SlideShare a Scribd company logo
REST API Security by Design
with Azure Pipelines
Security Matters in DevOps
THE J-CURVE OF TRANSFORMATION
The transformation
begins
From the State of DevOps 2018 Report by DORA
THE J-CURVE OF TRANSFORMATION
The transformation
begins
Automation helps
low performers
progress
From the State of DevOps 2018 Report by DORA
THE J-CURVE OF TRANSFORMATION
The transformation
begins
Automation helps
low performers
progress
Increased automation
demands more testing
From the State of DevOps 2018 Report by DORA
THE J-CURVE OF TRANSFORMATION
The transformation
begins
Automation helps
low performers
progress
Increased automation
demands more testing
Technical debt
is reduced, and
test
automation is
introduced
From the State of DevOps 2018 Report by DORA
THE J-CURVE OF TRANSFORMATION
From the State of DevOps 2018 Report by DORA
The transformation
begins
Automation helps
low performers
progress
Increased automation
demands more testing
Technical debt
is reduced, and
test automation
is introduced
Continuous
improvement
reduces manual
controls and
process
CATEGORIES OF PERFORMANCE
Low
✓ Deploy once a month to once every six months
✓ Going from code commit to production can be one to six months
✓ Restoring service from an incident can be between one week to one month
✓ Approximate change failure rate of 46% to 60%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
CATEGORIES OF PERFORMANCE
Medium
✓ Deploy once a week to once a month
✓ Going from code commit to production can be one week to one month
✓ Restoring service from an incident is usually less than a day
✓ Approximate change failure rate of 0% to 15%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
CATEGORIES OF PERFORMANCE
High
✓ Deploy once a day to once a week
✓ Going from code commit to production can be one day to one week
✓ Restoring service from an incident is usually less than a day
✓ Approximate change failure rate of 0% to 15%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
CATEGORIES OF PERFORMANCE
Elite
✓ Deploy on-demand (multiple deploys a day)
✓ Going from code commit to production is less than one day
✓ Restoring service from an incident is usually less than a day
✓ Approximate change failure rate of 0% to 15%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
AUTOMATION AND INTEGRATION - BUILD
Capability Low Medium High Elite
Automated build 64% 81% 91% 92%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
AUTOMATION AND INTEGRATION - TESTING
Capability Low Medium High Elite
Automated build 64% 81% 91% 92%
Automated unit tests 57% 66% 84% 87%
Automated acceptance tests 28% 38% 48% 58%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
AUTOMATION AND INTEGRATION - TESTING
Capability Low Medium High Elite
Automated build 64% 81% 91% 92%
Automated unit tests 57% 66% 84% 87%
Automated acceptance tests 28% 38% 48% 58%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
More on how Microsoft shifts tests left at
https://aka.ms/shift-tests-left
AUTOMATION AND INTEGRATION – DEPLOYMENT
Capability Low Medium High Elite
Automated build 64% 81% 91% 92%
Automated unit tests 57% 66% 84% 87%
Automated acceptance tests 28% 38% 48% 58%
Automated provisioning and
deployment to test environments
39% 54% 68% 72%
Automated deployment to
production
17% 38% 60% 69%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
AUTOMATION AND INTEGRATION - SECURITY
Capability Low Medium High Elite
Automated security tests 15% 28% 25% 31%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
WHERE IS WORK TIME SPENT
Time Spent Low Medium High Elite
New work 30% 40% 50% 50%
Unplanned work and rework 20% 20% 20% 19.5%
Remediating security issues 10% 5% 5% 5%
Working on end user reported
issues
20% 10% 10% 10%
Customer support work 15% 10% 10% 5%
