SlideShare a Scribd company logo
Five Simple Strategies
for Securing APIs
Tran Minh Tri
Security bootcamp 2018
Product manager
tritm@mi2.com.vn
Tran Minh Tri
@tridalat
Slideshare.net/tridalat
Linkedin.com/tridalat
https://api.mi2.vn
3
Contents
WHAT ARE APIS ?
ARE THEY WORTH THE RISK ?
THE THREE ATTACK VECTORS TO WATCH OUT FOR
FIVE SIMPLE MITIGATION STRATEGIES YOU MIGHT HAVE OVERLOOKED
CONCLUSION
WHAT ARE APIS ?
APIs are like windows into an application
5
APIs are the building blocks of digital transformation
IOT Devices
Cloud
Mobile
Partners/External
Divisions
External
Developers
Data
Your
Digital
Business
6
7
Digital transformation as a maturity model
Low digital maturity High digital maturity
Offline/In-Person Web Mobile Omnichannel Ecosystem
How Do APIs Increase an Organization’s Risk?
8
Digital Transformation in Retail
Low digital maturity High digital maturity
 RETAIL STORE
 CATALOG & CALL CENTER
 WEB STOREFRONT
 AFFILIATE CHANNELS
 MOBILE STOREFRONT
 SHOPPER PROFILE APIs
 PRODUCT CATALOG APIs
 PERSISTENT CART APIs
 IN-STORE/PROXIMITY APIs
 INVENTORY/LOGISTICS APIs
 PERSONALIZED PROFILE APIs
 ADVANCED PAYMENT APIs
 LOYALTY PARTNER APIs
 MARKETPLACE APIs
 SMART PRODUCT APIs
Offline / In-Person Web Mobile Omnichannel Ecosystem
9Low digital maturity High digital maturity
Offline / In-Person Web Mobile Omnichannel Ecosystem
 DEALER
 SERVICE CENTER/MECHANIC
 BRAND CONTENT
 ONLINE PRODUCT DATA
 RATINGS & REVIEWS
 DEALER APIs
 PRODUCT DATA APIs
 DRIVER PROFILE APIs
 DIAGNOSTIC APIs
 VEHICLE FEATURE APIs
 HISTORY/MAINTENANCE APIs
 OTA UPDATE APIs
 UBI APIs
 LOCATION & CONTEXT APIs
 INSURANCE APIs
 VEHICLE SHARE APIs
Digital Transformation in Automotive
10Low digital maturity High digital maturity
 DROPOFF / PICKUP CENTER
 COURIER
 WEB RESEARCH
 WEB SCHEDULING
 WEB TRACKING
 RATE AND SLA APIs
 SERVICE APIs
 TRACKING APIs
 FLEET TRACKING APIs
 SUPPLY CHAIN APIs
 TRAFFIC MANAGEMENT APIs
 ENROUTE REDIRECT APIs
 PROOF OF DELIVERY APIs
 TRAFFIC DATA APIs
 3PL SERVICES APIs
 3P PICKUP/DROPOFF APIs
Digital Transformation in Transportation & Logistics
Offline / In-Person Web Mobile Omnichannel Ecosystem
11Low digital maturity High digital maturity
 PRACTITIONER OFFICE
 OFFLINE HEALTH RECORDS
 CALL CENTER
 ONLINE RESEARCH
 CLAIMS & HISTORY
 APPOINTMENT APIs
 PLAN SELECION APIs
 INSURER INTEGRATON APIs
 TELEHEALTH APIs
 BIOTELEMETRY APIs
 EHR APIs
 MONITORING DEVICE APIs
 CARE ANALYTICS APIs
 PARTNER SERVICES APIs
Digital Transformation in Healthcare
Offline / In-Person Web Mobile Omnichannel Ecosystem
12Low digital maturity High digital maturity
 RETAIL BANKING  ONLINE BANKING  LOCATION & SERVICE APIs
 ACCOUNT APIs
 ALERT/MONITORING APIs
 MOBILE PAYMENT APIs
 DIRECT DEPOSIT APIs
 INVESTMENT APIs
 P2P MOBILE PAYMENT APIs
 LOYALTY PARTNER APIs
 P2P LENDING APIs
 WEALTH MANAGEMENT APIs
Digital Transformation in Financial Services
Offline / In-Person Web Mobile Omnichannel Ecosystem
13Low digital maturity High digital maturity
 BROADCAST MEDIA
 PROPRIETARY STB
 ONLINE PURCHASE
 GUIDE & METADATA
 STREAMING MEDIA APIs
 METADATA APIs
 ENTITLEMENT APIs
 VIEWER PROFILE APIs
 QUAD-PLAY APIs
 SERVICE DASHBOARD APIs
 WALLET/PAYMENT APIs
 PARTNER ENTITLEMENT APIs
 CONTENT-KEYED APIs
 AD NETWORK APIs
 EVENT APIs
Digital Transformation in Media & Entertainment
Offline / In-Person Web Mobile Omnichannel Ecosystem
14Low digital maturity High digital maturity
 BROADCAST SPORTS
 DISCONNECTED DEVICES
 SCORES & STATS
 ONLINE CONTENT
 SCORES & STATS APIs
