SlideShare a Scribd company logo
Akana by Perforce © 2019 Perforce Software, Inc.
API Lifecycle Management
AVOIDING BREACHES BY SECURING THE DEVELOPMENT PROCESS
akana.com2 | Akana by Perforce © 2020 Perforce Software, Inc.
Overview
Not only do you need to secure your APIs, you
also need to secure the API lifecycle.
Today’s discussion:
• How new APIs originate
• Securing the API development process
• Structuring API delivery workflows
• Integrating with CI/CD/DevOps for automation
45% of respondents aren’t confident in their security organization's ability to detect
whether a bad actor is accessing their APIs. In fact, 51% aren't even confident their
security team knows about all of the APIs that exist in the organization.
- Ping Identity Survey
akana.com3 | Akana by Perforce © 2020 Perforce Software, Inc.
Rod Cope
CTO, Perforce Software
• CTO at Rogue Wave Software
• Founder and CTO of OpenLogic
• 25+ year software career includes IBM, IBM Global
Services, General Electric, and Anthem Blue
Cross/Blue Shield.
• Worldwide event speaker, including: APIdays,
OSCON, Embedded World, ApacheCon, JavaOne,
Strata/Big Data, LinuxCon, and API World.
How Do New APIs Originate?
akana.com5 | Akana by Perforce © 2020 Perforce Software, Inc.
How Do New APIs Originate?
• New business channels
• New web/mobile applications
• Customer needs
The Importance of a Security-First API Management Strategy
(Or, Why “OK” Security Isn’t Good Enough)
akana.com7 | Akana by Perforce © 2020 Perforce Software, Inc.
API Security Matters
"Hackers Swipe Data On
2 Million T-Mobile
Subscribers"…
"Hackers managed to
breach a database by
exploiting a vulnerable
API..."
"Salesforce Security
Alert: API Error Exposed
Marketing Data"
"API Breaches Surge With
No Relief in Sight"
"Fitness app Strava
showed the world
how even seemingly
innocuous APIs can
have damaging
consequences when not
securely designed."
"Google announced
that an additional bug
in a Google+ API had
exposed user data from
52.5 million accounts."
akana.com8 | Akana by Perforce © 2020 Perforce Software, Inc.
Setting the Stage for Disruption
How do you prevent rogue services from getting deployed?
How do you secure processes?
How do you integrate with CI/CD?
akana.com10 | Akana by Perforce © 2020 Perforce Software, Inc.
Akana API Lifecycle
Management
akana.com11 | Akana by Perforce © 2020 Perforce Software, Inc.
Lifecycle Management Components
Lifecycle Manager
• Automate machine and role-based validations and
signoffs across the software development lifecycle.
Lifecycle Coordinator
• Automated API configuration and promotion through
runtime staging environments.
• Eliminate hands-on actions as much as possible.
Lifecycle Repository
• Add extensible metadata for APIs, apps, and users
akana.com12 | Akana by Perforce © 2020 Perforce Software, Inc.
API Lifecycle Review/Approval Process
REQUIREMENTS DESIGN DEVELOP
API CREATION PROCESS – DEMO SCENARIO
Developer Submitter
Lifecycle Manager
Automation
Architect Approver
Lifecycle Manager
Automation
API Submitted
API Updated and
Submitted
API Updated and
Submitted
Process API Process API
Architect
Approved?
API
Published
API Not
Published
API
Published
API Not
Published
API
Published
API Not
Published
