SlideShare a Scribd company logo
API
First step towards API Security
Discovery
Amod Gupta
Product Management, Traceable
amod@traceable.ai
GOAL ▪ Define API Discovery in the
context of API Security
▪ Minimum set of discovery
related features that API
Security tools should provide
What makes
API discovery
challenging
▪ Public cloud
▪ On-premises
▪ Hybrid
Deployment Options
Microservices
architecture has made
applications massively
distributed
Distributed
Dev teams are
releasing multiple
times a week
Agile releases
Automatically discover all API endpoints (by inspecting traffic)
Group APIs by apps, services, domains etc. so security teams can
digest the information
Classify APIs as external (public), internal or 3rd party
Automatically catalog new APIs and updates to existing APIs
API discovery
tool should…
Minimum Feature Set
1. Automatically create an API Catalog
● Hierarchical grouping
● Classification of APIs
● Up to date
Now, that we have an
API Catalog, how do we
make it actionable
Open
API Specification
Are APIs being consumed securely?
Are APIs being consumed as the
developer intended?
Are APIs exposing unknown
parameters, responses,
content-types etc. ?
Without
Common source of truth between different
teams and partners
Portability between different security tools
Easy to identify which APIs expose sensitive
data and where
With
Minimum Feature Set
1. Automatically create an API Catalog
● Hierarchical grouping
● Classification of APIs
● Up to date
2. Open API spec for API endpoints
● Create
● Download
Minimum Feature Set
We’ve cataloged all the API endpoints
We have Open API specifications for them
But how do we consume this when there are 1000s of endpoints?
CONFORMANCE ANALYSIS
Open API spec
Developer version
● Missing APIs (Shadow APIs)
● Issues with parameters
● Issues with request/response bodies
Open API spec
Prod/Test version
Doing this at scale… 1. Automatically create an API Catalog
● Hierarchical grouping
● Classification of APIs
● Up to date
2. Open API spec for API endpoints
● Create
● Download
3. Conformance analysis to identify
high priority issues at scale
Sensitive data exposure
Minimum Feature Set
1. Automatically create an API Catalog
● Hierarchical grouping
● Classification of APIs
● Up to date
2. Open API spec for API endpoints
● Create
● Download
3. Conformance analysis to identify
high priority issues at scale
Catalog of Sensitive Data
SSN email age
gcp_api_key
ip_address
credit_card_no address
Integrated workflows
Detect
● New data exposure
● Policy violations
Log
● Create tickets
● Integrations
Track & Verify
● Pre-prod
environments
TIN
SIN
aws_api_key
4. Sensitive data exposure
● Catalog data types
● Integrated workflows
Risk Score brings it together
API Endpoints Risk Score
/juiceshop/getorder/{order-id} 8
/juiceshop/create-account 7
/juiceshop/order/checkout/ 5
/juiceshop/account/getaccount/{account-id} 5
/juiceshop/order/notification/ 2
7
Conformance deviations
Public or Internal Sensitive Data Exposure
HTTP vs HTTPs
Minimum Feature Set
1. Automatically create an API Catalog
● Hierarchical grouping
● Classification of APIs
● Up to date
2. Open API spec for API endpoints
● Create
● Download
3. Conformance analysis to identify
high priority issues at scale
4. Sensitive data exposure
● Catalog data types
● Integrated workflows
5. Integrated risk score
Summary
API Catalog
Automatically create and keep
up to date
Open API Spec
Automatically create and keep
up to date
Conformance
Identify the drift from expected
behavior
Risk Score
Integrated score to identify APIs
that need attention
Sensitive Data
Integrated score to identify APIs
that need attention
Questions
THANK YOU

More Related Content

PDF
INTERFACE, by apidays - API Discovery: First step towards API Security
PPTX
What It Takes to Build API Integrations
PPTX
2022 APIsecure_Securing APIs with Open Standards
PDF
Apidays Paris 2023 - Building an Inventory, Maria Teresa Pereira, KPMG Portugal
PDF
Build, host and manage your custom API in less than an hour
PDF
Peeling the Onion: Making Sense of the Layers of API Security
ODP
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
PPTX
API Services: Building State-of-the-Art APIs
INTERFACE, by apidays - API Discovery: First step towards API Security
What It Takes to Build API Integrations
2022 APIsecure_Securing APIs with Open Standards
Apidays Paris 2023 - Building an Inventory, Maria Teresa Pereira, KPMG Portugal
Build, host and manage your custom API in less than an hour
Peeling the Onion: Making Sense of the Layers of API Security
Building an Open Source AppSec Pipeline - 2015 Texas Linux Fest
API Services: Building State-of-the-Art APIs