 TRACK & MONITOR APIs
 FITNESS PROFILE APIs
 REAL-TIME 2ND SCREEN APIs
 MULTI-DEVICE PROFILE APIs
 FITNESS PLATFORM APIs
 HEALTH CONNECTIVITY APIs
 DATA SUBSCRIPTION APIs
Digital Transformation in Sports & Fitness
Offline / In-Person Web Mobile Omnichannel Ecosystem
15Low digital maturity High digital maturity
 PROPRIETARY RESERVATIONS
 TRAVEL AGENT
 FARES & SCHEDULES
 ONLINE BOOKING
 ONLINE CHANNELS
 FARE & SCHEDULE APIs
 STATUS & ALERT APIs
 TRAVELER PROFILE APIs
 IDENTITY & ACCESS APIs
 LOCATION-AWARE APIs
 ENROUTE SERVICES APIs
 LOYALTY PARTNER APIs
 MULTI-MODE TRAVEL APIs
Digital Transformation in Travel & Hospitality
Offline / In-Person Web Mobile Omnichannel Ecosystem
16
17
Prominent API Breaches
18
Niantic's API for Pokemon Go Cracked
 API functions as the access
point for accessing DB and
algorithm
 3rd parties found the API
and created apps that aid
in the capture
 Server side issues
(including downtime)
increased as a result
Pokevision FastPokeMap
The Three Attack
Vectors to Watch
Out For
20
Outside the Enterprise
Internet of Things
Mobile
SaaS/Cloud Solutions
AWS, Google, SFDC …
Partner Ecosystems
External Developers
Within the Enterprise
Secure Data
Application Portfolio
ID/Authentication
Reporting & Analytics
Internal Teams
The Three Attack Vectors to Watch Out For
Many API developers come directly from a web design background, and may bring with them some
bad habits
Identity
 Identity attacks exploit flaws in authentication,
authorization, and session tracking. In particular, many of
these are the result of migrating bad practices from the web
world into API development.
Parameters
 Parameter attacks exploit the data sent into an API,
including URL, query parameters, HTTP headers, and/or
post content
Main-in-the-middle
 Simplify These attacks intercept legitimate transactions and
exploit unsigned and/or unencrypted data being sent
between the client and the server. They can reveal
confdential information (such as personal data), alter a
transaction in flight, or even replay legitimate transactions.
21
Attack Vector: Parameters
 API functions as the access point for accessing DB and algorithm
– In the traditional web world, parameterization was limited and indirect
– Subject to the capabilities of URLs and forms
 APIs in contrast and offer much more explicit parameterization
– The full power of RESTful design: GET, POST, PUT, DELETE
 (And don’t stop there… what about effects of HEAD, etc)?
 This creates a greater potential attack surface
– Injection, bounds, correlation, and so on
22
Attack Vector: Identity
 We had it surprisingly good in the Web world
– Browser session usually tied to human
– Dealing with one identity is not so tough
 Security tokens abound, but solutions are mature
– Username/pass, multi-factor, SAML, etc
 APIs rapidly becoming more difficult
– Non-human entities
– Multiple layers of relevant identities
 Me, my attributes, my phone, my developer, my provider…
23
API keys
“An application programing interface key (API key) is a code
generated by websites that allow users to access their
application programming interface. API keys are used to track
how the API is being used in order to prevent malicious use or
abuse of the terms of service.
Many applications publishing APIs require clients to use an API key to
access to their functionality
(Source: wikipedia http://en.wikipedia.org/wiki/Application_programming_interface_key )
24
Man-in-the-middle
25
How Should You Secure Your APIs?
