SlideShare a Scribd company logo
There’s no AI without
API, but what does this
mean for security?
Apidays Helsinki | Timo Rüppell
Apidays Helsinki & North 2024 - There’s no AI without API, but what does this mean for Security? by Timo Rüppell, FireTail.io
About Me.
VP of Product at FireTail. A former researcher
in theoretical high energy physics. Now
focused on API security.
Earlier
● CTO @ Mapita
● Founder @ Sideric
● Lead Dev @ PiggyBaggy
timo@firetail.io
Overview.
What we’ll cover today.
- The Rise of AI & API Proliferation: Why
there is no AI without APIs.
- Understanding the Security Risks: How the
emergence of AI is changing the game
when it comes to API security.
- Best Practices for Securing API in an Age of
AI: The core principles of an effective API
security strategy given the emergence of
AI.
- The Bottom Line: A quick recap of today’s
key takeaways.
- Q&A: Time to answers any burning
questions you may have.
Effective API security is a
must for organizations who
want to harness the power
of AI.
The Rise of AI &
API Proliferation.
In November 2023, OpenAI announced a
massive expansion of API calling
capabilities available via ChatGPT
What Changed?
AIs have been around for
decades?
The “assistant” has been
around even longer (just ask
Jeeves)?
Inflection point in available
computation resources,
mathematical advances, and a
direct-to-platform business
model.
Apidays Helsinki & North 2024 - There’s no AI without API, but what does this mean for Security? by Timo Rüppell, FireTail.io
Not Just LLMs.
Most news is about LLMs. And most (valid)
criticism regarding capabilities is aimed at
LLMs.
But LLMs are “just” one niche.
Specific types of models can be far more
adept at interacting with APIs.
- LAM: Translating human intentions into actions.
Example: Rabbit AI and service integrations.
Integrates AI with API communications.
- LCBM: Optimizing LLM output to achieve a desired
behaviour. Example: Lirio LBMs aim to make
people healthier.
OpenAI’s expansion on API calling
capabilities announced in November.
Long term optimism.
Commoditization of Large
Models can be relatively fast.
- Compute: Moore’s law is (still) in
effect.
- Maths: More efficient training
methods. Example: Mamba a linear
RNN is nLog(n) compared to
Transformers n^2.
Traits of commodities are
interchangeability, availability.
Emerging LLM Tech Stack.
There’s no AI without APIs
Source: a16z Enterprise
Now (or very soon) everyone,
everywhere, regardless of expertise
will have the ability to prod and
probe APIs across the globe, at
pace and at scale. This will be a
game changer for those charged
with protecting APIs.
In November 2023, OpenAI announced a
massive expansion of API calling
capabilities available via ChatGPT
Understanding the
Security Risks.
AI & API Security.
AI risks impacting APIs
- Unsafe AIs: Intentionally or
accidentally unsafe AIs finding
vulnerabilities in application or
business logic, authentication,
authorization.
- Bots and data spoofing: APIs
processing human generated
content need to make provisions
for both large scale abuse and
individual vetting.
AI & API Security.
API risks impacting AIs.
- Injection attacks: You need to
carefully sanitize user provided
content that is going to be handed
of to an AI integration.
- Resource consumption: You need
to protect expensive endpoints
from overuse and have robust
usage metering.
- Access control: You need to ensure
that any data returned by an AI
model is correctly authorized.
Best Practices for
Securing APIs in
an Age of AI.
6 Pillars of API Security.
Enforcement.
Authentication, authorization,
validation and sanitization directly
in your code.
Visibility.
Get a complete view of your entire
API landscape across your IT
fleet.
Assessment.
APIs analyzed for configuration
settings & security policy. API
security posture management.
Discovery.
Finding APIs not running FireTail
library via network traffic, code
repos & cloud APIs
Observability.
Commercial version sends
configuration and success /
failure events to cloud backend.
Audit.
Full & centralized audit trail of all
APIs with FireTail library. Search &
alert capabilities.
Existing approaches just don’t cut it.
API Call Log Visibility
Where to spend your time.
