SlideShare a Scribd company logo
1 of 67
Hello!
Introduce yourself in the chat while we wait
for more people to join! 
We’ll begin in some minutes…
1
Sep 30, 2020
Toronto MuleSoft Meetup Group
API Security and Threats
3
● Introductions
● API Security and Threats
● What’s next?
● Next event
Agenda
4
●About the organizers:
○ Alexandra Martinez
○ Mahesh Pujari
○ Pravallika Nagaraja
○ Kishore Reddy Paluri
Introductions
A SHOW OF HANDS:
Who is new to this Meetup?
Satyam Patel
Technical Architect at Incepta
API Security and Threats
6
● Introductions
● Background of APIs
● API Threats
● API Security
● Securing through MuleSoft
● Take away
● Networking time
Agenda
7
●About the me
○ Satyam Patel, Technical Architect
○ 8+ years in integration domain
○ Performed various roles from developer to project lead
○ Aviation, Oil and Gas industry domains
○ webMethods ESB and BPM
○ MuleSoft integration platform
○ Mule 4.x, Dell Boomi, AWS Solutions Architect Associate, webMethods 9.x certifications
○ Enjoy outdoor activities – hiking, biking, skiing, camping etc.
Introductions
Journey of APIs
BACKGROUND
9
● Brief history of APIs – Quick timeline
○ 1950s – 1970s: Subroutines, Libraries, FORTRAN, IBM instruction
set, C Standard libraries, Idea of reimplementation
○ 1980s – 1990s: Interface between HWs and OS, BIOS, Printers,
CLIs, etc.
○ 1990s – 2000s: Windows OS APIs, UNIX, Java class libraries and
functions, Delicious web APIs
● Rise of API based IT solutions (2000s and onwards)
○ CRM – Salesforce officially launched its API on February 7, 2000
○ eBay – On November 20, 2000, eBay launched the eBay
Application Program Interface (API) along with the eBay Developers
Program
○ Amazon – On July 16, 2002, Amazon launched Amazon.com Web
Services
● The present and the possible future
○ Social media boom – FB, Flickr, Twitter, etc.
Background of APIs
10
● APIs currently account for 83% of all
hits on internet
● Media organizations are the largest
users
● Need for seamless integrations
across industries
● Rise of IoT devices, Mobile apps,
Smart homes, complex systems in
Aviation and cars, unified platforms
and more !
● What’s the next big thing?
Where are we today and what’s coming in
future?
The growth over time of the ProgrammableWeb API
directory to more than 23,000 entries
11
●Infrastructure
○ Architecture
○ Networking & VPCs
○ Load balancing
○ Firewalls
●Solutions
○ Design and structure
○ Data handling
○ Connectivity
●Data
○ Storage and management
○ Access control
Overall security areas
12
General security framework
●Identify
○ Assess and Strategize
●Protect
○ Implement and Secure
●Detect
○ Intelligent monitoring
●Respond
○ Analyze and Mitigate
●Recover
○ Plan and Improve
13
Incidents of breaches
Source: https://krebsonsecurity.com/2018/04/panerabread-com-leaks-millions-of-customer-records/
14
Incidents of breaches
15
Incidents of breaches
16
Incidents of breaches
17
Reports and trends
Security threats and building blocks
API THREATS
19
● Injection Attacks – A malicious code, usually a query or a script, is embedded into an
unsecured software program
● Man-In-The-Middle-Attack (MITM) – An unauthorized third party secretly relays and possibly
alters the communications between two parties
● CSRF Attack – Cross-Site Request Forgery (CSRF) force logged-in users to silently open
URLs that perform actions unintentionally
REST API security threats
20
● Broken Access Control – An attacker can bypass
or control authentication into web applications
compromising web tokens, API keys, passwords,
account recovery options, password reset methods,
etc.
● Distributed Denial of Services – Most common
type of attack where a malicious attempt is made to
disrupt normal traffic
● Web Parameter Tampering – Based on the
manipulation of parameters exchanged between
client and server
● Sensitive Data Exposure – When sensitive data
isn’t encrypted in transit or at rest it could lead to
abuse of this information
REST API security threats
Security as a design principle
API SECURITY SOLUTIONS
22
Security building blocks
23
Industry standards and compliances
24
● Enforce secure communications
○ Enable TLS 1.2 or subsequent versions, in accordance with CSE
guidance.
● Design APIs to be resistant to attacks
○ Treat all submitted data as untrusted and validate before processing
● Avoid putting sensitive data in request URLs
○ URL strings can be tracked and compromised
● Protect access to APIs
○ Authenticate and authorize before any operation
○ Use open standards such as OpenID Connect and Open Authorization
2.0 (OAuth 2.0)
API security best practices
25
● Use gateways and proxies instead of whitelists
○ Use a secure gateway layer to provide a security control point instead of simply
whitelisting inbound Internet Protocol addresses (IPs)
● Integrate security testing
○ Automate security testing to validate any new changes to API source code
● Audit access to sensitive data
○ Access to APIs dealing with sensitive and/or personal data must be logged for
future audit and reviewed on a regular basis
● Log and monitor for performance and activity
○ Track usage and monitor for suspicious activity including abnormal access
patterns such as after-hours requests, large data requests, etc.
API security best practices
26
● Identity:
○ User and app authentication
○ API and server authentication
○ User and app authorization
● Identity Provider:
○ Single Sign-on multi-experience
○ Single Sign-on single experience
○ WS-Security with SAML Assertions
○ OpenID Connect with JWT ID Tokens
API security best practices
27
● Message Integrity
○ Digital Signatures
● Message confidentiality
○ Public key cryptography
○ Digital Certificates
○ Mutual authentication with
Digital Certificates
○ HTTPS
● Availability
API security best practices
28
● Handling of data – know the data, share minimum and only required data (yes, even
with reusability) – Implement data masking, encryptions for sensitive data etc.
● Accessing end systems – Securely access the end systems, ask for limited access,
restrictions
● Temporary storage of business data – shouldn’t be stored locally, if at all required
should clear it when processed
● Object stores – do not store sensitive information in memory
API Design considerations for security
SECURING THROUGH MULESOFT
30
● API Manager
● Secret Manager
● Access Manager
● Monitoring Dashboards
● Alerting Mechanism
● Ability to externalize logs for analysis
MuleSoft Provided Components
31
MuleSoft API Manager
● API Manager Policy types
○ Default Policies
○ Automated Policies
○ Custom Policies
● Policy classification
○ Security
○ Compliance
○ Transformation
○ Troubleshooting
○ Quality of Service
32
● Security
○ Basic Authentication – LDAP - Authenticates the LDAP credentials
○ Basic Authentication – Simple - Authenticates a single user password
○ IP Blacklist – Blocks a range of IP addresses.
○ IP Whitelist – Allows access from only a preapproved range of IP addresses
○ JSON Threat Protection– Protects against a malicious JSON structure in API requests
○ XML Threat Protection – Protects against malicious XML elements in API requests