25
Five Simple
Mitigation
StrategiesThat Will Allow an Organization
to More Securely Publish APIs
27
Strategy 1:
Validate Parameters
Strategy 1:
Validate Parameters
Strategy 2:
Apply Explicit Threat Detetion
Strategy 3:
Turn on SSL Everywhere
Strategy 4:
Apply Rigorous Authentication
and Authorization
Strategy 5:
Use Proven Solutions
• Rigorous validation of consumer supplied
inputs – and API output
• Use schema validation
28
Strategy 2:
Apply Explicit
Threat Detection
Strategy 1:
Validate Parameters
Strategy 2:
Apply Explicit Threat Detetion
Strategy 3:
Turn on SSL Everywhere
Strategy 4:
Apply Rigorous Authentication
and Authorization
Strategy 5:
Use Proven Solutions
• Blacklist dangerous tags like <SCRIPT>
• Virus scanning of attachments
• Very large messages can all be effective
denial-of-service attacks
29
Strategy 3:
Turn on SSL Everywhere
Strategy 1:
Validate Parameters
Strategy 2:
Apply Explicit Threat Detetion
Strategy 3:
Turn on SSL Everywhere
Strategy 4:
Apply Rigorous Authentication
and Authorization
Strategy 5:
Use Proven Solutions
30
Strategy 4:
Apply Rigorous
Authentication and
Authorization
Strategy 1:
Validate Parameters
Strategy 2:
Apply Explicit Threat Detetion
Strategy 3:
Turn on SSL Everywhere
Strategy 4:
Apply Rigorous Authentication
and Authorization
Strategy 5:
Use Proven Solutions • Multiple identity profile (Roles, Geo
location,IP,User agent,Time of day...)
• OAuth for people
31
Strategy 5:
Use Proven Solutions
Strategy 1:
Validate Parameters
Strategy 2:
Apply Explicit Threat Detetion
Strategy 3:
Turn on SSL Everywhere
Strategy 4:
Apply Rigorous Authentication
and Authorization
Strategy 5:
Use Proven Solutions
• Separate out API implementation and API
security into distinct tiers
• API Gateway ( Access control, Threat
detection, Confidentiality and integrity,
Audit management)
Conclusion
APIs represent a great opportunity for the enterprise to
integrate applications quickly and easily. But APIs can be a
double-edged sword: promising agility, while at the same time
increasing risk. But if an organization can address API security
as an architectural challenge long before any development
takes place, it can reap the rewards of this technological
breakthrough safely and securely.
33
Q & A

More Related Content

PDF
Cyber Attacks on Financial _ Vikjava
PDF
Point-Of-Sale Hacking - 2600Thailand#20
PDF
Removable Disk Hacking for Fun and Profit
PDF
[CB19] Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Apr...
PPT
Web Security
PDF
Combat the Latest Two-Factor Authentication Evasion Techniques
DOCX
Analysis of web application penetration testing
PDF
Two factor authentication
Cyber Attacks on Financial _ Vikjava
Point-Of-Sale Hacking - 2600Thailand#20
Removable Disk Hacking for Fun and Profit
[CB19] Leveraging Yara Rules to Hunt for Abused Telegram Accounts by Asaf Apr...
Web Security
Combat the Latest Two-Factor Authentication Evasion Techniques
Analysis of web application penetration testing
Two factor authentication

What's hot (20)

PPTX
Seminar-Two Factor Authentication
PDF
3 reasons your business can't ignore Two-Factor Authentication
PPTX
Multifactor Authentication
PDF
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
PPTX
Are Bot Operators Eating Your Lunch?
PDF
Two-factor Authentication
PPTX
Two Factor Authentication Made Easy ICWE 2015
PPT
Hacking Presentation
PPTX
Ethical Hacking
PDF
Avoiding Two-factor Authentication? You're Not Alone
PDF
Essential Defense by Kevin Cardwell
PPTX
Ethical hacking
PDF
Why Two-Factor Authentication?
DOCX
Ethical Hacking (CEH) - Industrial Training Report
PDF
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
PPTX
Logincat MFA and SSO
PDF
Implementing a comprehensive application security progaram - Tawfiq
PDF
ToorCon 14 : Malandroid : The Crux of Android Infections
PDF
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
PPTX
Two factor authentication presentation mcit
Seminar-Two Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication
Multifactor Authentication
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
Are Bot Operators Eating Your Lunch?
