SlideShare a Scribd company logo
Akamai Security Summit World Tour | Stockholm1
Designing for Doomsday: Effective API
Security Approaches from the Edge
Gerd Giese, Manager Cloud Security Architects, EMEA
Akamai Security Summit World Tour | Stockholm
Why Are We Here?
API
Because APIs Are Everywhere.
Akamai Security Summit World Tour | Stockholm
Rise of API Traffic
Akamai Security Summit World Tour | Stockholm
Rise of API Traffic
By Content Type
Akamai Security Summit World Tour | Stockholm
Rise of API Traffic
By Content Type
Akamai Security Summit World Tour | Stockholm
Things On The Internet Make The Majority Of API
Calls
66%
Source: Akamai SOTI Q1 2019
Akamai Security Summit World Tour | Stockholm
World’s Biggest Data Breaches & HacksWhy Are We Here?
Because Data Theft Is Still Rampant.
Source: https://informationisbeautiful.net
Akamai Security Summit World Tour | Stockholm
Web APIs Are A Primary Target
Web sites & Web APIs share the
same (old) attack vectors – but
APIs are often unprotected
APIs are more performant and
less expensive to attack compared
with traditional web forms
4Xmore Credential
Stuffing attacks on
APIs
Akamai Security Summit World Tour | Stockholm
67%
of login attempts
Akamai Security Summit World Tour | Stockholm
API Credential Stuffing Looks Like DDoS
Source: Akamai SOTI 1Q19
28 billion
credential stuffing attempts
in 8 month
(Observed on Akamai Intelligent Edge Platform, 2018)
Akamai Security Summit World Tour | Stockholm
Let’s Examine Some Real World Incidents
Akamai Security Summit World Tour | Stockholm
How to Identify Corporate APIs?
IP Addresses
xxx.xxx.xxx.xxxxxx.x
xx.xxx.xxx
xxx.xxx.xxx.xxx
xxx.xxx.xxx.xxx
Step 2
Reverse lookup +/- 10 IP Addresses
This Photo by Unknown Author is licensed under CC BY-SA
List of
Hostnames
to attack
Step 1
Trying ZT / Scanning for typical hostnames
Hostnames auth.
api.
developer.
download.
Akamai Security Summit World Tour | Stockholm
Origin
Response
User
Request
SaaS Partners
API requests are within limits, all apps and SaaS partners perform
API Risk Exposure in Business Ecosystems
Akamai Security Summit World Tour | Stockholm
API Risk Exposure in Business Ecosystems
DDoS attack on SaaS partner
Origin not protected if only relying on partners’ security measures
OriginDDoS Attack SaaS Partners
Akamai Security Summit World Tour | Stockholm
Online Media Distribution Partner Ecosystem
Media Company
(Content Owner)
authentication
Content
User DB
SaaS Partner
1 Content Owner leverage
SaaS Media Distributors
2 SaaS Partner provides
content adaptation
and distribution
3 Content Owner keeps
User DB for authentication
and authorization
authentication
Akamai Security Summit World Tour | Stockholm
Online Media Distribution Partner Ecosystem
SaaS
Partner
SaaS
Partner
SaaS
Partner
Content
Media Company
(Content Owner)
User DB
AuthN / AuthZ
SaaS Partners
1 A botnet is used to
request videos from
content distributors
2 AuthN and AuthZ
requests and retries
overwhelm the origin
3 All end user access to
content is blocked,
regardless of distributor
Akamai Security Summit World Tour | Stockholm
Bot Attack Data on SAAS Partner
several day period
Normal user traffic
~100 req/sec
Peak user traffic
~500 req/sec
Botnet attack!
Additional ~1200 req/sec
Akamai Security Summit World Tour | Stockholm
SaaS Partner
SaaS Partner
SaaS Partner
Content