○ Client ID Enforcement – Allows access to client applications with a valid client credentials
○ JWT – Validates a JWT token
MuleSoft Provided API Policies
33
● Security
○ OAuth 2.0 Access Token Enforcement Using Mule OAuth Provider Policy – Enforces token access using the
MuleSoft OAuth Provider policy.
○ OpenAM Access Token Enforcement – Restricts access to a protected resource using an Open AM
authentication server.
○ PingFederate Access Token Enforcement – Restricts access to a protected resource using the PingFederate
authentication server.
○ Tokenization – Transforms sensitive data into non-sensitive equivalent tokens.
○ Detokenization – Transforms a tokenized value back to the original data
MuleSoft Provided API Policies
34
● Compliance
○ Client ID Enforcement – Allows access to client applications with a valid client credentials
○ CORS – Enables calls executed in a web page to interact with resources from different domains
● Quality of Service
○ HTTP Caching – Stores HTTP responses from an API implementation
○ Rate Limiting – Enables imposing a limit on the number of requests that an API can accept within a specified time.
○ Rate Limiting, SLA-Based – Enables imposing an API request limit based on SLA tiers.
○ Spike Control – Controls API traffic and provides queuing feature
 Message Logging – Logs a custom message when an API is invoked.
MuleSoft Provided API Policies
35
MuleSoft Monitoring & Alerts
API manager alerts
● An API alert is an alarm that flags one of the following problems:
○ The API request violates a policy Automated Policies
○ Requests received by the API exceed a given number within a period of time
○ The API returns a specified HTTP error code
○ The API response time exceeds a certain amount
36
API event analytics and forwarding
37
● Analytics providing data on
○ Requests by Date
○ Requests by Location
○ Requests by Application
○ Requests by Platform
● Externalize analytics data
○ API Analytics Report API
○ Forward API Analytics events
Runtime manager alerts
● Number of errors
○ The number of errors in one minute reaches the specified limit
● Number of Mule messages
○ The number of Mule messages since the application started reaches the specified limit
● Response time
○ The response time reaches the specified limit
● Use Runtime Manager to Export Data to External Analytics Tools
○ Splunk and Elk plugins
38
Are the APIs truly secured?
API SECURITY ACHIEVED?
40
● Try some attacks yourself
● Find some tools or apps to test policies
● Get the organization’s security department to test the code and
environment
● Have professionals attack and assess API security
● Regular Pen-tests
Have APIs attacked!
41
● Credentials
● Authentication
● Authorization
● Session
● Privacy
● Data
● Certificates
Security testing areas
● Source
● System
● Files
● Logs
● Emails
● Services
● Cryptography
● Architecture
● Networks
● Virtualization
● Physical
● Mobile
● Social
TAKE AWAY
43
● Know the big picture, the infrastructure and business
● Security comes at a cost
● There will be side-effects
● Only recommend what’s right and needed
● There’s no one way to do it
● Ensure it gets thoroughly tested for security
● Security is not one-time activity
● Leverage proactive monitoring and implement policies
● Follow best practices and be as restrictive as possible in API design
● Discuss in the community, let MS know for additional support
Take away
For investing your time and participating
THANK YOU
45
● Blog - http://bit.ly/APISecurityBlog
● Connect on LinkedIn - http://bit.ly/LinkSatyam
● Please spend few seconds to post your valuable feedback here - http://bit.ly/MS-feedback
Connect with me – feedback/ideas
Quiz time!
How does the quiz work?
1. Organizers show the question.
2. Organizers read the question out loud.
3. Organizers will write in the chat the following message: “Answers from question n start
here” after reading the question.
4. Only answers that appear after this message will be taken into account.
5. A final raffle, with the people that answered the quiz correctly, will take place after the quiz,
where the 3 lucky winners will receive a training or certification voucher.
6. The 3 winners will send their email in the chat so we can contact them for further steps.
47
Rules:
1. First person to give the correct answer in the chat will enter the final raffle.
2. If you already answered one question correctly, please stop answering and give a chance to
the rest. You don’t receive “extra points” for answering correctly more than once.
3. If the answer is sent before the “Answers from question n start here” message appears in the
chat, it won’t be taken into account.
48
1. Which business launched their first APIs in
2000?
49
1. Which business launched their first APIs in
2000?
A: Salesforce
50
2. Name of a popular web API directory where
public APIs are published.
World’s leading source for internet-based
application programming interfaces (APIs).
51
2. Name of a popular web API directory where
public APIs are published.
World’s leading source for internet-based
application programming interfaces (APIs).
A: Programmableweb
52
3. What would this type of attack be called where
the message in transit was compromised and
possibly altered?
53
3. What would this type of attack be called where
the message in transit was compromised and
possibly altered?
A: Man-In-The-Middle-Attack (MITM)
54
4. Can you set an alert in Anypoint Platform if a
request is coming from some geographic
location?
55
4. Can you set an alert in Anypoint Platform if a
request is coming from some geographic
location?
A: No (false)
56
5. Can you set an alert in Anypoint Platform if the
payload’s size is above some threshold?
57
5. Can you set an alert in Anypoint Platform if the
payload’s size is above some threshold?
A: No (false)
58
6. What policy could help limit the number of API
hits in a given period of time?
59
6. What policy could help limit the number of API
hits in a given period of time?
A: Rate Limiting SLA
60
7. Which policy helps in controlling API traffic and
provides support for queuing?
61
7. Which policy helps in controlling API traffic and
provides support for queuing?
A: Spike Control
62
8. Incidents of breaches – What was this type of
attack on Panera Bread?
Please apply knowledge of attacks.
63
8. Incidents of breaches – What was this type of
attack on Panera Bread?
Please apply knowledge of attacks.
A: Possibly Web parameter tampering
OR SQL injection
OR both.
64
65
● Share:
○ Tweet using the hashtag #MuleSoftMeetups
○ Invite your network to join: https://meetups.mulesoft.com/toronto/
● Feedback:
○ Fill out the survey feedback and suggest topics for upcoming events
○ Contact MuleSoft at meetups@mulesoft.com for ways to improve the program
What’s next?
66
● Toronto Virtual Meetup #6 - How to use Salesforce composite request connector in Mule
○ Wed, Oct 21, 2020
○ 5:30 PM (EDT)
● Speaker:
○ Rajiv Mishra
○ Associate at Cognizant Technology Solutions
● https://meetups.mulesoft.com/events/details/mulesoft-toronto-presents-toronto-virtual-meetup-
6-how-to-use-salesforce-composite-request-connector-in-mule/#/
Next event
Thank you

