SlideShare a Scribd company logo
1 of 27
Download to read offline
App Security
Secure your app
against DDoS, API Abuse,
Hijacking, and Fraud
Tony Pham @ OpsRun.io
IO Extended Cebu
Bots
DDoS
Credential Theft
Application Fraud
API Attacks
Unauthorized Access
Data Exfiltration
Infrastructure Attacks
and more
Organizations must
protect against many
different types of attacks
Section 01
!
84%
of companies saw an increase in the number of
bot attacks over the last year (Jan ‘21)
Bot Attacks
Source: Forrester Consulting - State Of Online Fraud And Bot Management
$24B
Lost to credit card fraud by US businesses
Payments
Fraud
!
$1T
Lost to abandoned checkouts or
rejected transactions
53 days
spent on average fully resolving a bot
attack
! API Abuse
!
Account
Takeover
90%
Increase in 2021 alone
50%
of organizations experienced an API
security incident in the last 12 months
77%
of organizations that experienced an API
security incident delayed a rollout
Web Security Threats are Evolving and Increasing
Principles of security
Gaps in protection increased acquisition and operations cost
Too many point
products to manage
Assembling a comprehensive solution
to prevent app fraud and abuse is a
growing challenge
Too many
vendors to manage
Many products still built
for on-prem world
Section 01
You need to be secured across all points of interaction
Threat Protection
Behavior Based
Signature Based
Payload Complexity
Spikes
OWASP (SQL injection,
input validation, etc.)
Access Controls
OAuth2
API Keys
Products
Scopes
Quota/Spike Arrest
Logging
Self Service & SSO
IAM Integration
Prov. & DeComm
OpenId Connect
JWT
SAML
Security
Governance
Global Policies
RBAC management
Data Masking
Compliance:
ISO, PCI-DSS, HIPAA,
SOC1&2, CSA STAR
Data Security
TLS
Two-way TLS
IP Access Control
Encrypted Data Store
and Cache
User App Developer API API team Backend
Layered defence of applications
Google Cloud WAAP Solution: Cloud Armor, Apigee, reCAPTCHA Enterprise
Good and bad
traffic from Internet
DDoS and Web Attack
Defense on Global Edge
Web apps & APIs hosted
on Google Cloud
Web apps & APIs hosted
on-premises
Web apps & APIs hosted
on other clouds
Cloud
Cloud Armor
Intelligent API defense
Apigee
Advanced Bot & Fraud
Detection
reCAPTCHA Enterprise
Detects and prevents
direct API Access
Detects fraudulent
activity on applications
and blocks
Blocks scaled attacks
Attackers API Abuse
Credential Stuffing
Account Takeovers
Payments Fraud
Network Client Application
API
DDoS
Detects and prevents
direct API Access
Detects fraudulent
activity on applications
and blocks
Blocks scaled attacks
Layered defence of applications
Google Cloud WAAP Solution: Cloud Armor, Apigee, reCAPTCHA Enterprise
Network security against DDoS and application attacks
Cloud Armor
Section 02
Cloud Armor: DDoS Protection & WAF
HTTP(S) Load
Balancing
HTTPS
us-central
App
instance
Autoscaling
us-west
App
instance
Autoscaling
asia
App
instance
Autoscaling
Cloud Armor
IP Allow/Deny
Geo
WAF
Custom rules (L3-L7)
Defense against L3/L4 volumetric
and protocol DDoS attacks
Google Cloud Armor
Mitigate infrastructure DDoS attacks with Global
HTTP(S) Load Balancing (TCP SYN floods, Amplification
attacks, IP fragmentation attacks, etc)
Allow or block traffic based on IP, Geo, and custom
match parameters (L3-L7 etc)
Defend against application layer attacks with OWASP
Top 10 (e.g. SQLi, XSS, etc.). Use in combination with IAP
Telemetry: Decisions logged to Cloud Logging and