Consumer Server
Internet
GW/Proxy
WAF
Rate
limiting
AuthN
Sanitize
Validate
AuthZ
Fetch Data / Modify
Data / Execute
Function
Request
Response
Third party API
1. BOLA.
2. Broken AuthN.
3. BOPLA.
4. Unrestricted Resource Consumption.
5. BOLA.
6. Unrestricted Process Access.
7. SSRF.
8. Misconfiguration.
9. Improper Inventory Management.
10. Unsafe consumption of APIs.
Consumer Server
Internet
GW/Proxy
WAF
Rate
limiting
AuthN
Sanitize
Validate
AuthZ
Fetch Data / Modify
Data / Execute
Function
Request
Response
1. BOLA.
2. Broken AuthN.
3. BOPLA.
4. Unrestricted Resource Consumption.
5. BFLA.
6. Unrestricted Process Access.
7. SSRF.
8. Misconfiguration.
Third party API
Where to spend your time.
1. BOLA.
2. Broken AuthN.
3. BOPLA.
4. Unrestricted Resource Consumption.
5. BOLA.
6. Unrestricted Process Access.
7. SSRF.
8. Misconfiguration.
9. Improper Inventory Management.
10. Unsafe consumption of APIs.
Consumer Server
Internet
GW/Proxy
WAF
Rate
limiting
AuthN
Sanitize
Validate
AuthZ
Fetch Data / Modify
Data / Execute
Function
Request
Response
1. BOLA.
2. Broken AuthN.
3. BOPLA.
4. Unrestricted Resource Consumption.
5. BFLA.
6. Unrestricted Process Access.
7. SSRF.
8. Misconfiguration.
2
Third party API
Where to spend your time.
1. BOLA.
2. Broken AuthN.
3. BOPLA.
4. Unrestricted Resource Consumption.
5. BOLA.
6. Unrestricted Process Access.
7. SSRF.
8. Misconfiguration.
9. Improper Inventory Management.
10. Unsafe consumption of APIs.
Consumer Server
Internet
GW/Proxy
WAF
Rate
limiting
AuthN
Sanitize
Validate
AuthZ
Fetch Data / Modify
Data / Execute
Function
Request
Response
1. BOLA.
2. Broken AuthN.
3. BOPLA.
4. Unrestricted Resource Consumption.
5. BFLA.
6. Unrestricted Process Access.
7. SSRF.
8. Misconfiguration.
2
Third party API
4
6
6
4
6
4
Where to spend your time.
1. BOLA.
2. Broken AuthN.
3. BOPLA.
4. Unrestricted Resource Consumption.
5. BOLA.
6. Unrestricted Process Access.
7. SSRF.
8. Misconfiguration.
9. Improper Inventory Management.
10. Unsafe consumption of APIs.
Consumer Server
Internet
GW/Proxy
WAF
Rate
limiting
AuthN
Sanitize
Validate
AuthZ
Fetch Data / Modify
Data / Execute
Function
Request
Response
1. BOLA.
2. Broken AuthN.
3. BOPLA.
4. Unrestricted Resource Consumption.
5. BFLA.
6. Unrestricted Process Access.
7. SSRF.
8. Misconfiguration.
1
2
3
5
Third party API
4
6
6
4
6
4
Where to spend your time.
1. BOLA.
2. Broken AuthN.
3. BOPLA.
4. Unrestricted Resource Consumption.
5. BOLA.
6. Unrestricted Process Access.
7. SSRF.
8. Misconfiguration.
9. Improper Inventory Management.
10. Unsafe consumption of APIs.
Consumer Server
Internet
GW/Proxy
WAF
Rate
limiting
AuthN
Sanitize
Validate
AuthZ
Fetch Data / Modify
Data / Execute
Function
Request
Response
1. BOLA.
2. Broken AuthN.
3. BOPLA.
4. Unrestricted Resource Consumption.
5. BFLA.
6. Unrestricted Process Access.
7. SSRF.
8. Misconfiguration.
1
2
3
5
7
10
Third party API
4
6
6
4
6
4
Where to spend your time.
7
1. BOLA.
2. Broken AuthN.
3. BOPLA.
4. Unrestricted Resource Consumption.
5. BOLA.
6. Unrestricted Process Access.
7. SSRF.
8. Misconfiguration.
9. Improper Inventory Management.
10. Unsafe consumption of APIs.
Consumer Server
Internet
GW/Proxy
WAF
Rate
limiting
Sanitize
Validate
AuthZ
Fetch Data / Modify
Data / Execute
Function
Request
Response
1. BOLA.
2. Broken AuthN.
3. BOPLA.
4. Unrestricted Resource Consumption.
5. BFLA.
6. Unrestricted Process Access.
7. SSRF.
8. Misconfiguration.
AuthN
1
2
3
5
7
10
Third party API
4
6
6
4
6
4
Where to spend your time.