More Related Content

What's hot

Mule soft meetup__adelaide_october_2020_final (2)
Mule soft meetup__adelaide_october_2020_final (2)Mule soft meetup__adelaide_october_2020_final (2)
Mule soft meetup__adelaide_october_2020_final (2)Nicholas Bowman
 
Automating the Localization Workflow. What Works?
Automating the Localization Workflow. What Works?Automating the Localization Workflow. What Works?
Automating the Localization Workflow. What Works?Welocalize
 
#6 Calicut MuleSoft Meetup : Demystyfying Custom Policies in Mule
#6 Calicut MuleSoft Meetup : Demystyfying Custom Policies in Mule #6 Calicut MuleSoft Meetup : Demystyfying Custom Policies in Mule
#6 Calicut MuleSoft Meetup : Demystyfying Custom Policies in Mule JohnMathewPhilip
 
Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...
Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...
Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...Angel Alberici
 
Metadata definition between flows on Studio 7 : MuleSoft Virtual Muleys Meetups
Metadata definition between flows on Studio 7  : MuleSoft Virtual Muleys MeetupsMetadata definition between flows on Studio 7  : MuleSoft Virtual Muleys Meetups
Metadata definition between flows on Studio 7 : MuleSoft Virtual Muleys MeetupsAngel Alberici
 
Melbourne Virtual MuleSoft Meetup October 2021
Melbourne Virtual MuleSoft Meetup October 2021Melbourne Virtual MuleSoft Meetup October 2021
Melbourne Virtual MuleSoft Meetup October 2021Daniel Soffner
 
Meetup milano #3 all you need to know before creating your vpc
Meetup milano #3   all you need to know before creating your vpcMeetup milano #3   all you need to know before creating your vpc
Meetup milano #3 all you need to know before creating your vpcGonzalo Marcos Ansoain
 
MuleSoft Event Driven Architecture (EDA Patterns in MuleSoft) - VirtualMuleys63
MuleSoft Event Driven Architecture (EDA Patterns in MuleSoft) - VirtualMuleys63MuleSoft Event Driven Architecture (EDA Patterns in MuleSoft) - VirtualMuleys63
MuleSoft Event Driven Architecture (EDA Patterns in MuleSoft) - VirtualMuleys63Angel Alberici
 
MuleSoft Meetup Adelaide 7th April 2021
MuleSoft Meetup Adelaide 7th April 2021MuleSoft Meetup Adelaide 7th April 2021
MuleSoft Meetup Adelaide 7th April 2021Nicholas Bowman
 
Toronto Virtual Meetup #7 - Anypoint VPC, VPN and DLB Architecture
Toronto Virtual Meetup #7 - Anypoint VPC, VPN and DLB ArchitectureToronto Virtual Meetup #7 - Anypoint VPC, VPN and DLB Architecture
Toronto Virtual Meetup #7 - Anypoint VPC, VPN and DLB ArchitectureAlexandra N. Martinez
 
Riyadh Meetup4- Sonarqube for Mule 4 Code review
Riyadh Meetup4- Sonarqube for Mule 4 Code reviewRiyadh Meetup4- Sonarqube for Mule 4 Code review
Riyadh Meetup4- Sonarqube for Mule 4 Code reviewsatyasekhar123
 
Raleigh MuleSoft Meetup - October
Raleigh MuleSoft Meetup  - October Raleigh MuleSoft Meetup  - October
Raleigh MuleSoft Meetup - October Savannah Cole
 
Toronto mule soft meetup november 2021
Toronto mule soft meetup   november 2021Toronto mule soft meetup   november 2021
Toronto mule soft meetup november 2021Anurag Dwivedi
 
Mumbai MuleSoft Meetup #19 - Anypoint monitoring and MQ Integrations
Mumbai MuleSoft Meetup #19 - Anypoint monitoring and MQ IntegrationsMumbai MuleSoft Meetup #19 - Anypoint monitoring and MQ Integrations
Mumbai MuleSoft Meetup #19 - Anypoint monitoring and MQ IntegrationsAkshata Sawant
 
MuleSoft Meetup Bangalore - March 6 2021
MuleSoft Meetup Bangalore - March 6 2021MuleSoft Meetup Bangalore - March 6 2021
MuleSoft Meetup Bangalore - March 6 2021Nagaraju K R
 
Meetup slide api_design_custom_poicies_in_mule4
Meetup slide api_design_custom_poicies_in_mule4Meetup slide api_design_custom_poicies_in_mule4
Meetup slide api_design_custom_poicies_in_mule4AnuragSharma900
 
#2 connected apps_calicut_31_july
#2 connected apps_calicut_31_july#2 connected apps_calicut_31_july
#2 connected apps_calicut_31_julyJohnMathewPhilip
 
DelhiMeetup_AnypointMonitoring_v1.pptx
DelhiMeetup_AnypointMonitoring_v1.pptxDelhiMeetup_AnypointMonitoring_v1.pptx
DelhiMeetup_AnypointMonitoring_v1.pptxAnuragSharma900
 

What's hot (20)

Managing APIs with MuleSoft
Managing APIs with MuleSoftManaging APIs with MuleSoft
Managing APIs with MuleSoft
 
Mule soft meetup__adelaide_october_2020_final (2)
Mule soft meetup__adelaide_october_2020_final (2)Mule soft meetup__adelaide_october_2020_final (2)
Mule soft meetup__adelaide_october_2020_final (2)
 
Automating the Localization Workflow. What Works?
Automating the Localization Workflow. What Works?Automating the Localization Workflow. What Works?
Automating the Localization Workflow. What Works?
 
#6 Calicut MuleSoft Meetup : Demystyfying Custom Policies in Mule
#6 Calicut MuleSoft Meetup : Demystyfying Custom Policies in Mule #6 Calicut MuleSoft Meetup : Demystyfying Custom Policies in Mule
#6 Calicut MuleSoft Meetup : Demystyfying Custom Policies in Mule
 
Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...
Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...
Sustainability Challenge, Postman, Rest sheet and Anypoint provider : MuleSof...
 
