SlideShare a Scribd company logo
API IN(SECURITY)
Asim Jaweesh
Asim [dot] Jaweesh (at) owasp [dot] org
AGENDA and technical knowledge
History Rank Issues? defense resource Finish
BRIEF HISTORY
0
1
2
3
4
5
6
7
E-Commerce Social Mobile IoT
Time
IMPORTANCE
• Integration with other systems.
• Control of UI/UX.
• Cheap tweaks and change requests.
• Saving time and effort.
WHAT COULD GO WRONG?
MOST VULNERABLE TO HAX
COMMON API HACKS OF 2014
THINK LIKE A HACKER PROTECTOR
• Access control
• Input validation
• Output encoding
• Cryptography
• Message integrity
• confidentiality
ACCESS CONTROLS
• Anti-framing
• Protect HTTP methods
• Whitelist allowable methods
• Protect privileged actions.
• Protect against CSRF
• Protect against IDOR
• API rate limits
INPUT VALIDATION
• Input sanitization
• Secure parsing
• Strong typing
• Validate incoming content-type
• Validate response-type
• XML input validation
• Framework-Provided validation
OUTPUT ENCODING
• Send secure headers
• JSON encoding
• XML encoding
CRYPTOGRAPHY
• Data in transit
• Data in storage
MESSAGE INTEGRITY
• In addition to HTTPS, JSON Web Token (JWT)
• JWT guarantee message integrity and authenticate both
sender/ receiver
CONFIDENTIALITY
• RESTful web services can leak credentials, tokens and API keys
• https://example.com/resourceCollection/<id>/action
• https://Twitter.com/Jaweesh/lists
• https://example.com/controller/<id>/action?apikey=12345678
• http://example.com/controller/<id>/action?apikey=987654321
RESOURCES
• OWASP cheat sheet
• History of API
• Internet of things definition
• SmartBear Practical tips for API
security
RECAP
• API new business technology.
• Gaining popularity and trending.
• Can easily wreck your business.
• Good API helps your business.
• Integrate security in development.
• Do periodic security tests.
• Spread awareness.
THANK YOU
Asim [dot] Jaweesh (at) owasp [dot] org
@jaw33sh

More Related Content

PPTX
Hallwaze security snapshot
PDF
Anil saldhana cloudidentitybestpractices
PPTX
Webinar: Access Management with the ForgeRock Identity Platform - So What’s N...
PDF
DataPower Security Hardening
PDF
Checkmarx meetup API Security - Solving security at scale - Ante Gulam
PDF
Token vs Cookies (DevoxxMA 2015)
PDF
Token, token... From SAML to OIDC
PDF
How to integration DataPower with Zos
Hallwaze security snapshot
Anil saldhana cloudidentitybestpractices
Webinar: Access Management with the ForgeRock Identity Platform - So What’s N...
DataPower Security Hardening
Checkmarx meetup API Security - Solving security at scale - Ante Gulam
Token vs Cookies (DevoxxMA 2015)
Token, token... From SAML to OIDC
How to integration DataPower with Zos

What's hot (20)

PDF
WSO2Con EU 2015: Securing, Monitoring and Monetizing APIs
PPTX
NYC Identity Summit Tech Day: ForgeRock DevOps/Cloud Strategy
PDF
Pimping the ForgeRock Identity Platform for a Billion Users
PPTX
AWS Security
PPTX
Introduction to Web Security
PDF
OpenAM as Flexible Integration Component
PDF
CIS14: PingAccess 101
PPTX
Secure API Services in Node with Basic Auth and OAuth2
PPTX
OpenAM: An Introduction
PDF
Authentication and Authorization Architecture in the MEAN Stack
ODP
Security components in mule esb
PPT
Open Identity Stack Roadmap
PPTX
Adding layers of security to an API in real-time
PDF
SSO with the WSO2 Identity Server
PPTX
IDP Proxy Concept: Accessing Identity Data Sources Everywhere!
PDF
API Security In Cloud Native Era
PPTX
Privacy and Security
PPTX
Gateway/APIC security
PPT
Android secure coding
PPTX
Browser Security 101
WSO2Con EU 2015: Securing, Monitoring and Monetizing APIs
NYC Identity Summit Tech Day: ForgeRock DevOps/Cloud Strategy
Pimping the ForgeRock Identity Platform for a Billion Users
AWS Security
Introduction to Web Security
OpenAM as Flexible Integration Component
CIS14: PingAccess 101
Secure API Services in Node with Basic Auth and OAuth2
OpenAM: An Introduction
Authentication and Authorization Architecture in the MEAN Stack
Security components in mule esb
Open Identity Stack Roadmap
Adding layers of security to an API in real-time
SSO with the WSO2 Identity Server
IDP Proxy Concept: Accessing Identity Data Sources Everywhere!
API Security In Cloud Native Era
Privacy and Security
Gateway/APIC security
Android secure coding
Browser Security 101
Ad

