SlideShare a Scribd company logo
API Security Audit
A partnership between 42Crunch and WSO2
28th May 2020
8.30 P.M (IST), 8.00 A.M (PST), 11.00 A.M (EST), 4.00 P.M (BST), 3:00 P.M (UTC)
WSO2 API Manager
“
WSO2 API Manager 3.1.0 - Introduction
WSO2 API Management Overview
ENTERPRISE INTEGRATOR
MicroIntegrator
Streaming
Integrator
Message Broker Process Manager
Integrator
Analytics
Data Services Developer Studio ESB
IDENTITY & ACCESS MANAGER
Federation
SSO
Adaptive Auth
API Security
“
The State Of API Security
● 83% of all web traffic is now API traffic (Akamai, 2019)
● 363 different APIs are being managed by organizations on average, with
69% of them making those APIs public (Survey: APIs a Growing Cybersecurity Risk
| Imperva, 2018)
● APIs will be the most frequently attacked vector for enterprise web
application data breaches by 2022 (How to Build an Effective API Security Strategy,
2017)
Why API Security Must Not Be An Afterthought
Not taking API Security seriously can have devastating consequences on
organizations:
● Operation disruptions
● Negative publicity
● Legal problems
● Repeat attacks
● Suppliers can be compromised
Facebook Data Breach - 2019*
● Security expert Bob Diachenko discovered database containing sensitive
information of more than 267 million Facebook users were left exposed.
● Exposed data included Facebook ID, phone number, email address and
other profile details.
● It is highly suspected that the data was stolen from Facebook’s Developer
API, which allowed third-party developers access to phone numbers until
2018.
● Could have been prevented if vulnerabilities in the Developer API are
identified and fixed pro-actively.
*(267M Facebook Users’ Phone Numbers Exposed Online, 2019)
API Security in WSO2 API Gateway
● Static Checks
○ SQL injection
○ Parsing attacks(XML/JSON)
○ Payload attacks*
○ OpenAPI Security
Violations/Vulnerabilities
○ Schema violations*
○ SSL/TLS
○ API Implementation and API
Contract mismatches
● Dynamic Checks
○ Rate limiting for API calls.
○ Throttle API calls.
○ Authentication/Authorization.
○ Anomaly detection.
○ AI based threat detection.
○ Real-time protection for APIs via
API Firewall
Static and Dynamic
Security for APIs
AI-powered Threat
Protection for APIs
OpenAPI Exploitation
API Security Audit, API Conformance Scan, API Firewall
Data & Application Attacks
Advanced Persistent Threats, Data exfiltration, Deletion
DoS & DDoS Attacks
DDoS API attack, Login service DDoS attack, Botnet attacking API
Login Attacks
Stolen tokens or cookies, Credential stuffing, Fuzzing
Payload Scanning
JSON/XML threat protection, SQL injection, XSS, Schema validation, Encryption &
signature, Redaction
Access Control
Authentication, Authorization, Token Translation
Rate Limiting
Client throttling, Provider throttling, Quotas, Spike Arrest
Network Privacy
SSL/TLS
Fine Grained Permission Validation
OAuth 2.0 based scopes /XACML
Combined Security Features
API Security Tools to
identify and remedy
OpenAPI vulnerabilities
and offer runtime
protection for APIs
Platform Overview
“
 © COPYRIGHT 42CRUNCH | CONFIDENTIAL
Deploy & Protect
API Firewall is
automatically configured
from OAS file and
deployed in line of traffic.
The firewall can be
deployed as sidecar in
Kubernetes or reverse
proxy in front of API
Management solutions.
Develop
Developer documents
the API contract with
OpenAPI/Swagger.
API Contract security is
evaluated from
VSCode using
42Crunch plugin.
Integrate & Test
API Contract quality is
enforced via CI/CD
pipeline. Builds are
blocked when minimal
security requirements
defined by security
teams are not met.
API implementation is
tested via Conformance
Scan
Design
Developer initiates
security work at
design time.
Best practices and
recommendations are
documented.
42CRUNCH AND API MANAGEMENT ARE COMPLEMENTARY
API Threat Protection API Access Control
API/Identity managementAPI Firewall
➡ Content validation
➡ Token validation
➡ DOS Protection
➡ Payload security
(encrypt/sign)
➡ Access tokens management
➡ Authentication
➡ Authorization
➡ Identity management
➡ Traffic management
API Security
 © COPYRIGHT 42CRUNCH | CONFIDENTIAL
• Developers describe the API contract in a
language they know
• Audit is available from IDEs and CI/CD plugins
• Actionable report with zero false positives
Key Benefits
• Instant visibility into API security status
• Governance of corporate security standards
• Required security is declared instead of
developed/maintained manually across multiple
tools/environments
DEVELOPERS
INITIATE
SECURITY
AT DESIGN
TIME
The 42C Audit service performs
200+ security checks
SAMPLE REPORT
How To Secure APIs Proactively?
● Step 1 - Make sure API Definitions conform to OAS.
● Step 2 - Perform comprehensive security audits on API Definitions
Integration Implementation
● The API Security Audit functionality is built-in to WSO2 API Manager
● Once it is enabled, an Audit API button will be shown in the API
Definition tab in API Publisher
● Clicking on the Audit API button will send the API Definition to 42Crunch
to be audited
● The result from the audit will be shown as a report in API Publisher
Demo
“
bit.ly/security-audit-doc
Q&A
THANK YOU
wso2.com
Audit Report Structure
“
Audit Score and Summary
OpenAPI Format Requirements
Security
Data Validation
What are the benefits of this Audit Report?
● Ability to identify vulnerabilities in an API even before it has been
published - This will help to improve the security then and there
● Easy to prioritize what issues to be addressed first
● Convenience of being able to use the built-in Swagger Editor in
WSO2 API Manager to edit the API Definition