Similar to 2022 APIsecure_API Discovery: First step towards API Security (20)

PPTX
WaveMaker API Success
PDF
2022 APIsecure_Shift Left API Security - The Right Way
PPTX
Manual JavaScript Analysis Is A Bug
PDF
API testing methdology - OWASP Pune (1).pdf
PDF
Using ap is to gather data
PDF
Build, Test, Deploy: The Ultimate Handbook for Modern API Development
PPTX
Apache Eagle Strata Hadoop World London 2016
PDF
APImetrics Product Overview March 2015
PPTX
API Testing with Frisby and Mocha
PDF
Deploy a web API in 15'
PPTX
apidays Paris 2024 - Do not Live in the Shadow (APIs) - Teresa Pereira, Sieme...
PPTX
Office Add-ins developer community call-July 2019
PDF
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
PDF
[Workshop] Managing the API lifecycle with Open Source Technologies
PDF
apidays LIVE Paris - Potential of API integrations, common traps and advices ...
PDF
2022 apidays LIVE Helsinki & North_Event API Products – Maximizing the Value ...
PDF
Building an API Security Strategy
PDF
The ultimate api checklist by Blendr.io
PPTX
Diving into the World of Test Automation The Approach and the Technologies
PPTX
To Open Banking and Beyond: Developing APIs that are Resilient to every new I...
WaveMaker API Success
2022 APIsecure_Shift Left API Security - The Right Way
Manual JavaScript Analysis Is A Bug
API testing methdology - OWASP Pune (1).pdf
Using ap is to gather data
Build, Test, Deploy: The Ultimate Handbook for Modern API Development
Apache Eagle Strata Hadoop World London 2016
APImetrics Product Overview March 2015
API Testing with Frisby and Mocha
Deploy a web API in 15'
apidays Paris 2024 - Do not Live in the Shadow (APIs) - Teresa Pereira, Sieme...
Office Add-ins developer community call-July 2019
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
[Workshop] Managing the API lifecycle with Open Source Technologies
apidays LIVE Paris - Potential of API integrations, common traps and advices ...
2022 apidays LIVE Helsinki & North_Event API Products – Maximizing the Value ...
Building an API Security Strategy
The ultimate api checklist by Blendr.io
Diving into the World of Test Automation The Approach and the Technologies
To Open Banking and Beyond: Developing APIs that are Resilient to every new I...
Ad

More from APIsecure_ Official (20)

PPTX
2022 APIsecure_The Real World, API Security Edition
PDF
2022 APIsecure_Learn from the Past, Secure the Present, Plan for the Future: ...
PDF
2022 APIsecure_A day in the life of an API; Fighting the odds
PDF
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
PDF
2022 APIsecure_Securing Large API Ecosystems
PDF
2022 APIsecure_Quarterly Review of API Vulnerabilities
PPTX
2022 APIsecure_Top Ten Security Tips for APIs
PPTX
2022 APIsecure_Are your APIs Rugged Enough?
PPTX
2022 APIsecure_Making webhook APIs secure for enterprise
PDF
2022 APIsecure_API Security & Fraud Detection - Are you ready?
PPTX
2022 APIsecure_Monitoring and Responding to API Breaches
PDF
2022 APIsecure_Exploiting multi-step business logic vulnerabilities in APIs
PPTX
2022 APIsecure_API Security Testing: The Next Step in Modernizing AppSec
PPTX
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
PPTX
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
PPTX
2022 APIsecure_Hackers with Valid Credentials
PDF
2022 APIsecure_API Abuse - How data breaches now and in the future will use A...
PDF
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
PDF
2022 APIsecure_Harnessing the Speed of Innovation
PPTX
2022 APIsecure_We’re Not in AppSec Anymore Toto
2022 APIsecure_The Real World, API Security Edition
2022 APIsecure_Learn from the Past, Secure the Present, Plan for the Future: ...
2022 APIsecure_A day in the life of an API; Fighting the odds
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
2022 APIsecure_Securing Large API Ecosystems
2022 APIsecure_Quarterly Review of API Vulnerabilities
2022 APIsecure_Top Ten Security Tips for APIs
2022 APIsecure_Are your APIs Rugged Enough?
2022 APIsecure_Making webhook APIs secure for enterprise
2022 APIsecure_API Security & Fraud Detection - Are you ready?
2022 APIsecure_Monitoring and Responding to API Breaches
2022 APIsecure_Exploiting multi-step business logic vulnerabilities in APIs
2022 APIsecure_API Security Testing: The Next Step in Modernizing AppSec
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
2022 APIsecure_Hackers with Valid Credentials
2022 APIsecure_API Abuse - How data breaches now and in the future will use A...
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
2022 APIsecure_Harnessing the Speed of Innovation
2022 APIsecure_We’re Not in AppSec Anymore Toto
Ad