Media Company
(Content Owner)
Gateway
WAF
WAF
WAF
Key Take-aways:
o A central DB may
support many partners,
an attack on one may
affect everyone
o Risk exposure is
growing in large
business ecosystems
Effective Security
Tools:
✓ WAF
✓ Bot Management
✓ API Gateway
Lessons Learned
Akamai Security Summit World Tour | Stockholm
What Is In Your API Response?
Akamai Security Summit World Tour | Stockholm
Oh Snap!
Two problems:
1. Attacker could check
with only phone numbers
2. Attacker could send up to
75,000 phone numbers
per request
Akamai Security Summit World Tour | Stockholm
Coffee Anyone?
“Only my mobile app will call my API”
curl https://api.orderinput.com/v1/sku
-u sku_4bC39lelyjwGarjt:
-d currency=usd
-d inventory [type]=finite
-d inventory[quantity]=500-d price=3
-d product=prod_BgrChzDbl
-d attributes[size]=medium]
http 200 OK
https ://success.api.orderinput.com/v1/sku
-idAPI response includes some interesting data
Simple order request
to order entry APIs
order_number=14586
Akamai Security Summit World Tour | Stockholm
Coffee Anyone?
“Sequential order numbers makes sense”
http 200 OK
https ://success.api.orderinput.com/v1/sku
-id order_number=23697
Akamai Security Summit World Tour | Stockholm
But Why?
Akamai Security Summit World Tour | Stockholm
Lessons Learned
• API responses contain valuable information
• Restrict access to authorized apps only
Akamai Security Summit World Tour | Stockholm
What Is In Your Code?
Akamai Security Summit World Tour | Stockholm
Attack on Microservices
• DevOps utilizes automation via API functions in the cloud
• Developers sharing code via GitHub
Code Sharing
GitHub
IT
Dev
Ops
MicroserviceMicroservice
API
MicroserviceMicroservice
API
Akamai Security Summit World Tour | Stockholm
Gitrob Tool:
Find & Remove Sensitive Data On GitHub
• Search by organization
• Flagging interesting files, like:
o Private Keys
o Usernames
o Emails
o Internal System Info
Full service tool to identify the inside of corporate
networks exposed to API attacks, phishing campaigns,
and social engineering attacks!
Source: https://michenriksen.com/blog/gitrob-putting-the-open-source-in-osint/
Akamai Security Summit World Tour | Stockholm
Lessons Learned
• Careful code sharing
• API inspection & validation
• Mitigation applied:
• API Gateway: Dynamically assign and easily revoke API Keys
Code Sharing
GitHub
IT
Dev
Ops
MicroserviceMicroservice
API
MicroserviceMicroservice
API
Akamai Security Summit World Tour | Stockholm
Design Considerations for APIs
Usage
Model
• What are the use cases?
• Who are the intended users?
• Who are the actual/current users?
• Are some users more important?
Data
Points
• Get your users to register
• Issue API Keys
• Traffic segregation
Operational
control
• Susceptible to the same threats as websites
• Cache-ability?
• Are all API end points of equal importance?
• Inadvertent data leakage
Akamai Security Summit World Tour | Stockholm
What To Do…
Akamai Security Summit World Tour | Stockholm
Develop An API Protection Plan Today
Next Week :
Within 3 months :
Within 6 months :
• Assess your API ecosystem
• Identify potential security risks
• Understand who accesses your APIs
• Define appropriate security measures
• Select a security solution
• Drive a project to protect all APIs
(public AND private)
Akamai Security Summit World Tour | Stockholm
Thank you !