Yes YesNoNo YesNo
Architect
Approved?
Architect
Approved?
akana.com13 | Akana by Perforce © 2020 Perforce Software, Inc.
promote promote promote
Akana and CI/CD
Lifecycle Coordinator
API Platform
Dev
API Platform
Test
API Platform
Staging
API Platform
Production
CI/CD Platform
(e.g., Jenkins)
DevOps
Stakeholder
Dev CI/CD
akana.com14 | Akana by Perforce © 2020 Perforce Software, Inc.
Secure Cloud
Architecture
PRODUCTION
STAGING
DEVELOPMENT TEST
akana.com15 | Akana by Perforce © 2020 Perforce Software, Inc.
How Akana Fits Into Your Existing Architecture
DEVELOPER
SERVICES
MGMT.
SERVICES
SECURITY
SERVICES
ANALYTICS
SERVICES
akana.com16 | Akana by Perforce © 2020 Perforce Software, Inc.
Key API Security Policy Examples
Protect against vulnerabilities presented in OWASP API
Security Top 10, such as:
• Broken Object Level Authorization
• Broken Authentication
• Lack of Resources and Rate Limiting
• Broken Function Level Authorization
• Improper Assets Management
akana.com17 | Akana by Perforce © 2020 Perforce Software, Inc.
Security Policy Example - Malicious Pattern Detection
• Inspects HTTP for dangerous content
• If dangerous, rejects and returns a fault
What Does Security-First
Lifecycle Management Look Like?
akana.com19 | Akana by Perforce © 2020 Perforce Software, Inc.
Demo Scenario
• Three stage environment – Dev, Test, and Acc (Staging)
• Solution Architect approval required to exit Dev
• Enterprise Architect and IT Security notified for optional comment
• Solution Architect approval required to promote from Test to Acc
• API Owner initiates minor version (non-breaking) update to promoted API from Dev portal
akana.com20 | Akana by Perforce © 2020 Perforce Software, Inc.
1 - API in Dev with Metadata (Tags)
akana.com21 | Akana by Perforce © 2020 Perforce Software, Inc.
2 - API Owner Requests Dev Approval
akana.com22 | Akana by Perforce © 2020 Perforce Software, Inc.
3 - Solution Architect Approves API
akana.com23 | Akana by Perforce © 2020 Perforce Software, Inc.
4 - Workflow Initiates Auto-Promotion
akana.com24 | Akana by Perforce © 2020 Perforce Software, Inc.
5 - API Promoted to Test
akana.com25 | Akana by Perforce © 2020 Perforce Software, Inc.
6 - API Promotion to Acc Pending
akana.com26 | Akana by Perforce © 2020 Perforce Software, Inc.
7 - Solution Architect Approves API
akana.com27 | Akana by Perforce © 2020 Perforce Software, Inc.
8 - API Promoted to Acc (Staging)
akana.com28 | Akana by Perforce © 2020 Perforce Software, Inc.
9 - API Status in Dev Tenant Auto-Updated
akana.com29 | Akana by Perforce © 2020 Perforce Software, Inc.
10 - API Owner Initiates Reversion for Minor Version Update
akana.com30 | Akana by Perforce © 2020 Perforce Software, Inc.
Regardless of your size, you still have the same tech requirements.
The new Akana SaaS Club gives you our full-featured enterprise API
management solution – without the investment or implementation time.
QuickStart packages are right-sized to your needs. As you grow,
we’ll grow with you!
Get started with Akana API Management faster and more
affordably than ever before.
Akana QuickStart
S U G G E S T E D P A C K A G E :
250 Gb/month
Total bandwidth in/out of the gateway
Learn more at akana.com/akana-quickstart
Q&A

