SlideShare a Scribd company logo
Chuck Herrin
CTO, Wib API Security
Future -Proofing
API Security
Today’s Session
What
● API Security Is Different - How and Why
So What
● Traditional Approaches Fall Short
○ History doesn’t repeat, but it rhymes
Now What
● How to Address API Security
○ Visibility
○ Traffic
○ Code
○ Dev, Test, and Production
Key Takeaways
What We’ll Cover Today:
Why is API security different?
The architecture
a nd a t t a c k s ur f a c e
is dif f e r e nt .
APIs, by design, directly
expose application logic ,
and often change rapidly.
The attacks are
different.
Attacking APIs is mostly about
making unexpected requests
and failures to scope
authorization to resources.
The defenses are
different.
Traditional rule - based
defenses like WAFs can
neither detect nor defend
against logic - based
attacks.
1 2 3
These factors combined made APIs the #1 attack vector in 2021
Why API Security Differs From Traditional Web Application Security
2022 SERIES OF EVENT
New York
JULY
(HYBRID)
Australia
SEPTEMBER
(HYBRID)
Singapore
APRIL
(VIRTUAL)
Helsinki & North
MARCH
(VIRTUAL)
Paris
DECEMBER
(HYBRID)
London
OCTOBER
(HYBRID)
Hong Kong
AUGUST
(VIRTUAL)
JUNE (VIRTUAL)
India
MAY
(VIRTUAL)
APRIL (VIRTUAL)
Dubai & Middle East
JUNE
(VIRTUAL)
Check out our API Conferences here
Wa nt t o t a lk a t one of our conference?
Apply t o spea k here
NEW API BEST
PRACTICES
50% of mature API
organizations plan to
focus on increased API
security and governance
during 2022 and beyond
Dedicated API Security
solutions are gaining
widespread adoption.
“Discover your APIs before
attackers, add specialist
API Security products, and
design API Security into the
full cycle from
development to delivery.”
API SECURITY
A FOCAL POINT
"APIs expose application
logic and sensitive data
such as Personally
Identifiable Information
(PII) and because of this
have increasingly
become a target for
attackers.”
APIs EXPOSE
LOGIC
DIRECTLY
What the Analysts and Industry are Saying:
https://securityboulevard.com/2022/02/api - se c urity- tip p ing - p oint- g a rtn e r- just- c re a te d - the - c a te g ory/
Ga rtne r just m od ifie d the ir re fe re nc e a rc hite c ture 1 to inc lud e API
se c urity a s a d e d ic a te d la ye r
This is ha p p e ning in re a l tim e :
What We’re Seeing in the Wild:
Why Do Current Defensive Approaches Fall Short?
The Main Reason is That Collectively, We’re Fig hting the La st Wa r
As De fe nd e rs, We ’re Alm ost ALWAYS Fig hting the La st Wa r
1914 1930 1940
1) Te c hnolog ie s c ontinuously a d va nc e
2) Com p a nie s a nd g ove rnm e nts suc c e e d or fa il b a se d on
a d op tion of ne w te c h
● The world d id n’t m e c ha nize just to c re a te m a c hine
g uns, b ut a rm ie s without the m c ould no long e r
c om p e te on the b a ttle fie ld
1) Atta c ke rs ta ke a d va nta g e of ne w c a p a b ilitie s, a tta c k
surfa c e s, or we a kne ss
2) De fe nd e rs m ust sc ra m b le to urg e ntly c a tc h up .
Key Principle -
API Se c urity is just the la te st e xa m p le of a ‘rhym e ’ throug hout hum a n history:
Key Takeaway -
Your De fe nse Must b e Consta ntly Inform e d By The
Offe nse in Ord e r to Quic kly Ad a p t
Key Takeaway
Some More Mod e rn Exa m p le s:
Mic rose rvic e s Dra m a tic a lly Cha ng e the Atta c k Surfa c e . We Must Ad a p t.
