SlideShare a Scribd company logo
THE IMPORTANCE OF REAL-TIME
PROTECTION IN API SECURITY
Jeremy Ventura
Field CISO
AGENDA
Copyrights 2
The key challenges and risk
associated with API Security
Case Studies from ThreatX
The importance of real-time
blocking
APIS REPRESENT A TARGET RICH ENVIRONMENT
• Thousands of APIs and
endpoints with limited visibility
• API vulnerabilities easily
exposed and discoverable
• Attackers continually leverage
advanced techniques against
APIs
• Multi-mode attacks becoming
the norm
3
Increased Usage = Increased Risk
APIS IN THE NEWS
• Entity had access from November to
January to an API
• Data attained via API was done
“without authorization”
• Name, Address, Email, Phone,
DoB, Account #
• 37 million end users affected
• More info to come but:
• Lack of visibility?
• Misconfiguration/Misuse?
• Broken business logic?
• Stolen Credentials?
4
Incidents & Breaches on the Rise
COMPLEXITY & AUTOMATION OF ATTACKS IS EVER INCREASING
5
• Hacking is easier than ever
• Industrialized hacking tools
• Rent-a-bot/Solver Services
• Attack-as-a-Service
• Residential proxies, anonymizers
• Advanced attacks are far more
coordinated
• Security tools do not keep up
Multi-mode attacks require a fundamental shift in protection strategies
Traditional
OWASP Top 10
Sophisticated,
multi-mode
attacks
THE THREAT OF MULTI-VECTOR ATTACKS
6
• Orchestrated attacks that span
varied phases & techniques
• Distributed IPs
• Massive volumes
• Diversionary tactics
• Embedded, multi-step
automation
Disguise true attack through diversion, distraction & evasion
A WORD ABOUT BOTS
7
• Bot management critical, but must
evolve with attacks
• Current approaches best suited for high
volume, binary attacks
• Heavy reliance on static threat intel
feeds
• APIs present new challenges
• No browser injections
• No Captcha or IP challenges
• Attacker profiling & behavioral context
critical for protection against multi-
mode attacks
Bots present a new challenge to protecting APIs
TALES FROM THE THREATX SOC
8
• Large online retailer taking fire from
multiple directions
• Periodic mid-grade DDoS attacks
• Increased login failure rates on web
• High rate of rebate fraud
• Goal: trigger BGP routing to bypass
fraud protection for mobile APIs while
the security team is distracted
• Multiple best-of-breed technologies
fail to identify & block attacks
Attackers deploy multiple techniques to distract security & target APIs
TALES FROM THE THREATX SOC
9
• Gaming company launching new
product
• Attacker engaged foreign botnet to
discover potentially vulnerable API
endpoints
• Later during product launch, attacker
deployed large ATO attack while
quietly attempting vulnerability
exploits
• Although rotating IPs and user agents,
TLS signatures & IP fingerprints
detected same attacker profile to
block all suspicious behavior
Tracking & correlating attacker behavior – to enable real-time protection
PROTECTING APIS STARTS WITH FOCUS ON THE ATTACKER
10
• Understanding attacker risk profile
• Digital fingerprints to each unique
attacker
• Cumulative across multiple attack
vectors
• Continually evaluate risk &
response
• Behavioral fingerprints of an attack
reveal patterns, techniques &
targets
Context of attack over time is key to protecting APIs
INSIGHT & CONTEXT THROUGH CROSS PLATFORM VISIBILITY
11
• Identify unique attacker
executing campaigns across
multiple methods and vectors
• Correlate data over time to see
through deception
• Understanding behaviors and
intentions
• Biggest challenge = enabling
effective response
Correlating attack patterns to identify and mitigate API risk
BLOCKING API ATTACKS IN REAL TIME
12
• Observing attack data offline will not
enable real-time protection of APIs
• Often too late by the time an attack is
discovered
• Complexity required to identify attacks
typically can’t be replicated in 3rd party
firewall
• Blocking single IP at a time
• Responses must occur as the attack
is underway – and based on insights
gathered over time
Real-time API protection key to defense
API PROTECTION: KEY CAPABILITIES
13
Real-time Analysis
& Response
• AI/ML/Context Engine
• IP Interrogation &
Fingerprinting
• Active Deception
• Tarpit/Rate Limiting
• Attacker/User Behavior
Analysis
• Data Flow Analysis &
Enforcement
• Real-time Blocking
13
API Discovery &
Analysis
• API Discovery
• API Specification Mgt
• Endpoint Usage Analysis
• Endpoint Attack Metrics
• Endpoint Risk Scoring
Fully Integrated
Attack Prevention
• API Protection
• Web App Protection
• DDoS Protection
• Bot Mgt & Mitigation
• Fraud Protection
Flexible
Deployment
Options
• Inline / Agentless
• Inline / Agent-based
• Out-of-Band / Agentless
• Hosted, Cloud, On-Premise
Managed Services
• Managed Cloud Platform
• Managed Threat Analysis
• Managed Policy Enforcement
• Managed Attack Response
• APIs are under siege – by mixed-mode, high volume attacks, including bots and DDoS
• API observability does not = real-time protection
• API protection must deliver active, real-time attack blocking
• API protection should have ability to extend to broader application portfolio
Can’t block?
Then you’re not protecting APIs.