More Related Content

PDF
apidays LIVE New York - Building Great Web APIs by Mike Amundsen
PPTX
apidays LIVE New York - API Lifecycle Management - Avoiding Breaches By Secur...
PDF
apidays LIVE New York - Navigating the Sea of Javascript Tools to Discover Sc...
PDF
apidays LIVE New York - Automation API Testing: with Postman collection are ...
PDF
How to Achieve Agile API Security
PPTX
API Security Lifecycle
PDF
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
PPTX
API Services: Building State-of-the-Art APIs
apidays LIVE New York - Building Great Web APIs by Mike Amundsen
apidays LIVE New York - API Lifecycle Management - Avoiding Breaches By Secur...
apidays LIVE New York - Navigating the Sea of Javascript Tools to Discover Sc...
apidays LIVE New York - Automation API Testing: with Postman collection are ...
How to Achieve Agile API Security
API Security Lifecycle
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
API Services: Building State-of-the-Art APIs

What's hot (20)

PDF
REST API Security by Design with Azure Pipelines
PPTX
Adapt or Die Sydney - API Security
PDF
Enhancing your Security APIs
PPTX
Executing on API Developer Experience
PDF
Pivotal + Apigee Workshop (June 4th, 2019)
PDF
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
PPTX
Apigee Edge Overview and Roadmap
PDF
APIdays Paris 2019 - Improve the Security of Your APIs by Securing the API Li...
PPTX
APImetrics Product Introduction
PPTX
Webcast: Apigee Edge Product Demo
PPTX
API Services: Harness the Power of Enterprise Infrastructure
PPTX
What are your APIs Worth?
PDF
Mobile - Your API Security Blindspot by David Stewart, Approov
PDF
I Love APIs 2015: Implementing an API Tier to Enable a New Mobile Platform
PPTX
apidays LIVE Paris - Principles for API security by Alan Glickenhouse
PDF
Cloud-native Patterns (July 4th, 2019)
PDF
A Checklist for Every API Call
PPTX
App & API Monitoring: Building a 5-Star Reputation for your Apps
PPTX
Mulesoft Connections to different companies, and different services
PPTX
APIdays Paris 2019 - Microservices vs Miniservices vs Monoliths: Winner Takes...
REST API Security by Design with Azure Pipelines
Adapt or Die Sydney - API Security
Enhancing your Security APIs
Executing on API Developer Experience
Pivotal + Apigee Workshop (June 4th, 2019)
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
Apigee Edge Overview and Roadmap
APIdays Paris 2019 - Improve the Security of Your APIs by Securing the API Li...
APImetrics Product Introduction
Webcast: Apigee Edge Product Demo
API Services: Harness the Power of Enterprise Infrastructure
What are your APIs Worth?
Mobile - Your API Security Blindspot by David Stewart, Approov
I Love APIs 2015: Implementing an API Tier to Enable a New Mobile Platform
apidays LIVE Paris - Principles for API security by Alan Glickenhouse
Cloud-native Patterns (July 4th, 2019)
A Checklist for Every API Call
App & API Monitoring: Building a 5-Star Reputation for your Apps
Mulesoft Connections to different companies, and different services
APIdays Paris 2019 - Microservices vs Miniservices vs Monoliths: Winner Takes...
Ad

Similar to apidays LIVE LONDON - API Lifecycle Management - Avoiding Breaches By Securing the Development Process by Rod Cope (20)

PPTX
apidays LIVE New York 2021 - API Automation For DevOps at Scale by Rod Cope, ...
PPTX
Apidays London 2024 - Securing APIs, Beyond the Basics with Advanced Security...
PPTX
apidays LIVE Australia 2020 - Multigrain services: micro vs. mini vs. mac by ...
PDF
Accelerating Digital Transformation With API Lifecycle & Test Automation
PDF
Apidays London 2024 - From Fragmentation to Federation, Peter Mörsch, Boomi.pdf
PPTX
The Datacenter API
PPTX
The Datacenter API
PPTX
WaveMaker API Success
PDF
B7 api management_enabling_digital_transformation
PPTX
Getting the most from your API management platform: A case study
PDF
CA API Management: A DevOps Enabler
PDF
Infrastructure as Code in Large Scale Organizations
PPTX
Will you survive the API avalanche?
PPTX
APIdays London 2019 - Microservices vs Miniservices vs Monolithics: Winner Ta...
PDF
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
PPTX
API Economy - Cuomo
PDF
API Design Essentials - Akana Platform Overview
PPTX
AWS DevDay Cologne - CI/CD for modern applications
PPTX
API Best Practices
PDF
Design - Start Your API Journey Today
apidays LIVE New York 2021 - API Automation For DevOps at Scale by Rod Cope, ...
Apidays London 2024 - Securing APIs, Beyond the Basics with Advanced Security...
apidays LIVE Australia 2020 - Multigrain services: micro vs. mini vs. mac by ...
Accelerating Digital Transformation With API Lifecycle & Test Automation
Apidays London 2024 - From Fragmentation to Federation, Peter Mörsch, Boomi.pdf
The Datacenter API
The Datacenter API
WaveMaker API Success
B7 api management_enabling_digital_transformation
Getting the most from your API management platform: A case study
CA API Management: A DevOps Enabler
Infrastructure as Code in Large Scale Organizations
Will you survive the API avalanche?
APIdays London 2019 - Microservices vs Miniservices vs Monolithics: Winner Ta...
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
API Economy - Cuomo
API Design Essentials - Akana Platform Overview
AWS DevDay Cologne - CI/CD for modern applications
API Best Practices
Design - Start Your API Journey Today
Ad