From the State of DevOps 2018 Report by DORA
WHERE IS WORK TIME SPENT
Time Spent Low Medium High Elite
New work 30% 40% 50% 50%
Unplanned work and rework 20% 20% 20% 19.5%
Remediating security issues 10% 5% 5% 5%
Working on end user reported
issues
20% 10% 10% 10%
Customer support work 15% 10% 10% 5%
From the State of DevOps 2018 Report by DORA
Cost of excess rework = Technical staff size ×
Average salary × Benefits multiplier ×
Percentage of technical staff time spent on
excess rework
COST OF DEFECTS ALONG THE LIFECYCLE
AUTOMATING API
THREAT PROTECTION
APIS ARE THE NEW ATTACKS VECTOR…
Data breaches via APIs are on the rise
✓ 200+ breaches reported on
apisecurity.io since Oct. 2018
✓ And those are just the public ones!
Most recurrent causes:
✓ Lack of Input validation
✓ Data/Exception leakage
✓ Broken authentication
22
“By 2022, APIs will become
the #1 attack vector.”
- Gartner, How to Build an Effective API Security Strategy -
* :// . . / / /3834704/ - - - - - - -
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
MANY APIS, DEPLOYED OFTEN
APPLICATION
DEVELOPMENT
APPLICATION
SECURITY
SECURING APIS
REQUIRES A NEW
APPROACH
26
Development
Security
Operations
Business
A CHANGE IN CULTURE: PEOPLE COLLABORATING…
27
…FOLLOWING ESTABLISHED PROCESSES…
28
…AND USING THE RIGHT TOOLS.
Deploy & Protect
API Firewall is
automatically configured
from OAS file and
deployed in line of traffic.
The firewall can be
deployed as sidecar in
Kubernetes or reverse
proxy in front of API
Management solutions.
Develop
Developer
documents the API
contract with
OpenAPI/Swagger.
API Contract security
is evaluated from
VSCode using
42Crunch plugin.
Integrate & Test
API Contract quality is
enforced via CI/CD
pipeline. Builds are
blocked when minimal
security requirements
defined by security
teams are not met.
API implementation is
tested via Conformance
Scan
Design
Developer initiates
security work at
design time.
Best practices and
recommendations
are documented.
Developers know how the
application was built!
OpenAPI specification is leveraged to
describe the API contract.
Once the API contract is defined by
the developer, the security process
becomes clear and straight forward !
ENABLING DEVELOPERS TO INITIATE SECURITY
30
“If you describe your API, we will secure it”
API
Contract
Audit
Scan
Protect
EMPOWER DEVELOPERS TO BUILD THE ULTIMATE WHITELIST
VALIDATE OPENAPI CONTRACT CONTENTS
Does it comply to best
practices ?
Does it comply to security
requirements ?
✓ Using API Keys ? OAuth ?
Basic Auth ?
How well is the data defined ?
✓ Headers, query params, path params,
form data
✓ Input/output payloads format (JSON)
✓ Is the data constrained ?
• Min/Max/Patterns/Max Items
31
AUDIT
API
Contract
Audit
Scan
Protect
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
Platform Architecture
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
DEMO PART 1:
OPENAPI EDITOR/AUDIT
FOR VSCODE
https://marketplace.visualstudio.com/items?itemName=42Crunch.vscode-openapi
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
DEMO STEP 2:
AZURE DEVOPS
INTEGRATION
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
Automated audit and API discovery
https://marketplace.visualstudio.com/items?itemName=42Crunch.cicd
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
DEV-SEC-OPS BENEFITS
When API security becomes fully
part of the API lifecycle:
• Security is applied automatically and
at scale
• Vulnerable APIs are detected early
• APIs are automatically protected as
soon as the contract is defined
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
RESOURCES
• 42Crunch Website
• Azure DevOps SignUp
• Free OAS Security Audit
• OpenAPI VS Code Extension
• OpenAPI Spec Encyclopedia
• OWASP API Security Top 10
• APIsecurity.io