1970s - 1980s: Ma infra m e Com p uting
(Ce ntra lize d )
1990s - 2000s: Inte rne t
(Glob a l)
1980s - 1990s: Clie nt / Se rve r
(Distrib ute d )
~2012 - 2015: >50% of Com p a nie s Ag ile (Fa st,
Ite ra tive Cyc le s)
2000s - 2010s: Cloud
(Sa a S, Pa a S, Ia a S)
~2015 - 2020s: Mic rose rvic e s
(Gra nula r, Re usa b le )
}Security
Model
Lagging
}Security
Model
Lagged
}Security
Model
Lagged
Specific Changes for APIs - OWASP Top 10 (2003+) vs API Top 10 (2019+)
API01:2021 Broken Object Level Authorization
API02:2021 Broken Authentication
API03:2021 Excessive Data Exposure
API04:2021 Lack of Resources & Rate Limiting
API05:2021 Broken Function Level Authorization
API06:2021 Mass Assignment
API07:2021 Security Misconfiguration
API08:2021 Injection
API09:2021 Improper Assets Management
API10:2021 Insufficient Logging & Monitoring
Mostly Logic based
API Top 10 - Published in 2019
A0 1:2 0 2 1 Broke n Acce ss Con trol
A0 2 :2 0 2 1 Cryp tog rap h ic Failu re s
A0 3 :2 0 2 1 In je ction
A0 4:2 0 2 1 In se cu re De sig n
A0 5:2 0 2 1 Se cu rity Miscon fig u ration
A0 6 :2 0 2 1 Vu ln e rab le an d Ou td ate d Com p on e n ts
A0 7:2 0 2 1 Id e n tification an d Au th e n tication Failu re s
A0 8 :2 0 2 1 Softw are an d Data In te g rity Failu re s
A0 9 :2 0 2 1 Se cu rity Log g in g an d Mon itorin g Failu re s
A10 :2 0 2 1 Se rve r-Sid e Re q u e st Forg e ry
Mostly Ruled based
Web Top 10 - Published in 2003
2019 OWASP API Security Top 10 Threats WAFs API Gateways
Broken Object Level Authorization
Broken Authentication
Excessive Data Exposure
Lack of Resources & Rate -Limiting
Broken Function Level Authorization
Mass Assignment
Security Misconfiguration
Injection
Improper Assets Management
Insufficient Logging & Monitoring
Logic based
Rule based
Dedicated API Solution
Key Takeaway -
Traditional Tools Lack the Context Needed to Defend Against Modern Logic Based Attacks
How to Address API Security?
API threats emerge in development, testing, and production.
Cove rin g th e fu ll API life c yc le is c ritic a l!
Ke y Princ ip le - Your API Se c urity Prog ra m Must Cove r the Full API Life c yc le
The API Lifecycle
First Principle - You Can’t Defend An Asset You Can’t See
Development
Testing
Production
Identify Protect Detect Respond Recover
Defend right by simulating
a tta c ks on p rod uc tion APIs to
und e rsta nd e xp osure to
re a l- world a tta c ks a nd
d e te c t hid d e n d e p e nd e nc ie s
Shift le ft b y g iving d e vs
tools to d e te c t a nd
re solve issue s in the ir
norm a l workflow
Development
Testing
Production
True Visibility Requires Multiple Lenses - Defend Right While Shifting Left
Uncover blind spots by continually monitoring inbound and
outbound traffic AND code repositories for direct references
to APIs and Endpoints you can’t see elsewhere
In Conclusion:
Key Takeaways
● APIs e xp ose a p p lic a tion a nd b usine ss log ic d ire c tly,
c re a ting a nove l a nd c om p le x a tta c k surfa c e
● Mic rose rvic e s offe r m ultip le a d va nta g e s for
b usine sse s a nd g ove rnm e nts, a nd re g ula tors a re
m a nd a ting inc re a se d API usa g e a nd d a ta sha ring
(FHIR, Op e n Ba nking , PSD2).
○ Ad op tion is ine vita b le . Sa fe a d op tion is not.
● Tra d itiona l we b se c urity a p p roa c he s we re d e sig ne d
for m onolithic we b a p p s a nd the 2003+ OWASP Top 10
● Ma ny te a m s up d a te APIs m ultip le tim e s p e r we e k (or
d a y)
● API se c urity re q uire s a holistic solution to p rovid e
b roa d visib ility from c od e to p rod , a s we ll a s
p rod uc tion m onitoring to find hid d e n a tta c k p a ths
a nd d isc ove ry of slow a nd low a tta c ks.
1. http s:/ / se c urityb oule va rd .c om / 2022/ 02/ a p i- se c urity- tip p ing - p oint- g a rtne r- just- c re a te d - the -
c a te g ory/
2. 1930 Ma g inot Line - Philip p e Truttm a nn, La Mura ille d e Fra nc e , Gé ra rd Klop p , Thionville , 1985.