More from apidays (20)

PDF
apidays Munich 2025 - The Physics of Requirement Sciences Through Application...
PDF
apidays Munich 2025 - Developer Portals, API Catalogs, and Marketplaces, Miri...
PDF
apidays Munich 2025 - Making Sense of AI-Ready APIs in a Buzzword World, Andr...
PDF
apidays Munich 2025 - Integrate Your APIs into the New AI Marketplace, Senthi...
PDF
apidays Munich 2025 - The Double Life of the API Product Manager, Emmanuel Pa...
PDF
apidays Munich 2025 - Let’s build, debug and test a magic MCP server in Postm...
PDF
apidays Munich 2025 - The life-changing magic of great API docs, Jens Fischer...
PDF
apidays Munich 2025 - Automating Operations Without Reinventing the Wheel, Ma...
PDF
apidays Munich 2025 - Geospatial Artificial Intelligence (GeoAI) with OGC API...
PPTX
apidays Munich 2025 - GraphQL 101: I won't REST, until you GraphQL, Surbhi Si...
PPTX
apidays Munich 2025 - Effectively incorporating API Security into the overall...
PPTX
apidays Munich 2025 - Federated API Management and Governance, Vince Baker (D...
PPTX
apidays Munich 2025 - Agentic AI: A Friend or Foe?, Merja Kajava (Aavista Oy)
PPTX
apidays Munich 2025 - Streamline & Secure LLM Traffic with APISIX AI Gateway ...
PPTX
apidays Munich 2025 - Building Telco-Aware Apps with Open Gateway APIs, Subhr...
PPTX
apidays Munich 2025 - Building an AWS Serverless Application with Terraform, ...
PDF
apidays Helsinki & North 2025 - REST in Peace? Hunting the Dominant Design fo...
PDF
apidays Helsinki & North 2025 - Monetizing AI APIs: The New API Economy, Alla...
PDF
apidays Helsinki & North 2025 - How (not) to run a Graphql Stewardship Group,...
PDF
apidays Helsinki & North 2025 - APIs in the healthcare sector: hospitals inte...
apidays Munich 2025 - The Physics of Requirement Sciences Through Application...
apidays Munich 2025 - Developer Portals, API Catalogs, and Marketplaces, Miri...
apidays Munich 2025 - Making Sense of AI-Ready APIs in a Buzzword World, Andr...
apidays Munich 2025 - Integrate Your APIs into the New AI Marketplace, Senthi...
apidays Munich 2025 - The Double Life of the API Product Manager, Emmanuel Pa...
apidays Munich 2025 - Let’s build, debug and test a magic MCP server in Postm...
apidays Munich 2025 - The life-changing magic of great API docs, Jens Fischer...
apidays Munich 2025 - Automating Operations Without Reinventing the Wheel, Ma...
apidays Munich 2025 - Geospatial Artificial Intelligence (GeoAI) with OGC API...
apidays Munich 2025 - GraphQL 101: I won't REST, until you GraphQL, Surbhi Si...
apidays Munich 2025 - Effectively incorporating API Security into the overall...
apidays Munich 2025 - Federated API Management and Governance, Vince Baker (D...
apidays Munich 2025 - Agentic AI: A Friend or Foe?, Merja Kajava (Aavista Oy)
apidays Munich 2025 - Streamline & Secure LLM Traffic with APISIX AI Gateway ...
apidays Munich 2025 - Building Telco-Aware Apps with Open Gateway APIs, Subhr...
apidays Munich 2025 - Building an AWS Serverless Application with Terraform, ...
apidays Helsinki & North 2025 - REST in Peace? Hunting the Dominant Design fo...
apidays Helsinki & North 2025 - Monetizing AI APIs: The New API Economy, Alla...
apidays Helsinki & North 2025 - How (not) to run a Graphql Stewardship Group,...
apidays Helsinki & North 2025 - APIs in the healthcare sector: hospitals inte...