More Related Content

PDF
The TLS/SSLv3 renegotiation vulnerability explained
PPTX
ITLC HN 14 - Bizweb Microservices Architecture
PPTX
Springboot Microservices
PPTX
Microservice intro
PDF
OWASP Top 10 API Security Risks
PPTX
Log management with ELK
PPTX
Software architecture for high traffic website
PDF
Memory Management in Apache Spark
The TLS/SSLv3 renegotiation vulnerability explained
ITLC HN 14 - Bizweb Microservices Architecture
Springboot Microservices
Microservice intro
OWASP Top 10 API Security Risks
Log management with ELK
Software architecture for high traffic website
Memory Management in Apache Spark

What's hot (20)

PDF
Intro to Reactive Programming
PPTX
Project Orleans - Actor Model framework
PPTX
Introduction To Microservices
PDF
Introduction to Docker - VIT Campus
PDF
Kubernetes: A Short Introduction (2019)
PPSX
Big Data Redis Mongodb Dynamodb Sharding
PDF
OAuth2 and Spring Security
ODP
OAuth2 - Introduction
PPTX
Express JS
PDF
CNIT 129S: Ch 6: Attacking Authentication
PDF
Microservice With Spring Boot and Spring Cloud
PDF
[OpenStack Days Korea 2016] Track1 - Monasca를 이용한 Cloud 모니터링
PDF
What Is Helm
PDF
PDF
What's New in Apache Hive
PDF
MySQL Deep dive with FusionIO
PDF
Event driven autoscaling with KEDA
PDF
Service discovery with Eureka and Spring Cloud
PDF
DevJam 2019 - Introduction to Kubernetes
PPTX
Introduction to microservices
Intro to Reactive Programming
Project Orleans - Actor Model framework
Introduction To Microservices
Introduction to Docker - VIT Campus
Kubernetes: A Short Introduction (2019)
Big Data Redis Mongodb Dynamodb Sharding
OAuth2 and Spring Security
OAuth2 - Introduction
Express JS
CNIT 129S: Ch 6: Attacking Authentication
Microservice With Spring Boot and Spring Cloud
[OpenStack Days Korea 2016] Track1 - Monasca를 이용한 Cloud 모니터링
What Is Helm
What's New in Apache Hive
MySQL Deep dive with FusionIO
Event driven autoscaling with KEDA
Service discovery with Eureka and Spring Cloud
DevJam 2019 - Introduction to Kubernetes
Introduction to microservices
Ad

Similar to 42Crunch Security Audit for WSO2 API Manager 3.1 (20)

PPTX
Gateway/APIC security
PDF
APIConnect Security Best Practice
PDF
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
PPTX
Outpost24 webinar - Api security
PDF
[Workshop] API-driven Integration
PDF
API Security Best Practices and Guidelines
PDF
APIC/DataPower security
PDF
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
PPTX
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
PDF
API Testing and Hacking.pdf
PDF
API Testing and Hacking.pdf
PDF
API Testing and Hacking (1).pdf
PDF
What's new in API Connect and DataPower - 2019
PPTX
Test and Protect Your API
PDF
Protecting Microservices APIs with 42Crunch API Firewall
PDF
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSI®
PPTX
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
PDF
The Best of Both Worlds: Introducing WSO2 API Manager 4.0.0
PDF
Protecting Your APIs Against Attack & Hijack
PDF
Apidays Helsinki & North 2024 - From Chaos to Calm- Navigating Emerging API ...
Gateway/APIC security
APIConnect Security Best Practice
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
Outpost24 webinar - Api security
[Workshop] API-driven Integration
API Security Best Practices and Guidelines
APIC/DataPower security
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
API Testing and Hacking.pdf
API Testing and Hacking.pdf
API Testing and Hacking (1).pdf
What's new in API Connect and DataPower - 2019
Test and Protect Your API
Protecting Microservices APIs with 42Crunch API Firewall
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSI®
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
The Best of Both Worlds: Introducing WSO2 API Manager 4.0.0
Protecting Your APIs Against Attack & Hijack
Apidays Helsinki & North 2024 - From Chaos to Calm- Navigating Emerging API ...
Ad