Two-factor Authentication
Two Factor Authentication Made Easy ICWE 2015
Hacking Presentation
Ethical Hacking
Avoiding Two-factor Authentication? You're Not Alone
Essential Defense by Kevin Cardwell
Ethical hacking
Why Two-Factor Authentication?
Ethical Hacking (CEH) - Industrial Training Report
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
Logincat MFA and SSO
Implementing a comprehensive application security progaram - Tawfiq
ToorCon 14 : Malandroid : The Crux of Android Infections
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
Two factor authentication presentation mcit
Ad

Similar to Api security-present (20)

PDF
Virtual Meetup - API Security Best Practices
PDF
Disrupt or be disrupted – Using secure APIs to drive digital transformation
PDF
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...
PDF
F5-API-Security-Best-Practices.pdf
PPTX
Platform for Secure Digital Business
PPTX
Platform for Secure Digital Business
PDF
5 step plan to securing your APIs
PPTX
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
PPTX
apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...
PPT
Enterprise API deployment best practice
PDF
API Security Best Practices and Guidelines
PPTX
API Strategy Introduction
PPT
Api management introduction and product overview v1.0 2014.08.28
PDF
Manage your ap is securely and easily ibm apim 4.0
PDF
7 Best Practices for Secure API Development .pdf
PDF
IBM API management Philip Little
PPTX
TEC-Roundtable-API
DOCX
7 Best Practices for Secure API Development .docx
PDF
WSO2's API Vision: Unifying Control, Empowering Developers
PDF
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
Virtual Meetup - API Security Best Practices
Disrupt or be disrupted – Using secure APIs to drive digital transformation
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...
F5-API-Security-Best-Practices.pdf
Platform for Secure Digital Business
Platform for Secure Digital Business
5 step plan to securing your APIs
APIdays Singapore 2019 - Securing Value in API Ecosystems, Ajay Biyani, Head ...
apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...
Enterprise API deployment best practice
API Security Best Practices and Guidelines
API Strategy Introduction
Api management introduction and product overview v1.0 2014.08.28
Manage your ap is securely and easily ibm apim 4.0
7 Best Practices for Secure API Development .pdf
IBM API management Philip Little
TEC-Roundtable-API
7 Best Practices for Secure API Development .docx
WSO2's API Vision: Unifying Control, Empowering Developers
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
Ad

More from Security Bootcamp (20)

PDF
Ẩn mình kết nối C&C - Xu hướng tấn công và cách phòng thủ
PPTX
AI-ttacks - Nghiên cứu về một số tấn công vào các mô hình học máy và AI
PPTX
Human and AI - Balancing Innovation and Data Privacy in the Age of Cyber Threats
PPTX
Robustness of Deep learning mode ls.pptx
PPTX
DLL Sideloading cho mọi nhà - Security Bootcamp 2024
PDF
Let the Hunt Begin - Security Bootcamp 2024
PDF
Detection as Code - Effective Approach to manage & optimize SOC Development
PDF
Quản trị rủi ro nguồn mở tại các doanh nghiệp phần mềm Việt Nam
PDF
Phân tích một chiến dịch ransomware: Từ lan truyền đến tống tiền
PDF
CyberJutsu - The Joern-ey of Static Code Analysis.pdf
PPTX
Security in the AI and Web3 era - Veramine
PDF
ĐỂ AI ĐƯỢC AN TOÀN, MINH BẠCH, CÓ TRÁCH NHIỆM VÀ ‘NHÂN TÍNH’ HƠN
PDF
Modern Security Operations - Building and leading modern SOC
PDF
Humanity and AI: Balancing Innovation and Data Privacy in the Age of Cyber Th...
