SlideShare a Scribd company logo
Monitoring and Responding
to API Breaches
API SECURE 2022
Carolina Ruiz
Brier & Thorn
THE
THREAT
LANDSCAPE
Companies are leveraging APIs more frequently. With
a total increase of API traffic of 321% (Salt Security,
2022) in comparison to last year.
With the majority of the companies cite
• Development Efficiencies/ Standardization
• Platform System Integrations
• Cloud Migration
As the main drivers behind the use of API.
In 2021, a total increase of 681% (Salt Security. 2022)
of attack traffic for APIs was detected.
“Gartner predicts that by 2022,
application programming interface (API)
attacks will become the most-frequent
attack vector...” Companies are struggling to keep up with the
deployment of APIs unable to perform security testing
fast enough .
A narrow view on API Security, viewing prevention
as the only security strategy.
THE
THREAT
LANDSCAPE
Platform or Product Team ,
2% Other , 1%
DevSecOps, 12%
DevOps, 11%
Developers, 29%
AppSecTeam , 21%
API Team , 14%
Infosec , 10%
A multi- department approach is needed to tackle
all of the challenges with API security.
Efforts to fill in the gaps in knowledge regarding
API security is necessary for all teams involved.
Companies are struggling to define responsibilities
for API Security.
41% Companies secure their APIs in the same way that
they secure their web applications (Dark Reading,
2021)
WHAT
ABOUT
MONITORING
PREVENTION RESPONSE FORENSICS
Before the Incident During the Incident After the Incident
API Discovery Behavior and Analytics
Identify your business as usual
Threat Monitoring
Log and identify malicious activity
Integration
Consolidate to a security platform
(e.g. SIEM, XDR)
Use Case Creation
e.g Create alarms based on
applicable use cases.
Log Retention
Historical logs will prove critical
during forensics effort.
Shadow API: APIs that existing outside
of the official maintenance processes.
Zombie API: Forgotten APIs
T O O L S 1 0 1 T O O L S +
CDN/
ADC
WAF
API
GATEWAY
Helps with latency, reliability and traffic spikes and
provides some protection against volumetric DDOS
Attacks
Will provide protection against application layer
attacks such as SQL injection, cookie poisoning and
cross-site scripting (XSS).
Supports companies in routing API request,
aggregating API responses etc.… whilst protecting
against an array of vulnerabilities. (e.g. Invalid input)
Dynamic and Static Application
Test
API Penetration Testing
Q&A
www.brierandthorn.com
www.linkedin.com/company
/brier-&-thorn
@brierandthorn
www.brierandthorn.com.mx
https://mx.linkedin.com/company/b
rier-&-thorn-mexico-s-a-p-i-de-c-v
@BrierandThornMX
Brier & Thorn Inc. Brier & Thorn México Carolina Ruiz
www.linkedin.com/in/carolinamruiz
@RuizCarolinaM

More Related Content

PDF
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
PPTX
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
PDF
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSI®
PDF
FireTail at API Days Australia 2024 - The Double-edge sword of AI for API Sec...
PPTX
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
PDF
APIsecure 2023 - Learning from a decade of API breaches and why application-c...
PDF
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
PDF
Apidays Helsinki & North 2024 - From Chaos to Calm- Navigating Emerging API ...
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSI®
FireTail at API Days Australia 2024 - The Double-edge sword of AI for API Sec...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
APIsecure 2023 - Learning from a decade of API breaches and why application-c...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
Apidays Helsinki & North 2024 - From Chaos to Calm- Navigating Emerging API ...

Similar to 2022 APIsecure_Monitoring and Responding to API Breaches (20)