More from WSO2 (20)

PDF
Demystifying CMS-0057-F - Compliance Made Seamless with WSO2
PDF
Quantum Threats Are Closer Than You Think – Act Now to Stay Secure
PDF
Modern Platform Engineering with Choreo - The AI-Native Internal Developer Pl...
PDF
Application Modernization with Choreo - The AI-Native Internal Developer Plat...
PDF
Build Smarter, Deliver Faster with Choreo - An AI Native Internal Developer P...
PDF
Platformless Modernization with Choreo.pdf
PDF
Application Modernization with Choreo for the BFSI Sector
PDF
Choreo - The AI-Native Internal Developer Platform as a Service: Overview
PDF
[Roundtable] Choreo - The AI-Native Internal Developer Platform as a Service
PPTX
WSO2Con 2025 - Building AI Applications in the Enterprise (Part 1)
PPTX
WSO2Con 2025 - Building Secure Business Customer and Partner Experience (B2B)...
PPTX
WSO2Con 2025 - Building Secure Customer Experience Apps
PPTX
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
PPTX
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
PPTX
WSO2Con 2025 - Unified Management of Ingress and Egress Across Multiple API G...
PPTX
WSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on Code
PPTX
WSO2Con 2025 - Architecting Cloud-Native Applications
PDF
Mastering Intelligent Digital Experiences with Platformless Modernization
PDF
Accelerate Enterprise Software Engineering with Platformless
PDF
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
Demystifying CMS-0057-F - Compliance Made Seamless with WSO2
Quantum Threats Are Closer Than You Think – Act Now to Stay Secure
Modern Platform Engineering with Choreo - The AI-Native Internal Developer Pl...
Application Modernization with Choreo - The AI-Native Internal Developer Plat...
Build Smarter, Deliver Faster with Choreo - An AI Native Internal Developer P...
Platformless Modernization with Choreo.pdf
Application Modernization with Choreo for the BFSI Sector
Choreo - The AI-Native Internal Developer Platform as a Service: Overview
[Roundtable] Choreo - The AI-Native Internal Developer Platform as a Service
WSO2Con 2025 - Building AI Applications in the Enterprise (Part 1)
WSO2Con 2025 - Building Secure Business Customer and Partner Experience (B2B)...
WSO2Con 2025 - Building Secure Customer Experience Apps
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
WSO2Con 2025 - Unified Management of Ingress and Egress Across Multiple API G...
WSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on Code
WSO2Con 2025 - Architecting Cloud-Native Applications
Mastering Intelligent Digital Experiences with Platformless Modernization
Accelerate Enterprise Software Engineering with Platformless
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Empathic Computing: Creating Shared Understanding
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Encapsulation theory and applications.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
KodekX | Application Modernization Development
PPTX
A Presentation on Artificial Intelligence
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPT
Teaching material agriculture food technology
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Understanding_Digital_Forensics_Presentation.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Empathic Computing: Creating Shared Understanding
The AUB Centre for AI in Media Proposal.docx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Encapsulation theory and applications.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Weekly Chronicles - August'25 Week I
KodekX | Application Modernization Development
A Presentation on Artificial Intelligence
Digital-Transformation-Roadmap-for-Companies.pptx
Teaching material agriculture food technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Network Security Unit 5.pdf for BCA BBA.
Per capita expenditure prediction using model stacking based on satellite ima...
Unlocking AI with Model Context Protocol (MCP)
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

