS
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
 
一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理A
 
Dan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat HoodieDan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat Hoodierahman018755
 
一比一定制加州大学欧文分校毕业证学位证书
一比一定制加州大学欧文分校毕业证学位证书一比一定制加州大学欧文分校毕业证学位证书
一比一定制加州大学欧文分校毕业证学位证书A
 
一比一原版罗切斯特大学毕业证如何办理
一比一原版罗切斯特大学毕业证如何办理一比一原版罗切斯特大学毕业证如何办理
一比一原版罗切斯特大学毕业证如何办理F
 
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformonhackersuli
 
The Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfThe Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfe-Market Hub
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书c6eb683559b3
 
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样Fi
 
原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样A
 
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样AS
 
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样AS
 

Recently uploaded (20)

一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
 
Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303
 
一比一定制美国罗格斯大学毕业证学位证书
一比一定制美国罗格斯大学毕业证学位证书一比一定制美国罗格斯大学毕业证学位证书
一比一定制美国罗格斯大学毕业证学位证书
 
Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirts
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理
 
Dan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat HoodieDan Quinn Commanders Feather Dad Hat Hoodie
Dan Quinn Commanders Feather Dad Hat Hoodie
 
一比一定制加州大学欧文分校毕业证学位证书
一比一定制加州大学欧文分校毕业证学位证书一比一定制加州大学欧文分校毕业证学位证书
一比一定制加州大学欧文分校毕业证学位证书
 
一比一原版罗切斯特大学毕业证如何办理
一比一原版罗切斯特大学毕业证如何办理一比一原版罗切斯特大学毕业证如何办理
一比一原版罗切斯特大学毕业证如何办理
 
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
 
The Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfThe Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdf
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
 
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
一比一原版(UWE毕业证书)西英格兰大学毕业证原件一模一样
 
原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样
 
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
原版定制(LBS毕业证书)英国伦敦商学院毕业证原件一模一样
 
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
 

APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilacqua (APIsec)