10
The Bottom Line.
The scale of the risk and the
frequency of attacks are growing
due to AI. The nature of the threat
is evolving but the same core
risks persist.
Questions.
FireTail is headquartered in Northern Virginia, USA, with
additional offices in Dublin, Ireland and Helsinki, Finland.
FireTail is backed by leading cybersecurity investors
Paladin Capital, Secure Octane, General Advance and
Zscaler. For more information, please visit www.firetail.io.

More Related Content

PDF
FireTail at API Days Australia 2024 - The Double-edge sword of AI for API Sec...
PDF
APIsecure 2023 - API Security - doing more with less, Nir Paz (Standard.ai)
PDF
apidays Australia 2023 - API Security Breach Analysis & Empowering Devs to M...
PDF
Virtual Meetup - API Security Best Practices
PPTX
2022 APIsecure_Hackers with Valid Credentials
PDF
apidays New York 2023 - Putting yourself out there - how to secure your publi...
PDF
7 Best Practices for Secure API Development .pdf
DOCX
7 Best Practices for Secure API Development .docx
FireTail at API Days Australia 2024 - The Double-edge sword of AI for API Sec...
APIsecure 2023 - API Security - doing more with less, Nir Paz (Standard.ai)
apidays Australia 2023 - API Security Breach Analysis & Empowering Devs to M...
Virtual Meetup - API Security Best Practices
2022 APIsecure_Hackers with Valid Credentials
apidays New York 2023 - Putting yourself out there - how to secure your publi...
7 Best Practices for Secure API Development .pdf
7 Best Practices for Secure API Development .docx

Similar to Apidays Helsinki & North 2024 - There’s no AI without API, but what does this mean for Security? by Timo Rüppell, FireTail.io (20)

PDF
API Security Best Practices and Guidelines
PDF
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
PDF
apidays London 2023 - Overengineering Weakens your API Security, Dr. David Va...
PDF
How To Fix The Most Critical API Security Risks.pdf
PDF
OWASP API Security Top 10 Examples
PDF
API Security Webinar : Security Guidelines for Providing and Consuming APIs
PDF
API Security Webinar - Security Guidelines for Providing and Consuming APIs
PDF
INTERFACE by apidays 2023 - API Security & Ecosystem Trust, Jeremy Snyder, Fi...
PDF
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
PDF
Checkmarx meetup API Security - Solving security at scale - Ante Gulam
PDF
Understanding and Mitigating Common Security Risks in API Testing.pdf
PPTX
Toronto Virtual Meetup #5 - API Security and Threats
PPTX
API Security from the DevOps and CSO Perspectives (Webcast)
PDF
Better API Security with Automation
PDF
Better API Security With A SecDevOps Approach
PDF
Api economy and why effective security is important (1)
PDF
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
PDF
Peeling the Onion: Making Sense of the Layers of API Security
PDF
APIsecure 2023 - Learning from a decade of API breaches and why application-c...
PDF
OWASP API Security Top 10 - API World
API Security Best Practices and Guidelines
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays London 2023 - Overengineering Weakens your API Security, Dr. David Va...
How To Fix The Most Critical API Security Risks.pdf
OWASP API Security Top 10 Examples
API Security Webinar : Security Guidelines for Providing and Consuming APIs
API Security Webinar - Security Guidelines for Providing and Consuming APIs
INTERFACE by apidays 2023 - API Security & Ecosystem Trust, Jeremy Snyder, Fi...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
Checkmarx meetup API Security - Solving security at scale - Ante Gulam
Understanding and Mitigating Common Security Risks in API Testing.pdf
Toronto Virtual Meetup #5 - API Security and Threats
API Security from the DevOps and CSO Perspectives (Webcast)
Better API Security with Automation
Better API Security With A SecDevOps Approach
Api economy and why effective security is important (1)
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
Peeling the Onion: Making Sense of the Layers of API Security
APIsecure 2023 - Learning from a decade of API breaches and why application-c...
OWASP API Security Top 10 - API World
Ad

More from apidays (20)

PDF
apidays Munich 2025 - The Physics of Requirement Sciences Through Application...
PDF
apidays Munich 2025 - Developer Portals, API Catalogs, and Marketplaces, Miri...
