SlideShare a Scribd company logo
API Security
The Need of
Enterprise Solutions
for
Managing API Security
Tharindu Edirisinghehttps://www.meetup.com/colombo-security-meetup/events/266658163/
Security Internal.com
Tharindu Edirisinghe
Graduate Researcher/ PhD Student
Open Source Contributor
RaiderJava Encoder
@thariyarox
OWASP API Security Top 10
Source: https://www.owasp.org/index.php/OWASP_API_Security_Project
OWASP API Security Top 10
Source: https://www.owasp.org/index.php/OWASP_API_Security_Project#tab=Road_Map
All the demo videos can be found at :
https://drive.google.com/drive/folders/1rvdTY4Kgm7qf8
edK3dqithhW_asF9FKj?usp=sharing
API 3
Source: https://www.owasp.org/index.php/OWASP_API_Security_Project#tab=Main
API 1
Source: https://www.owasp.org/index.php/OWASP_API_Security_Project#tab=Main
API 2
Source: https://www.owasp.org/index.php/OWASP_API_Security_Project#tab=Main
A Quick Look into OAuth 2.0 Framework
Source: https://www.slideshare.net/thariyarox/api-security-with-oauth
RFC : https://tools.ietf.org/html/rfc6749
Protecting API
View User
Add User
Update User
Delete User
http://localhost:8081/api
/user
GET
POST
PUT
DELETE
Unprotected Service
Managed API
API Gateway
https://…..
Key Manager
Authentication in Chained APIs
Authorization Server / Key Manager
Add Product
Send Notification
App
User
Service 1
Service 2
Request Token
Token
Token
1
2
3
Validate Token Signed JWT with User Data
4
5
6
Signed JWT
Validate JWT
7
API 5
Source: https://www.owasp.org/index.php/OWASP_API_Security_Project#tab=Main
Function Level Access Control
View User
Add User
Update User
Delete User
http://localhost:8081/api
/user
GET
POST
PUT
DELETE
Unprotected Service
Managed API
API Gateway
Key Manager
View User
Add User
Update User
Delete User
GET
POST
PUT
DELETE
Assistant
Manager
API 4
Good Read: https://apim.docs.wso2.com/en/latest/Learn/RateLimiting/introducing-throttling-use-cases/
Source: https://www.owasp.org/index.php/OWASP_API_Security_Project#tab=Main
API 7
HTTP Header Mediation: https://docs.wso2.com/display/ESB500/Header+Mediator
Source: https://www.owasp.org/index.php/OWASP_API_Security_Project#tab=Main
API 9
Source: https://www.owasp.org/index.php/OWASP_API_Security_Project#tab=Main
API 8
Demo Documentation: https://docs.wso2.com/display/AM260/Regular+Expression+Threat+Protection+for+API+Gateway
Source: https://www.owasp.org/index.php/OWASP_API_Security_Project#tab=Main
Message Mediation in API Gateway
Source: https://wso2.com/blogs/cloud/the-power-of-mediators-api-call-transformation-and-orchestration/
API 6
Demo Documentation: https://docs.wso2.com/display/AM260/JSON+Threat+Protection+for+API+Gateway
: https://docs.wso2.com/display/AM260/XML+Threat+Protection+for+API+Gateway
Source: https://www.owasp.org/index.php/OWASP_API_Security_Project#tab=Main
API 10
WSO2 Log Mediator : https://docs.wso2.com/display/ESB500/Log+Mediator
Source: https://www.owasp.org/index.php/OWASP_API_Security_Project#tab=Main
Summary
Source: https://www.owasp.org/index.php/OWASP_API_Security_Project#tab=Main
● Exposed the resource securely to the audience
● Blocked hidden endpoints/resources
● Enabled OAuth/JWT protection for the services with different OAuth scopes and user roles
● Enabled multi factor authentication for browser based flows
● Enabled passing through a JWT for backend services for authenticating chained APIs
● Enabled CORS headers
● Defined throttling limits
● Configured SQL Injection/ XSS etc. protection
● Configured XML/JSON exploit protection
● Enabled logging for better monitoring
More importantly, we did all above with zero code change !!!
Thank You !
@thariyarox
https://au.linkedin.com/in/ediri

