SlideShare a Scribd company logo
api s ec ur it y ed it io n :
W h en b es t p r a c t ic es s t o p b ein g
p o l it e a n d s t a r t b ein g r ea l
© 2021 Salt Security, Inc. All rights r
Software is
eating the world
© 2021 Salt Security, Inc. All rights r
API security predictions were accurate
© 2021 Salt Security, Inc. All rights r
API security best practices help reduce risk
Three areas we’ll be focusing on today:
1. API documentation, discovery, and cataloging
2. Runtime protection
3. API
-centric security operations
New York
JULY
Australia
SEPTEMBER
Singapore
APRIL
Helsinki & North
MARCH
Paris
DECEMBER
London
OCTOBER
Jakarta
FEBRUARY
Hong Kong
AUGUST
JUNE
India
MAY
Check out our API Conferences here
50+ events since 2012, 14 countries, 2,000+ speakers, 50,000+ attendees,
300k+ online community
Want to talk at one of our conferences?
Apply to speak here
1. a p i d o c um en t a t io n , d is c o ver y
a n d c a t a l o g in g
© 2021 Salt Security, Inc. All rights r
Use machine formats likeOpenAPISpecification
• Standardizing on machine formats enables
other life cycle activities and integration
work with suppliers
• Most organizations have pockets of OAS and
Swagger, but practices aren’t universal
• Recognize limitations of schema analysis
for finding issues and business logic flaws
• Disparity between documented design and
deployed APIs is common, aka
API drift
© 2021 Salt Security, Inc. All rights r
Tag and label APIs and microservices consistently
• Developers are empowered to help the
organization and its security strategy
• Tagging and labeling is an enabler of many
DevOps best practices
– Improves integrity of software supply
chain when done consistently and
verified
– Aids SOC analysts and security
operations as part of forensics and
incident response
– Useful for compliance activity, and CI/CD
build pipelines become a system of
record
© 2021 Salt Security, Inc. All rights r
Industry:
B
usiness travel
management
“With Salt we can see exactly
how our APIs are designed to
work and how they’re reacting
when they’re used and misused.”
-- TarikG
hbeish,Product &
SecurityEngineering
Customer example of pitfalls related to lack of API inventory
Customer challenges
• COVID forced rapid platform adjustments and enhancements that spurred
• Needed API visibility to stay in line with agile development
Salt Security key capabilities
API discovery
• Discovers all APIs automatically and continuously
• Maintains an up
-to-date catalog of all APIs
• Captures granular details to eliminate blind spots and help teams assess r
Sensitive data exposure prevention
• Details where APIs expose sensitive data
• Provides updates when new or updated APIs impact data exposure
2. Runtime protection
© 2021 Salt Security, Inc. All rights r
Use threat protection features of your API gateways and API management
• Many gateways provide basic message
filtering mechanisms in addition to access
control enforcement
• This form of threat protection may satisfy
some basic security use cases but leaves
gaps in API protection
• Overloading API gateways impacts servic
performance, particularly in microservices
architectures
• Maintenance of rules and signatures is
often a gray area or operational nightmare
© 2021 Salt Security, Inc. All rights r
Seek more than rate limiting and traffic management to stop attacks
• Rate limiting mechanisms are commonly
found in many network elements
• Use and quota limits within API gateways
are useful for API monetization and basic
security control
• Rate limiting stops some basic attacks and
API abuse, but it falls over for distributed
architectures and advanced attackers
• Most useful for internal APIs and partner
APIs where API consumers are known and
request volume is predictable
© 2021 Salt Security, Inc. All rights r