More Related Content

What's hot

The Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API WorldThe Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API World
42Crunch
 

What's hot (20)

Checkmarx meetup API Security - API Security top 10 - Erez Yalon
Checkmarx meetup API Security -  API Security top 10 - Erez YalonCheckmarx meetup API Security -  API Security top 10 - Erez Yalon
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
 
The Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API WorldThe Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API World
 
OWASP API Security Top 10 - API World
OWASP API Security Top 10 - API WorldOWASP API Security Top 10 - API World
OWASP API Security Top 10 - API World
 
Why you need API Security Automation
Why you need API Security AutomationWhy you need API Security Automation
Why you need API Security Automation
 
OWASP API Security TOP 10 - 2019
OWASP API Security TOP 10 - 2019OWASP API Security TOP 10 - 2019
OWASP API Security TOP 10 - 2019
 
Applying API Security at Scale
Applying API Security at ScaleApplying API Security at Scale
Applying API Security at Scale
 
APISecurity_OWASP_MitigationGuide
APISecurity_OWASP_MitigationGuide APISecurity_OWASP_MitigationGuide
APISecurity_OWASP_MitigationGuide
 
Owasp top 10 2017 (en)
Owasp top 10 2017 (en)Owasp top 10 2017 (en)
Owasp top 10 2017 (en)
 
Open APIs Design
Open APIs DesignOpen APIs Design
Open APIs Design
 
apidays LIVE Paris - Protecting financial grade API: adopting the right secur...
apidays LIVE Paris - Protecting financial grade API: adopting the right secur...apidays LIVE Paris - Protecting financial grade API: adopting the right secur...
apidays LIVE Paris - Protecting financial grade API: adopting the right secur...
 
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
 
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon ShkedyCheckmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
 
API Security in a Microservices World
API Security in a Microservices WorldAPI Security in a Microservices World
API Security in a Microservices World
 
API Abuse - The Anatomy of An Attack
API Abuse -  The Anatomy of An AttackAPI Abuse -  The Anatomy of An Attack
API Abuse - The Anatomy of An Attack
 
API Security Guidelines: Beyond SSL and OAuth.
API Security Guidelines: Beyond SSL and OAuth.API Security Guidelines: Beyond SSL and OAuth.
API Security Guidelines: Beyond SSL and OAuth.
 
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
 
API Security from the DevOps and CSO Perspectives (Webcast)
API Security from the DevOps and CSO Perspectives (Webcast)API Security from the DevOps and CSO Perspectives (Webcast)
API Security from the DevOps and CSO Perspectives (Webcast)
 
Five Principles to API Security
Five Principles to API SecurityFive Principles to API Security
Five Principles to API Security
 
Data-driven API Security
Data-driven API SecurityData-driven API Security
Data-driven API Security
 
Managing Identities in the World of APIs
Managing Identities in the World of APIsManaging Identities in the World of APIs
Managing Identities in the World of APIs
 

Similar to REST API Security by Design with Azure Pipelines

Similar to REST API Security by Design with Azure Pipelines (20)

Velocity 2014 Tool Chain Choices
Velocity 2014 Tool Chain ChoicesVelocity 2014 Tool Chain Choices
Velocity 2014 Tool Chain Choices
 
OPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu SlidesOPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu Slides
 
Don’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital TransformationDon’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital Transformation
 
Don’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital TransformationDon’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital Transformation
 
Don't Let Technology Slow Down Your Digital Transformation
Don't Let Technology Slow Down Your Digital Transformation Don't Let Technology Slow Down Your Digital Transformation
Don't Let Technology Slow Down Your Digital Transformation
 
Software Quality as a Competitive Differentiator
Software Quality as a Competitive Differentiator Software Quality as a Competitive Differentiator
Software Quality as a Competitive Differentiator
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned Way
 
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
 
Transform Digital Business with DevOps
Transform Digital Business with DevOpsTransform Digital Business with DevOps
Transform Digital Business with DevOps
 
Application Programming Interface Implementation For Building Software Applic...
Application Programming Interface Implementation For Building Software Applic...Application Programming Interface Implementation For Building Software Applic...
Application Programming Interface Implementation For Building Software Applic...
 
