SlideShare a Scribd company logo
How to secure API
endpoints with WAF?
Kuldeep Pisda, Backend-cum-SRE Goldcast Inc
Prerequisite
The application should be deployed on AWS routed with proper Application Load Balancers, API Gateway, AWS
AppSync or CloudFront.
Common
Exploits
SQL Injection
SQL injection is a code injection technique that might destroy or leak your database.
user_id = request.body.POST.get(‘user’);
sql_to_execute = "SELECT * FROM Users WHERE id = " + user_id;
SELECT * FROM Users WHERE id = 105 OR 1=1;
Resolution: Always prepare your
SQL Queries before executing
them.
LFI Attacks
Local File Inclusion attacks are used by attackers to trick a web application into running or exposing files on a web
server. If the attack is successful, it will expose sensitive information, and in severe cases, can lead to XSS and remote
code execution.
2022 APIsecure_Secure your APIs with WAF in AWS
Resolution: Configure server
correctly, set proper permissions
for www-data users and don’t
allow ../ based file access.
RCE
RCE vulnerabilities allow an attacker to execute arbitrary code on a remote device. An attacker can achieve RCE in a few
different ways, including, Injection Attacks, Deserialization Attacks, Out-of-Bounds Write.
Example: Log4j, ETERNALBLUE
Resolution: Input Sanitization,
Secure Memory Management,
Access Control.
How does WAF
help?
WAF
AWS WAF is a web application firewall that helps protect your web applications or APIs against common web exploits and bots that may affect
availability, compromise security, or consume excessive resources. AWS WAF gives you control over how traffic reaches your applications by
enabling you to create security rules that control bot traffic and block common attack patterns, such as SQL injection or cross-site scripting.
2022 APIsecure_Secure your APIs with WAF in AWS
Rules
● Rate Based Rules
● Regular Rules
○ Origin
○ Request Components
■ Header
■ Query Param
■ URI Path
■ Body
■ Method
WAF Rules & Actions
Actions
Allow
Block
Count
Captcha
What WAF does
not protect us
from?
It does protect us from the known
vulnerabilities but it can’t help us
with the broken business logics.
WAF should not be the only
means of defence.
Thanking You

More Related Content

PPTX
Cyber ppt
PDF
OWASP Top 10 Project
PPTX
OWASP TOP 10 VULNERABILITIS
PPT
Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities
DOCX
supraja technologies material for secure coding
PPTX
Application Security Vulnerabilities: OWASP Top 10 -2007
PDF
OWASP Evening #10 Serbia
PPT
2009: Securing Applications With Web Application Firewalls and Vulnerability ...
Cyber ppt
OWASP Top 10 Project
OWASP TOP 10 VULNERABILITIS
Sergey Kochergan - OWASP Top 10 Web Application Vulnerabilities
supraja technologies material for secure coding
Application Security Vulnerabilities: OWASP Top 10 -2007
OWASP Evening #10 Serbia
2009: Securing Applications With Web Application Firewalls and Vulnerability ...

Similar to 2022 APIsecure_Secure your APIs with WAF in AWS (20)

PPT
Owasp top 10
PDF
OWASP Evening #10
PPTX
Navigating the Intersection: IAM and OWASP in the Cybersecurity Landscape (Id...
PPTX
How To Deal With Common Vulnerabilities in Java.pptx
PPT
OWASP Top10 2010
PDF
Soteria Cybersecurity Healthcheck-FB01
PPTX
OWASP -Top 5 Jagjit
PPT
OWASP_Top_10_Introduction_and_Remedies_2017.ppt
PPT
OWASP App Sec US - 2010
PDF
Acunetix - Web Vulnerability Scanner
PDF
T04505103106
PDF
Web Application Security 101
PPT
香港六合彩
PDF
Injecting Security into Web apps at Runtime Whitepaper
PPT
PPTX
An Introduction of SQL Injection, Buffer Overflow & Wireless Attack
PPTX
Web application Security tools
PDF
2013 OWASP Top 10
PPT
Cyber security
Owasp top 10
OWASP Evening #10
Navigating the Intersection: IAM and OWASP in the Cybersecurity Landscape (Id...
How To Deal With Common Vulnerabilities in Java.pptx
OWASP Top10 2010
Soteria Cybersecurity Healthcheck-FB01
OWASP -Top 5 Jagjit
OWASP_Top_10_Introduction_and_Remedies_2017.ppt
OWASP App Sec US - 2010
Acunetix - Web Vulnerability Scanner
T04505103106
Web Application Security 101
香港六合彩
Injecting Security into Web apps at Runtime Whitepaper
An Introduction of SQL Injection, Buffer Overflow & Wireless Attack
Web application Security tools
2013 OWASP Top 10
Cyber security
Ad