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
MYSQL Presentation for SQL database connectivity
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation theory and applications.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Dropbox Q2 2025 Financial Results & Investor Presentation
NewMind AI Monthly Chronicles - July 2025
Advanced methodologies resolving dimensionality complications for autism neur...
Building Integrated photovoltaic BIPV_UPV.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Electronic commerce courselecture one. Pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Spectral efficient network and resource selection model in 5G networks
Understanding_Digital_Forensics_Presentation.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
MYSQL Presentation for SQL database connectivity
“AI and Expert System Decision Support & Business Intelligence Systems”
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Machine learning based COVID-19 study performance prediction
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

apidays LIVE LONDON - API Lifecycle Management - Avoiding Breaches By Securing the Development Process by Rod Cope

  • 1. Akana by Perforce © 2019 Perforce Software, Inc. API Lifecycle Management AVOIDING BREACHES BY SECURING THE DEVELOPMENT PROCESS
  • 2. akana.com2 | Akana by Perforce © 2020 Perforce Software, Inc. Overview Not only do you need to secure your APIs, you also need to secure the API lifecycle. Today’s discussion: • How new APIs originate • Securing the API development process • Structuring API delivery workflows • Integrating with CI/CD/DevOps for automation 45% of respondents aren’t confident in their security organization's ability to detect whether a bad actor is accessing their APIs. In fact, 51% aren't even confident their security team knows about all of the APIs that exist in the organization. - Ping Identity Survey
  • 3. akana.com3 | Akana by Perforce © 2020 Perforce Software, Inc. Rod Cope CTO, Perforce Software • CTO at Rogue Wave Software • Founder and CTO of OpenLogic • 25+ year software career includes IBM, IBM Global Services, General Electric, and Anthem Blue Cross/Blue Shield. • Worldwide event speaker, including: APIdays, OSCON, Embedded World, ApacheCon, JavaOne, Strata/Big Data, LinuxCon, and API World.
  • 4. How Do New APIs Originate?
  • 5. akana.com5 | Akana by Perforce © 2020 Perforce Software, Inc. How Do New APIs Originate? • New business channels • New web/mobile applications • Customer needs
  • 6. The Importance of a Security-First API Management Strategy (Or, Why “OK” Security Isn’t Good Enough)
  • 7. akana.com7 | Akana by Perforce © 2020 Perforce Software, Inc. API Security Matters "Hackers Swipe Data On 2 Million T-Mobile Subscribers"… "Hackers managed to breach a database by exploiting a vulnerable API..." "Salesforce Security Alert: API Error Exposed Marketing Data" "API Breaches Surge With No Relief in Sight" "Fitness app Strava showed the world how even seemingly innocuous APIs can have damaging consequences when not securely designed." "Google announced that an additional bug in a Google+ API had exposed user data from 52.5 million accounts."
  • 8. akana.com8 | Akana by Perforce © 2020 Perforce Software, Inc. Setting the Stage for Disruption
  • 9. How do you prevent rogue services from getting deployed? How do you secure processes? How do you integrate with CI/CD?
  • 10. akana.com10 | Akana by Perforce © 2020 Perforce Software, Inc. Akana API Lifecycle Management
  • 11. akana.com11 | Akana by Perforce © 2020 Perforce Software, Inc. Lifecycle Management Components Lifecycle Manager • Automate machine and role-based validations and signoffs across the software development lifecycle. Lifecycle Coordinator • Automated API configuration and promotion through runtime staging environments. • Eliminate hands-on actions as much as possible. Lifecycle Repository • Add extensible metadata for APIs, apps, and users