More Related Content

PDF
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
PDF
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
PDF
How Secure Are Your APIs?
PDF
Hacker vs AI
PDF
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
PDF
Outpost24 webinar Why API security matters and how to get it right.pdf
PPTX
2022 APIsecure_The Real World, API Security Edition
PDF
APIdays Paris 2019 - API Gateway & Identity Providers, a Match Made in Micros...
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
APIdays London 2019 - Why the Financial Industry Needs Intelligent API Securi...
How Secure Are Your APIs?
Hacker vs AI
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
Outpost24 webinar Why API security matters and how to get it right.pdf
2022 APIsecure_The Real World, API Security Edition
APIdays Paris 2019 - API Gateway & Identity Providers, a Match Made in Micros...

Similar to APIsecure 2023 - The Importance of Real-Time Protection in API Security, Jeremy Ventura (ThreatX) (20)

PDF
2022 APIsecure_API Security & Fraud Detection - Are you ready?
PPTX
Defending Your IBM i Against Malware
PPTX
Why Network and Endpoint Security Isn’t Enough
PPTX
Catalyst 2015: Patrick Harding
PPTX
apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...
PDF
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
PPTX
Multi-Factor Authentication - "Moving Towards the Enterprise"
PDF
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
PDF
5 step plan to securing your APIs
PDF
API Security - Everything You Need to Know To Protect Your APIs
PPTX
F5 XC Distributed cloud Security and Application Delievery
PPTX
2022 APIsecure_Hackers with Valid Credentials
PDF
API Security Best Practices and Guidelines
PDF
F5 Web Application Security
PPTX
Layered API Security: What Hackers Don't Want You To Know
PPTX
Application security meetup k8_s security with zero trust_29072021
PDF
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
PDF
Cybersecurity update 12
PDF
Cyber security series Application Security
PDF
Information Risk and Protection
2022 APIsecure_API Security & Fraud Detection - Are you ready?
Defending Your IBM i Against Malware
Why Network and Endpoint Security Isn’t Enough
Catalyst 2015: Patrick Harding
apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
Multi-Factor Authentication - "Moving Towards the Enterprise"
Breaking Secure Mobile Applications - Hack In The Box 2014 KL
5 step plan to securing your APIs
API Security - Everything You Need to Know To Protect Your APIs
F5 XC Distributed cloud Security and Application Delievery
2022 APIsecure_Hackers with Valid Credentials
API Security Best Practices and Guidelines
F5 Web Application Security
Layered API Security: What Hackers Don't Want You To Know
Application security meetup k8_s security with zero trust_29072021
APIdays Paris 2019 - RASP for APIs and Microservices by Jean-Baptiste Aviat, ...
Cybersecurity update 12
Cyber security series Application Security
Information Risk and Protection
Ad

More from apidays (20)