(http s:/ / c om m ons.wikim e d ia .org / wiki/ File :Ca rte Lig ne Ma g inot.p ng ), „Ca rte Lig ne Ma g inot“,
http s:/ / c re a tive c om m ons.org / lic e nse s/ b y- sa / 2.0/ fr/ d e e d .e n
3. 1940 Ma g inot Line - Ca rd e na s, Jorg e & Jr, Jorg e & Ca rd e na s, Cristia n. (2021). Cyb e rse c urity; Wa r &
Che ss r1.
Re sourc e s & Links a ttrib ution

More Related Content

PPT
04 Client Server Technology
PDF
AI and Design Vol. 2: Navigating the New Frontier - Morgenbooster
PDF
Ceh v8 labs module 03 scanning networks
PDF
Ethical hacking and countermeasures
PPTX
6 winning strategies for agil SaaS editors
PDF
New Era of Software with modern Application Security v1.0
PDF
Certified ethicalhacking classroom_1382954076
PDF
Ceh v8-course-outline
04 Client Server Technology
AI and Design Vol. 2: Navigating the New Frontier - Morgenbooster
Ceh v8 labs module 03 scanning networks
Ethical hacking and countermeasures
6 winning strategies for agil SaaS editors
New Era of Software with modern Application Security v1.0
Certified ethicalhacking classroom_1382954076
Ceh v8-course-outline

Similar to 2022 apidays LIVE Helsinki & North_Future proofing API Security (20)

PDF
PROGRAMMING AND CYBER SECURITY
PDF
Customer_Testimonial_IFFCO.pdf
PPTX
API Security: Assume Possible Interference
PPTX
Copilot Readiness Workshop Octobber 22nd 2024
PDF
How will AI impact enterprise software
PDF
Grants Managers Share and Learn Webinar by WizeHIve
PDF
CSA Raleigh application security and deception in the cloud
PDF
FortiGuard Labs What we’ve seen on the Threat Landscape, and what’s to come, ...
PDF
機械学習エンジニアを見せたAWSの再:発明とは? 〜re:Invent 2018 参加レポート〜
PPTX
apidays Paris 2024 - Do not Live in the Shadow (APIs) - Teresa Pereira, Sieme...
PDF
The IoT For Real
PPTX
Software Architecture in the age of Cloud Computing
PDF
SAI - Serverless Integration Architectures - 09/2019
PPTX
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
PDF
soFrida Dynamic Analysis Tool for Mobile Apps with Cloud Backend
PDF
Ceh v8 labs module 02 footprinting and reconnaissance
PDF
Mapping vendor solutions to emmm capability map
PPTX
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
PDF
Wiring the IoT for modern manufacturing
PDF
apidays Paris 2022 - The next five years of the API Economy, Paolo Malinverno...
PROGRAMMING AND CYBER SECURITY
Customer_Testimonial_IFFCO.pdf
API Security: Assume Possible Interference
Copilot Readiness Workshop Octobber 22nd 2024
How will AI impact enterprise software
Grants Managers Share and Learn Webinar by WizeHIve
CSA Raleigh application security and deception in the cloud
FortiGuard Labs What we’ve seen on the Threat Landscape, and what’s to come, ...
機械学習エンジニアを見せたAWSの再:発明とは? 〜re:Invent 2018 参加レポート〜
apidays Paris 2024 - Do not Live in the Shadow (APIs) - Teresa Pereira, Sieme...
The IoT For Real
Software Architecture in the age of Cloud Computing
SAI - Serverless Integration Architectures - 09/2019
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
soFrida Dynamic Analysis Tool for Mobile Apps with Cloud Backend
Ceh v8 labs module 02 footprinting and reconnaissance
Mapping vendor solutions to emmm capability map
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Wiring the IoT for modern manufacturing
apidays Paris 2022 - The next five years of the API Economy, Paolo Malinverno...
Ad

More from apidays (20)

PDF
apidays Munich 2025 - The Physics of Requirement Sciences Through Application...
PDF
apidays Munich 2025 - Developer Portals, API Catalogs, and Marketplaces, Miri...
PDF
apidays Munich 2025 - Making Sense of AI-Ready APIs in a Buzzword World, Andr...
PDF
apidays Munich 2025 - Integrate Your APIs into the New AI Marketplace, Senthi...
PDF
apidays Munich 2025 - The Double Life of the API Product Manager, Emmanuel Pa...
PDF
apidays Munich 2025 - Let’s build, debug and test a magic MCP server in Postm...