Customer challenges
• ProtectingA
PIs at the core ofthe Finastra FusionFabric.cloudservice
• PreventingA
TO
,compromisedapps callingA
PIs,andexploitationofO
W
A
SPA
PISecurity
Top1
0
Salt Security key capabilities
Attack prevention
• ID
s attackers usingadvancedtechniques toevade rate limitingandother protections
• B
locks attackers inearlyreconnaissance stages
Risk reduction
• Provides insights todevelopers andpartners onpotentialvulnerabilities andsensitive
data exposure
• H
elps mitigate riskandprevent vulnerable A
PIs fromlaunching
Customer example of pitfalls related to inadequate runtime protection
Industry:
FinTech
“Salt has automatically blocked
tens of 1000s of credential
stuffing attacks. Without Salt,
we’d be out of business.”
--N
irV
altman,V
Pproduct and
data security
3. a p i- c en t r ic s ec ur it y o p er a t io n s
© 2021 Salt Security, Inc. All rights r
Account for multiple personas and work streams in the organization
• Telemetry of full API call chains and data flows
provides necessary technical detail and drives
machine analysis
• Development, Operations, and Security teams
need different information at different times
of the API life cycle
• Integrate with IT systems to aid in DFIR
collaboration and remediation workflow
• Security insights should be tailored per role
– Is an issue resulting from code?
– Or is it an infrastructure misconfiguration?
© 2021 Salt Security, Inc. All rights r
Surface actionable API events, don’t just dump data into SIEM
• SecOps fatigue is common and application
expertise is often lacking
• Select tooling that interoperates with
organizational SIEM and SOAR
• Strike a balance between too many and too
little data feeds
• Focus on improving signal
-to-noise ratio
and reducing false positives
© 2021 Salt Security, Inc. All rights r
Customer example of pitfalls related to inefficient SecOps
Customer challenges
• D
etectingandpreventingattacks targetingthe unique logic ofcore A
PIs
• Preventingattacks missedbyN
G
-W
A
Fs andbot mitigationtools
Salt Security key capabilities
Attack prevention
• C
orrelates attackactivitytopinpoint attackers earlyduringreconnaissance
• R
educes alerts witha consolidatedattacker timeline
• Provides SO
Cteams withcontext neededfor quickaction
Risk reduction
• Provides insights toidentify,prioritize,andeliminatevulnerabilities
• Enables teams tocontinuouslyhardenA
PIs
• H
elps developers make A
PIs more secure before launchingintoproduction
Industry:
M
obile marketing
analytics andattribution
“W
ithvisibility,protection,and
remediationinone solution,
Salt helps us respondtoissues
faster andunderstandexactly
what needs tobe fixed.”
--G
uyFlechter,C
ISO
© 2021 Salt Security, Inc. All rights r
Salt –the API context
you need
17
© 2021 Salt Security, Inc. All rights r
Additional resources
• A
PISecurityfor D
ummies
• A
PISecurityEvaluationG
uide
• A
PISecurityB
est Practices G
uide and C
hecklist
• O
W
A
SPA
PISecurityTop1
0Explained
• State of A
PISecurityQ
32021
• A
PIThreat R
esearch:D
etailedFinancialR
ecords ExposedonFinancialServices Platform
• A
PIThreat R
esearch:Elastic StackM
isconfigurationA
llows D
ata Extraction
Still have questions or want more info? Reach out!
• Email:michaeli@salt.security,nicolasj@salt.security
• L
inkedIn:https://www.linkedin.com/in/michael-isbitski-45728737,https://fr.linkedin.com/in/nicolasjeanselme
18
Over
50security best practices
spread across 12 focus areas
Thank you for attending
New York
JULY
Australia
SEPTEMBER
Singapore
APRIL
Helsinki & North
MARCH
Paris
DECEMBER
London
OCTOBER
Jakarta
FEBRUARY
Hong Kong
AUGUST
JUNE
India
MAY
Check out our API Conferences here
50+ events since 2012, 14 countries, 2,000+ speakers, 50,000+ attendees,
300k+ online community
Want to talk at one of our conferences?
Apply to speak here