Metadata definition between flows on Studio 7 : MuleSoft Virtual Muleys Meetups
Metadata definition between flows on Studio 7  : MuleSoft Virtual Muleys MeetupsMetadata definition between flows on Studio 7  : MuleSoft Virtual Muleys Meetups
Metadata definition between flows on Studio 7 : MuleSoft Virtual Muleys Meetups
 
Melbourne Virtual MuleSoft Meetup October 2021
Melbourne Virtual MuleSoft Meetup October 2021Melbourne Virtual MuleSoft Meetup October 2021
Melbourne Virtual MuleSoft Meetup October 2021
 
Meetup milano #3 all you need to know before creating your vpc
Meetup milano #3   all you need to know before creating your vpcMeetup milano #3   all you need to know before creating your vpc
Meetup milano #3 all you need to know before creating your vpc
 
MuleSoft Event Driven Architecture (EDA Patterns in MuleSoft) - VirtualMuleys63
MuleSoft Event Driven Architecture (EDA Patterns in MuleSoft) - VirtualMuleys63MuleSoft Event Driven Architecture (EDA Patterns in MuleSoft) - VirtualMuleys63
MuleSoft Event Driven Architecture (EDA Patterns in MuleSoft) - VirtualMuleys63
 
Meetup bangalore-may22nd2021
Meetup bangalore-may22nd2021Meetup bangalore-may22nd2021
Meetup bangalore-may22nd2021
 
MuleSoft Meetup Adelaide 7th April 2021
MuleSoft Meetup Adelaide 7th April 2021MuleSoft Meetup Adelaide 7th April 2021
MuleSoft Meetup Adelaide 7th April 2021
 
Toronto Virtual Meetup #7 - Anypoint VPC, VPN and DLB Architecture
Toronto Virtual Meetup #7 - Anypoint VPC, VPN and DLB ArchitectureToronto Virtual Meetup #7 - Anypoint VPC, VPN and DLB Architecture
Toronto Virtual Meetup #7 - Anypoint VPC, VPN and DLB Architecture
 
Riyadh Meetup4- Sonarqube for Mule 4 Code review
Riyadh Meetup4- Sonarqube for Mule 4 Code reviewRiyadh Meetup4- Sonarqube for Mule 4 Code review
Riyadh Meetup4- Sonarqube for Mule 4 Code review
 
Raleigh MuleSoft Meetup - October
Raleigh MuleSoft Meetup  - October Raleigh MuleSoft Meetup  - October
Raleigh MuleSoft Meetup - October
 
Toronto mule soft meetup november 2021
Toronto mule soft meetup   november 2021Toronto mule soft meetup   november 2021
Toronto mule soft meetup november 2021
 
Mumbai MuleSoft Meetup #19 - Anypoint monitoring and MQ Integrations
Mumbai MuleSoft Meetup #19 - Anypoint monitoring and MQ IntegrationsMumbai MuleSoft Meetup #19 - Anypoint monitoring and MQ Integrations
Mumbai MuleSoft Meetup #19 - Anypoint monitoring and MQ Integrations
 
MuleSoft Meetup Bangalore - March 6 2021
MuleSoft Meetup Bangalore - March 6 2021MuleSoft Meetup Bangalore - March 6 2021
MuleSoft Meetup Bangalore - March 6 2021
 
Meetup slide api_design_custom_poicies_in_mule4
Meetup slide api_design_custom_poicies_in_mule4Meetup slide api_design_custom_poicies_in_mule4
Meetup slide api_design_custom_poicies_in_mule4
 
#2 connected apps_calicut_31_july
#2 connected apps_calicut_31_july#2 connected apps_calicut_31_july
#2 connected apps_calicut_31_july
 
DelhiMeetup_AnypointMonitoring_v1.pptx
DelhiMeetup_AnypointMonitoring_v1.pptxDelhiMeetup_AnypointMonitoring_v1.pptx
DelhiMeetup_AnypointMonitoring_v1.pptx
 

Similar to Toronto Virtual Meetup #5 - API Security and Threats

Virtual Meetup - API Security Best Practices
Virtual Meetup - API Security Best PracticesVirtual Meetup - API Security Best Practices
Virtual Meetup - API Security Best PracticesJimmy Attia
 
apidays London 2023 - Overengineering Weakens your API Security, Dr. David Va...
apidays London 2023 - Overengineering Weakens your API Security, Dr. David Va...apidays London 2023 - Overengineering Weakens your API Security, Dr. David Va...
apidays London 2023 - Overengineering Weakens your API Security, Dr. David Va...apidays
 
INTERFACE by apidays 2023 - The Swiss Cheese Model of Layered API Security, L...
INTERFACE by apidays 2023 - The Swiss Cheese Model of Layered API Security, L...INTERFACE by apidays 2023 - The Swiss Cheese Model of Layered API Security, L...
INTERFACE by apidays 2023 - The Swiss Cheese Model of Layered API Security, L...apidays
 
API Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIsAPI Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIsAaronLieberman5
 
apidays Australia 2023 - The Swiss Cheese Model of Layered API Security, Leon...
apidays Australia 2023 - The Swiss Cheese Model of Layered API Security, Leon...apidays Australia 2023 - The Swiss Cheese Model of Layered API Security, Leon...
apidays Australia 2023 - The Swiss Cheese Model of Layered API Security, Leon...apidays
 
The Role of IAM in Microservices
The Role of IAM in MicroservicesThe Role of IAM in Microservices
The Role of IAM in MicroservicesWSO2
 
API Management within a Microservice Architecture
API Management within a Microservice ArchitectureAPI Management within a Microservice Architecture
API Management within a Microservice ArchitectureWSO2
 
API Management Within a Microservices Architecture
API Management Within a Microservices Architecture API Management Within a Microservices Architecture
API Management Within a Microservices Architecture Nadeesha Gamage
 
API Security In Cloud Native Era
API Security In Cloud Native EraAPI Security In Cloud Native Era
API Security In Cloud Native EraWSO2
 
Security in microservices architectures
Security in microservices architecturesSecurity in microservices architectures
Security in microservices architecturesinovia
 
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...Codemotion
 
API Security Best Practices and Guidelines
API Security Best Practices and GuidelinesAPI Security Best Practices and Guidelines
API Security Best Practices and GuidelinesWSO2
 
Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...
Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...
Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...MysoreMuleSoftMeetup
 
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemSecurity Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemInductive Automation
 
Blueprint for omnichannel integration architecture
Blueprint for omnichannel integration architectureBlueprint for omnichannel integration architecture
Blueprint for omnichannel integration architectureEric D. Schabell
 
Peeling the Onion: Making Sense of the Layers of API Security
Peeling the Onion: Making Sense of the Layers of API SecurityPeeling the Onion: Making Sense of the Layers of API Security
Peeling the Onion: Making Sense of the Layers of API SecurityMatt Tesauro
 
Uncover the Flex Gateway with a Demonstration (1).pdf
Uncover the Flex Gateway with a Demonstration (1).pdfUncover the Flex Gateway with a Demonstration (1).pdf
Uncover the Flex Gateway with a Demonstration (1).pdfPankaj Goyal
 

Similar to Toronto Virtual Meetup #5 - API Security and Threats (20)

Virtual Meetup - API Security Best Practices
Virtual Meetup - API Security Best PracticesVirtual Meetup - API Security Best Practices
Virtual Meetup - API Security Best Practices
 
apidays London 2023 - Overengineering Weakens your API Security, Dr. David Va...
apidays London 2023 - Overengineering Weakens your API Security, Dr. David Va...apidays London 2023 - Overengineering Weakens your API Security, Dr. David Va...
apidays London 2023 - Overengineering Weakens your API Security, Dr. David Va...
 