Don't be a DevOps Failure
Don't be a DevOps FailureDon't be a DevOps Failure
Don't be a DevOps Failure
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
 
Leverage Service Virtualization on Your Roadmap for Success
Leverage Service Virtualization on Your Roadmap for SuccessLeverage Service Virtualization on Your Roadmap for Success
Leverage Service Virtualization on Your Roadmap for Success
 
Deliver Differentiating Apps – that Leverage the Mainframe – Faster with CA A...
Deliver Differentiating Apps – that Leverage the Mainframe – Faster with CA A...Deliver Differentiating Apps – that Leverage the Mainframe – Faster with CA A...
Deliver Differentiating Apps – that Leverage the Mainframe – Faster with CA A...
 
Fueling DevOps with a Testing Trifecta: How the New World of Testing is Driv...
Fueling DevOps with a Testing Trifecta:  How the New World of Testing is Driv...Fueling DevOps with a Testing Trifecta:  How the New World of Testing is Driv...
Fueling DevOps with a Testing Trifecta: How the New World of Testing is Driv...
 
04 accelerating businessvaluewithdevops
04 accelerating businessvaluewithdevops04 accelerating businessvaluewithdevops
04 accelerating businessvaluewithdevops
 
CWIN17 Toulouse / Safe 4.5 and agile devops-ca technologies-r.bajul
CWIN17 Toulouse / Safe 4.5 and agile devops-ca technologies-r.bajulCWIN17 Toulouse / Safe 4.5 and agile devops-ca technologies-r.bajul
CWIN17 Toulouse / Safe 4.5 and agile devops-ca technologies-r.bajul
 
Guidewire Connections 2023 DE-4 Using AI to Accelerate Application Integration
Guidewire Connections 2023 DE-4 Using AI to Accelerate Application IntegrationGuidewire Connections 2023 DE-4 Using AI to Accelerate Application Integration
Guidewire Connections 2023 DE-4 Using AI to Accelerate Application Integration
 
Using Lean Thinking to Identify and Address Delivery Pipeline Bottlenecks
Using Lean Thinking to Identify and Address Delivery Pipeline BottlenecksUsing Lean Thinking to Identify and Address Delivery Pipeline Bottlenecks
Using Lean Thinking to Identify and Address Delivery Pipeline Bottlenecks
 

More from 42Crunch

More from 42Crunch (8)

OWASP API Security Top 10 Examples
OWASP API Security Top 10 ExamplesOWASP API Security Top 10 Examples
OWASP API Security Top 10 Examples
 
Applying API Security at Scale
Applying API Security at ScaleApplying API Security at Scale
Applying API Security at Scale
 
APIDays Paris Security Workshop
APIDays Paris Security WorkshopAPIDays Paris Security Workshop
APIDays Paris Security Workshop
 
Better API Security with Automation
Better API Security with Automation Better API Security with Automation
Better API Security with Automation
 
Advanced API Security Patterns
Advanced API Security PatternsAdvanced API Security Patterns
Advanced API Security Patterns
 
SecDevOps for API Security
SecDevOps for API SecuritySecDevOps for API Security
SecDevOps for API Security
 
42crunch-API-security-workshop
42crunch-API-security-workshop42crunch-API-security-workshop
42crunch-API-security-workshop
 
API Security: the full story
API Security: the full storyAPI Security: the full story
API Security: the full story
 

Recently uploaded

AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
Alluxio, Inc.
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
mbmh111980
 

Recently uploaded (20)

AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning Framework
 
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
Abortion ^Clinic ^%[+971588192166''] Abortion Pill Al Ain (?@?) Abortion Pill...
 
Breaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdfBreaking the Code : A Guide to WhatsApp Business API.pdf
Breaking the Code : A Guide to WhatsApp Business API.pdf
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024
 
Crafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM IntegrationCrafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM Integration
 
iGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by SkilrockiGaming Platform & Lottery Solutions by Skilrock
iGaming Platform & Lottery Solutions by Skilrock
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Kraków
 
GraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysisGraphAware - Transforming policing with graph-based intelligence analysis
GraphAware - Transforming policing with graph-based intelligence analysis
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdfA Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
A Comprehensive Appium Guide for Hybrid App Automation Testing.pdf
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
 

REST API Security by Design with Azure Pipelines

  • 1. REST API Security by Design with Azure Pipelines
  • 3. THE J-CURVE OF TRANSFORMATION The transformation begins From the State of DevOps 2018 Report by DORA
  • 4. THE J-CURVE OF TRANSFORMATION The transformation begins Automation helps low performers progress From the State of DevOps 2018 Report by DORA
  • 5. THE J-CURVE OF TRANSFORMATION The transformation begins Automation helps low performers progress Increased automation demands more testing From the State of DevOps 2018 Report by DORA
  • 6. THE J-CURVE OF TRANSFORMATION The transformation begins Automation helps low performers progress Increased automation demands more testing Technical debt is reduced, and test automation is introduced From the State of DevOps 2018 Report by DORA
  • 7. THE J-CURVE OF TRANSFORMATION From the State of DevOps 2018 Report by DORA The transformation begins Automation helps low performers progress Increased automation demands more testing Technical debt is reduced, and test automation is introduced Continuous improvement reduces manual controls and process
  • 8. CATEGORIES OF PERFORMANCE Low ✓ Deploy once a month to once every six months ✓ Going from code commit to production can be one to six months ✓ Restoring service from an incident can be between one week to one month ✓ Approximate change failure rate of 46% to 60% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 9. CATEGORIES OF PERFORMANCE Medium ✓ Deploy once a week to once a month ✓ Going from code commit to production can be one week to one month ✓ Restoring service from an incident is usually less than a day ✓ Approximate change failure rate of 0% to 15% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 10. CATEGORIES OF PERFORMANCE High ✓ Deploy once a day to once a week ✓ Going from code commit to production can be one day to one week ✓ Restoring service from an incident is usually less than a day ✓ Approximate change failure rate of 0% to 15% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 11. CATEGORIES OF PERFORMANCE Elite ✓ Deploy on-demand (multiple deploys a day) ✓ Going from code commit to production is less than one day ✓ Restoring service from an incident is usually less than a day ✓ Approximate change failure rate of 0% to 15% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 12. AUTOMATION AND INTEGRATION - BUILD Capability Low Medium High Elite Automated build 64% 81% 91% 92% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 13. AUTOMATION AND INTEGRATION - TESTING Capability Low Medium High Elite Automated build 64% 81% 91% 92% Automated unit tests 57% 66% 84% 87% Automated acceptance tests 28% 38% 48% 58% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 14. AUTOMATION AND INTEGRATION - TESTING Capability Low Medium High Elite Automated build 64% 81% 91% 92% Automated unit tests 57% 66% 84% 87% Automated acceptance tests 28% 38% 48% 58% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops More on how Microsoft shifts tests left at https://aka.ms/shift-tests-left