More Related Content

PDF
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
PDF
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...
PDF
apidays LIVE Paris 2021 - Taming the beast by Markus Mueller, Apiida
PDF
apidays LIVE Paris 2021 - Synchronous Communication Patterns by Sébastien Ber...
PDF
apidays LIVE Paris 2021 - API Attack Simulator - Find your API vulnerabilitie...
PDF
Mobile - Your API Security Blindspot by David Stewart, Approov
PDF
apidays LIVE Paris 2021 - Beyond API Governance: Run your API org like a lean...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...
apidays LIVE Paris 2021 - Taming the beast by Markus Mueller, Apiida
apidays LIVE Paris 2021 - Synchronous Communication Patterns by Sébastien Ber...
apidays LIVE Paris 2021 - API Attack Simulator - Find your API vulnerabilitie...
Mobile - Your API Security Blindspot by David Stewart, Approov
apidays LIVE Paris 2021 - Beyond API Governance: Run your API org like a lean...

What's hot (20)

PDF
apidays LIVE Paris 2021 - API design is where culture and tech meet each othe...
PDF
apidays LIVE Paris 2021 - Low-Code API DevOps approach to API Lifecycle Manag...
PPTX
Guide to an API-first Strategy
PDF
INTERFACE, by apidays - APIs from consumption to contribution by Kristof Van...
PDF
Owasp top 10 2017 (en)
PDF
apidays LIVE Paris 2021 - APIGEE, different ways for integrating with CI/CD p...
PPTX
apidays LIVE Paris - Principles for API security by Alan Glickenhouse
PPTX
Executing on API Developer Experience
DOCX
API Strategy in Cloud
PDF
INTERFACE, by apidays - Aligning teams and strategies behind API investment ...
PPTX
API Management - Practical Enterprise Implementation Experience
PDF
Building an API Security Strategy
PDF
APIdays Paris 2019 - API Gateway & Identity Providers, a Match Made in Micros...
PDF
APIdays Paris 2019 - Zero Downtime in API Management by Waldemar Rosenfeld, A...
PPTX
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
PDF
apidays LIVE Paris 2021 - API data sharing legal practices for public sector ...
PPTX
apidays LIVE New York 2021 - Top 10 API security threats every API team shoul...
PPTX
apidays LIVE India - The link between technical documentation and developer e...
PPTX
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...
PDF
apidays LIVE London 2021 - API Security in Highly Volatile Threat Landscapes ...
apidays LIVE Paris 2021 - API design is where culture and tech meet each othe...
apidays LIVE Paris 2021 - Low-Code API DevOps approach to API Lifecycle Manag...
Guide to an API-first Strategy
INTERFACE, by apidays - APIs from consumption to contribution by Kristof Van...
Owasp top 10 2017 (en)
apidays LIVE Paris 2021 - APIGEE, different ways for integrating with CI/CD p...
apidays LIVE Paris - Principles for API security by Alan Glickenhouse
Executing on API Developer Experience
API Strategy in Cloud
INTERFACE, by apidays - Aligning teams and strategies behind API investment ...
API Management - Practical Enterprise Implementation Experience
Building an API Security Strategy
APIdays Paris 2019 - API Gateway & Identity Providers, a Match Made in Micros...
APIdays Paris 2019 - Zero Downtime in API Management by Waldemar Rosenfeld, A...
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
apidays LIVE Paris 2021 - API data sharing legal practices for public sector ...
apidays LIVE New York 2021 - Top 10 API security threats every API team shoul...
apidays LIVE India - The link between technical documentation and developer e...
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...
apidays LIVE London 2021 - API Security in Highly Volatile Threat Landscapes ...
Ad

Similar to apidays LIVE Paris 2021 - The Real World, API Security Edition by Michael Isbitski, Salt Security (20)

PPTX
2022 APIsecure_The Real World, API Security Edition
PDF
Bridging the Security Testing Gap in Your CI/CD Pipeline
PDF
Top 5 best practice for delivering secure in-vehicle software
PDF
Webinar–AppSec: Hype or Reality
PPTX
Create code confidence for better application security
PPTX
Outpost24 webinar - Api security
PDF
7 Best Practices for Secure API Development .pdf
DOCX
7 Best Practices for Secure API Development .docx
PPTX
Fortify-Application_Security_Foundation_Training.pptx
PPTX
Fortify-Application_Security_Foundation_Training.pptx
PDF
Outpost24 webinar Why API security matters and how to get it right.pdf
PDF
Addressing Cloud Security with OPA
PPTX
Platform for Secure Digital Business
PDF
AWS live hack: Atlassian + Snyk OSS on AWS
PPTX
Secure application deployment in the age of continuous delivery
PPTX
Secure application deployment in the age of continuous delivery
PPTX
The Inconvenient Truth About API Security
PPTX
The road towards better automotive cybersecurity
PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
PPSX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
2022 APIsecure_The Real World, API Security Edition
Bridging the Security Testing Gap in Your CI/CD Pipeline
Top 5 best practice for delivering secure in-vehicle software
Webinar–AppSec: Hype or Reality
Create code confidence for better application security
Outpost24 webinar - Api security
7 Best Practices for Secure API Development .pdf
7 Best Practices for Secure API Development .docx
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
Outpost24 webinar Why API security matters and how to get it right.pdf
Addressing Cloud Security with OPA
Platform for Secure Digital Business
AWS live hack: Atlassian + Snyk OSS on AWS
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
The Inconvenient Truth About API Security
The road towards better automotive cybersecurity
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Ad