Monitoring dashboard, and Cloud Security Command
Center
Capability
L3/L4 DDoS Defense
IP, ASN & Geo based rules
WAF rules (OWASP T10)
Custom Rules Language
Fraud & Bot Management (Preview)
Adaptive Protection
Managed Protection Plus
CDN / Edge Policies
Rate Limiting
Telemetry & CSCC Findings
Named IP Lists (3rd Party)
Google Cloud
Armor
Global HTTP(S)
Load Balancer
Application
instances
US West region
Application
instances
Asia region
Google Cloud
Regions
Google Cloud Armor
Current Capabilities
Cloud Armor Adaptive Protection
ML based L7 (Application Layer) DDoS detection and protection
Application / Service
CA - AP
User-Agent
Geography
Value
Attack
Likelihood
% Attack % Baseline
Firefox 80% 40% 4%
IE 80% 60% 1%
Value Attack
Likelihood
% Attack % Baseline
CN 80% 50% 0%
HK 80% 50% 0%
Attack detected
Confidence
Suggested WAF Rule
● % Attack Impacted
● % Baseline Impacted
Attack Signature
HTTP GET Flood
HTTP GET Flood
HTTP POST Flood
HTTP POST Flood
Alert
WAF Rule
Learn Baseline Detect Attack Suggest Rule Mitigate
Comprehensive API Security
Apigee
Section 03
Secure API management: Verify API keys,
generate and validate OAuth access tokens,
implement JSON threat protection, Rate limiting,
Quotas and more.
Govern Access Create API Products, set
permissions and usage Quota on API Product.
Govern which consumers can access which APIs
API Analytics: Analyze API trends (most popular
APIs), source of API traffic, types of client
applications etc.
Integrated Services: Google Cloud integration
including Identity and Access Management (IAM),
and Cloud Logging
Apigee
Section 04
Section 03
/accounts
/payments
/claims
API Catalog
API Monetization
API Products
API Marketplace
Client/SDK
Extensions
Transformation
Security
Orchestration
Abuse
Prevention
& AI/ML
Developer Usage
Metrics
Business
KPIs
Performance
Metrics
API Program
Metrics
API Monitoring &
Advanced Ops
Monitoring &
Analytics
Developer
Services
Apigee
SaaS, Hybrid &
Multi-cloud Gateways
API Runtime
Gateway
Services
Apigee API Management
Advanced
API Security
Design and build Secure APIs
Operate Secure APIs
Leverage Google security knowhow
Section 04
Section 04
Section 03
Deny list Traffic Data Models
Dashboard Advanced API Security
Apigee runtime
Enforcement
How
Mitigation
Block or mark the bot traffic depending on
your needs
API Traffic Data
Continuously monitor billions of API calls to
identify anomalies Machine Learning Models
& Rules
Continuously recognizing bot patterns
Section 04
Section 04
Section 03
New API abuse detection dashboards powered by ML
Clustering alerts to reduce volume and provides the relevant context for quick resolution
Online Fraud Solution
reCAPTCHA Enterprise
Section 04
reCAPTCHA v1
(released 2007)
reCAPTCHA v2
(released 2014)
reCAPTCHA v3
(released 2018)
reCAPTCHA Enterprise
(released 2020)
+
Mobile SDKs
reCAPTCHA is now frictionless
5 Million sites are defended with reCAPTCHA Enterprise
5M+
Sites are defended with reCAPTCHA
Enterprise
reCAPTCHA Enterprise Detects Fraud
All device types
and at the edge
(Mobile, IOT, Web)
Apps and Services on
Google Cloud
Apps and Services
hosted on-premises
Apps and Services
hosted on other cloud
Cloud
All types of fraud are covered
across all device types
Full
Fraud
Solution
Account Takeovers
Credential stuffing, 2FA,
Password Leaks
Payments Fraud
Detection of fraudulent transactions
On the payments page
Scraping
Scraping abuse
Thank You
CEO @ OpsRun.io
Tony Pham He/Him