PPTX
SBC2024_AI TRONG CYBER SECURITY_final.pptx
PPTX
Cyber GenAI – Another Chatbot? - Trellix
PDF
Akamai_ API Security Best Practices - Real-world attacks and breaches
PPTX
How to steal a drone Drone Hijacking - VNPT Cyber Immunity
PDF
Empowering Malware Analysis with IDA AppCall
PDF
Detection of Spreading Process on many assets over the network
Ẩn mình kết nối C&C - Xu hướng tấn công và cách phòng thủ
AI-ttacks - Nghiên cứu về một số tấn công vào các mô hình học máy và AI
Human and AI - Balancing Innovation and Data Privacy in the Age of Cyber Threats
Robustness of Deep learning mode ls.pptx
DLL Sideloading cho mọi nhà - Security Bootcamp 2024
Let the Hunt Begin - Security Bootcamp 2024
Detection as Code - Effective Approach to manage & optimize SOC Development
Quản trị rủi ro nguồn mở tại các doanh nghiệp phần mềm Việt Nam
Phân tích một chiến dịch ransomware: Từ lan truyền đến tống tiền
CyberJutsu - The Joern-ey of Static Code Analysis.pdf
Security in the AI and Web3 era - Veramine
ĐỂ AI ĐƯỢC AN TOÀN, MINH BẠCH, CÓ TRÁCH NHIỆM VÀ ‘NHÂN TÍNH’ HƠN
Modern Security Operations - Building and leading modern SOC
Humanity and AI: Balancing Innovation and Data Privacy in the Age of Cyber Th...
SBC2024_AI TRONG CYBER SECURITY_final.pptx
Cyber GenAI – Another Chatbot? - Trellix
Akamai_ API Security Best Practices - Real-world attacks and breaches
How to steal a drone Drone Hijacking - VNPT Cyber Immunity
Empowering Malware Analysis with IDA AppCall
Detection of Spreading Process on many assets over the network

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
KodekX | Application Modernization Development
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation theory and applications.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Machine learning based COVID-19 study performance prediction
PPT
Teaching material agriculture food technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Spectroscopy.pptx food analysis technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
KodekX | Application Modernization Development
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
MIND Revenue Release Quarter 2 2025 Press Release
Big Data Technologies - Introduction.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Electronic commerce courselecture one. Pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation theory and applications.pdf
Understanding_Digital_Forensics_Presentation.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
cuic standard and advanced reporting.pdf
Unlocking AI with Model Context Protocol (MCP)
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Machine learning based COVID-19 study performance prediction
Teaching material agriculture food technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectroscopy.pptx food analysis technology

Api security-present

  • 1. Five Simple Strategies for Securing APIs Tran Minh Tri Security bootcamp 2018
  • 2. Product manager tritm@mi2.com.vn Tran Minh Tri @tridalat Slideshare.net/tridalat Linkedin.com/tridalat https://api.mi2.vn
  • 3. 3 Contents WHAT ARE APIS ? ARE THEY WORTH THE RISK ? THE THREE ATTACK VECTORS TO WATCH OUT FOR FIVE SIMPLE MITIGATION STRATEGIES YOU MIGHT HAVE OVERLOOKED CONCLUSION
  • 4. WHAT ARE APIS ? APIs are like windows into an application
  • 5. 5 APIs are the building blocks of digital transformation IOT Devices Cloud Mobile Partners/External Divisions External Developers Data Your Digital Business
  • 6. 6
  • 7. 7 Digital transformation as a maturity model Low digital maturity High digital maturity Offline/In-Person Web Mobile Omnichannel Ecosystem How Do APIs Increase an Organization’s Risk?