More from apidays (20)

PDF
apidays Munich 2025 - The Physics of Requirement Sciences Through Application...
PDF
apidays Munich 2025 - Developer Portals, API Catalogs, and Marketplaces, Miri...
PDF
apidays Munich 2025 - Making Sense of AI-Ready APIs in a Buzzword World, Andr...
PDF
apidays Munich 2025 - Integrate Your APIs into the New AI Marketplace, Senthi...
PDF
apidays Munich 2025 - The Double Life of the API Product Manager, Emmanuel Pa...
PDF
apidays Munich 2025 - Let’s build, debug and test a magic MCP server in Postm...
PDF
apidays Munich 2025 - The life-changing magic of great API docs, Jens Fischer...
PDF
apidays Munich 2025 - Automating Operations Without Reinventing the Wheel, Ma...
PDF
apidays Munich 2025 - Geospatial Artificial Intelligence (GeoAI) with OGC API...
PPTX
apidays Munich 2025 - GraphQL 101: I won't REST, until you GraphQL, Surbhi Si...
PPTX
apidays Munich 2025 - Effectively incorporating API Security into the overall...
PPTX
apidays Munich 2025 - Federated API Management and Governance, Vince Baker (D...
PPTX
apidays Munich 2025 - Agentic AI: A Friend or Foe?, Merja Kajava (Aavista Oy)
PPTX
apidays Munich 2025 - Streamline & Secure LLM Traffic with APISIX AI Gateway ...
PPTX
apidays Munich 2025 - Building Telco-Aware Apps with Open Gateway APIs, Subhr...
PPTX
apidays Munich 2025 - Building an AWS Serverless Application with Terraform, ...
PDF
apidays Helsinki & North 2025 - REST in Peace? Hunting the Dominant Design fo...
PDF
apidays Helsinki & North 2025 - Monetizing AI APIs: The New API Economy, Alla...
PDF
apidays Helsinki & North 2025 - How (not) to run a Graphql Stewardship Group,...
PDF
apidays Helsinki & North 2025 - APIs in the healthcare sector: hospitals inte...
apidays Munich 2025 - The Physics of Requirement Sciences Through Application...
apidays Munich 2025 - Developer Portals, API Catalogs, and Marketplaces, Miri...
apidays Munich 2025 - Making Sense of AI-Ready APIs in a Buzzword World, Andr...
apidays Munich 2025 - Integrate Your APIs into the New AI Marketplace, Senthi...
apidays Munich 2025 - The Double Life of the API Product Manager, Emmanuel Pa...
apidays Munich 2025 - Let’s build, debug and test a magic MCP server in Postm...
apidays Munich 2025 - The life-changing magic of great API docs, Jens Fischer...
apidays Munich 2025 - Automating Operations Without Reinventing the Wheel, Ma...
apidays Munich 2025 - Geospatial Artificial Intelligence (GeoAI) with OGC API...
apidays Munich 2025 - GraphQL 101: I won't REST, until you GraphQL, Surbhi Si...
apidays Munich 2025 - Effectively incorporating API Security into the overall...
apidays Munich 2025 - Federated API Management and Governance, Vince Baker (D...
apidays Munich 2025 - Agentic AI: A Friend or Foe?, Merja Kajava (Aavista Oy)
apidays Munich 2025 - Streamline & Secure LLM Traffic with APISIX AI Gateway ...
apidays Munich 2025 - Building Telco-Aware Apps with Open Gateway APIs, Subhr...
apidays Munich 2025 - Building an AWS Serverless Application with Terraform, ...
apidays Helsinki & North 2025 - REST in Peace? Hunting the Dominant Design fo...
apidays Helsinki & North 2025 - Monetizing AI APIs: The New API Economy, Alla...
apidays Helsinki & North 2025 - How (not) to run a Graphql Stewardship Group,...
apidays Helsinki & North 2025 - APIs in the healthcare sector: hospitals inte...