More Related Content

Similar to Secure Your Apps with Google Cloud WAAP

2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...APIsecure_ Official
 
API Security Survey
API Security SurveyAPI Security Survey
API Security SurveyImperva
 
LF_APIStrat17_OWASP’s Latest Category: API Underprotection
LF_APIStrat17_OWASP’s Latest Category: API UnderprotectionLF_APIStrat17_OWASP’s Latest Category: API Underprotection
LF_APIStrat17_OWASP’s Latest Category: API UnderprotectionLF_APIStrat
 
Verizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul HobbsVerizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul HobbsPaul Hobbs
 
Api economy and why effective security is important (1)
Api economy and why effective security is important (1)Api economy and why effective security is important (1)
Api economy and why effective security is important (1)IndusfacePvtLtd
 
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accentureapidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accentureapidays
 
APIs: the Glue of Cloud Computing
APIs: the Glue of Cloud ComputingAPIs: the Glue of Cloud Computing
APIs: the Glue of Cloud Computing3scale
 
42Crunch Security Audit for WSO2 API Manager 3.1
42Crunch Security Audit for WSO2 API Manager 3.142Crunch Security Audit for WSO2 API Manager 3.1
42Crunch Security Audit for WSO2 API Manager 3.1WSO2
 
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...apidays
 
2022 APIsecure_Monitoring and Responding to API Breaches
2022 APIsecure_Monitoring and Responding to API Breaches2022 APIsecure_Monitoring and Responding to API Breaches
2022 APIsecure_Monitoring and Responding to API BreachesAPIsecure_ Official
 
APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...
APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...
APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...apidays
 
apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...
apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...
apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...apidays
 
2022 APIsecure_Harnessing the Speed of Innovation
2022 APIsecure_Harnessing the Speed of Innovation2022 APIsecure_Harnessing the Speed of Innovation
2022 APIsecure_Harnessing the Speed of InnovationAPIsecure_ Official
 
Api management customer
Api management customerApi management customer
Api management customernick_garrod
 
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSFAppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSFAjin Abraham
 
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Codit
 
Reducing Risk of Credential Compromise at Netflix
Reducing Risk of Credential Compromise at NetflixReducing Risk of Credential Compromise at Netflix
Reducing Risk of Credential Compromise at NetflixSBWebinars
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014Andrew Ames
 

Similar to Secure Your Apps with Google Cloud WAAP (20)

2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
LF_APIStrat17_OWASP’s Latest Category: API Underprotection
LF_APIStrat17_OWASP’s Latest Category: API UnderprotectionLF_APIStrat17_OWASP’s Latest Category: API Underprotection
LF_APIStrat17_OWASP’s Latest Category: API Underprotection
 
Verizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul HobbsVerizon DMS' Bot Mitigation from Paul Hobbs
Verizon DMS' Bot Mitigation from Paul Hobbs
 
Api economy and why effective security is important (1)
Api economy and why effective security is important (1)Api economy and why effective security is important (1)
Api economy and why effective security is important (1)
 
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accentureapidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
 
APIs: the Glue of Cloud Computing
APIs: the Glue of Cloud ComputingAPIs: the Glue of Cloud Computing
APIs: the Glue of Cloud Computing
 
42Crunch Security Audit for WSO2 API Manager 3.1
42Crunch Security Audit for WSO2 API Manager 3.142Crunch Security Audit for WSO2 API Manager 3.1
42Crunch Security Audit for WSO2 API Manager 3.1
 
Api security-present
Api security-presentApi security-present
Api security-present
 
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
 
2022 APIsecure_Monitoring and Responding to API Breaches
2022 APIsecure_Monitoring and Responding to API Breaches2022 APIsecure_Monitoring and Responding to API Breaches
2022 APIsecure_Monitoring and Responding to API Breaches
 
APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...
APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...
APIsecure 2023 - Discovery is the Starting Point for Defending APIs, Giora En...
 
apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...
apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...
apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...
 
2022 APIsecure_Harnessing the Speed of Innovation
2022 APIsecure_Harnessing the Speed of Innovation2022 APIsecure_Harnessing the Speed of Innovation
2022 APIsecure_Harnessing the Speed of Innovation
 
Api management customer
Api management customerApi management customer
Api management customer
 
mobsf.pdf
mobsf.pdfmobsf.pdf
mobsf.pdf
 
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSFAppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
 
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
 
Reducing Risk of Credential Compromise at Netflix
Reducing Risk of Credential Compromise at NetflixReducing Risk of Credential Compromise at Netflix
Reducing Risk of Credential Compromise at Netflix
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014
 

More from Tu Pham

Go from idea to app with no coding using AppSheet.pptx
Go from idea to app with no coding using AppSheet.pptxGo from idea to app with no coding using AppSheet.pptx
Go from idea to app with no coding using AppSheet.pptxTu Pham
 
Challenges In Implementing SRE
Challenges In Implementing SREChallenges In Implementing SRE
Challenges In Implementing SRETu Pham
 