PDF
apidays Munich 2025 - The life-changing magic of great API docs, Jens Fischer...
PDF
apidays Munich 2025 - Automating Operations Without Reinventing the Wheel, Ma...
PDF
apidays Munich 2025 - Geospatial Artificial Intelligence (GeoAI) with OGC API...
PPTX
apidays Munich 2025 - GraphQL 101: I won't REST, until you GraphQL, Surbhi Si...
PPTX
apidays Munich 2025 - Effectively incorporating API Security into the overall...
PPTX
apidays Munich 2025 - Federated API Management and Governance, Vince Baker (D...
PPTX
apidays Munich 2025 - Agentic AI: A Friend or Foe?, Merja Kajava (Aavista Oy)
PPTX
apidays Munich 2025 - Streamline & Secure LLM Traffic with APISIX AI Gateway ...
PPTX
apidays Munich 2025 - Building Telco-Aware Apps with Open Gateway APIs, Subhr...
PPTX
apidays Munich 2025 - Building an AWS Serverless Application with Terraform, ...
PDF
apidays Helsinki & North 2025 - REST in Peace? Hunting the Dominant Design fo...
PDF
apidays Helsinki & North 2025 - Monetizing AI APIs: The New API Economy, Alla...
PDF
apidays Helsinki & North 2025 - How (not) to run a Graphql Stewardship Group,...
PDF
apidays Helsinki & North 2025 - APIs in the healthcare sector: hospitals inte...
apidays Munich 2025 - The Physics of Requirement Sciences Through Application...
apidays Munich 2025 - Developer Portals, API Catalogs, and Marketplaces, Miri...
apidays Munich 2025 - Making Sense of AI-Ready APIs in a Buzzword World, Andr...
apidays Munich 2025 - Integrate Your APIs into the New AI Marketplace, Senthi...
apidays Munich 2025 - The Double Life of the API Product Manager, Emmanuel Pa...
apidays Munich 2025 - Let’s build, debug and test a magic MCP server in Postm...
apidays Munich 2025 - The life-changing magic of great API docs, Jens Fischer...
apidays Munich 2025 - Automating Operations Without Reinventing the Wheel, Ma...
apidays Munich 2025 - Geospatial Artificial Intelligence (GeoAI) with OGC API...
apidays Munich 2025 - GraphQL 101: I won't REST, until you GraphQL, Surbhi Si...
apidays Munich 2025 - Effectively incorporating API Security into the overall...
apidays Munich 2025 - Federated API Management and Governance, Vince Baker (D...
apidays Munich 2025 - Agentic AI: A Friend or Foe?, Merja Kajava (Aavista Oy)
apidays Munich 2025 - Streamline & Secure LLM Traffic with APISIX AI Gateway ...
apidays Munich 2025 - Building Telco-Aware Apps with Open Gateway APIs, Subhr...
apidays Munich 2025 - Building an AWS Serverless Application with Terraform, ...
apidays Helsinki & North 2025 - REST in Peace? Hunting the Dominant Design fo...
apidays Helsinki & North 2025 - Monetizing AI APIs: The New API Economy, Alla...
apidays Helsinki & North 2025 - How (not) to run a Graphql Stewardship Group,...
apidays Helsinki & North 2025 - APIs in the healthcare sector: hospitals inte...
Ad

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Machine learning based COVID-19 study performance prediction
PDF
Encapsulation theory and applications.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Electronic commerce courselecture one. Pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
KodekX | Application Modernization Development
PPTX
Cloud computing and distributed systems.
Mobile App Security Testing_ A Comprehensive Guide.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The AUB Centre for AI in Media Proposal.docx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
MYSQL Presentation for SQL database connectivity
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Review of recent advances in non-invasive hemoglobin estimation
Machine learning based COVID-19 study performance prediction
Encapsulation theory and applications.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation_ Review paper, used for researhc scholars
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Electronic commerce courselecture one. Pdf
Understanding_Digital_Forensics_Presentation.pptx
KodekX | Application Modernization Development
Cloud computing and distributed systems.

2022 apidays LIVE Helsinki & North_Future proofing API Security

  • 1. Chuck Herrin CTO, Wib API Security Future -Proofing API Security
  • 2. Today’s Session What ● API Security Is Different - How and Why So What ● Traditional Approaches Fall Short ○ History doesn’t repeat, but it rhymes Now What ● How to Address API Security ○ Visibility ○ Traffic ○ Code ○ Dev, Test, and Production Key Takeaways What We’ll Cover Today:
  • 3. Why is API security different?