  • 8. 8 Digital Transformation in Retail Low digital maturity High digital maturity  RETAIL STORE  CATALOG & CALL CENTER  WEB STOREFRONT  AFFILIATE CHANNELS  MOBILE STOREFRONT  SHOPPER PROFILE APIs  PRODUCT CATALOG APIs  PERSISTENT CART APIs  IN-STORE/PROXIMITY APIs  INVENTORY/LOGISTICS APIs  PERSONALIZED PROFILE APIs  ADVANCED PAYMENT APIs  LOYALTY PARTNER APIs  MARKETPLACE APIs  SMART PRODUCT APIs Offline / In-Person Web Mobile Omnichannel Ecosystem
  • 9. 9Low digital maturity High digital maturity Offline / In-Person Web Mobile Omnichannel Ecosystem  DEALER  SERVICE CENTER/MECHANIC  BRAND CONTENT  ONLINE PRODUCT DATA  RATINGS & REVIEWS  DEALER APIs  PRODUCT DATA APIs  DRIVER PROFILE APIs  DIAGNOSTIC APIs  VEHICLE FEATURE APIs  HISTORY/MAINTENANCE APIs  OTA UPDATE APIs  UBI APIs  LOCATION & CONTEXT APIs  INSURANCE APIs  VEHICLE SHARE APIs Digital Transformation in Automotive
  • 10. 10Low digital maturity High digital maturity  DROPOFF / PICKUP CENTER  COURIER  WEB RESEARCH  WEB SCHEDULING  WEB TRACKING  RATE AND SLA APIs  SERVICE APIs  TRACKING APIs  FLEET TRACKING APIs  SUPPLY CHAIN APIs  TRAFFIC MANAGEMENT APIs  ENROUTE REDIRECT APIs  PROOF OF DELIVERY APIs  TRAFFIC DATA APIs  3PL SERVICES APIs  3P PICKUP/DROPOFF APIs Digital Transformation in Transportation & Logistics Offline / In-Person Web Mobile Omnichannel Ecosystem
  • 11. 11Low digital maturity High digital maturity  PRACTITIONER OFFICE  OFFLINE HEALTH RECORDS  CALL CENTER  ONLINE RESEARCH  CLAIMS & HISTORY  APPOINTMENT APIs  PLAN SELECION APIs  INSURER INTEGRATON APIs  TELEHEALTH APIs  BIOTELEMETRY APIs  EHR APIs  MONITORING DEVICE APIs  CARE ANALYTICS APIs  PARTNER SERVICES APIs Digital Transformation in Healthcare Offline / In-Person Web Mobile Omnichannel Ecosystem
  • 12. 12Low digital maturity High digital maturity  RETAIL BANKING  ONLINE BANKING  LOCATION & SERVICE APIs  ACCOUNT APIs  ALERT/MONITORING APIs  MOBILE PAYMENT APIs  DIRECT DEPOSIT APIs  INVESTMENT APIs  P2P MOBILE PAYMENT APIs  LOYALTY PARTNER APIs  P2P LENDING APIs  WEALTH MANAGEMENT APIs Digital Transformation in Financial Services Offline / In-Person Web Mobile Omnichannel Ecosystem
  • 13. 13Low digital maturity High digital maturity  BROADCAST MEDIA  PROPRIETARY STB  ONLINE PURCHASE  GUIDE & METADATA  STREAMING MEDIA APIs  METADATA APIs  ENTITLEMENT APIs  VIEWER PROFILE APIs  QUAD-PLAY APIs  SERVICE DASHBOARD APIs  WALLET/PAYMENT APIs  PARTNER ENTITLEMENT APIs  CONTENT-KEYED APIs  AD NETWORK APIs  EVENT APIs Digital Transformation in Media & Entertainment Offline / In-Person Web Mobile Omnichannel Ecosystem
  • 14. 14Low digital maturity High digital maturity  BROADCAST SPORTS  DISCONNECTED DEVICES  SCORES & STATS  ONLINE CONTENT  SCORES & STATS APIs  TRACK & MONITOR APIs  FITNESS PROFILE APIs  REAL-TIME 2ND SCREEN APIs  MULTI-DEVICE PROFILE APIs  FITNESS PLATFORM APIs  HEALTH CONNECTIVITY APIs  DATA SUBSCRIPTION APIs Digital Transformation in Sports & Fitness Offline / In-Person Web Mobile Omnichannel Ecosystem
  • 15. 15Low digital maturity High digital maturity  PROPRIETARY RESERVATIONS  TRAVEL AGENT  FARES & SCHEDULES  ONLINE BOOKING  ONLINE CHANNELS  FARE & SCHEDULE APIs  STATUS & ALERT APIs  TRAVELER PROFILE APIs  IDENTITY & ACCESS APIs  LOCATION-AWARE APIs  ENROUTE SERVICES APIs  LOYALTY PARTNER APIs  MULTI-MODE TRAVEL APIs Digital Transformation in Travel & Hospitality Offline / In-Person Web Mobile Omnichannel Ecosystem
  • 16. 16
  • 18. 18 Niantic's API for Pokemon Go Cracked  API functions as the access point for accessing DB and algorithm  3rd parties found the API and created apps that aid in the capture  Server side issues (including downtime) increased as a result Pokevision FastPokeMap
  • 19. The Three Attack Vectors to Watch Out For
  • 20. 20 Outside the Enterprise Internet of Things Mobile SaaS/Cloud Solutions AWS, Google, SFDC … Partner Ecosystems External Developers Within the Enterprise Secure Data Application Portfolio ID/Authentication Reporting & Analytics Internal Teams The Three Attack Vectors to Watch Out For Many API developers come directly from a web design background, and may bring with them some bad habits Identity  Identity attacks exploit flaws in authentication, authorization, and session tracking. In particular, many of these are the result of migrating bad practices from the web world into API development. Parameters  Parameter attacks exploit the data sent into an API, including URL, query parameters, HTTP headers, and/or post content Main-in-the-middle  Simplify These attacks intercept legitimate transactions and exploit unsigned and/or unencrypted data being sent between the client and the server. They can reveal confdential information (such as personal data), alter a transaction in flight, or even replay legitimate transactions.