More Related Content

What's hot

SgCodeJam24 Workshop Extract
SgCodeJam24 Workshop ExtractSgCodeJam24 Workshop Extract
SgCodeJam24 Workshop Extract
remko caprio
 
Corruption in Software Profession
Corruption in Software ProfessionCorruption in Software Profession
Corruption in Software Profession
Sanjay Saini
 
How to hack a node app? @ GDG DevFest Ukraine 2017
How to hack a node app? @  GDG DevFest Ukraine 2017How to hack a node app? @  GDG DevFest Ukraine 2017
How to hack a node app? @ GDG DevFest Ukraine 2017
Asim Hussain
 
Instrumentation 101
Instrumentation 101Instrumentation 101
Instrumentation 101
Apkudo
 
Open social for science a sciverse primer - mysimplesearch
Open social for science   a sciverse primer - mysimplesearchOpen social for science   a sciverse primer - mysimplesearch
Open social for science a sciverse primer - mysimplesearchremko caprio
 
How to hack a node app? - LvivJS 2017
How to hack a node app? - LvivJS 2017How to hack a node app? - LvivJS 2017
How to hack a node app? - LvivJS 2017
Asim Hussain
 
It could happen to anyone - FrontEnd Connect 2017
It could happen to anyone - FrontEnd Connect 2017It could happen to anyone - FrontEnd Connect 2017
It could happen to anyone - FrontEnd Connect 2017
Asim Hussain
 
Testing Sucks, But It Doesn't Have To
Testing Sucks, But It Doesn't Have ToTesting Sucks, But It Doesn't Have To
Testing Sucks, But It Doesn't Have To
Apkudo
 
iPhone meets SOA - 06/2008
iPhone meets SOA - 06/2008iPhone meets SOA - 06/2008
iPhone meets SOA - 06/2008Roland Tritsch
 
Continuous Delivery for Mobile
Continuous Delivery for MobileContinuous Delivery for Mobile
Continuous Delivery for Mobile
Sweta Vajjhala
 

What's hot (10)

SgCodeJam24 Workshop Extract
SgCodeJam24 Workshop ExtractSgCodeJam24 Workshop Extract
SgCodeJam24 Workshop Extract
 
Corruption in Software Profession
Corruption in Software ProfessionCorruption in Software Profession
Corruption in Software Profession
 
How to hack a node app? @ GDG DevFest Ukraine 2017
How to hack a node app? @  GDG DevFest Ukraine 2017How to hack a node app? @  GDG DevFest Ukraine 2017
How to hack a node app? @ GDG DevFest Ukraine 2017
 
Instrumentation 101
Instrumentation 101Instrumentation 101
Instrumentation 101
 
Open social for science a sciverse primer - mysimplesearch
Open social for science   a sciverse primer - mysimplesearchOpen social for science   a sciverse primer - mysimplesearch
Open social for science a sciverse primer - mysimplesearch
 
How to hack a node app? - LvivJS 2017
How to hack a node app? - LvivJS 2017How to hack a node app? - LvivJS 2017
How to hack a node app? - LvivJS 2017
 
It could happen to anyone - FrontEnd Connect 2017
It could happen to anyone - FrontEnd Connect 2017It could happen to anyone - FrontEnd Connect 2017
It could happen to anyone - FrontEnd Connect 2017
 
Testing Sucks, But It Doesn't Have To
Testing Sucks, But It Doesn't Have ToTesting Sucks, But It Doesn't Have To
Testing Sucks, But It Doesn't Have To
 
iPhone meets SOA - 06/2008
iPhone meets SOA - 06/2008iPhone meets SOA - 06/2008
iPhone meets SOA - 06/2008
 
Continuous Delivery for Mobile
Continuous Delivery for MobileContinuous Delivery for Mobile
Continuous Delivery for Mobile
 

Similar to Owasp API Security top 10 - The need of enterprise solutions for managing API security