IT Strategy
IT Strategy IT Strategy
IT Strategy Tu Pham
 
Set up Learn and Development program
Set up Learn and Development programSet up Learn and Development program
Set up Learn and Development programTu Pham
 
Cost Management For IT Project / Product
Cost Management For IT Project / ProductCost Management For IT Project / Product
Cost Management For IT Project / ProductTu Pham
 
Minimum Viable Product 101
Minimum Viable Product 101Minimum Viable Product 101
Minimum Viable Product 101Tu Pham
 
Understand your customers
Understand your customersUnderstand your customers
Understand your customersTu Pham
 
Let's build great products for mid-size companies
Let's build great products for mid-size companiesLet's build great products for mid-size companies
Let's build great products for mid-size companiesTu Pham
 
Latency Control And Supervision In Resilience Design Patterns
Latency Control And Supervision In Resilience Design Patterns Latency Control And Supervision In Resilience Design Patterns
Latency Control And Supervision In Resilience Design Patterns Tu Pham
 
End To End Business Intelligence On Google Cloud
End To End Business Intelligence On Google CloudEnd To End Business Intelligence On Google Cloud
End To End Business Intelligence On Google CloudTu Pham
 
High Output Tech Management
High Output Tech Management High Output Tech Management
High Output Tech Management Tu Pham
 
Big Data Driven At Eway
Big Data Driven At Eway Big Data Driven At Eway
Big Data Driven At Eway Tu Pham
 
Security On The Cloud
Security On The CloudSecurity On The Cloud
Security On The CloudTu Pham
 
Eway Tech Talk #2 Coding Guidelines
Eway Tech Talk #2 Coding GuidelinesEway Tech Talk #2 Coding Guidelines
Eway Tech Talk #2 Coding GuidelinesTu Pham
 
End To End Machine Learning With Google Cloud
End To End Machine Learning With Google Cloud End To End Machine Learning With Google Cloud
End To End Machine Learning With Google Cloud Tu Pham
 
Eway Tech Talk #0 Knowledge Sharing
Eway Tech Talk #0 Knowledge SharingEway Tech Talk #0 Knowledge Sharing
Eway Tech Talk #0 Knowledge SharingTu Pham
 
Php 5.6 vs Php 7 performance comparison
Php 5.6 vs Php 7 performance comparisonPhp 5.6 vs Php 7 performance comparison
Php 5.6 vs Php 7 performance comparisonTu Pham
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on CloudTu Pham
 
Big Data at DYNO
Big Data at DYNOBig Data at DYNO
Big Data at DYNOTu Pham
 
Big data on google cloud
Big data on google cloudBig data on google cloud
Big data on google cloudTu Pham
 

More from Tu Pham (20)

Go from idea to app with no coding using AppSheet.pptx
Go from idea to app with no coding using AppSheet.pptxGo from idea to app with no coding using AppSheet.pptx
Go from idea to app with no coding using AppSheet.pptx
 
Challenges In Implementing SRE
Challenges In Implementing SREChallenges In Implementing SRE
Challenges In Implementing SRE
 
IT Strategy
IT Strategy IT Strategy
IT Strategy
 
Set up Learn and Development program
Set up Learn and Development programSet up Learn and Development program
Set up Learn and Development program
 
Cost Management For IT Project / Product
Cost Management For IT Project / ProductCost Management For IT Project / Product
Cost Management For IT Project / Product
 
Minimum Viable Product 101
Minimum Viable Product 101Minimum Viable Product 101
Minimum Viable Product 101
 
Understand your customers
Understand your customersUnderstand your customers
Understand your customers
 
Let's build great products for mid-size companies
Let's build great products for mid-size companiesLet's build great products for mid-size companies
Let's build great products for mid-size companies
 
Latency Control And Supervision In Resilience Design Patterns
Latency Control And Supervision In Resilience Design Patterns Latency Control And Supervision In Resilience Design Patterns
Latency Control And Supervision In Resilience Design Patterns
 
End To End Business Intelligence On Google Cloud
End To End Business Intelligence On Google CloudEnd To End Business Intelligence On Google Cloud
End To End Business Intelligence On Google Cloud
 
High Output Tech Management
High Output Tech Management High Output Tech Management
High Output Tech Management
 