  • 21. 21 Attack Vector: Parameters  API functions as the access point for accessing DB and algorithm – In the traditional web world, parameterization was limited and indirect – Subject to the capabilities of URLs and forms  APIs in contrast and offer much more explicit parameterization – The full power of RESTful design: GET, POST, PUT, DELETE  (And don’t stop there… what about effects of HEAD, etc)?  This creates a greater potential attack surface – Injection, bounds, correlation, and so on
  • 22. 22 Attack Vector: Identity  We had it surprisingly good in the Web world – Browser session usually tied to human – Dealing with one identity is not so tough  Security tokens abound, but solutions are mature – Username/pass, multi-factor, SAML, etc  APIs rapidly becoming more difficult – Non-human entities – Multiple layers of relevant identities  Me, my attributes, my phone, my developer, my provider…
  • 23. 23 API keys “An application programing interface key (API key) is a code generated by websites that allow users to access their application programming interface. API keys are used to track how the API is being used in order to prevent malicious use or abuse of the terms of service. Many applications publishing APIs require clients to use an API key to access to their functionality (Source: wikipedia http://en.wikipedia.org/wiki/Application_programming_interface_key )
  • 25. 25 How Should You Secure Your APIs? 25
  • 26. Five Simple Mitigation StrategiesThat Will Allow an Organization to More Securely Publish APIs
  • 27. 27 Strategy 1: Validate Parameters Strategy 1: Validate Parameters Strategy 2: Apply Explicit Threat Detetion Strategy 3: Turn on SSL Everywhere Strategy 4: Apply Rigorous Authentication and Authorization Strategy 5: Use Proven Solutions • Rigorous validation of consumer supplied inputs – and API output • Use schema validation
  • 28. 28 Strategy 2: Apply Explicit Threat Detection Strategy 1: Validate Parameters Strategy 2: Apply Explicit Threat Detetion Strategy 3: Turn on SSL Everywhere Strategy 4: Apply Rigorous Authentication and Authorization Strategy 5: Use Proven Solutions • Blacklist dangerous tags like <SCRIPT> • Virus scanning of attachments • Very large messages can all be effective denial-of-service attacks
  • 29. 29 Strategy 3: Turn on SSL Everywhere Strategy 1: Validate Parameters Strategy 2: Apply Explicit Threat Detetion Strategy 3: Turn on SSL Everywhere Strategy 4: Apply Rigorous Authentication and Authorization Strategy 5: Use Proven Solutions
  • 30. 30 Strategy 4: Apply Rigorous Authentication and Authorization Strategy 1: Validate Parameters Strategy 2: Apply Explicit Threat Detetion Strategy 3: Turn on SSL Everywhere Strategy 4: Apply Rigorous Authentication and Authorization Strategy 5: Use Proven Solutions • Multiple identity profile (Roles, Geo location,IP,User agent,Time of day...) • OAuth for people
  • 31. 31 Strategy 5: Use Proven Solutions Strategy 1: Validate Parameters Strategy 2: Apply Explicit Threat Detetion Strategy 3: Turn on SSL Everywhere Strategy 4: Apply Rigorous Authentication and Authorization Strategy 5: Use Proven Solutions • Separate out API implementation and API security into distinct tiers • API Gateway ( Access control, Threat detection, Confidentiality and integrity, Audit management)
  • 32. Conclusion APIs represent a great opportunity for the enterprise to integrate applications quickly and easily. But APIs can be a double-edged sword: promising agility, while at the same time increasing risk. But if an organization can address API security as an architectural challenge long before any development takes place, it can reap the rewards of this technological breakthrough safely and securely.