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
A Presentation on Artificial Intelligence
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
cuic standard and advanced reporting.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Electronic commerce courselecture one. Pdf
PPT
Teaching material agriculture food technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Encapsulation_ Review paper, used for researhc scholars
Review of recent advances in non-invasive hemoglobin estimation
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Unlocking AI with Model Context Protocol (MCP)
A Presentation on Artificial Intelligence
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The AUB Centre for AI in Media Proposal.docx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Spectral efficient network and resource selection model in 5G networks
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
cuic standard and advanced reporting.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Electronic commerce courselecture one. Pdf
Teaching material agriculture food technology
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction
Understanding_Digital_Forensics_Presentation.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

2022 APIsecure_API Discovery: First step towards API Security

  • 1. API First step towards API Security Discovery Amod Gupta Product Management, Traceable amod@traceable.ai
  • 2. GOAL ▪ Define API Discovery in the context of API Security ▪ Minimum set of discovery related features that API Security tools should provide
  • 3. What makes API discovery challenging ▪ Public cloud ▪ On-premises ▪ Hybrid Deployment Options Microservices architecture has made applications massively distributed Distributed Dev teams are releasing multiple times a week Agile releases
  • 4. Automatically discover all API endpoints (by inspecting traffic) Group APIs by apps, services, domains etc. so security teams can digest the information Classify APIs as external (public), internal or 3rd party Automatically catalog new APIs and updates to existing APIs API discovery tool should… Minimum Feature Set 1. Automatically create an API Catalog ● Hierarchical grouping ● Classification of APIs ● Up to date
  • 5. Now, that we have an API Catalog, how do we make it actionable
  • 6. Open API Specification Are APIs being consumed securely? Are APIs being consumed as the developer intended? Are APIs exposing unknown parameters, responses, content-types etc. ? Without Common source of truth between different teams and partners Portability between different security tools Easy to identify which APIs expose sensitive data and where With Minimum Feature Set 1. Automatically create an API Catalog ● Hierarchical grouping ● Classification of APIs ● Up to date 2. Open API spec for API endpoints ● Create ● Download
  • 7. Minimum Feature Set We’ve cataloged all the API endpoints We have Open API specifications for them But how do we consume this when there are 1000s of endpoints? CONFORMANCE ANALYSIS Open API spec Developer version ● Missing APIs (Shadow APIs) ● Issues with parameters ● Issues with request/response bodies Open API spec Prod/Test version Doing this at scale… 1. Automatically create an API Catalog ● Hierarchical grouping ● Classification of APIs ● Up to date 2. Open API spec for API endpoints ● Create ● Download 3. Conformance analysis to identify high priority issues at scale
  • 8. Sensitive data exposure Minimum Feature Set 1. Automatically create an API Catalog ● Hierarchical grouping ● Classification of APIs ● Up to date 2. Open API spec for API endpoints ● Create ● Download 3. Conformance analysis to identify high priority issues at scale Catalog of Sensitive Data SSN email age gcp_api_key ip_address credit_card_no address Integrated workflows Detect ● New data exposure ● Policy violations Log ● Create tickets ● Integrations Track & Verify ● Pre-prod environments TIN SIN aws_api_key 4. Sensitive data exposure ● Catalog data types ● Integrated workflows
  • 9. Risk Score brings it together API Endpoints Risk Score /juiceshop/getorder/{order-id} 8 /juiceshop/create-account 7 /juiceshop/order/checkout/ 5 /juiceshop/account/getaccount/{account-id} 5 /juiceshop/order/notification/ 2 7 Conformance deviations Public or Internal Sensitive Data Exposure HTTP vs HTTPs Minimum Feature Set 1. Automatically create an API Catalog ● Hierarchical grouping ● Classification of APIs ● Up to date 2. Open API spec for API endpoints ● Create ● Download 3. Conformance analysis to identify high priority issues at scale 4. Sensitive data exposure ● Catalog data types ● Integrated workflows 5. Integrated risk score
  • 10. Summary API Catalog Automatically create and keep up to date Open API Spec Automatically create and keep up to date Conformance Identify the drift from expected behavior Risk Score Integrated score to identify APIs that need attention Sensitive Data Integrated score to identify APIs that need attention