PDF
Veracode Corporate Overview - Print
PDF
A Look At API Economy Trends In 2024 - by Bill Doerrfeld, Nordic APIs
PDF
Secure your app against DDOS, API Abuse, Hijacking, and Fraud
PPTX
Outpost24 webinar - Api security
PDF
Security that Scales with Cloud Native Development
PDF
OWASP API Security TOP 10 - 2019
PPTX
API Security Survey
PDF
Realities of Security in the Cloud
PPTX
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
PPTX
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
PPTX
Realizing the Full Potential of Cloud-Native Application Security
PPTX
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
PDF
API Security Needs AI Now More Than Ever
PPTX
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
PDF
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
PPTX
The Inconvenient Truth About API Security
PDF
[WSO2Con USA 2018] Integration is Sexy
PDF
[WSO2Con Asia 2018] Integration is Sexy
PDF
7 measures to overcome cyber attacks of web application
Veracode Corporate Overview - Print
A Look At API Economy Trends In 2024 - by Bill Doerrfeld, Nordic APIs
Secure your app against DDOS, API Abuse, Hijacking, and Fraud
Outpost24 webinar - Api security
Security that Scales with Cloud Native Development
OWASP API Security TOP 10 - 2019
API Security Survey
Realities of Security in the Cloud
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
Realizing the Full Potential of Cloud-Native Application Security
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
API Security Needs AI Now More Than Ever
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
The Inconvenient Truth About API Security
[WSO2Con USA 2018] Integration is Sexy
[WSO2Con Asia 2018] Integration is Sexy
7 measures to overcome cyber attacks of web application
Ad

More from APIsecure_ Official (20)

PPTX
2022 APIsecure_The Real World, API Security Edition
PDF
2022 APIsecure_Learn from the Past, Secure the Present, Plan for the Future: ...
PDF
2022 APIsecure_Shift Left API Security - The Right Way
PDF
2022 APIsecure_A day in the life of an API; Fighting the odds
PDF
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
PDF
2022 APIsecure_Securing Large API Ecosystems
PDF
2022 APIsecure_Quarterly Review of API Vulnerabilities
PPTX
2022 APIsecure_Top Ten Security Tips for APIs
PPTX
2022 APIsecure_Are your APIs Rugged Enough?
PPTX
2022 APIsecure_Making webhook APIs secure for enterprise
PDF
2022 APIsecure_API Security & Fraud Detection - Are you ready?
PDF
2022 APIsecure_Exploiting multi-step business logic vulnerabilities in APIs
PPTX
2022 APIsecure_API Security Testing: The Next Step in Modernizing AppSec
PPTX
2022 APIsecure_Hackers with Valid Credentials
PDF
2022 APIsecure_API Abuse - How data breaches now and in the future will use A...
PDF
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
PDF
2022 APIsecure_Harnessing the Speed of Innovation
PDF
2022 APIsecure_API Discovery: First step towards API Security
PPTX
2022 APIsecure_We’re Not in AppSec Anymore Toto
PPTX
2022 APIsecure_Anomaly detection is no longer a strategy
2022 APIsecure_The Real World, API Security Edition
2022 APIsecure_Learn from the Past, Secure the Present, Plan for the Future: ...
2022 APIsecure_Shift Left API Security - The Right Way
2022 APIsecure_A day in the life of an API; Fighting the odds
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
2022 APIsecure_Securing Large API Ecosystems
2022 APIsecure_Quarterly Review of API Vulnerabilities
2022 APIsecure_Top Ten Security Tips for APIs
2022 APIsecure_Are your APIs Rugged Enough?
2022 APIsecure_Making webhook APIs secure for enterprise
2022 APIsecure_API Security & Fraud Detection - Are you ready?
2022 APIsecure_Exploiting multi-step business logic vulnerabilities in APIs
2022 APIsecure_API Security Testing: The Next Step in Modernizing AppSec
2022 APIsecure_Hackers with Valid Credentials
2022 APIsecure_API Abuse - How data breaches now and in the future will use A...
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
2022 APIsecure_Harnessing the Speed of Innovation
2022 APIsecure_API Discovery: First step towards API Security
2022 APIsecure_We’re Not in AppSec Anymore Toto
2022 APIsecure_Anomaly detection is no longer a strategy
Ad

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Cloud computing and distributed systems.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Electronic commerce courselecture one. Pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPT
Teaching material agriculture food technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
DOCX
The AUB Centre for AI in Media Proposal.docx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Encapsulation theory and applications.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Cloud computing and distributed systems.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Spectroscopy.pptx food analysis technology
Spectral efficient network and resource selection model in 5G networks
Building Integrated photovoltaic BIPV_UPV.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Per capita expenditure prediction using model stacking based on satellite ima...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Electronic commerce courselecture one. Pdf
Unlocking AI with Model Context Protocol (MCP)
Teaching material agriculture food technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Reach Out and Touch Someone: Haptics and Empathic Computing
Big Data Technologies - Introduction.pptx
Programs and apps: productivity, graphics, security and other tools
The AUB Centre for AI in Media Proposal.docx