PDF
apidays Munich 2025 - Making Sense of AI-Ready APIs in a Buzzword World, Andr...
PDF
apidays Munich 2025 - Integrate Your APIs into the New AI Marketplace, Senthi...
PDF
apidays Munich 2025 - The Double Life of the API Product Manager, Emmanuel Pa...
PDF
apidays Munich 2025 - Let’s build, debug and test a magic MCP server in Postm...
PDF
apidays Munich 2025 - The life-changing magic of great API docs, Jens Fischer...
PDF
apidays Munich 2025 - Automating Operations Without Reinventing the Wheel, Ma...
PDF
apidays Munich 2025 - Geospatial Artificial Intelligence (GeoAI) with OGC API...
PPTX
apidays Munich 2025 - GraphQL 101: I won't REST, until you GraphQL, Surbhi Si...
PPTX
apidays Munich 2025 - Effectively incorporating API Security into the overall...
PPTX
apidays Munich 2025 - Federated API Management and Governance, Vince Baker (D...
PPTX
apidays Munich 2025 - Agentic AI: A Friend or Foe?, Merja Kajava (Aavista Oy)
PPTX
apidays Munich 2025 - Streamline & Secure LLM Traffic with APISIX AI Gateway ...
PPTX
apidays Munich 2025 - Building Telco-Aware Apps with Open Gateway APIs, Subhr...
PPTX
apidays Munich 2025 - Building an AWS Serverless Application with Terraform, ...
PDF
apidays Helsinki & North 2025 - REST in Peace? Hunting the Dominant Design fo...
PDF
apidays Helsinki & North 2025 - Monetizing AI APIs: The New API Economy, Alla...
PDF
apidays Helsinki & North 2025 - How (not) to run a Graphql Stewardship Group,...
PDF
apidays Helsinki & North 2025 - APIs in the healthcare sector: hospitals inte...
apidays Munich 2025 - The Physics of Requirement Sciences Through Application...
apidays Munich 2025 - Developer Portals, API Catalogs, and Marketplaces, Miri...
apidays Munich 2025 - Making Sense of AI-Ready APIs in a Buzzword World, Andr...
apidays Munich 2025 - Integrate Your APIs into the New AI Marketplace, Senthi...
apidays Munich 2025 - The Double Life of the API Product Manager, Emmanuel Pa...
apidays Munich 2025 - Let’s build, debug and test a magic MCP server in Postm...
apidays Munich 2025 - The life-changing magic of great API docs, Jens Fischer...
apidays Munich 2025 - Automating Operations Without Reinventing the Wheel, Ma...
apidays Munich 2025 - Geospatial Artificial Intelligence (GeoAI) with OGC API...
apidays Munich 2025 - GraphQL 101: I won't REST, until you GraphQL, Surbhi Si...
apidays Munich 2025 - Effectively incorporating API Security into the overall...
apidays Munich 2025 - Federated API Management and Governance, Vince Baker (D...
apidays Munich 2025 - Agentic AI: A Friend or Foe?, Merja Kajava (Aavista Oy)
apidays Munich 2025 - Streamline & Secure LLM Traffic with APISIX AI Gateway ...
apidays Munich 2025 - Building Telco-Aware Apps with Open Gateway APIs, Subhr...
apidays Munich 2025 - Building an AWS Serverless Application with Terraform, ...
apidays Helsinki & North 2025 - REST in Peace? Hunting the Dominant Design fo...
apidays Helsinki & North 2025 - Monetizing AI APIs: The New API Economy, Alla...
apidays Helsinki & North 2025 - How (not) to run a Graphql Stewardship Group,...
apidays Helsinki & North 2025 - APIs in the healthcare sector: hospitals inte...
Ad

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation theory and applications.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
KodekX | Application Modernization Development
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Unlocking AI with Model Context Protocol (MCP)
The Rise and Fall of 3GPP – Time for a Sabbatical?
Reach Out and Touch Someone: Haptics and Empathic Computing
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation theory and applications.pdf
Programs and apps: productivity, graphics, security and other tools
Advanced methodologies resolving dimensionality complications for autism neur...
MIND Revenue Release Quarter 2 2025 Press Release
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
sap open course for s4hana steps from ECC to s4
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KodekX | Application Modernization Development
Per capita expenditure prediction using model stacking based on satellite ima...