Similar to API IN(SECURITY) (20)

PDF
APIsecure 2023 - Understanding and Identifying Threats Against APIs, Shannon ...
PPTX
Spa Secure Coding Guide
PPTX
Deep-Dive: Secure API Management
PDF
Web security and OWASP
PDF
Secure JAX-RS
PDF
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
PPTX
API Security from the DevOps and CSO Perspectives (Webcast)
PPTX
Layered API Security: What Hackers Don't Want You To Know
PDF
APIConnect Security Best Practice
PDF
WebApp_to_Container_Security.pdf
PPTX
Security in Software Development - Codearrest.pptx
PDF
The API Primer (OWASP AppSec Europe, May 2015)
PDF
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
PPTX
Web Application Security Session for Web Developers
PPTX
Securing Applications in the Cloud
PPTX
Infosec girls training-hackcummins-college-jan-2020(v0.1)
PPTX
Ten Commandments of Secure Coding - OWASP Top Ten Proactive Controls
PPTX
Ten Commandments of Secure Coding
PPTX
OWASP Top Ten 2017
PPTX
PaaS security challenges and solutions (salesforce vision)
APIsecure 2023 - Understanding and Identifying Threats Against APIs, Shannon ...
Spa Secure Coding Guide
Deep-Dive: Secure API Management
Web security and OWASP
Secure JAX-RS
Data encryption for Ruby web applications - Dmytro Shapovalov (RUS) | Ruby Me...
API Security from the DevOps and CSO Perspectives (Webcast)
Layered API Security: What Hackers Don't Want You To Know
APIConnect Security Best Practice
WebApp_to_Container_Security.pdf
Security in Software Development - Codearrest.pptx
The API Primer (OWASP AppSec Europe, May 2015)
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
Web Application Security Session for Web Developers
Securing Applications in the Cloud
Infosec girls training-hackcummins-college-jan-2020(v0.1)
Ten Commandments of Secure Coding - OWASP Top Ten Proactive Controls
Ten Commandments of Secure Coding
OWASP Top Ten 2017
PaaS security challenges and solutions (salesforce vision)
Ad

More from OWASP Khartoum (11)

PDF
Cryptocurrency, a deep dive
PDF
Usable Security: Tips for Daily Life
PDF
SSH - From Zero to Hero
PDF
OWASP Khartoum Cyber Security Session
PPTX
Computer forensic 101 - OWASP Khartoum
PDF
Welcome to OWASP World
PPTX
Cross Site Scripting (XSS)
PPTX
OWASP Khartoum - Top 10 A5 - 7th meeting - Cross Site Request Forgery
PPTX
OWASP Khartoum Top 10 A3 - 6th meeting
PPTX
OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
PPTX
OWASP Khartoum Top 10 A4 - 7th meeting
Cryptocurrency, a deep dive
Usable Security: Tips for Daily Life
SSH - From Zero to Hero
OWASP Khartoum Cyber Security Session
Computer forensic 101 - OWASP Khartoum
Welcome to OWASP World
Cross Site Scripting (XSS)
OWASP Khartoum - Top 10 A5 - 7th meeting - Cross Site Request Forgery
OWASP Khartoum Top 10 A3 - 6th meeting
OWASP Khartoum - Top 10 A6 - 8th meeting - Security Misconfiguration
OWASP Khartoum Top 10 A4 - 7th meeting

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
TLE Review Electricity (Electricity).pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Spectroscopy.pptx food analysis technology
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Encapsulation theory and applications.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
1. Introduction to Computer Programming.pptx
PDF
August Patch Tuesday
PPTX
Tartificialntelligence_presentation.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Machine learning based COVID-19 study performance prediction
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
Digital-Transformation-Roadmap-for-Companies.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
TLE Review Electricity (Electricity).pptx
NewMind AI Weekly Chronicles - August'25-Week II
Spectroscopy.pptx food analysis technology
A comparative analysis of optical character recognition models for extracting...
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Encapsulation theory and applications.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
1. Introduction to Computer Programming.pptx
August Patch Tuesday
Tartificialntelligence_presentation.pptx
cloud_computing_Infrastucture_as_cloud_p
Machine learning based COVID-19 study performance prediction
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
A Presentation on Artificial Intelligence
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation_ Review paper, used for researhc scholars

API IN(SECURITY)