More Related Content

PDF
Trust No One - Zero Trust on the Akamai Platform
PDF
Kona Site Defender Product Brief - Multi-layered defense to protect websites ...
PPTX
3 Reasons You Need Proactive Protection Against Malware
PPTX
Automate compliance with cloud guard dome9
PPTX
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
PPTX
Dome9 Public Cloud Security
PDF
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
PPTX
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Trust No One - Zero Trust on the Akamai Platform
Kona Site Defender Product Brief - Multi-layered defense to protect websites ...
3 Reasons You Need Proactive Protection Against Malware
Automate compliance with cloud guard dome9
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
Dome9 Public Cloud Security
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode

What's hot (17)

PPTX
The Future of CASBs - A Cloud Security Force Awakens
PPTX
CASB: Securing your cloud applications
PPTX
3 Reasons It's Time for a New Remote Access Model
PDF
Cloud Security 101 by Madhav Chablani
PDF
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
PDF
Workshop on CASB Part 2
PDF
SACON - Mobile App Security (Srinath Venkataramani)
PPTX
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
PPTX
5 Highest-Impact CASB Use Cases
PDF
Securing Your Cloud Transformation
PDF
MalCon Future of Security
PDF
63 Requirements for CASB
PDF
Security in the cloud
PDF
IT Security As A Service
PDF
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
PDF
Cisco Connect 2018 Singapore - Cisco CMX
PDF
2018 06 Presentation Cloudguard IaaS de Checkpoint
The Future of CASBs - A Cloud Security Force Awakens
CASB: Securing your cloud applications
3 Reasons It's Time for a New Remote Access Model
Cloud Security 101 by Madhav Chablani
Introducing IBM Cloud Security Enforcer, CASB, IDaaS and Threat Prevention
Workshop on CASB Part 2
SACON - Mobile App Security (Srinath Venkataramani)
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
5 Highest-Impact CASB Use Cases
Securing Your Cloud Transformation
MalCon Future of Security
63 Requirements for CASB
Security in the cloud
IT Security As A Service
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
Cisco Connect 2018 Singapore - Cisco CMX
2018 06 Presentation Cloudguard IaaS de Checkpoint
Ad

Similar to Designing for API Doomsday (20)

PDF
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
PDF
Apidays Helsinki & North 2024 - From Chaos to Calm- Navigating Emerging API ...
PDF
APIConnect Security Best Practice
PDF
API, Integration, and SOA Convergence
PPTX
Deep-Dive: Secure API Management
PDF
5 step plan to securing your APIs
PPTX
Building API Driven Microservices
PPTX
Gateway/APIC security
PDF
AWS User Group November
PDF
AWS November meetup Slides
PDF
42Crunch Security Audit for WSO2 API Manager 3.1
PDF
APIC/DataPower security
PPTX
2022 APIsecure_The Real World, API Security Edition
PDF
Outpost24 webinar Why API security matters and how to get it right.pdf
PDF
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
PDF
PPTX
Apidays London 2024 - Securing APIs, Beyond the Basics with Advanced Security...
PPTX
Meetup callback
PPTX
Outpost24 webinar - Api security
PPTX
Application security meetup k8_s security with zero trust_29072021
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
Apidays Helsinki & North 2024 - From Chaos to Calm- Navigating Emerging API ...
APIConnect Security Best Practice
API, Integration, and SOA Convergence
Deep-Dive: Secure API Management
5 step plan to securing your APIs
Building API Driven Microservices
Gateway/APIC security
AWS User Group November
AWS November meetup Slides
42Crunch Security Audit for WSO2 API Manager 3.1
APIC/DataPower security
2022 APIsecure_The Real World, API Security Edition
Outpost24 webinar Why API security matters and how to get it right.pdf
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
Apidays London 2024 - Securing APIs, Beyond the Basics with Advanced Security...
Meetup callback
Outpost24 webinar - Api security
Application security meetup k8_s security with zero trust_29072021
Ad

More from Elisabeth Bitsch-Christensen (16)

PDF
The Akamai Security Portfolio
PDF
What is a Bot and why you should care
PDF
How to Counter Cybersecurity Attacks - Trust No One
PDF
Keynotes Akamai Trust No One City Tour
PDF
Datadriven organizations and the digital customer journey
PDF
Creating a datadriven news room - Expressen in Sweden
PDF
Social Airlines and Customer Experience in Social Media
PDF
The digital journey in 8 steps: from catalog to content and digital
PDF
Digital CMO - Dataföreningens Nätverk För Marketing Professionals
PDF
Hermods gymnasium-4-feb (1)
PDF
Digital Strategy in Presidential Elections
PDF
Engagement marketing: Influence the Influencer
PPTX
CCT Nordics Stockholm 10.15 Gallery
PDF
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
PDF
Web forumsocialairlines
PDF
SSMX SocialAirlines
The Akamai Security Portfolio
What is a Bot and why you should care
How to Counter Cybersecurity Attacks - Trust No One
Keynotes Akamai Trust No One City Tour
Datadriven organizations and the digital customer journey
Creating a datadriven news room - Expressen in Sweden
Social Airlines and Customer Experience in Social Media
The digital journey in 8 steps: from catalog to content and digital
Digital CMO - Dataföreningens Nätverk För Marketing Professionals
Hermods gymnasium-4-feb (1)
Digital Strategy in Presidential Elections
Engagement marketing: Influence the Influencer
CCT Nordics Stockholm 10.15 Gallery
The ROI of Social Media - Show me the money presented at Sweden Social Web Ca...
Web forumsocialairlines
SSMX SocialAirlines