Hyderabad MuleSoft Meetup
Hyderabad MuleSoft MeetupHyderabad MuleSoft Meetup
Hyderabad MuleSoft Meetup
 
INTERFACE by apidays 2023 - The Swiss Cheese Model of Layered API Security, L...
INTERFACE by apidays 2023 - The Swiss Cheese Model of Layered API Security, L...INTERFACE by apidays 2023 - The Swiss Cheese Model of Layered API Security, L...
INTERFACE by apidays 2023 - The Swiss Cheese Model of Layered API Security, L...
 
API Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIsAPI Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIs
 
apidays Australia 2023 - The Swiss Cheese Model of Layered API Security, Leon...
apidays Australia 2023 - The Swiss Cheese Model of Layered API Security, Leon...apidays Australia 2023 - The Swiss Cheese Model of Layered API Security, Leon...
apidays Australia 2023 - The Swiss Cheese Model of Layered API Security, Leon...
 
The Role of IAM in Microservices
The Role of IAM in MicroservicesThe Role of IAM in Microservices
The Role of IAM in Microservices
 
API Management within a Microservice Architecture
API Management within a Microservice ArchitectureAPI Management within a Microservice Architecture
API Management within a Microservice Architecture
 
API Management Within a Microservices Architecture
API Management Within a Microservices Architecture API Management Within a Microservices Architecture
API Management Within a Microservices Architecture
 
IPsec on Mikrotik
IPsec on MikrotikIPsec on Mikrotik
IPsec on Mikrotik
 
API Security In Cloud Native Era
API Security In Cloud Native EraAPI Security In Cloud Native Era
API Security In Cloud Native Era
 
Security in microservices architectures
Security in microservices architecturesSecurity in microservices architectures
Security in microservices architectures
 
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
Increasing Android app security for free - Roberto Gassirà, Roberto Piccirill...
 
API Security Best Practices and Guidelines
API Security Best Practices and GuidelinesAPI Security Best Practices and Guidelines
API Security Best Practices and Guidelines
 
Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...
Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...
Handling NFRs for the API through OoTB API policies Part-1 | MuleSoft Mysore ...
 
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemSecurity Best Practices for Your Ignition System
Security Best Practices for Your Ignition System
 
Blueprint for omnichannel integration architecture
Blueprint for omnichannel integration architectureBlueprint for omnichannel integration architecture
Blueprint for omnichannel integration architecture
 
Mikrotik API
Mikrotik APIMikrotik API
Mikrotik API
 
Peeling the Onion: Making Sense of the Layers of API Security
Peeling the Onion: Making Sense of the Layers of API SecurityPeeling the Onion: Making Sense of the Layers of API Security
Peeling the Onion: Making Sense of the Layers of API Security
 
Uncover the Flex Gateway with a Demonstration (1).pdf
Uncover the Flex Gateway with a Demonstration (1).pdfUncover the Flex Gateway with a Demonstration (1).pdf
Uncover the Flex Gateway with a Demonstration (1).pdf
 

More from Alexandra N. Martinez

Mejora tu productividad creando aplicaciones de Slack
Mejora tu productividad creando aplicaciones de SlackMejora tu productividad creando aplicaciones de Slack
Mejora tu productividad creando aplicaciones de SlackAlexandra N. Martinez
 
Women Who Mule - Workshop series #2: Ghost
Women Who Mule - Workshop series #2: GhostWomen Who Mule - Workshop series #2: Ghost
Women Who Mule - Workshop series #2: GhostAlexandra N. Martinez
 
Women Who Mule - Workshop series: Create your own blog from scratch without a...
Women Who Mule - Workshop series: Create your own blog from scratch without a...Women Who Mule - Workshop series: Create your own blog from scratch without a...
Women Who Mule - Workshop series: Create your own blog from scratch without a...Alexandra N. Martinez
 
Toronto Virtual Meetup #12 - Testing Strategies and MUnit Test Recorder
Toronto Virtual Meetup #12 - Testing Strategies and MUnit Test RecorderToronto Virtual Meetup #12 - Testing Strategies and MUnit Test Recorder
Toronto Virtual Meetup #12 - Testing Strategies and MUnit Test RecorderAlexandra N. Martinez
 
Toronto Virtual Meetup #11 - Reviewing Complex DataWeave Transformation Use-case
Toronto Virtual Meetup #11 - Reviewing Complex DataWeave Transformation Use-caseToronto Virtual Meetup #11 - Reviewing Complex DataWeave Transformation Use-case
Toronto Virtual Meetup #11 - Reviewing Complex DataWeave Transformation Use-caseAlexandra N. Martinez
 
Cómo generar e implementar monitoreo para aplicaciones de Mule
Cómo generar e implementar monitoreo para aplicaciones de MuleCómo generar e implementar monitoreo para aplicaciones de Mule
Cómo generar e implementar monitoreo para aplicaciones de MuleAlexandra N. Martinez
 
reCONNECT 2021 May Meetup - Women Who Mule #4
reCONNECT 2021 May Meetup - Women Who Mule #4reCONNECT 2021 May Meetup - Women Who Mule #4
reCONNECT 2021 May Meetup - Women Who Mule #4Alexandra N. Martinez
 
Women Who Mule - April Meetup (Diane Kesler's Journey)
Women Who Mule - April Meetup (Diane Kesler's Journey)Women Who Mule - April Meetup (Diane Kesler's Journey)
Women Who Mule - April Meetup (Diane Kesler's Journey)Alexandra N. Martinez
 
Toronto Virtual Meetup #9 - KPIs and metrics accelerator
Toronto Virtual Meetup #9 - KPIs and metrics acceleratorToronto Virtual Meetup #9 - KPIs and metrics accelerator
Toronto Virtual Meetup #9 - KPIs and metrics acceleratorAlexandra N. Martinez
 
Reviewing a complex dataweave transformation use case v3
Reviewing a complex dataweave transformation use case v3Reviewing a complex dataweave transformation use case v3
Reviewing a complex dataweave transformation use case v3Alexandra N. Martinez
 
What is munit and how to create your first unit test
What is munit and how to create your first unit testWhat is munit and how to create your first unit test
What is munit and how to create your first unit testAlexandra N. Martinez
 
Toronto Virtual Meetup #8 - Tips for Reusability
Toronto Virtual Meetup #8 - Tips for ReusabilityToronto Virtual Meetup #8 - Tips for Reusability
Toronto Virtual Meetup #8 - Tips for ReusabilityAlexandra N. Martinez
 