Big Data Driven At Eway
Big Data Driven At Eway Big Data Driven At Eway
Big Data Driven At Eway
 
Security On The Cloud
Security On The CloudSecurity On The Cloud
Security On The Cloud
 
Eway Tech Talk #2 Coding Guidelines
Eway Tech Talk #2 Coding GuidelinesEway Tech Talk #2 Coding Guidelines
Eway Tech Talk #2 Coding Guidelines
 
End To End Machine Learning With Google Cloud
End To End Machine Learning With Google Cloud End To End Machine Learning With Google Cloud
End To End Machine Learning With Google Cloud
 
Eway Tech Talk #0 Knowledge Sharing
Eway Tech Talk #0 Knowledge SharingEway Tech Talk #0 Knowledge Sharing
Eway Tech Talk #0 Knowledge Sharing
 
Php 5.6 vs Php 7 performance comparison
Php 5.6 vs Php 7 performance comparisonPhp 5.6 vs Php 7 performance comparison
Php 5.6 vs Php 7 performance comparison
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 
Big Data at DYNO
Big Data at DYNOBig Data at DYNO
Big Data at DYNO
 
Big data on google cloud
Big data on google cloudBig data on google cloud
Big data on google cloud
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

Secure Your Apps with Google Cloud WAAP

  • 1. App Security Secure your app against DDoS, API Abuse, Hijacking, and Fraud Tony Pham @ OpsRun.io IO Extended Cebu
  • 2. Bots DDoS Credential Theft Application Fraud API Attacks Unauthorized Access Data Exfiltration Infrastructure Attacks and more Organizations must protect against many different types of attacks Section 01
  • 3. ! 84% of companies saw an increase in the number of bot attacks over the last year (Jan ‘21) Bot Attacks Source: Forrester Consulting - State Of Online Fraud And Bot Management $24B Lost to credit card fraud by US businesses Payments Fraud ! $1T Lost to abandoned checkouts or rejected transactions 53 days spent on average fully resolving a bot attack ! API Abuse ! Account Takeover 90% Increase in 2021 alone 50% of organizations experienced an API security incident in the last 12 months 77% of organizations that experienced an API security incident delayed a rollout Web Security Threats are Evolving and Increasing
  • 5.
  • 6. Gaps in protection increased acquisition and operations cost Too many point products to manage Assembling a comprehensive solution to prevent app fraud and abuse is a growing challenge Too many vendors to manage Many products still built for on-prem world Section 01
  • 7. You need to be secured across all points of interaction Threat Protection Behavior Based Signature Based Payload Complexity Spikes OWASP (SQL injection, input validation, etc.) Access Controls OAuth2 API Keys Products Scopes Quota/Spike Arrest Logging Self Service & SSO IAM Integration Prov. & DeComm OpenId Connect JWT SAML Security Governance Global Policies RBAC management Data Masking Compliance: ISO, PCI-DSS, HIPAA, SOC1&2, CSA STAR Data Security TLS Two-way TLS IP Access Control Encrypted Data Store and Cache User App Developer API API team Backend
  • 8. Layered defence of applications Google Cloud WAAP Solution: Cloud Armor, Apigee, reCAPTCHA Enterprise Good and bad traffic from Internet DDoS and Web Attack Defense on Global Edge Web apps & APIs hosted on Google Cloud Web apps & APIs hosted on-premises Web apps & APIs hosted on other clouds Cloud Cloud Armor Intelligent API defense Apigee Advanced Bot & Fraud Detection reCAPTCHA Enterprise
  • 9. Detects and prevents direct API Access Detects fraudulent activity on applications and blocks Blocks scaled attacks Attackers API Abuse Credential Stuffing Account Takeovers Payments Fraud Network Client Application API DDoS Detects and prevents direct API Access Detects fraudulent activity on applications and blocks Blocks scaled attacks Layered defence of applications Google Cloud WAAP Solution: Cloud Armor, Apigee, reCAPTCHA Enterprise
  • 10. Network security against DDoS and application attacks Cloud Armor Section 02
  • 11. Cloud Armor: DDoS Protection & WAF HTTP(S) Load Balancing HTTPS us-central App instance Autoscaling us-west App instance Autoscaling asia App instance Autoscaling Cloud Armor IP Allow/Deny Geo WAF Custom rules (L3-L7) Defense against L3/L4 volumetric and protocol DDoS attacks