Zotero Visualisierungen
Zotero VisualisierungenZotero Visualisierungen
Zotero Visualisierungen
Adrian Wilke
 
2022 APIsecure_Securing APIs with Open Standards
2022 APIsecure_Securing APIs with Open Standards2022 APIsecure_Securing APIs with Open Standards
2022 APIsecure_Securing APIs with Open Standards
APIsecure_ Official
 
OISF - AppSec Presentation
OISF - AppSec PresentationOISF - AppSec Presentation
OISF - AppSec Presentation
ThreatReel Podcast
 
OWASP Top 10 - 2017The Ten Most Critical Web Application Sec.docx
OWASP Top 10 - 2017The Ten Most Critical Web Application Sec.docxOWASP Top 10 - 2017The Ten Most Critical Web Application Sec.docx
OWASP Top 10 - 2017The Ten Most Critical Web Application Sec.docx
gerardkortney
 
Running an app sec program with OWASP projects_ Defcon AppSec Village
Running an app sec program with OWASP projects_ Defcon AppSec VillageRunning an app sec program with OWASP projects_ Defcon AppSec Village
Running an app sec program with OWASP projects_ Defcon AppSec Village
Vandana Verma
 
API Design: Women Who Code (WWCode) DFW
API Design: Women Who Code (WWCode) DFW API Design: Women Who Code (WWCode) DFW
API Design: Women Who Code (WWCode) DFW
Axway
 
What You Need to Know About Web App Security Testing in 2018
What You Need to Know About Web App Security Testing in 2018What You Need to Know About Web App Security Testing in 2018
What You Need to Know About Web App Security Testing in 2018
Ken DeSouza
 
Developing a Custom Video Solution with the 3Play Media API
Developing a Custom Video Solution with the 3Play Media APIDeveloping a Custom Video Solution with the 3Play Media API
Developing a Custom Video Solution with the 3Play Media API
3Play Media
 
Origins of Serverless
Origins of ServerlessOrigins of Serverless
Origins of Serverless
Andrii Soldatenko
 
Architect's Guide to Building an API Program
Architect's Guide to Building an API ProgramArchitect's Guide to Building an API Program
Architect's Guide to Building an API Program
clatimer
 
Confessions of-a-gadget-holic
Confessions of-a-gadget-holicConfessions of-a-gadget-holic
Confessions of-a-gadget-holic
Tyrell Perera
 
How to use the Open PHACTS API
How to use the Open PHACTS APIHow to use the Open PHACTS API
How to use the Open PHACTS API
thetravellingbard
 
Construye tu stack de ciberseguridad con open source
Construye tu stack de ciberseguridad con open sourceConstruye tu stack de ciberseguridad con open source
Construye tu stack de ciberseguridad con open source
Software Guru
 
"APIs as a growth tool of your startup" par Nicolas Grenié
"APIs as a growth tool of your startup" par Nicolas Grenié "APIs as a growth tool of your startup" par Nicolas Grenié
"APIs as a growth tool of your startup" par Nicolas Grenié
TheFamily
 
API as a Growth Tool
API as a Growth ToolAPI as a Growth Tool
API as a Growth Tool
3scale
 
PyCon Canada 2015 - Is your python application secure
PyCon Canada 2015 - Is your python application securePyCon Canada 2015 - Is your python application secure
PyCon Canada 2015 - Is your python application secure
IMMUNIO
 
Security Testing by Ken De Souza
Security Testing by Ken De SouzaSecurity Testing by Ken De Souza
Security Testing by Ken De Souza
QA or the Highway
 
OWASP, PHP, life and universe
OWASP, PHP, life and universeOWASP, PHP, life and universe
OWASP, PHP, life and universe
Sebastien Gioria
 
2014 06-05-mozilla-afup
2014 06-05-mozilla-afup2014 06-05-mozilla-afup
2014 06-05-mozilla-afup
Sebastien Gioria
 
The Jisc UK ORCID use cases and API workshop
The Jisc UK ORCID use cases and API workshopThe Jisc UK ORCID use cases and API workshop
The Jisc UK ORCID use cases and API workshop
Jisc
 