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation theory and applications.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
cuic standard and advanced reporting.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Understanding_Digital_Forensics_Presentation.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Mobile App Security Testing_ A Comprehensive Guide.pdf
Review of recent advances in non-invasive hemoglobin estimation
Dropbox Q2 2025 Financial Results & Investor Presentation
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Per capita expenditure prediction using model stacking based on satellite ima...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation theory and applications.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
Machine learning based COVID-19 study performance prediction
Diabetes mellitus diagnosis method based random forest with bat algorithm
Programs and apps: productivity, graphics, security and other tools
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Designing for API Doomsday

  • 1. Akamai Security Summit World Tour | Stockholm1 Designing for Doomsday: Effective API Security Approaches from the Edge Gerd Giese, Manager Cloud Security Architects, EMEA
  • 2. Akamai Security Summit World Tour | Stockholm Why Are We Here? API Because APIs Are Everywhere.
  • 3. Akamai Security Summit World Tour | Stockholm Rise of API Traffic
  • 4. Akamai Security Summit World Tour | Stockholm Rise of API Traffic By Content Type
  • 5. Akamai Security Summit World Tour | Stockholm Rise of API Traffic By Content Type
  • 6. Akamai Security Summit World Tour | Stockholm Things On The Internet Make The Majority Of API Calls 66% Source: Akamai SOTI Q1 2019
  • 7. Akamai Security Summit World Tour | Stockholm World’s Biggest Data Breaches & HacksWhy Are We Here? Because Data Theft Is Still Rampant. Source: https://informationisbeautiful.net
  • 8. Akamai Security Summit World Tour | Stockholm Web APIs Are A Primary Target Web sites & Web APIs share the same (old) attack vectors – but APIs are often unprotected APIs are more performant and less expensive to attack compared with traditional web forms 4Xmore Credential Stuffing attacks on APIs
  • 9. Akamai Security Summit World Tour | Stockholm 67% of login attempts
  • 10. Akamai Security Summit World Tour | Stockholm API Credential Stuffing Looks Like DDoS Source: Akamai SOTI 1Q19 28 billion credential stuffing attempts in 8 month (Observed on Akamai Intelligent Edge Platform, 2018)
  • 11. Akamai Security Summit World Tour | Stockholm Let’s Examine Some Real World Incidents
  • 12. Akamai Security Summit World Tour | Stockholm How to Identify Corporate APIs? IP Addresses xxx.xxx.xxx.xxxxxx.x xx.xxx.xxx xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx Step 2 Reverse lookup +/- 10 IP Addresses This Photo by Unknown Author is licensed under CC BY-SA List of Hostnames to attack Step 1 Trying ZT / Scanning for typical hostnames Hostnames auth. api. developer. download.
  • 13. Akamai Security Summit World Tour | Stockholm Origin Response User Request SaaS Partners API requests are within limits, all apps and SaaS partners perform API Risk Exposure in Business Ecosystems
  • 14. Akamai Security Summit World Tour | Stockholm API Risk Exposure in Business Ecosystems DDoS attack on SaaS partner Origin not protected if only relying on partners’ security measures OriginDDoS Attack SaaS Partners
  • 15. Akamai Security Summit World Tour | Stockholm Online Media Distribution Partner Ecosystem Media Company (Content Owner) authentication Content User DB SaaS Partner 1 Content Owner leverage SaaS Media Distributors 2 SaaS Partner provides content adaptation and distribution 3 Content Owner keeps User DB for authentication and authorization authentication