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation theory and applications.pdf
PPT
Teaching material agriculture food technology
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Empathic Computing: Creating Shared Understanding
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
MYSQL Presentation for SQL database connectivity
Per capita expenditure prediction using model stacking based on satellite ima...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
20250228 LYD VKU AI Blended-Learning.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Modernizing your data center with Dell and AMD
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Advanced methodologies resolving dimensionality complications for autism neur...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation theory and applications.pdf
Teaching material agriculture food technology
Review of recent advances in non-invasive hemoglobin estimation
Diabetes mellitus diagnosis method based random forest with bat algorithm
The Rise and Fall of 3GPP – Time for a Sabbatical?
Network Security Unit 5.pdf for BCA BBA.
Empathic Computing: Creating Shared Understanding
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Spectral efficient network and resource selection model in 5G networks
Encapsulation_ Review paper, used for researhc scholars
MYSQL Presentation for SQL database connectivity

apidays LIVE Paris 2021 - The Real World, API Security Edition by Michael Isbitski, Salt Security

  • 1. api s ec ur it y ed it io n : W h en b es t p r a c t ic es s t o p b ein g p o l it e a n d s t a r t b ein g r ea l
  • 2. © 2021 Salt Security, Inc. All rights r Software is eating the world
  • 3. © 2021 Salt Security, Inc. All rights r API security predictions were accurate
  • 4. © 2021 Salt Security, Inc. All rights r API security best practices help reduce risk Three areas we’ll be focusing on today: 1. API documentation, discovery, and cataloging 2. Runtime protection 3. API -centric security operations
  • 5. New York JULY Australia SEPTEMBER Singapore APRIL Helsinki & North MARCH Paris DECEMBER London OCTOBER Jakarta FEBRUARY Hong Kong AUGUST JUNE India MAY Check out our API Conferences here 50+ events since 2012, 14 countries, 2,000+ speakers, 50,000+ attendees, 300k+ online community Want to talk at one of our conferences? Apply to speak here
  • 6. 1. a p i d o c um en t a t io n , d is c o ver y a n d c a t a l o g in g
  • 7. © 2021 Salt Security, Inc. All rights r Use machine formats likeOpenAPISpecification • Standardizing on machine formats enables other life cycle activities and integration work with suppliers • Most organizations have pockets of OAS and Swagger, but practices aren’t universal • Recognize limitations of schema analysis for finding issues and business logic flaws • Disparity between documented design and deployed APIs is common, aka API drift
  • 8. © 2021 Salt Security, Inc. All rights r Tag and label APIs and microservices consistently • Developers are empowered to help the organization and its security strategy • Tagging and labeling is an enabler of many DevOps best practices – Improves integrity of software supply chain when done consistently and verified – Aids SOC analysts and security operations as part of forensics and incident response – Useful for compliance activity, and CI/CD build pipelines become a system of record
  • 9. © 2021 Salt Security, Inc. All rights r Industry: B usiness travel management “With Salt we can see exactly how our APIs are designed to work and how they’re reacting when they’re used and misused.” -- TarikG hbeish,Product & SecurityEngineering Customer example of pitfalls related to lack of API inventory Customer challenges • COVID forced rapid platform adjustments and enhancements that spurred • Needed API visibility to stay in line with agile development Salt Security key capabilities API discovery • Discovers all APIs automatically and continuously • Maintains an up -to-date catalog of all APIs • Captures granular details to eliminate blind spots and help teams assess r Sensitive data exposure prevention • Details where APIs expose sensitive data • Provides updates when new or updated APIs impact data exposure
  • 11. © 2021 Salt Security, Inc. All rights r Use threat protection features of your API gateways and API management • Many gateways provide basic message filtering mechanisms in addition to access control enforcement • This form of threat protection may satisfy some basic security use cases but leaves gaps in API protection • Overloading API gateways impacts servic performance, particularly in microservices architectures • Maintenance of rules and signatures is often a gray area or operational nightmare