Similar to Owasp API Security top 10 - The need of enterprise solutions for managing API security (20)

Zotero Visualisierungen
Zotero VisualisierungenZotero Visualisierungen
Zotero Visualisierungen
 
2022 APIsecure_Securing APIs with Open Standards
2022 APIsecure_Securing APIs with Open Standards2022 APIsecure_Securing APIs with Open Standards
2022 APIsecure_Securing APIs with Open Standards
 
OISF - AppSec Presentation
OISF - AppSec PresentationOISF - AppSec Presentation
OISF - AppSec Presentation
 
OWASP Top 10 - 2017The Ten Most Critical Web Application Sec.docx
OWASP Top 10 - 2017The Ten Most Critical Web Application Sec.docxOWASP Top 10 - 2017The Ten Most Critical Web Application Sec.docx
OWASP Top 10 - 2017The Ten Most Critical Web Application Sec.docx
 
Running an app sec program with OWASP projects_ Defcon AppSec Village
Running an app sec program with OWASP projects_ Defcon AppSec VillageRunning an app sec program with OWASP projects_ Defcon AppSec Village
Running an app sec program with OWASP projects_ Defcon AppSec Village
 
API Design: Women Who Code (WWCode) DFW
API Design: Women Who Code (WWCode) DFW API Design: Women Who Code (WWCode) DFW
API Design: Women Who Code (WWCode) DFW
 
What You Need to Know About Web App Security Testing in 2018
What You Need to Know About Web App Security Testing in 2018What You Need to Know About Web App Security Testing in 2018
What You Need to Know About Web App Security Testing in 2018
 
Developing a Custom Video Solution with the 3Play Media API
Developing a Custom Video Solution with the 3Play Media APIDeveloping a Custom Video Solution with the 3Play Media API
Developing a Custom Video Solution with the 3Play Media API
 
Origins of Serverless
Origins of ServerlessOrigins of Serverless
Origins of Serverless
 
Architect's Guide to Building an API Program
Architect's Guide to Building an API ProgramArchitect's Guide to Building an API Program
Architect's Guide to Building an API Program
 
Confessions of-a-gadget-holic
Confessions of-a-gadget-holicConfessions of-a-gadget-holic
Confessions of-a-gadget-holic
 
How to use the Open PHACTS API
How to use the Open PHACTS APIHow to use the Open PHACTS API
How to use the Open PHACTS API
 
Construye tu stack de ciberseguridad con open source
Construye tu stack de ciberseguridad con open sourceConstruye tu stack de ciberseguridad con open source
Construye tu stack de ciberseguridad con open source
 
"APIs as a growth tool of your startup" par Nicolas Grenié
"APIs as a growth tool of your startup" par Nicolas Grenié "APIs as a growth tool of your startup" par Nicolas Grenié
"APIs as a growth tool of your startup" par Nicolas Grenié
 
API as a Growth Tool
API as a Growth ToolAPI as a Growth Tool
API as a Growth Tool
 
PyCon Canada 2015 - Is your python application secure
PyCon Canada 2015 - Is your python application securePyCon Canada 2015 - Is your python application secure
PyCon Canada 2015 - Is your python application secure
 
Security Testing by Ken De Souza
Security Testing by Ken De SouzaSecurity Testing by Ken De Souza
Security Testing by Ken De Souza
 
OWASP, PHP, life and universe
OWASP, PHP, life and universeOWASP, PHP, life and universe
OWASP, PHP, life and universe
 
2014 06-05-mozilla-afup
2014 06-05-mozilla-afup2014 06-05-mozilla-afup
2014 06-05-mozilla-afup
 
The Jisc UK ORCID use cases and API workshop
The Jisc UK ORCID use cases and API workshopThe Jisc UK ORCID use cases and API workshop
The Jisc UK ORCID use cases and API workshop
 

Recently uploaded

Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 

Recently uploaded (20)

Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 

Owasp API Security top 10 - The need of enterprise solutions for managing API security