  • 16. Akamai Security Summit World Tour | Stockholm Online Media Distribution Partner Ecosystem SaaS Partner SaaS Partner SaaS Partner Content Media Company (Content Owner) User DB AuthN / AuthZ SaaS Partners 1 A botnet is used to request videos from content distributors 2 AuthN and AuthZ requests and retries overwhelm the origin 3 All end user access to content is blocked, regardless of distributor
  • 17. Akamai Security Summit World Tour | Stockholm Bot Attack Data on SAAS Partner several day period Normal user traffic ~100 req/sec Peak user traffic ~500 req/sec Botnet attack! Additional ~1200 req/sec
  • 18. Akamai Security Summit World Tour | Stockholm SaaS Partner SaaS Partner SaaS Partner Content Media Company (Content Owner) Gateway WAF WAF WAF Key Take-aways: o A central DB may support many partners, an attack on one may affect everyone o Risk exposure is growing in large business ecosystems Effective Security Tools: ✓ WAF ✓ Bot Management ✓ API Gateway Lessons Learned
  • 19. Akamai Security Summit World Tour | Stockholm What Is In Your API Response?
  • 20. Akamai Security Summit World Tour | Stockholm Oh Snap! Two problems: 1. Attacker could check with only phone numbers 2. Attacker could send up to 75,000 phone numbers per request
  • 21. Akamai Security Summit World Tour | Stockholm Coffee Anyone? “Only my mobile app will call my API” curl https://api.orderinput.com/v1/sku -u sku_4bC39lelyjwGarjt: -d currency=usd -d inventory [type]=finite -d inventory[quantity]=500-d price=3 -d product=prod_BgrChzDbl -d attributes[size]=medium] http 200 OK https ://success.api.orderinput.com/v1/sku -idAPI response includes some interesting data Simple order request to order entry APIs order_number=14586
  • 22. Akamai Security Summit World Tour | Stockholm Coffee Anyone? “Sequential order numbers makes sense” http 200 OK https ://success.api.orderinput.com/v1/sku -id order_number=23697
  • 23. Akamai Security Summit World Tour | Stockholm But Why?
  • 24. Akamai Security Summit World Tour | Stockholm Lessons Learned • API responses contain valuable information • Restrict access to authorized apps only
  • 25. Akamai Security Summit World Tour | Stockholm What Is In Your Code?
  • 26. Akamai Security Summit World Tour | Stockholm Attack on Microservices • DevOps utilizes automation via API functions in the cloud • Developers sharing code via GitHub Code Sharing GitHub IT Dev Ops MicroserviceMicroservice API MicroserviceMicroservice API
  • 27. Akamai Security Summit World Tour | Stockholm Gitrob Tool: Find & Remove Sensitive Data On GitHub • Search by organization • Flagging interesting files, like: o Private Keys o Usernames o Emails o Internal System Info Full service tool to identify the inside of corporate networks exposed to API attacks, phishing campaigns, and social engineering attacks! Source: https://michenriksen.com/blog/gitrob-putting-the-open-source-in-osint/
  • 28. Akamai Security Summit World Tour | Stockholm Lessons Learned • Careful code sharing • API inspection & validation • Mitigation applied: • API Gateway: Dynamically assign and easily revoke API Keys Code Sharing GitHub IT Dev Ops MicroserviceMicroservice API MicroserviceMicroservice API
  • 29. Akamai Security Summit World Tour | Stockholm Design Considerations for APIs Usage Model • What are the use cases? • Who are the intended users? • Who are the actual/current users? • Are some users more important? Data Points • Get your users to register • Issue API Keys • Traffic segregation Operational control • Susceptible to the same threats as websites • Cache-ability? • Are all API end points of equal importance? • Inadvertent data leakage
  • 30. Akamai Security Summit World Tour | Stockholm What To Do…
  • 31. Akamai Security Summit World Tour | Stockholm Develop An API Protection Plan Today Next Week : Within 3 months : Within 6 months : • Assess your API ecosystem • Identify potential security risks • Understand who accesses your APIs • Define appropriate security measures • Select a security solution • Drive a project to protect all APIs (public AND private)
  • 32. Akamai Security Summit World Tour | Stockholm Thank you !