  • 12. akana.com12 | Akana by Perforce © 2020 Perforce Software, Inc. API Lifecycle Review/Approval Process REQUIREMENTS DESIGN DEVELOP API CREATION PROCESS – DEMO SCENARIO Developer Submitter Lifecycle Manager Automation Architect Approver Lifecycle Manager Automation API Submitted API Updated and Submitted API Updated and Submitted Process API Process API Architect Approved? API Published API Not Published API Published API Not Published API Published API Not Published Yes YesNoNo YesNo Architect Approved? Architect Approved?
  • 13. akana.com13 | Akana by Perforce © 2020 Perforce Software, Inc. promote promote promote Akana and CI/CD Lifecycle Coordinator API Platform Dev API Platform Test API Platform Staging API Platform Production CI/CD Platform (e.g., Jenkins) DevOps Stakeholder Dev CI/CD
  • 14. akana.com14 | Akana by Perforce © 2020 Perforce Software, Inc. Secure Cloud Architecture PRODUCTION STAGING DEVELOPMENT TEST
  • 15. akana.com15 | Akana by Perforce © 2020 Perforce Software, Inc. How Akana Fits Into Your Existing Architecture DEVELOPER SERVICES MGMT. SERVICES SECURITY SERVICES ANALYTICS SERVICES
  • 16. akana.com16 | Akana by Perforce © 2020 Perforce Software, Inc. Key API Security Policy Examples Protect against vulnerabilities presented in OWASP API Security Top 10, such as: • Broken Object Level Authorization • Broken Authentication • Lack of Resources and Rate Limiting • Broken Function Level Authorization • Improper Assets Management
  • 17. akana.com17 | Akana by Perforce © 2020 Perforce Software, Inc. Security Policy Example - Malicious Pattern Detection • Inspects HTTP for dangerous content • If dangerous, rejects and returns a fault
  • 18. What Does Security-First Lifecycle Management Look Like?
  • 19. akana.com19 | Akana by Perforce © 2020 Perforce Software, Inc. Demo Scenario • Three stage environment – Dev, Test, and Acc (Staging) • Solution Architect approval required to exit Dev • Enterprise Architect and IT Security notified for optional comment • Solution Architect approval required to promote from Test to Acc • API Owner initiates minor version (non-breaking) update to promoted API from Dev portal
  • 20. akana.com20 | Akana by Perforce © 2020 Perforce Software, Inc. 1 - API in Dev with Metadata (Tags)
  • 21. akana.com21 | Akana by Perforce © 2020 Perforce Software, Inc. 2 - API Owner Requests Dev Approval
  • 22. akana.com22 | Akana by Perforce © 2020 Perforce Software, Inc. 3 - Solution Architect Approves API
  • 23. akana.com23 | Akana by Perforce © 2020 Perforce Software, Inc. 4 - Workflow Initiates Auto-Promotion
  • 24. akana.com24 | Akana by Perforce © 2020 Perforce Software, Inc. 5 - API Promoted to Test
  • 25. akana.com25 | Akana by Perforce © 2020 Perforce Software, Inc. 6 - API Promotion to Acc Pending
  • 26. akana.com26 | Akana by Perforce © 2020 Perforce Software, Inc. 7 - Solution Architect Approves API
  • 27. akana.com27 | Akana by Perforce © 2020 Perforce Software, Inc. 8 - API Promoted to Acc (Staging)
  • 28. akana.com28 | Akana by Perforce © 2020 Perforce Software, Inc. 9 - API Status in Dev Tenant Auto-Updated
  • 29. akana.com29 | Akana by Perforce © 2020 Perforce Software, Inc. 10 - API Owner Initiates Reversion for Minor Version Update
  • 30. akana.com30 | Akana by Perforce © 2020 Perforce Software, Inc. Regardless of your size, you still have the same tech requirements. The new Akana SaaS Club gives you our full-featured enterprise API management solution – without the investment or implementation time. QuickStart packages are right-sized to your needs. As you grow, we’ll grow with you! Get started with Akana API Management faster and more affordably than ever before. Akana QuickStart S U G G E S T E D P A C K A G E : 250 Gb/month Total bandwidth in/out of the gateway Learn more at akana.com/akana-quickstart
  • 31. Q&A