PDF
apidays Munich 2025 - The Physics of Requirement Sciences Through Application...
PDF
apidays Munich 2025 - Developer Portals, API Catalogs, and Marketplaces, Miri...
PDF
apidays Munich 2025 - Making Sense of AI-Ready APIs in a Buzzword World, Andr...
PDF
apidays Munich 2025 - Integrate Your APIs into the New AI Marketplace, Senthi...
PDF
apidays Munich 2025 - The Double Life of the API Product Manager, Emmanuel Pa...
PDF
apidays Munich 2025 - Let’s build, debug and test a magic MCP server in Postm...
PDF
apidays Munich 2025 - The life-changing magic of great API docs, Jens Fischer...
PDF
apidays Munich 2025 - Automating Operations Without Reinventing the Wheel, Ma...
PDF
apidays Munich 2025 - Geospatial Artificial Intelligence (GeoAI) with OGC API...
PPTX
apidays Munich 2025 - GraphQL 101: I won't REST, until you GraphQL, Surbhi Si...
PPTX
apidays Munich 2025 - Effectively incorporating API Security into the overall...
PPTX
apidays Munich 2025 - Federated API Management and Governance, Vince Baker (D...
PPTX
apidays Munich 2025 - Agentic AI: A Friend or Foe?, Merja Kajava (Aavista Oy)
PPTX
apidays Munich 2025 - Streamline & Secure LLM Traffic with APISIX AI Gateway ...
PPTX
apidays Munich 2025 - Building Telco-Aware Apps with Open Gateway APIs, Subhr...
PPTX
apidays Munich 2025 - Building an AWS Serverless Application with Terraform, ...
PDF
apidays Helsinki & North 2025 - REST in Peace? Hunting the Dominant Design fo...
PDF
apidays Helsinki & North 2025 - Monetizing AI APIs: The New API Economy, Alla...
PDF
apidays Helsinki & North 2025 - How (not) to run a Graphql Stewardship Group,...
PDF
apidays Helsinki & North 2025 - APIs in the healthcare sector: hospitals inte...
apidays Munich 2025 - The Physics of Requirement Sciences Through Application...
apidays Munich 2025 - Developer Portals, API Catalogs, and Marketplaces, Miri...
apidays Munich 2025 - Making Sense of AI-Ready APIs in a Buzzword World, Andr...
apidays Munich 2025 - Integrate Your APIs into the New AI Marketplace, Senthi...
apidays Munich 2025 - The Double Life of the API Product Manager, Emmanuel Pa...
apidays Munich 2025 - Let’s build, debug and test a magic MCP server in Postm...
apidays Munich 2025 - The life-changing magic of great API docs, Jens Fischer...
apidays Munich 2025 - Automating Operations Without Reinventing the Wheel, Ma...
apidays Munich 2025 - Geospatial Artificial Intelligence (GeoAI) with OGC API...
apidays Munich 2025 - GraphQL 101: I won't REST, until you GraphQL, Surbhi Si...
apidays Munich 2025 - Effectively incorporating API Security into the overall...
apidays Munich 2025 - Federated API Management and Governance, Vince Baker (D...
apidays Munich 2025 - Agentic AI: A Friend or Foe?, Merja Kajava (Aavista Oy)
apidays Munich 2025 - Streamline & Secure LLM Traffic with APISIX AI Gateway ...
apidays Munich 2025 - Building Telco-Aware Apps with Open Gateway APIs, Subhr...
apidays Munich 2025 - Building an AWS Serverless Application with Terraform, ...
apidays Helsinki & North 2025 - REST in Peace? Hunting the Dominant Design fo...
apidays Helsinki & North 2025 - Monetizing AI APIs: The New API Economy, Alla...
apidays Helsinki & North 2025 - How (not) to run a Graphql Stewardship Group,...
apidays Helsinki & North 2025 - APIs in the healthcare sector: hospitals inte...
Ad

Recently uploaded (20)

PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
Introduction to Information and Communication Technology
PPTX
Digital Literacy And Online Safety on internet
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
innovation process that make everything different.pptx
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
international classification of diseases ICD-10 review PPT.pptx
DOCX
Unit-3 cyber security network security of internet system
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPT
tcp ip networks nd ip layering assotred slides
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
Internet___Basics___Styled_ presentation
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
The Internet -By the Numbers, Sri Lanka Edition
522797556-Unit-2-Temperature-measurement-1-1.pptx
SAP Ariba Sourcing PPT for learning material
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Introduction to Information and Communication Technology
Digital Literacy And Online Safety on internet
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
innovation process that make everything different.pptx
Decoding a Decade: 10 Years of Applied CTI Discipline
Sims 4 Historia para lo sims 4 para jugar
international classification of diseases ICD-10 review PPT.pptx
Unit-3 cyber security network security of internet system
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Job_Card_System_Styled_lorem_ipsum_.pptx
tcp ip networks nd ip layering assotred slides
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Internet___Basics___Styled_ presentation
RPKI Status Update, presented by Makito Lay at IDNOG 10
Introuction about ICD -10 and ICD-11 PPT.pptx
introduction about ICD -10 & ICD-11 ppt.pptx

APIsecure 2023 - The Importance of Real-Time Protection in API Security, Jeremy Ventura (ThreatX)