Apidays Helsinki & North 2024 - There’s no AI without API, but what does this mean for Security? by Timo Rüppell, FireTail.io

  • 1. There’s no AI without API, but what does this mean for security? Apidays Helsinki | Timo Rüppell
  • 3. About Me. VP of Product at FireTail. A former researcher in theoretical high energy physics. Now focused on API security. Earlier ● CTO @ Mapita ● Founder @ Sideric ● Lead Dev @ PiggyBaggy timo@firetail.io
  • 4. Overview. What we’ll cover today. - The Rise of AI & API Proliferation: Why there is no AI without APIs. - Understanding the Security Risks: How the emergence of AI is changing the game when it comes to API security. - Best Practices for Securing API in an Age of AI: The core principles of an effective API security strategy given the emergence of AI. - The Bottom Line: A quick recap of today’s key takeaways. - Q&A: Time to answers any burning questions you may have. Effective API security is a must for organizations who want to harness the power of AI.
  • 5. The Rise of AI & API Proliferation.
  • 6. In November 2023, OpenAI announced a massive expansion of API calling capabilities available via ChatGPT
  • 7. What Changed? AIs have been around for decades? The “assistant” has been around even longer (just ask Jeeves)? Inflection point in available computation resources, mathematical advances, and a direct-to-platform business model.
  • 9. Not Just LLMs. Most news is about LLMs. And most (valid) criticism regarding capabilities is aimed at LLMs. But LLMs are “just” one niche. Specific types of models can be far more adept at interacting with APIs. - LAM: Translating human intentions into actions. Example: Rabbit AI and service integrations. Integrates AI with API communications. - LCBM: Optimizing LLM output to achieve a desired behaviour. Example: Lirio LBMs aim to make people healthier. OpenAI’s expansion on API calling capabilities announced in November.
  • 10. Long term optimism. Commoditization of Large Models can be relatively fast. - Compute: Moore’s law is (still) in effect. - Maths: More efficient training methods. Example: Mamba a linear RNN is nLog(n) compared to Transformers n^2. Traits of commodities are interchangeability, availability.
  • 11. Emerging LLM Tech Stack. There’s no AI without APIs Source: a16z Enterprise
  • 12. Now (or very soon) everyone, everywhere, regardless of expertise will have the ability to prod and probe APIs across the globe, at pace and at scale. This will be a game changer for those charged with protecting APIs. In November 2023, OpenAI announced a massive expansion of API calling capabilities available via ChatGPT
  • 14. AI & API Security. AI risks impacting APIs - Unsafe AIs: Intentionally or accidentally unsafe AIs finding vulnerabilities in application or business logic, authentication, authorization. - Bots and data spoofing: APIs processing human generated content need to make provisions for both large scale abuse and individual vetting.
  • 15. AI & API Security. API risks impacting AIs. - Injection attacks: You need to carefully sanitize user provided content that is going to be handed of to an AI integration. - Resource consumption: You need to protect expensive endpoints from overuse and have robust usage metering. - Access control: You need to ensure that any data returned by an AI model is correctly authorized.
  • 16. Best Practices for Securing APIs in an Age of AI.
  • 17. 6 Pillars of API Security. Enforcement. Authentication, authorization, validation and sanitization directly in your code. Visibility. Get a complete view of your entire API landscape across your IT fleet. Assessment. APIs analyzed for configuration settings & security policy. API security posture management. Discovery. Finding APIs not running FireTail library via network traffic, code repos & cloud APIs Observability. Commercial version sends configuration and success / failure events to cloud backend. Audit. Full & centralized audit trail of all APIs with FireTail library. Search & alert capabilities.
  • 18. Existing approaches just don’t cut it. API Call Log Visibility
  • 19. Where to spend your time. Consumer Server Internet GW/Proxy WAF Rate limiting AuthN Sanitize Validate AuthZ Fetch Data / Modify Data / Execute Function Request Response Third party API
  • 20. 1. BOLA. 2. Broken AuthN. 3. BOPLA. 4. Unrestricted Resource Consumption. 5. BOLA. 6. Unrestricted Process Access. 7. SSRF. 8. Misconfiguration. 9. Improper Inventory Management. 10. Unsafe consumption of APIs. Consumer Server Internet GW/Proxy WAF Rate limiting AuthN Sanitize Validate AuthZ Fetch Data / Modify Data / Execute Function Request Response 1. BOLA. 2. Broken AuthN. 3. BOPLA. 4. Unrestricted Resource Consumption. 5. BFLA. 6. Unrestricted Process Access. 7. SSRF. 8. Misconfiguration. Third party API Where to spend your time.