Meetup en español #6 - MuleSoft para profesionales de Java (segunda edición)
Meetup en español #6 - MuleSoft para profesionales de Java (segunda edición)Meetup en español #6 - MuleSoft para profesionales de Java (segunda edición)
Meetup en español #6 - MuleSoft para profesionales de Java (segunda edición)Alexandra N. Martinez
 
Meetup en español #5 - Continuous Integration and Continuous Delivery (CI/CD)...
Meetup en español #5 - Continuous Integration and Continuous Delivery (CI/CD)...Meetup en español #5 - Continuous Integration and Continuous Delivery (CI/CD)...
Meetup en español #5 - Continuous Integration and Continuous Delivery (CI/CD)...Alexandra N. Martinez
 
Reviewing a Complex DataWeave Transformation Use-case v2
Reviewing a Complex DataWeave Transformation Use-case v2Reviewing a Complex DataWeave Transformation Use-case v2
Reviewing a Complex DataWeave Transformation Use-case v2Alexandra N. Martinez
 
How to use Salesforce composite request connector in Mule
How to use Salesforce composite request connector in MuleHow to use Salesforce composite request connector in Mule
How to use Salesforce composite request connector in MuleAlexandra N. Martinez
 
Meetup en español #4 - MuleSoft para profesionales de Java
 Meetup en español #4 - MuleSoft para profesionales de Java Meetup en español #4 - MuleSoft para profesionales de Java
Meetup en español #4 - MuleSoft para profesionales de JavaAlexandra N. Martinez
 

More from Alexandra N. Martinez (20)

Mejora tu productividad creando aplicaciones de Slack
Mejora tu productividad creando aplicaciones de SlackMejora tu productividad creando aplicaciones de Slack
Mejora tu productividad creando aplicaciones de Slack
 
Women Who Mule - Workshop series #2: Ghost
Women Who Mule - Workshop series #2: GhostWomen Who Mule - Workshop series #2: Ghost
Women Who Mule - Workshop series #2: Ghost
 
Women Who Mule - Workshop series: Create your own blog from scratch without a...
Women Who Mule - Workshop series: Create your own blog from scratch without a...Women Who Mule - Workshop series: Create your own blog from scratch without a...
Women Who Mule - Workshop series: Create your own blog from scratch without a...
 
Toronto Virtual Meetup #12 - Testing Strategies and MUnit Test Recorder
Toronto Virtual Meetup #12 - Testing Strategies and MUnit Test RecorderToronto Virtual Meetup #12 - Testing Strategies and MUnit Test Recorder
Toronto Virtual Meetup #12 - Testing Strategies and MUnit Test Recorder
 
Women Who Mule - June Meetup (EMEA)
Women Who Mule - June Meetup (EMEA)Women Who Mule - June Meetup (EMEA)
Women Who Mule - June Meetup (EMEA)
 
Toronto Virtual Meetup #11 - Reviewing Complex DataWeave Transformation Use-case
Toronto Virtual Meetup #11 - Reviewing Complex DataWeave Transformation Use-caseToronto Virtual Meetup #11 - Reviewing Complex DataWeave Transformation Use-case
Toronto Virtual Meetup #11 - Reviewing Complex DataWeave Transformation Use-case
 
Cómo generar e implementar monitoreo para aplicaciones de Mule
Cómo generar e implementar monitoreo para aplicaciones de MuleCómo generar e implementar monitoreo para aplicaciones de Mule
Cómo generar e implementar monitoreo para aplicaciones de Mule
 
reCONNECT 2021 May Meetup - Women Who Mule #4
reCONNECT 2021 May Meetup - Women Who Mule #4reCONNECT 2021 May Meetup - Women Who Mule #4
reCONNECT 2021 May Meetup - Women Who Mule #4
 
Women Who Mule - April Meetup (Diane Kesler's Journey)
Women Who Mule - April Meetup (Diane Kesler's Journey)Women Who Mule - April Meetup (Diane Kesler's Journey)
Women Who Mule - April Meetup (Diane Kesler's Journey)
 
Toronto Virtual Meetup #9 - KPIs and metrics accelerator
Toronto Virtual Meetup #9 - KPIs and metrics acceleratorToronto Virtual Meetup #9 - KPIs and metrics accelerator
Toronto Virtual Meetup #9 - KPIs and metrics accelerator
 
Reviewing a complex dataweave transformation use case v3
Reviewing a complex dataweave transformation use case v3Reviewing a complex dataweave transformation use case v3
Reviewing a complex dataweave transformation use case v3
 
Introduction to MuleSoft
Introduction to MuleSoftIntroduction to MuleSoft
Introduction to MuleSoft
 
What is munit and how to create your first unit test
What is munit and how to create your first unit testWhat is munit and how to create your first unit test
What is munit and how to create your first unit test
 
Truly Human part 1
Truly Human part 1Truly Human part 1
Truly Human part 1
 
Toronto Virtual Meetup #8 - Tips for Reusability
Toronto Virtual Meetup #8 - Tips for ReusabilityToronto Virtual Meetup #8 - Tips for Reusability
Toronto Virtual Meetup #8 - Tips for Reusability
 
Meetup en español #6 - MuleSoft para profesionales de Java (segunda edición)
Meetup en español #6 - MuleSoft para profesionales de Java (segunda edición)Meetup en español #6 - MuleSoft para profesionales de Java (segunda edición)
Meetup en español #6 - MuleSoft para profesionales de Java (segunda edición)
 
Meetup en español #5 - Continuous Integration and Continuous Delivery (CI/CD)...
Meetup en español #5 - Continuous Integration and Continuous Delivery (CI/CD)...Meetup en español #5 - Continuous Integration and Continuous Delivery (CI/CD)...
Meetup en español #5 - Continuous Integration and Continuous Delivery (CI/CD)...
 
Reviewing a Complex DataWeave Transformation Use-case v2
Reviewing a Complex DataWeave Transformation Use-case v2Reviewing a Complex DataWeave Transformation Use-case v2
Reviewing a Complex DataWeave Transformation Use-case v2
 
How to use Salesforce composite request connector in Mule
How to use Salesforce composite request connector in MuleHow to use Salesforce composite request connector in Mule
How to use Salesforce composite request connector in Mule
 
Meetup en español #4 - MuleSoft para profesionales de Java
 Meetup en español #4 - MuleSoft para profesionales de Java Meetup en español #4 - MuleSoft para profesionales de Java
Meetup en español #4 - MuleSoft para profesionales de Java
 

Recently uploaded

OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxakanksha16arora
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 

Recently uploaded (20)

OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 

Toronto Virtual Meetup #5 - API Security and Threats

  • 1. Hello! Introduce yourself in the chat while we wait for more people to join!  We’ll begin in some minutes… 1
  • 2. Sep 30, 2020 Toronto MuleSoft Meetup Group API Security and Threats
  • 3. 3 ● Introductions ● API Security and Threats ● What’s next? ● Next event Agenda
  • 4. 4 ●About the organizers: ○ Alexandra Martinez ○ Mahesh Pujari ○ Pravallika Nagaraja ○ Kishore Reddy Paluri Introductions A SHOW OF HANDS: Who is new to this Meetup?
  • 5. Satyam Patel Technical Architect at Incepta API Security and Threats
  • 6. 6 ● Introductions ● Background of APIs ● API Threats ● API Security ● Securing through MuleSoft ● Take away ● Networking time Agenda
  • 7. 7 ●About the me ○ Satyam Patel, Technical Architect ○ 8+ years in integration domain ○ Performed various roles from developer to project lead ○ Aviation, Oil and Gas industry domains ○ webMethods ESB and BPM ○ MuleSoft integration platform ○ Mule 4.x, Dell Boomi, AWS Solutions Architect Associate, webMethods 9.x certifications ○ Enjoy outdoor activities – hiking, biking, skiing, camping etc. Introductions
  • 9. 9 ● Brief history of APIs – Quick timeline ○ 1950s – 1970s: Subroutines, Libraries, FORTRAN, IBM instruction set, C Standard libraries, Idea of reimplementation ○ 1980s – 1990s: Interface between HWs and OS, BIOS, Printers, CLIs, etc. ○ 1990s – 2000s: Windows OS APIs, UNIX, Java class libraries and functions, Delicious web APIs ● Rise of API based IT solutions (2000s and onwards) ○ CRM – Salesforce officially launched its API on February 7, 2000 ○ eBay – On November 20, 2000, eBay launched the eBay Application Program Interface (API) along with the eBay Developers Program ○ Amazon – On July 16, 2002, Amazon launched Amazon.com Web Services ● The present and the possible future ○ Social media boom – FB, Flickr, Twitter, etc. Background of APIs
  • 10. 10 ● APIs currently account for 83% of all hits on internet ● Media organizations are the largest users ● Need for seamless integrations across industries ● Rise of IoT devices, Mobile apps, Smart homes, complex systems in Aviation and cars, unified platforms and more ! ● What’s the next big thing? Where are we today and what’s coming in future? The growth over time of the ProgrammableWeb API directory to more than 23,000 entries
  • 11. 11 ●Infrastructure ○ Architecture ○ Networking & VPCs ○ Load balancing ○ Firewalls ●Solutions ○ Design and structure ○ Data handling ○ Connectivity ●Data ○ Storage and management ○ Access control Overall security areas
  • 12. 12 General security framework ●Identify ○ Assess and Strategize ●Protect ○ Implement and Secure ●Detect ○ Intelligent monitoring ●Respond ○ Analyze and Mitigate ●Recover ○ Plan and Improve
  • 13. 13 Incidents of breaches Source: https://krebsonsecurity.com/2018/04/panerabread-com-leaks-millions-of-customer-records/
  • 18. Security threats and building blocks API THREATS
  • 19. 19 ● Injection Attacks – A malicious code, usually a query or a script, is embedded into an unsecured software program ● Man-In-The-Middle-Attack (MITM) – An unauthorized third party secretly relays and possibly alters the communications between two parties ● CSRF Attack – Cross-Site Request Forgery (CSRF) force logged-in users to silently open URLs that perform actions unintentionally REST API security threats
  • 20. 20 ● Broken Access Control – An attacker can bypass or control authentication into web applications compromising web tokens, API keys, passwords, account recovery options, password reset methods, etc. ● Distributed Denial of Services – Most common type of attack where a malicious attempt is made to disrupt normal traffic ● Web Parameter Tampering – Based on the manipulation of parameters exchanged between client and server ● Sensitive Data Exposure – When sensitive data isn’t encrypted in transit or at rest it could lead to abuse of this information REST API security threats
  • 21. Security as a design principle API SECURITY SOLUTIONS
  • 24. 24 ● Enforce secure communications ○ Enable TLS 1.2 or subsequent versions, in accordance with CSE guidance. ● Design APIs to be resistant to attacks ○ Treat all submitted data as untrusted and validate before processing ● Avoid putting sensitive data in request URLs ○ URL strings can be tracked and compromised ● Protect access to APIs ○ Authenticate and authorize before any operation ○ Use open standards such as OpenID Connect and Open Authorization 2.0 (OAuth 2.0) API security best practices
  • 25. 25 ● Use gateways and proxies instead of whitelists ○ Use a secure gateway layer to provide a security control point instead of simply whitelisting inbound Internet Protocol addresses (IPs) ● Integrate security testing ○ Automate security testing to validate any new changes to API source code ● Audit access to sensitive data ○ Access to APIs dealing with sensitive and/or personal data must be logged for future audit and reviewed on a regular basis ● Log and monitor for performance and activity ○ Track usage and monitor for suspicious activity including abnormal access patterns such as after-hours requests, large data requests, etc. API security best practices
  • 26. 26 ● Identity: ○ User and app authentication ○ API and server authentication ○ User and app authorization ● Identity Provider: ○ Single Sign-on multi-experience ○ Single Sign-on single experience ○ WS-Security with SAML Assertions ○ OpenID Connect with JWT ID Tokens API security best practices
  • 27. 27 ● Message Integrity ○ Digital Signatures ● Message confidentiality ○ Public key cryptography ○ Digital Certificates ○ Mutual authentication with Digital Certificates ○ HTTPS ● Availability API security best practices
  • 28. 28 ● Handling of data – know the data, share minimum and only required data (yes, even with reusability) – Implement data masking, encryptions for sensitive data etc. ● Accessing end systems – Securely access the end systems, ask for limited access, restrictions ● Temporary storage of business data – shouldn’t be stored locally, if at all required should clear it when processed ● Object stores – do not store sensitive information in memory API Design considerations for security
  • 30. 30 ● API Manager ● Secret Manager ● Access Manager ● Monitoring Dashboards ● Alerting Mechanism ● Ability to externalize logs for analysis MuleSoft Provided Components
  • 31. 31 MuleSoft API Manager ● API Manager Policy types ○ Default Policies ○ Automated Policies ○ Custom Policies ● Policy classification ○ Security ○ Compliance ○ Transformation ○ Troubleshooting ○ Quality of Service
  • 32. 32 ● Security ○ Basic Authentication – LDAP - Authenticates the LDAP credentials ○ Basic Authentication – Simple - Authenticates a single user password ○ IP Blacklist – Blocks a range of IP addresses. ○ IP Whitelist – Allows access from only a preapproved range of IP addresses ○ JSON Threat Protection– Protects against a malicious JSON structure in API requests ○ XML Threat Protection – Protects against malicious XML elements in API requests ○ Client ID Enforcement – Allows access to client applications with a valid client credentials ○ JWT – Validates a JWT token MuleSoft Provided API Policies