42Crunch Security Audit for WSO2 API Manager 3.1

  • 1. API Security Audit A partnership between 42Crunch and WSO2 28th May 2020 8.30 P.M (IST), 8.00 A.M (PST), 11.00 A.M (EST), 4.00 P.M (BST), 3:00 P.M (UTC)
  • 3. WSO2 API Manager 3.1.0 - Introduction
  • 4. WSO2 API Management Overview ENTERPRISE INTEGRATOR MicroIntegrator Streaming Integrator Message Broker Process Manager Integrator Analytics Data Services Developer Studio ESB IDENTITY & ACCESS MANAGER Federation SSO Adaptive Auth
  • 6. The State Of API Security ● 83% of all web traffic is now API traffic (Akamai, 2019) ● 363 different APIs are being managed by organizations on average, with 69% of them making those APIs public (Survey: APIs a Growing Cybersecurity Risk | Imperva, 2018) ● APIs will be the most frequently attacked vector for enterprise web application data breaches by 2022 (How to Build an Effective API Security Strategy, 2017)
  • 7. Why API Security Must Not Be An Afterthought Not taking API Security seriously can have devastating consequences on organizations: ● Operation disruptions ● Negative publicity ● Legal problems ● Repeat attacks ● Suppliers can be compromised
  • 8. Facebook Data Breach - 2019* ● Security expert Bob Diachenko discovered database containing sensitive information of more than 267 million Facebook users were left exposed. ● Exposed data included Facebook ID, phone number, email address and other profile details. ● It is highly suspected that the data was stolen from Facebook’s Developer API, which allowed third-party developers access to phone numbers until 2018. ● Could have been prevented if vulnerabilities in the Developer API are identified and fixed pro-actively. *(267M Facebook Users’ Phone Numbers Exposed Online, 2019)
  • 9. API Security in WSO2 API Gateway ● Static Checks ○ SQL injection ○ Parsing attacks(XML/JSON) ○ Payload attacks* ○ OpenAPI Security Violations/Vulnerabilities ○ Schema violations* ○ SSL/TLS ○ API Implementation and API Contract mismatches ● Dynamic Checks ○ Rate limiting for API calls. ○ Throttle API calls. ○ Authentication/Authorization. ○ Anomaly detection. ○ AI based threat detection. ○ Real-time protection for APIs via API Firewall
  • 10. Static and Dynamic Security for APIs AI-powered Threat Protection for APIs OpenAPI Exploitation API Security Audit, API Conformance Scan, API Firewall Data & Application Attacks Advanced Persistent Threats, Data exfiltration, Deletion DoS & DDoS Attacks DDoS API attack, Login service DDoS attack, Botnet attacking API Login Attacks Stolen tokens or cookies, Credential stuffing, Fuzzing Payload Scanning JSON/XML threat protection, SQL injection, XSS, Schema validation, Encryption & signature, Redaction Access Control Authentication, Authorization, Token Translation Rate Limiting Client throttling, Provider throttling, Quotas, Spike Arrest Network Privacy SSL/TLS Fine Grained Permission Validation OAuth 2.0 based scopes /XACML Combined Security Features API Security Tools to identify and remedy OpenAPI vulnerabilities and offer runtime protection for APIs
  • 12.  © COPYRIGHT 42CRUNCH | CONFIDENTIAL Deploy & Protect API Firewall is automatically configured from OAS file and deployed in line of traffic. The firewall can be deployed as sidecar in Kubernetes or reverse proxy in front of API Management solutions. Develop Developer documents the API contract with OpenAPI/Swagger. API Contract security is evaluated from VSCode using 42Crunch plugin. Integrate & Test API Contract quality is enforced via CI/CD pipeline. Builds are blocked when minimal security requirements defined by security teams are not met. API implementation is tested via Conformance Scan Design Developer initiates security work at design time. Best practices and recommendations are documented.
  • 13. 42CRUNCH AND API MANAGEMENT ARE COMPLEMENTARY API Threat Protection API Access Control API/Identity managementAPI Firewall ➡ Content validation ➡ Token validation ➡ DOS Protection ➡ Payload security (encrypt/sign) ➡ Access tokens management ➡ Authentication ➡ Authorization ➡ Identity management ➡ Traffic management API Security
  • 14.  © COPYRIGHT 42CRUNCH | CONFIDENTIAL • Developers describe the API contract in a language they know • Audit is available from IDEs and CI/CD plugins • Actionable report with zero false positives Key Benefits • Instant visibility into API security status • Governance of corporate security standards • Required security is declared instead of developed/maintained manually across multiple tools/environments DEVELOPERS INITIATE SECURITY AT DESIGN TIME The 42C Audit service performs 200+ security checks
  • 16. How To Secure APIs Proactively? ● Step 1 - Make sure API Definitions conform to OAS. ● Step 2 - Perform comprehensive security audits on API Definitions
  • 17. Integration Implementation ● The API Security Audit functionality is built-in to WSO2 API Manager ● Once it is enabled, an Audit API button will be shown in the API Definition tab in API Publisher ● Clicking on the Audit API button will send the API Definition to 42Crunch to be audited ● The result from the audit will be shown as a report in API Publisher
  • 20. Q&A
  • 23. Audit Score and Summary
  • 27. What are the benefits of this Audit Report? ● Ability to identify vulnerabilities in an API even before it has been published - This will help to improve the security then and there ● Easy to prioritize what issues to be addressed first ● Convenience of being able to use the built-in Swagger Editor in WSO2 API Manager to edit the API Definition