  • 12. © 2021 Salt Security, Inc. All rights r Seek more than rate limiting and traffic management to stop attacks • Rate limiting mechanisms are commonly found in many network elements • Use and quota limits within API gateways are useful for API monetization and basic security control • Rate limiting stops some basic attacks and API abuse, but it falls over for distributed architectures and advanced attackers • Most useful for internal APIs and partner APIs where API consumers are known and request volume is predictable
  • 13. © 2021 Salt Security, Inc. All rights r Customer challenges • ProtectingA PIs at the core ofthe Finastra FusionFabric.cloudservice • PreventingA TO ,compromisedapps callingA PIs,andexploitationofO W A SPA PISecurity Top1 0 Salt Security key capabilities Attack prevention • ID s attackers usingadvancedtechniques toevade rate limitingandother protections • B locks attackers inearlyreconnaissance stages Risk reduction • Provides insights todevelopers andpartners onpotentialvulnerabilities andsensitive data exposure • H elps mitigate riskandprevent vulnerable A PIs fromlaunching Customer example of pitfalls related to inadequate runtime protection Industry: FinTech “Salt has automatically blocked tens of 1000s of credential stuffing attacks. Without Salt, we’d be out of business.” --N irV altman,V Pproduct and data security
  • 14. 3. a p i- c en t r ic s ec ur it y o p er a t io n s
  • 15. © 2021 Salt Security, Inc. All rights r Account for multiple personas and work streams in the organization • Telemetry of full API call chains and data flows provides necessary technical detail and drives machine analysis • Development, Operations, and Security teams need different information at different times of the API life cycle • Integrate with IT systems to aid in DFIR collaboration and remediation workflow • Security insights should be tailored per role – Is an issue resulting from code? – Or is it an infrastructure misconfiguration?
  • 16. © 2021 Salt Security, Inc. All rights r Surface actionable API events, don’t just dump data into SIEM • SecOps fatigue is common and application expertise is often lacking • Select tooling that interoperates with organizational SIEM and SOAR • Strike a balance between too many and too little data feeds • Focus on improving signal -to-noise ratio and reducing false positives
  • 17. © 2021 Salt Security, Inc. All rights r Customer example of pitfalls related to inefficient SecOps Customer challenges • D etectingandpreventingattacks targetingthe unique logic ofcore A PIs • Preventingattacks missedbyN G -W A Fs andbot mitigationtools Salt Security key capabilities Attack prevention • C orrelates attackactivitytopinpoint attackers earlyduringreconnaissance • R educes alerts witha consolidatedattacker timeline • Provides SO Cteams withcontext neededfor quickaction Risk reduction • Provides insights toidentify,prioritize,andeliminatevulnerabilities • Enables teams tocontinuouslyhardenA PIs • H elps developers make A PIs more secure before launchingintoproduction Industry: M obile marketing analytics andattribution “W ithvisibility,protection,and remediationinone solution, Salt helps us respondtoissues faster andunderstandexactly what needs tobe fixed.” --G uyFlechter,C ISO
  • 18. © 2021 Salt Security, Inc. All rights r Salt –the API context you need 17
  • 19. © 2021 Salt Security, Inc. All rights r Additional resources • A PISecurityfor D ummies • A PISecurityEvaluationG uide • A PISecurityB est Practices G uide and C hecklist • O W A SPA PISecurityTop1 0Explained • State of A PISecurityQ 32021 • A PIThreat R esearch:D etailedFinancialR ecords ExposedonFinancialServices Platform • A PIThreat R esearch:Elastic StackM isconfigurationA llows D ata Extraction Still have questions or want more info? Reach out! • Email:michaeli@salt.security,nicolasj@salt.security • L inkedIn:https://www.linkedin.com/in/michael-isbitski-45728737,https://fr.linkedin.com/in/nicolasjeanselme 18 Over 50security best practices spread across 12 focus areas
  • 20. Thank you for attending
  • 21. New York JULY Australia SEPTEMBER Singapore APRIL Helsinki & North MARCH Paris DECEMBER London OCTOBER Jakarta FEBRUARY Hong Kong AUGUST JUNE India MAY Check out our API Conferences here 50+ events since 2012, 14 countries, 2,000+ speakers, 50,000+ attendees, 300k+ online community Want to talk at one of our conferences? Apply to speak here