  • 1. 1 Take the "F*^!" Out of ShiFt Left Christine Bevilacqua, API Security Evangelist APIsec University
  • 2. 2 Shift Left API Security • Why Shift Left? • 3 Pillars of API Security • Dev + Sec, Educate & Empower • Real World Successes • Best Practices
  • 4. 4 API Security Requires Shifting Left 83% of all internet traffic is from APIs Regulations mandate privacy, vulnerability detection, testing Regulatory Compliance 2022: APIs “most frequent attack vector” Major Attack Target High-profile API breaches announced weekly High Profile Breaches Explosive Growth
  • 5. 5 Your API Security Problem isn’t Shrinking 93% of professional developers use APIs (that’s 21.9M developers using APIs in enterprise projects) 76% or 95% have experienced an API security incident in the past 12 months 34% lack any kind of API security strategy Of 117,000 cybersecurity incidents, API insecurity was responsible for annual losses of between $41- 75 billion globally and $12-23 billion in the US.
  • 6. 6 Why Attackers Target APIs Mobile App API Web App Application Public API Micro Services Internal APIs: • Direct access to sensitive data • Often “over-permissioned” • Vulnerable to logic flaws
  • 7. 7 When do you want to find API vulnerabilities?
  • 9. 9
  • 10. 10 3 Pillars of API Security
  • 11. 11 The 3 Pillars of API Security Developing secure APIs Ensuring APIs are free of flaws Detecting threats in production Governance Testing Monitoring
  • 12. 12 Governance • Goals: • Consistency • Setting expectations Awareness • Know your APIs • Know your data • Know your risks Policy • Engineering process • API documentation • Style guides • Enforcing security • Establishing standard processes
  • 13. 13 Know Your APIs • Get full inventory APIs • Purpose, owner, documentation • Standardize and enforce API deployment process • Existence of “shadow/rogue” APIs sign of weak governance • APIs only deployed in approved ways, with proper validation • Enforce governance at Gateway, Marketplace • Mandate API Documentation • Make sure APIs are consistent and reusable • Define documentation requirements • Create API Development standards • Style guides, authentication requirements, versioning, PII tracking
  • 14. 14 Know Your Risks (Threat Modeling) • Identify: APIs, data, access paths -> potential threats • Assess: vulnerabilities, logic flaws, access controls, 3rd party risk • Probability: examine the likelihood of an attack • Impact: understand the damage, loss, consequences of an attack • Mitigation: develop a plan to address the risk
  • 15. 15 Style Guides: Promote Governance, Consistency • Design Style and Specification – API type: REST, GraphQL • Authentication and Authorization – how to implement (OAuth 2.0) • Endpoint Naming – URIs as nouns, Methods as verbs, pluralization, hierarchy, lowercase, language, naming (no jargon), no abbreviations • Error Codes – status codes, reference ID, human readable messages • Versioning – when to increment, when not, types of versions • Units, Formats, Standards – date/times
  • 18. 18 OpenAPI Specification (Swagger) • De facto standard for API documentation • Aids development and 3rd party integration • Manually or auto-generated • Used with REST APIs • Machine-readable (YAML, JSON) • Defines API capability (contract) • Title, description, version • Base-URL • Endpoints, paths • Parameters • Methods • Data types • Request, response payloads • Authentication requirements
  • 19. 19
  • 20. 20 Testing • Where do you want to find API vulnerabilities? • Pre-production • Production • “Standard playbook” test categories offer limited value • Cross-site scripting, injection, buffer overflow • Important to run these tests to avoid bot-based attacks • API breaches rarely exploit these • Major breaches typically business logic flaws
  • 21. 21 The Need for API-First Testing 21 Backend API Web App Mobile App Pen Test, Web Scan Attacker
  • 22. 22 Testing Categories API Security • Unsecured Endpoints • Authentication exploits • Enumeration • App DOS, rate limiting • Missing TLS, SSL issues • Injection, fuzzing • Fuzzing, input validation • Server-side resource forgery • Server properties leaks Business Logic • Cross-account access • API function abuse • Role-based access control • Pen-testing Data Security • Access control • Excessive data exposure • Sensitive data exposure • Personal, health, bank data • File, directory exposure • Encryption at rest • Data exfiltration
  • 23. 23 API-First Testing • Critical to attack simulate • Examine business processes and create attack scenarios • Exercise all object/user/action combinations Unauthorized trading Account data harvesting Excess data exposure Account takeover Account tampering SEC reporting Ransom 3rd party exposure
  • 24. 24 APIsec University • API Pen-Testing course • www.apisecuniversity.com
  • 25. 25 Monitoring • Critical to monitor API traffic • Uncover anomalies and active attacks • Identify resource abuse – harvesting, scraping • Detect fraudulent transactions • Alert on brute force attacks • Identify distributed attacks • e.g., rotating IPs to make thousands of disparate requests look legitimate • Monitoring is reactive • Tools typically used in non-blocking mode • Best practice is to test wherever possible
  • 26. 26 API Discovery • API Discovery is not a point-in-time activity • Monitoring can help • However, organizations should discover APIs from multiple sources: • Gateway • Code repository • Traffic analysis • Web Application Firewall • Application testing, crawling • Monitoring • Reliance on traffic based-discovery misses: • Unexercised endpoints • East-West APIs – internal API traffic not seen by traffic analysis tool
  • 28. 28 28 Regulatory Compliance Competing Challenges Privacy: • Consumer data protection • Breach notification requirements • Massive penalties for violations (GDPR: 4% of company revenue) Accessibility: • Global push to make data accessible • Ensure interoperability among providers • “Information Blocking” penalties • Banking: FFIEC, OCC, Open Banking, FDX • Payment Card Industry: PCI • Healthcare: HIPAA/HITRUST/Interoperability • Privacy: GDPR, CCPA, PIPEDA • Federal: FedRAMP • Standards, Frameworks: NIST 800-53, ISO 27001, SOC 2
  • 29. 29 APIsec University • API Security Fundamentals • www.apisecuniversity.com
  • 30. 30 2023 OWASP API Security Top 10 API1 Broken Object Level Authorization API2 Broken Authentication API3 Broken Object Property Level Authorization API4 Unrestricted Resource Consumption API5 Broken Function Level Authorization API6 Server-Side Request Forgery API7 Security Misconfiguration API8 Lack of Protection from Automated Threats API9 Improper Assets Management API10 Unsafe Consumption of APIs
  • 31. 31 Network Endpoint Application Data Web/Messaging Identity Detection Cloud Firewall NAC Threat Protection Deception EDR Anti Malware/Virus Vulnerability Management SAST, DAST SCA, Container Security WAF API Security Encryption DLP Access Control Email Gateway Web Gateway Authentication PIM Identity Governance SIEM SOAR Incident Response CASB Infrastructure Security Cybersecurity Landscape
  • 32. 32 Application Security • How apps are tested typically: • Code scanning – looking for poor coding practices, hygiene • Library analysis – looking for vulnerable 3rd party code • Dynamic testing (DAST) – looks for common vulnerabilities • 2 key issues with these solutions: 1. Don’t look at what’s actually exploitable 2. Don’t evaluate the most exploited aspect – business logic
  • 33. 33 Develop Deploy Operate Static Code Analysis • Coding weaknesses • Injection flaws • Weak authentication • Configuration issues Software Composition Analysis • 3rd party vulnerabilities • Licensing issues • Outdated components API Security Testing • OWASP testing • Business logic • Authentication testing • Authorization testing • Attack simulation API Gateway • Authentication • Authorization (limited) • Rate limiting • Traffic filtering • Logging API Monitor/Firewall • Attack detection • API discovery • Anomaly detection • Traffic blocking Production Pre-Production Recommendations: • Shift Left: find issues as early as possible • Validate security controls in production • Automate as much as possible
  • 35. 35
  • 36. 36
  • 37. 37
  • 39. 39 Best Practices 1. Enforce API governance and establish central API control • Gateway, marketplace platform • No API goes live without passing gates (docs, testing, security) 2. Create comprehensive testing program • Test every endpoint across all OWASP attack types and more • Evaluate every data object, user type and function for logic flaws • Leverage automation for comprehensive test coverage
  • 40. 40 Best Practices 3. Implement automated, continuous testing • Although APIs rarely change, code & infrastructure does • Every release needs functional AND security testing • Integrate testing into CI/CD pipeline 4. Develop API security metrics and assess progress • Total APIs managed – new, existing, retired • Vulnerabilities identified, outstanding, fixed
  • 41. 41 Thank you! Contact me: christine@apisecuniversity.com API Pen-Test course: www.apisecuniversity.com API Fundamentals course: COMING SOON