  • 4. The architecture a nd a t t a c k s ur f a c e is dif f e r e nt . APIs, by design, directly expose application logic , and often change rapidly. The attacks are different. Attacking APIs is mostly about making unexpected requests and failures to scope authorization to resources. The defenses are different. Traditional rule - based defenses like WAFs can neither detect nor defend against logic - based attacks. 1 2 3 These factors combined made APIs the #1 attack vector in 2021 Why API Security Differs From Traditional Web Application Security
  • 5. 2022 SERIES OF EVENT New York JULY (HYBRID) Australia SEPTEMBER (HYBRID) Singapore APRIL (VIRTUAL) Helsinki & North MARCH (VIRTUAL) Paris DECEMBER (HYBRID) London OCTOBER (HYBRID) Hong Kong AUGUST (VIRTUAL) JUNE (VIRTUAL) India MAY (VIRTUAL) APRIL (VIRTUAL) Dubai & Middle East JUNE (VIRTUAL) Check out our API Conferences here Wa nt t o t a lk a t one of our conference? Apply t o spea k here
  • 6. NEW API BEST PRACTICES 50% of mature API organizations plan to focus on increased API security and governance during 2022 and beyond Dedicated API Security solutions are gaining widespread adoption. “Discover your APIs before attackers, add specialist API Security products, and design API Security into the full cycle from development to delivery.” API SECURITY A FOCAL POINT "APIs expose application logic and sensitive data such as Personally Identifiable Information (PII) and because of this have increasingly become a target for attackers.” APIs EXPOSE LOGIC DIRECTLY What the Analysts and Industry are Saying:
  • 7. https://securityboulevard.com/2022/02/api - se c urity- tip p ing - p oint- g a rtn e r- just- c re a te d - the - c a te g ory/ Ga rtne r just m od ifie d the ir re fe re nc e a rc hite c ture 1 to inc lud e API se c urity a s a d e d ic a te d la ye r This is ha p p e ning in re a l tim e :
  • 8. What We’re Seeing in the Wild:
  • 9. Why Do Current Defensive Approaches Fall Short?
  • 10. The Main Reason is That Collectively, We’re Fig hting the La st Wa r As De fe nd e rs, We ’re Alm ost ALWAYS Fig hting the La st Wa r 1914 1930 1940
  • 11. 1) Te c hnolog ie s c ontinuously a d va nc e 2) Com p a nie s a nd g ove rnm e nts suc c e e d or fa il b a se d on a d op tion of ne w te c h ● The world d id n’t m e c ha nize just to c re a te m a c hine g uns, b ut a rm ie s without the m c ould no long e r c om p e te on the b a ttle fie ld 1) Atta c ke rs ta ke a d va nta g e of ne w c a p a b ilitie s, a tta c k surfa c e s, or we a kne ss 2) De fe nd e rs m ust sc ra m b le to urg e ntly c a tc h up . Key Principle - API Se c urity is just the la te st e xa m p le of a ‘rhym e ’ throug hout hum a n history: Key Takeaway - Your De fe nse Must b e Consta ntly Inform e d By The Offe nse in Ord e r to Quic kly Ad a p t Key Takeaway
  • 12. Some More Mod e rn Exa m p le s: Mic rose rvic e s Dra m a tic a lly Cha ng e the Atta c k Surfa c e . We Must Ad a p t. 1970s - 1980s: Ma infra m e Com p uting (Ce ntra lize d ) 1990s - 2000s: Inte rne t (Glob a l) 1980s - 1990s: Clie nt / Se rve r (Distrib ute d ) ~2012 - 2015: >50% of Com p a nie s Ag ile (Fa st, Ite ra tive Cyc le s) 2000s - 2010s: Cloud (Sa a S, Pa a S, Ia a S) ~2015 - 2020s: Mic rose rvic e s (Gra nula r, Re usa b le ) }Security Model Lagging }Security Model Lagged }Security Model Lagged