  • 12. Google Cloud Armor Mitigate infrastructure DDoS attacks with Global HTTP(S) Load Balancing (TCP SYN floods, Amplification attacks, IP fragmentation attacks, etc) Allow or block traffic based on IP, Geo, and custom match parameters (L3-L7 etc) Defend against application layer attacks with OWASP Top 10 (e.g. SQLi, XSS, etc.). Use in combination with IAP Telemetry: Decisions logged to Cloud Logging and Monitoring dashboard, and Cloud Security Command Center
  • 13. Capability L3/L4 DDoS Defense IP, ASN & Geo based rules WAF rules (OWASP T10) Custom Rules Language Fraud & Bot Management (Preview) Adaptive Protection Managed Protection Plus CDN / Edge Policies Rate Limiting Telemetry & CSCC Findings Named IP Lists (3rd Party) Google Cloud Armor Global HTTP(S) Load Balancer Application instances US West region Application instances Asia region Google Cloud Regions Google Cloud Armor Current Capabilities
  • 14. Cloud Armor Adaptive Protection ML based L7 (Application Layer) DDoS detection and protection Application / Service CA - AP User-Agent Geography Value Attack Likelihood % Attack % Baseline Firefox 80% 40% 4% IE 80% 60% 1% Value Attack Likelihood % Attack % Baseline CN 80% 50% 0% HK 80% 50% 0% Attack detected Confidence Suggested WAF Rule ● % Attack Impacted ● % Baseline Impacted Attack Signature HTTP GET Flood HTTP GET Flood HTTP POST Flood HTTP POST Flood Alert WAF Rule Learn Baseline Detect Attack Suggest Rule Mitigate
  • 16. Secure API management: Verify API keys, generate and validate OAuth access tokens, implement JSON threat protection, Rate limiting, Quotas and more. Govern Access Create API Products, set permissions and usage Quota on API Product. Govern which consumers can access which APIs API Analytics: Analyze API trends (most popular APIs), source of API traffic, types of client applications etc. Integrated Services: Google Cloud integration including Identity and Access Management (IAM), and Cloud Logging Apigee Section 04 Section 03
  • 17. /accounts /payments /claims API Catalog API Monetization API Products API Marketplace Client/SDK Extensions Transformation Security Orchestration Abuse Prevention & AI/ML Developer Usage Metrics Business KPIs Performance Metrics API Program Metrics API Monitoring & Advanced Ops Monitoring & Analytics Developer Services Apigee SaaS, Hybrid & Multi-cloud Gateways API Runtime Gateway Services Apigee API Management
  • 18. Advanced API Security Design and build Secure APIs Operate Secure APIs Leverage Google security knowhow Section 04 Section 04 Section 03
  • 19. Deny list Traffic Data Models Dashboard Advanced API Security Apigee runtime Enforcement How Mitigation Block or mark the bot traffic depending on your needs API Traffic Data Continuously monitor billions of API calls to identify anomalies Machine Learning Models & Rules Continuously recognizing bot patterns Section 04 Section 04 Section 03
  • 20. New API abuse detection dashboards powered by ML Clustering alerts to reduce volume and provides the relevant context for quick resolution
  • 21.
  • 22. Online Fraud Solution reCAPTCHA Enterprise Section 04
  • 23. reCAPTCHA v1 (released 2007) reCAPTCHA v2 (released 2014) reCAPTCHA v3 (released 2018) reCAPTCHA Enterprise (released 2020) + Mobile SDKs reCAPTCHA is now frictionless 5 Million sites are defended with reCAPTCHA Enterprise
  • 24. 5M+ Sites are defended with reCAPTCHA Enterprise
  • 25. reCAPTCHA Enterprise Detects Fraud All device types and at the edge (Mobile, IOT, Web) Apps and Services on Google Cloud Apps and Services hosted on-premises Apps and Services hosted on other cloud Cloud All types of fraud are covered across all device types Full Fraud Solution Account Takeovers Credential stuffing, 2FA, Password Leaks Payments Fraud Detection of fraudulent transactions On the payments page Scraping Scraping abuse
  • 26.
  • 27. Thank You CEO @ OpsRun.io Tony Pham He/Him