  • 33. 33 ● Security ○ OAuth 2.0 Access Token Enforcement Using Mule OAuth Provider Policy – Enforces token access using the MuleSoft OAuth Provider policy. ○ OpenAM Access Token Enforcement – Restricts access to a protected resource using an Open AM authentication server. ○ PingFederate Access Token Enforcement – Restricts access to a protected resource using the PingFederate authentication server. ○ Tokenization – Transforms sensitive data into non-sensitive equivalent tokens. ○ Detokenization – Transforms a tokenized value back to the original data MuleSoft Provided API Policies
  • 34. 34 ● Compliance ○ Client ID Enforcement – Allows access to client applications with a valid client credentials ○ CORS – Enables calls executed in a web page to interact with resources from different domains ● Quality of Service ○ HTTP Caching – Stores HTTP responses from an API implementation ○ Rate Limiting – Enables imposing a limit on the number of requests that an API can accept within a specified time. ○ Rate Limiting, SLA-Based – Enables imposing an API request limit based on SLA tiers. ○ Spike Control – Controls API traffic and provides queuing feature  Message Logging – Logs a custom message when an API is invoked. MuleSoft Provided API Policies
  • 36. API manager alerts ● An API alert is an alarm that flags one of the following problems: ○ The API request violates a policy Automated Policies ○ Requests received by the API exceed a given number within a period of time ○ The API returns a specified HTTP error code ○ The API response time exceeds a certain amount 36
  • 37. API event analytics and forwarding 37 ● Analytics providing data on ○ Requests by Date ○ Requests by Location ○ Requests by Application ○ Requests by Platform ● Externalize analytics data ○ API Analytics Report API ○ Forward API Analytics events
  • 38. Runtime manager alerts ● Number of errors ○ The number of errors in one minute reaches the specified limit ● Number of Mule messages ○ The number of Mule messages since the application started reaches the specified limit ● Response time ○ The response time reaches the specified limit ● Use Runtime Manager to Export Data to External Analytics Tools ○ Splunk and Elk plugins 38
  • 39. Are the APIs truly secured? API SECURITY ACHIEVED?
  • 40. 40 ● Try some attacks yourself ● Find some tools or apps to test policies ● Get the organization’s security department to test the code and environment ● Have professionals attack and assess API security ● Regular Pen-tests Have APIs attacked!
  • 41. 41 ● Credentials ● Authentication ● Authorization ● Session ● Privacy ● Data ● Certificates Security testing areas ● Source ● System ● Files ● Logs ● Emails ● Services ● Cryptography ● Architecture ● Networks ● Virtualization ● Physical ● Mobile ● Social
  • 43. 43 ● Know the big picture, the infrastructure and business ● Security comes at a cost ● There will be side-effects ● Only recommend what’s right and needed ● There’s no one way to do it ● Ensure it gets thoroughly tested for security ● Security is not one-time activity ● Leverage proactive monitoring and implement policies ● Follow best practices and be as restrictive as possible in API design ● Discuss in the community, let MS know for additional support Take away
  • 44. For investing your time and participating THANK YOU
  • 45. 45 ● Blog - http://bit.ly/APISecurityBlog ● Connect on LinkedIn - http://bit.ly/LinkSatyam ● Please spend few seconds to post your valuable feedback here - http://bit.ly/MS-feedback Connect with me – feedback/ideas
  • 47. How does the quiz work? 1. Organizers show the question. 2. Organizers read the question out loud. 3. Organizers will write in the chat the following message: “Answers from question n start here” after reading the question. 4. Only answers that appear after this message will be taken into account. 5. A final raffle, with the people that answered the quiz correctly, will take place after the quiz, where the 3 lucky winners will receive a training or certification voucher. 6. The 3 winners will send their email in the chat so we can contact them for further steps. 47
  • 48. Rules: 1. First person to give the correct answer in the chat will enter the final raffle. 2. If you already answered one question correctly, please stop answering and give a chance to the rest. You don’t receive “extra points” for answering correctly more than once. 3. If the answer is sent before the “Answers from question n start here” message appears in the chat, it won’t be taken into account. 48
  • 49. 1. Which business launched their first APIs in 2000? 49
  • 50. 1. Which business launched their first APIs in 2000? A: Salesforce 50
  • 51. 2. Name of a popular web API directory where public APIs are published. World’s leading source for internet-based application programming interfaces (APIs). 51
  • 52. 2. Name of a popular web API directory where public APIs are published. World’s leading source for internet-based application programming interfaces (APIs). A: Programmableweb 52
  • 53. 3. What would this type of attack be called where the message in transit was compromised and possibly altered? 53
  • 54. 3. What would this type of attack be called where the message in transit was compromised and possibly altered? A: Man-In-The-Middle-Attack (MITM) 54
  • 55. 4. Can you set an alert in Anypoint Platform if a request is coming from some geographic location? 55
  • 56. 4. Can you set an alert in Anypoint Platform if a request is coming from some geographic location? A: No (false) 56
  • 57. 5. Can you set an alert in Anypoint Platform if the payload’s size is above some threshold? 57
  • 58. 5. Can you set an alert in Anypoint Platform if the payload’s size is above some threshold? A: No (false) 58
  • 59. 6. What policy could help limit the number of API hits in a given period of time? 59
  • 60. 6. What policy could help limit the number of API hits in a given period of time? A: Rate Limiting SLA 60
  • 61. 7. Which policy helps in controlling API traffic and provides support for queuing? 61
  • 62. 7. Which policy helps in controlling API traffic and provides support for queuing? A: Spike Control 62
  • 63. 8. Incidents of breaches – What was this type of attack on Panera Bread? Please apply knowledge of attacks. 63
  • 64. 8. Incidents of breaches – What was this type of attack on Panera Bread? Please apply knowledge of attacks. A: Possibly Web parameter tampering OR SQL injection OR both. 64
  • 65. 65 ● Share: ○ Tweet using the hashtag #MuleSoftMeetups ○ Invite your network to join: https://meetups.mulesoft.com/toronto/ ● Feedback: ○ Fill out the survey feedback and suggest topics for upcoming events ○ Contact MuleSoft at meetups@mulesoft.com for ways to improve the program What’s next?
  • 66. 66 ● Toronto Virtual Meetup #6 - How to use Salesforce composite request connector in Mule ○ Wed, Oct 21, 2020 ○ 5:30 PM (EDT) ● Speaker: ○ Rajiv Mishra ○ Associate at Cognizant Technology Solutions ● https://meetups.mulesoft.com/events/details/mulesoft-toronto-presents-toronto-virtual-meetup- 6-how-to-use-salesforce-composite-request-connector-in-mule/#/ Next event