  • 21. 1. BOLA. 2. Broken AuthN. 3. BOPLA. 4. Unrestricted Resource Consumption. 5. BOLA. 6. Unrestricted Process Access. 7. SSRF. 8. Misconfiguration. 9. Improper Inventory Management. 10. Unsafe consumption of APIs. Consumer Server Internet GW/Proxy WAF Rate limiting AuthN Sanitize Validate AuthZ Fetch Data / Modify Data / Execute Function Request Response 1. BOLA. 2. Broken AuthN. 3. BOPLA. 4. Unrestricted Resource Consumption. 5. BFLA. 6. Unrestricted Process Access. 7. SSRF. 8. Misconfiguration. 2 Third party API Where to spend your time.
  • 22. 1. BOLA. 2. Broken AuthN. 3. BOPLA. 4. Unrestricted Resource Consumption. 5. BOLA. 6. Unrestricted Process Access. 7. SSRF. 8. Misconfiguration. 9. Improper Inventory Management. 10. Unsafe consumption of APIs. Consumer Server Internet GW/Proxy WAF Rate limiting AuthN Sanitize Validate AuthZ Fetch Data / Modify Data / Execute Function Request Response 1. BOLA. 2. Broken AuthN. 3. BOPLA. 4. Unrestricted Resource Consumption. 5. BFLA. 6. Unrestricted Process Access. 7. SSRF. 8. Misconfiguration. 2 Third party API 4 6 6 4 6 4 Where to spend your time.
  • 23. 1. BOLA. 2. Broken AuthN. 3. BOPLA. 4. Unrestricted Resource Consumption. 5. BOLA. 6. Unrestricted Process Access. 7. SSRF. 8. Misconfiguration. 9. Improper Inventory Management. 10. Unsafe consumption of APIs. Consumer Server Internet GW/Proxy WAF Rate limiting AuthN Sanitize Validate AuthZ Fetch Data / Modify Data / Execute Function Request Response 1. BOLA. 2. Broken AuthN. 3. BOPLA. 4. Unrestricted Resource Consumption. 5. BFLA. 6. Unrestricted Process Access. 7. SSRF. 8. Misconfiguration. 1 2 3 5 Third party API 4 6 6 4 6 4 Where to spend your time.
  • 24. 1. BOLA. 2. Broken AuthN. 3. BOPLA. 4. Unrestricted Resource Consumption. 5. BOLA. 6. Unrestricted Process Access. 7. SSRF. 8. Misconfiguration. 9. Improper Inventory Management. 10. Unsafe consumption of APIs. Consumer Server Internet GW/Proxy WAF Rate limiting AuthN Sanitize Validate AuthZ Fetch Data / Modify Data / Execute Function Request Response 1. BOLA. 2. Broken AuthN. 3. BOPLA. 4. Unrestricted Resource Consumption. 5. BFLA. 6. Unrestricted Process Access. 7. SSRF. 8. Misconfiguration. 1 2 3 5 7 10 Third party API 4 6 6 4 6 4 Where to spend your time. 7
  • 25. 1. BOLA. 2. Broken AuthN. 3. BOPLA. 4. Unrestricted Resource Consumption. 5. BOLA. 6. Unrestricted Process Access. 7. SSRF. 8. Misconfiguration. 9. Improper Inventory Management. 10. Unsafe consumption of APIs. Consumer Server Internet GW/Proxy WAF Rate limiting Sanitize Validate AuthZ Fetch Data / Modify Data / Execute Function Request Response 1. BOLA. 2. Broken AuthN. 3. BOPLA. 4. Unrestricted Resource Consumption. 5. BFLA. 6. Unrestricted Process Access. 7. SSRF. 8. Misconfiguration. AuthN 1 2 3 5 7 10 Third party API 4 6 6 4 6 4 Where to spend your time. 10
  • 27. The scale of the risk and the frequency of attacks are growing due to AI. The nature of the threat is evolving but the same core risks persist.
  • 29. FireTail is headquartered in Northern Virginia, USA, with additional offices in Dublin, Ireland and Helsinki, Finland. FireTail is backed by leading cybersecurity investors Paladin Capital, Secure Octane, General Advance and Zscaler. For more information, please visit www.firetail.io.