  • 1. THE IMPORTANCE OF REAL-TIME PROTECTION IN API SECURITY Jeremy Ventura Field CISO
  • 2. AGENDA Copyrights 2 The key challenges and risk associated with API Security Case Studies from ThreatX The importance of real-time blocking
  • 3. APIS REPRESENT A TARGET RICH ENVIRONMENT • Thousands of APIs and endpoints with limited visibility • API vulnerabilities easily exposed and discoverable • Attackers continually leverage advanced techniques against APIs • Multi-mode attacks becoming the norm 3 Increased Usage = Increased Risk
  • 4. APIS IN THE NEWS • Entity had access from November to January to an API • Data attained via API was done “without authorization” • Name, Address, Email, Phone, DoB, Account # • 37 million end users affected • More info to come but: • Lack of visibility? • Misconfiguration/Misuse? • Broken business logic? • Stolen Credentials? 4 Incidents & Breaches on the Rise
  • 5. COMPLEXITY & AUTOMATION OF ATTACKS IS EVER INCREASING 5 • Hacking is easier than ever • Industrialized hacking tools • Rent-a-bot/Solver Services • Attack-as-a-Service • Residential proxies, anonymizers • Advanced attacks are far more coordinated • Security tools do not keep up Multi-mode attacks require a fundamental shift in protection strategies Traditional OWASP Top 10 Sophisticated, multi-mode attacks
  • 6. THE THREAT OF MULTI-VECTOR ATTACKS 6 • Orchestrated attacks that span varied phases & techniques • Distributed IPs • Massive volumes • Diversionary tactics • Embedded, multi-step automation Disguise true attack through diversion, distraction & evasion
  • 7. A WORD ABOUT BOTS 7 • Bot management critical, but must evolve with attacks • Current approaches best suited for high volume, binary attacks • Heavy reliance on static threat intel feeds • APIs present new challenges • No browser injections • No Captcha or IP challenges • Attacker profiling & behavioral context critical for protection against multi- mode attacks Bots present a new challenge to protecting APIs
  • 8. TALES FROM THE THREATX SOC 8 • Large online retailer taking fire from multiple directions • Periodic mid-grade DDoS attacks • Increased login failure rates on web • High rate of rebate fraud • Goal: trigger BGP routing to bypass fraud protection for mobile APIs while the security team is distracted • Multiple best-of-breed technologies fail to identify & block attacks Attackers deploy multiple techniques to distract security & target APIs
  • 9. TALES FROM THE THREATX SOC 9 • Gaming company launching new product • Attacker engaged foreign botnet to discover potentially vulnerable API endpoints • Later during product launch, attacker deployed large ATO attack while quietly attempting vulnerability exploits • Although rotating IPs and user agents, TLS signatures & IP fingerprints detected same attacker profile to block all suspicious behavior Tracking & correlating attacker behavior – to enable real-time protection
  • 10. PROTECTING APIS STARTS WITH FOCUS ON THE ATTACKER 10 • Understanding attacker risk profile • Digital fingerprints to each unique attacker • Cumulative across multiple attack vectors • Continually evaluate risk & response • Behavioral fingerprints of an attack reveal patterns, techniques & targets Context of attack over time is key to protecting APIs
  • 11. INSIGHT & CONTEXT THROUGH CROSS PLATFORM VISIBILITY 11 • Identify unique attacker executing campaigns across multiple methods and vectors • Correlate data over time to see through deception • Understanding behaviors and intentions • Biggest challenge = enabling effective response Correlating attack patterns to identify and mitigate API risk
  • 12. BLOCKING API ATTACKS IN REAL TIME 12 • Observing attack data offline will not enable real-time protection of APIs • Often too late by the time an attack is discovered • Complexity required to identify attacks typically can’t be replicated in 3rd party firewall • Blocking single IP at a time • Responses must occur as the attack is underway – and based on insights gathered over time Real-time API protection key to defense
  • 13. API PROTECTION: KEY CAPABILITIES 13 Real-time Analysis & Response • AI/ML/Context Engine • IP Interrogation & Fingerprinting • Active Deception • Tarpit/Rate Limiting • Attacker/User Behavior Analysis • Data Flow Analysis & Enforcement • Real-time Blocking 13 API Discovery & Analysis • API Discovery • API Specification Mgt • Endpoint Usage Analysis • Endpoint Attack Metrics • Endpoint Risk Scoring Fully Integrated Attack Prevention • API Protection • Web App Protection • DDoS Protection • Bot Mgt & Mitigation • Fraud Protection Flexible Deployment Options • Inline / Agentless • Inline / Agent-based • Out-of-Band / Agentless • Hosted, Cloud, On-Premise Managed Services • Managed Cloud Platform • Managed Threat Analysis • Managed Policy Enforcement • Managed Attack Response • APIs are under siege – by mixed-mode, high volume attacks, including bots and DDoS • API observability does not = real-time protection • API protection must deliver active, real-time attack blocking • API protection should have ability to extend to broader application portfolio Can’t block? Then you’re not protecting APIs.