  • 13. Specific Changes for APIs - OWASP Top 10 (2003+) vs API Top 10 (2019+) API01:2021 Broken Object Level Authorization API02:2021 Broken Authentication API03:2021 Excessive Data Exposure API04:2021 Lack of Resources & Rate Limiting API05:2021 Broken Function Level Authorization API06:2021 Mass Assignment API07:2021 Security Misconfiguration API08:2021 Injection API09:2021 Improper Assets Management API10:2021 Insufficient Logging & Monitoring Mostly Logic based API Top 10 - Published in 2019 A0 1:2 0 2 1 Broke n Acce ss Con trol A0 2 :2 0 2 1 Cryp tog rap h ic Failu re s A0 3 :2 0 2 1 In je ction A0 4:2 0 2 1 In se cu re De sig n A0 5:2 0 2 1 Se cu rity Miscon fig u ration A0 6 :2 0 2 1 Vu ln e rab le an d Ou td ate d Com p on e n ts A0 7:2 0 2 1 Id e n tification an d Au th e n tication Failu re s A0 8 :2 0 2 1 Softw are an d Data In te g rity Failu re s A0 9 :2 0 2 1 Se cu rity Log g in g an d Mon itorin g Failu re s A10 :2 0 2 1 Se rve r-Sid e Re q u e st Forg e ry Mostly Ruled based Web Top 10 - Published in 2003
  • 14. 2019 OWASP API Security Top 10 Threats WAFs API Gateways Broken Object Level Authorization Broken Authentication Excessive Data Exposure Lack of Resources & Rate -Limiting Broken Function Level Authorization Mass Assignment Security Misconfiguration Injection Improper Assets Management Insufficient Logging & Monitoring Logic based Rule based Dedicated API Solution Key Takeaway - Traditional Tools Lack the Context Needed to Defend Against Modern Logic Based Attacks
  • 15. How to Address API Security?
  • 16. API threats emerge in development, testing, and production. Cove rin g th e fu ll API life c yc le is c ritic a l! Ke y Princ ip le - Your API Se c urity Prog ra m Must Cove r the Full API Life c yc le
  • 17. The API Lifecycle First Principle - You Can’t Defend An Asset You Can’t See Development Testing Production Identify Protect Detect Respond Recover
  • 18. Defend right by simulating a tta c ks on p rod uc tion APIs to und e rsta nd e xp osure to re a l- world a tta c ks a nd d e te c t hid d e n d e p e nd e nc ie s Shift le ft b y g iving d e vs tools to d e te c t a nd re solve issue s in the ir norm a l workflow Development Testing Production True Visibility Requires Multiple Lenses - Defend Right While Shifting Left Uncover blind spots by continually monitoring inbound and outbound traffic AND code repositories for direct references to APIs and Endpoints you can’t see elsewhere
  • 19. In Conclusion: Key Takeaways ● APIs e xp ose a p p lic a tion a nd b usine ss log ic d ire c tly, c re a ting a nove l a nd c om p le x a tta c k surfa c e ● Mic rose rvic e s offe r m ultip le a d va nta g e s for b usine sse s a nd g ove rnm e nts, a nd re g ula tors a re m a nd a ting inc re a se d API usa g e a nd d a ta sha ring (FHIR, Op e n Ba nking , PSD2). ○ Ad op tion is ine vita b le . Sa fe a d op tion is not. ● Tra d itiona l we b se c urity a p p roa c he s we re d e sig ne d for m onolithic we b a p p s a nd the 2003+ OWASP Top 10 ● Ma ny te a m s up d a te APIs m ultip le tim e s p e r we e k (or d a y) ● API se c urity re q uire s a holistic solution to p rovid e b roa d visib ility from c od e to p rod , a s we ll a s p rod uc tion m onitoring to find hid d e n a tta c k p a ths a nd d isc ove ry of slow a nd low a tta c ks.
  • 20. 1. http s:/ / se c urityb oule va rd .c om / 2022/ 02/ a p i- se c urity- tip p ing - p oint- g a rtne r- just- c re a te d - the - c a te g ory/ 2. 1930 Ma g inot Line - Philip p e Truttm a nn, La Mura ille d e Fra nc e , Gé ra rd Klop p , Thionville , 1985. (http s:/ / c om m ons.wikim e d ia .org / wiki/ File :Ca rte Lig ne Ma g inot.p ng ), „Ca rte Lig ne Ma g inot“, http s:/ / c re a tive c om m ons.org / lic e nse s/ b y- sa / 2.0/ fr/ d e e d .e n 3. 1940 Ma g inot Line - Ca rd e na s, Jorg e & Jr, Jorg e & Ca rd e na s, Cristia n. (2021). Cyb e rse c urity; Wa r & Che ss r1. Re sourc e s & Links a ttrib ution