  • 15. AUTOMATION AND INTEGRATION – DEPLOYMENT Capability Low Medium High Elite Automated build 64% 81% 91% 92% Automated unit tests 57% 66% 84% 87% Automated acceptance tests 28% 38% 48% 58% Automated provisioning and deployment to test environments 39% 54% 68% 72% Automated deployment to production 17% 38% 60% 69% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 16. AUTOMATION AND INTEGRATION - SECURITY Capability Low Medium High Elite Automated security tests 15% 28% 25% 31% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 17. WHERE IS WORK TIME SPENT Time Spent Low Medium High Elite New work 30% 40% 50% 50% Unplanned work and rework 20% 20% 20% 19.5% Remediating security issues 10% 5% 5% 5% Working on end user reported issues 20% 10% 10% 10% Customer support work 15% 10% 10% 5% From the State of DevOps 2018 Report by DORA
  • 18. WHERE IS WORK TIME SPENT Time Spent Low Medium High Elite New work 30% 40% 50% 50% Unplanned work and rework 20% 20% 20% 19.5% Remediating security issues 10% 5% 5% 5% Working on end user reported issues 20% 10% 10% 10% Customer support work 15% 10% 10% 5% From the State of DevOps 2018 Report by DORA
  • 19. Cost of excess rework = Technical staff size × Average salary × Benefits multiplier × Percentage of technical staff time spent on excess rework
  • 20. COST OF DEFECTS ALONG THE LIFECYCLE
  • 22. APIS ARE THE NEW ATTACKS VECTOR… Data breaches via APIs are on the rise ✓ 200+ breaches reported on apisecurity.io since Oct. 2018 ✓ And those are just the public ones! Most recurrent causes: ✓ Lack of Input validation ✓ Data/Exception leakage ✓ Broken authentication 22
  • 23. “By 2022, APIs will become the #1 attack vector.” - Gartner, How to Build an Effective API Security Strategy - * :// . . / / /3834704/ - - - - - - -
  • 24. © COPYRIGHT 42CRUNCH | CONFIDENTIAL MANY APIS, DEPLOYED OFTEN APPLICATION DEVELOPMENT APPLICATION SECURITY
  • 25. SECURING APIS REQUIRES A NEW APPROACH
  • 28. 28 …AND USING THE RIGHT TOOLS.
  • 29. Deploy & Protect API Firewall is automatically configured from OAS file and deployed in line of traffic. The firewall can be deployed as sidecar in Kubernetes or reverse proxy in front of API Management solutions. Develop Developer documents the API contract with OpenAPI/Swagger. API Contract security is evaluated from VSCode using 42Crunch plugin. Integrate & Test API Contract quality is enforced via CI/CD pipeline. Builds are blocked when minimal security requirements defined by security teams are not met. API implementation is tested via Conformance Scan Design Developer initiates security work at design time. Best practices and recommendations are documented.
  • 30. Developers know how the application was built! OpenAPI specification is leveraged to describe the API contract. Once the API contract is defined by the developer, the security process becomes clear and straight forward ! ENABLING DEVELOPERS TO INITIATE SECURITY 30 “If you describe your API, we will secure it”
  • 31. API Contract Audit Scan Protect EMPOWER DEVELOPERS TO BUILD THE ULTIMATE WHITELIST VALIDATE OPENAPI CONTRACT CONTENTS Does it comply to best practices ? Does it comply to security requirements ? ✓ Using API Keys ? OAuth ? Basic Auth ? How well is the data defined ? ✓ Headers, query params, path params, form data ✓ Input/output payloads format (JSON) ✓ Is the data constrained ? • Min/Max/Patterns/Max Items 31 AUDIT API Contract Audit Scan Protect
  • 32. © COPYRIGHT 42CRUNCH | CONFIDENTIAL Platform Architecture
  • 33. © COPYRIGHT 42CRUNCH | CONFIDENTIAL DEMO PART 1: OPENAPI EDITOR/AUDIT FOR VSCODE https://marketplace.visualstudio.com/items?itemName=42Crunch.vscode-openapi
  • 34. © COPYRIGHT 42CRUNCH | CONFIDENTIAL
  • 35. © COPYRIGHT 42CRUNCH | CONFIDENTIAL
  • 36. © COPYRIGHT 42CRUNCH | CONFIDENTIAL DEMO STEP 2: AZURE DEVOPS INTEGRATION
  • 37. © COPYRIGHT 42CRUNCH | CONFIDENTIAL Automated audit and API discovery https://marketplace.visualstudio.com/items?itemName=42Crunch.cicd
  • 38. © COPYRIGHT 42CRUNCH | CONFIDENTIAL DEV-SEC-OPS BENEFITS When API security becomes fully part of the API lifecycle: • Security is applied automatically and at scale • Vulnerable APIs are detected early • APIs are automatically protected as soon as the contract is defined
  • 39. © COPYRIGHT 42CRUNCH | CONFIDENTIAL RESOURCES • 42Crunch Website • Azure DevOps SignUp • Free OAS Security Audit • OpenAPI VS Code Extension • OpenAPI Spec Encyclopedia • OWASP API Security Top 10 • APIsecurity.io