Editor's Notes

  • #3: Abstract:   In the race to unlock new business channels and create more value, there is always a push to develop new APIs. But how do they get from idea to value? And how do you ensure that they are developed not only swiftly, but securely? Strict top-down control destroys speed, but no governance puts you at major risk of regulatory and compliance violations.   Any phase of your API lifecycle - from strategy and design to deployment and optimization – can be the source of vulnerabilities that enable malicious attacks and allow unauthorized access, unapproved APIs, and exposed data.   In this webinar, we explore the API development process: where it originates, how to secure it, and how to maximize automation while preserving developer creativity and speed.   Join Rod Cope, CTO of Perforce Software, and guest speaker Randy Heffner, VP and Principal Analyst from Forrester Research, Inc., as they discuss:   How new APIs originate from new business channels and new web and mobile applications Infusing security throughout the API development process Structuring API delivery workflows to both meet compliance demands and speed development Integrating with CI/CD/DevOps to automate and harden the API lifecycle  
  • #11: Development Governance - ensure you aren't building same functionality multiple times - ties into Portal capabilities, approval processes - Akana can do it and very few others can - authentication, proxying, having a gateway, rate limiting - automating - not leaving a chance that a policy is not applied, not attaching the right policy, ability to attach policies to meta data Can your API platform really do all of this?
  • #12: Lifecycle Coordinator highlights: Objective: automated API configuration and promotion through runtime staging environments – eliminate hands-on actions as much as possible and by doing so gain efficiency and reduce potential for error Automated API configuration - API architects can easily define configuration patterns to be automatically applied via extended metadata values Auditable promotion records – Lifecycle Coordinator records all API promotion activities across multiple iterations with full visibility to configuration changes between staging environments Configurable role-based gating – enterprises can easily specify RACI (Responsible/Approver/Commenter/Informed) roles into promotion workflows; these become part of the audit record Integration with CI/CD platforms (e.g., Jenkins) – Lifecycle Coordinator can act as either a master or a slave within an enterprise’s CI/CD architecture When you promote from Dev to Production, can change OAuth domain The keys are: Configurable role-based gating (make gating more generic) RACI - broken down into roles that people have in any governance process -- who is responsible for promoting something into next environment, who approved that, who comments on it / reviews it, who needs to be informed of it -- all of this concept is built into the Akana platform
  • #13: This is just a sample – not fixed -- there can be as many tasks/approvals as you want.
  • #14: Promotions are being initiated and governed by the Lifecycle Manager, which drives approvals. In each Promotion (gray arrows), you can change appropriate policies for each instance, and change Oauth domains in each stage.
  • #15: We typically position this architecture to those who want to be PCI compliant or have a little more security than they are currently doing – i.e. “you need to be doing AT LEAST this much” Advantage of Akana – Lifecycle Manager (pink box) -- managing review/approval side of things before production, so the managers get a notice of a request to do this promotion, and it must be approved before a change is made. Not just about encryption, also about process and architecture.
  • #16: Customer wrapped in Akana’s architecture We add gateways on top of interaction layer, add a developer portal, add these security/management services along with our Oauth server, etc.
  • #18: The HTTP Malicious Pattern Detection Policy is used to inspect HTTP messages for content that could be considered dangerous to an API or web service. This policy can be attached based on the metadata (previous slide) If the message content matches any of the expressions identified in the policy as potentially dangerous, the policy rejects the message and returns a fault. This policy uses regular expressions to define the content that could be considered dangerous, that would warrant a message being rejected. Typical uses of this policy are for SQL injection detection or JavaScript detection. You don’t need to order your policies, like with other platforms.
  • #23: Note: change “Asset Submission” to “API submission” if possible
  • #27: Same slide title at step #3. Are they both correct?