More from APIsecure_ Official (20)

PPTX
2022 APIsecure_The Real World, API Security Edition
PDF
2022 APIsecure_Learn from the Past, Secure the Present, Plan for the Future: ...
PDF
2022 APIsecure_Shift Left API Security - The Right Way
PDF
2022 APIsecure_A day in the life of an API; Fighting the odds
PDF
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
PDF
2022 APIsecure_Securing Large API Ecosystems
PDF
2022 APIsecure_Quarterly Review of API Vulnerabilities
PPTX
2022 APIsecure_Top Ten Security Tips for APIs
PPTX
2022 APIsecure_Are your APIs Rugged Enough?
PPTX
2022 APIsecure_Making webhook APIs secure for enterprise
PDF
2022 APIsecure_API Security & Fraud Detection - Are you ready?
PPTX
2022 APIsecure_Monitoring and Responding to API Breaches
PDF
2022 APIsecure_Exploiting multi-step business logic vulnerabilities in APIs
PPTX
2022 APIsecure_API Security Testing: The Next Step in Modernizing AppSec
PPTX
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
PPTX
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
PPTX
2022 APIsecure_Hackers with Valid Credentials
PDF
2022 APIsecure_API Abuse - How data breaches now and in the future will use A...
PDF
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
PDF
2022 APIsecure_Harnessing the Speed of Innovation
2022 APIsecure_The Real World, API Security Edition
2022 APIsecure_Learn from the Past, Secure the Present, Plan for the Future: ...
2022 APIsecure_Shift Left API Security - The Right Way
2022 APIsecure_A day in the life of an API; Fighting the odds
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
2022 APIsecure_Securing Large API Ecosystems
2022 APIsecure_Quarterly Review of API Vulnerabilities
2022 APIsecure_Top Ten Security Tips for APIs
2022 APIsecure_Are your APIs Rugged Enough?
2022 APIsecure_Making webhook APIs secure for enterprise
2022 APIsecure_API Security & Fraud Detection - Are you ready?
2022 APIsecure_Monitoring and Responding to API Breaches
2022 APIsecure_Exploiting multi-step business logic vulnerabilities in APIs
2022 APIsecure_API Security Testing: The Next Step in Modernizing AppSec
2022 APIsecure_Realizing the Full Cloud Native Potential With a Multi-Layered...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
2022 APIsecure_Hackers with Valid Credentials
2022 APIsecure_API Abuse - How data breaches now and in the future will use A...
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
2022 APIsecure_Harnessing the Speed of Innovation
Ad

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
KodekX | Application Modernization Development
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
sap open course for s4hana steps from ECC to s4
PPT
Teaching material agriculture food technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Empathic Computing: Creating Shared Understanding
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
Electronic commerce courselecture one. Pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Approach and Philosophy of On baking technology
Encapsulation_ Review paper, used for researhc scholars
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
KodekX | Application Modernization Development
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
cuic standard and advanced reporting.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
sap open course for s4hana steps from ECC to s4
Teaching material agriculture food technology
Building Integrated photovoltaic BIPV_UPV.pdf
Spectral efficient network and resource selection model in 5G networks
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

2022 APIsecure_Secure your APIs with WAF in AWS