2022 APIsecure_Monitoring and Responding to API Breaches

  • 1. Monitoring and Responding to API Breaches API SECURE 2022 Carolina Ruiz Brier & Thorn
  • 2. THE THREAT LANDSCAPE Companies are leveraging APIs more frequently. With a total increase of API traffic of 321% (Salt Security, 2022) in comparison to last year. With the majority of the companies cite • Development Efficiencies/ Standardization • Platform System Integrations • Cloud Migration As the main drivers behind the use of API. In 2021, a total increase of 681% (Salt Security. 2022) of attack traffic for APIs was detected. “Gartner predicts that by 2022, application programming interface (API) attacks will become the most-frequent attack vector...” Companies are struggling to keep up with the deployment of APIs unable to perform security testing fast enough . A narrow view on API Security, viewing prevention as the only security strategy.
  • 3. THE THREAT LANDSCAPE Platform or Product Team , 2% Other , 1% DevSecOps, 12% DevOps, 11% Developers, 29% AppSecTeam , 21% API Team , 14% Infosec , 10% A multi- department approach is needed to tackle all of the challenges with API security. Efforts to fill in the gaps in knowledge regarding API security is necessary for all teams involved. Companies are struggling to define responsibilities for API Security. 41% Companies secure their APIs in the same way that they secure their web applications (Dark Reading, 2021)
  • 4. WHAT ABOUT MONITORING PREVENTION RESPONSE FORENSICS Before the Incident During the Incident After the Incident API Discovery Behavior and Analytics Identify your business as usual Threat Monitoring Log and identify malicious activity Integration Consolidate to a security platform (e.g. SIEM, XDR) Use Case Creation e.g Create alarms based on applicable use cases. Log Retention Historical logs will prove critical during forensics effort. Shadow API: APIs that existing outside of the official maintenance processes. Zombie API: Forgotten APIs T O O L S 1 0 1 T O O L S + CDN/ ADC WAF API GATEWAY Helps with latency, reliability and traffic spikes and provides some protection against volumetric DDOS Attacks Will provide protection against application layer attacks such as SQL injection, cookie poisoning and cross-site scripting (XSS). Supports companies in routing API request, aggregating API responses etc.… whilst protecting against an array of vulnerabilities. (e.g. Invalid input) Dynamic and Static Application Test API Penetration Testing

Editor's Notes

  • #2: My name is Carolina Ruiz, CEO of Brier & Thorn, Managed Security Service Provider and a long-time cybersecurity and compliance enthusiast.
  • #3: According to the report “State of API Security” by Salt Security. As you can see between the growth % of API traffic and API attack traffic, is disproportionate. Meaning that we not only seen the the growth in attack traffic that match the growth in API infrastructure, but we see that this the attack traffic doubles it. The narrow view focusing almost exclusively on the prevention aspect of security. We got so caught up in protecting from an API attack that we lose sight that we should focus on protecting our environment or data from the risk associated to APIs – not just the API attack vector.
  • #4: I’ve included this statistic from Drak Readings Secure Applications Survey, which states that 41% of companies use the same tools ans strategies to protect their API as they do with their web application. In this situation a good example would be relying solely on having a Web Application Firewall in place, although a WAF has its place within application security Its main focus it to protect against the OWASP Top Ten which difer from the OWASP AP Security Top Ten – effectively creating a gap in security and visibility. Lastly these following points focus on the confusion around the ownership of API Security, as detailed by the chart (From the Salt Security report) there is an evident confusion across companies of who should own it. Mention: Christine Bottagaro – Resurface on the importance of collaboration from the security team and development team – often times with the development not receiving sufficient training on security and on the other side security engineers coming from a network background requiring more training on the API side.
  • #5: So how do we go about monitoring. Threat Monitoring: Maintaining an API logging system will be critical to identify anomalous and potentially malicious traffic promptly and aid the response time for security teams. Logging input validation failures, application errors and events that deal with the API functionality such as payments and settings. If there is anything I want you to leave this talk with, is that security monitoring for APIs is critical for companies and they must take a holistic and multi department approach. It is not enough to apply controls at the development level, we must ensure that we are prepared to monitor and respond to incidents as part of security operations as a whole.
  • #6: II have included Brier & Thorn’s social media accounts as well as my personal accounts, if you want to follow, look at our content or just say hi. Thank you to API Secure for having me and ill open up for any questions.