SlideShare a Scribd company logo
Evolving challenges for modern
enterprise architectures 

in the age of APIs
Dinis Cruz, CISO, Photobox
April 2018
I’m a CISO focused on
securing our client’s Magic moments
by creating secure environments
that enable and accelerate the business
and contribute to the 

top and bottom line
Here are my challenges

1.How to make rational risk based decisions
2.How to create high performance teams
3.How to scale Security knowledge
4.How to drive and enable change
5.How to map data as graphs
Everything is a API
Evolving challenges for modern enterprise architectures in the age of APIs
You might
think your API
landscape
looks like this
Or like this
But in reality it
looks like this
Dependencies between APIs
and like this
Traffic patterns (who talks to to who)
How do you understand
API dependencies?
One way to do it is to break
stuff and see what happens
Netflix Chaos Monkey
Chaos Engineering is 

carefully injecting harm into 

our systems
to test the system’s ability to
respond to it.
Success story
Netflix recommendations
The best model is to use Security to
improve:
visibility , availability, data validation,
authentication, authorisation, etc…
Every API needs to
be protected
You need to think about API
Security at the Gate
Central API filtering
Outside world
But also at API level
Every API
needs to
protect
herself
Apis should trust no-one
that connects to them
that gives them data
that they depend on
We want zero-trust networks
(and zero-trust APIs)
See Google’s Beyondcorp
for a great framework
Change the defend
paradigm
The myth of the
singe point of failure
(i.e. attackers only need to run
code and find a weak spot)
Do you understand what is
going on in your APIs?
Biggest threat is not the issue,
but is not having visibility
When do you know about
security incidents? 

(or changes)
You need to know what the
attackers are 

doing on your APIs
If you don’t know what is on
the pentest report …
you have a bigger problem
(i.e. your SOC should be able to tell you)
Best Security model is one
based on
the attacker making a mistake
(i.e. a change)
Use risks to understand reality
and to make the business
owners responsible for their
decisions
Use Threat Models to
understand how your system
works and to document it
Use tests to replicate
known behaviours, attacks
and simulate changes 

(with and without random events)
Which can also called
Security tests

(which pass on vulnerable
state and on regression test)
Properties of secure
APIs
Availability
Plan for Failure
Ability to sustain failures
Validate and Sanitise
all requests
Authenticate and Authorise
all requests
Reduce capabilities and
features gracefully
Hostile to
insecure traffic
and
insecure code
Have error budgets 

(from Google SRE)
Are easy to change
Are easy to refactor
(make changes with confidence)
Pushes to production 

happen minutes
(fully tested and 100x a day (if needed))
The bigger they
get the faster they go


(it is smooth and safe to make changes)
Have 99% change coverage
Change coverage
What matters is
change coverage
If you make changes
and they are not detected
you are just making
random changes
Every change you make
has to have a respective
test change 

(much better pair programming model)
Two more little
things
See Photobox
Group Security
blog for real-
world examples
of how we think
and operate
https://pbx-group-security.com
We are hiring :)

Head of InfoSec
Senior AWS Security
Engineer
https://pbx-group-security.com/roles/
I’m writing a book and would
really appreciate your feedback
https://leanpub.com/generation-z
Thanks
Any questions
@DinisCruz

More Related Content

PDF
How to not fail at security data analytics (by CxOSidekick)
PDF
Using security to drive chaos engineering - April 2018
PPTX
6 Most Common Threat Modeling Misconceptions
PPTX
Information Security Life Cycle
PPTX
Application Security at DevOps Speed and Portfolio Scale
PPTX
Should You Use Security Point Solutions?
PPTX
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
PPTX
TDC PoA submission
How to not fail at security data analytics (by CxOSidekick)
Using security to drive chaos engineering - April 2018
6 Most Common Threat Modeling Misconceptions
Information Security Life Cycle
Application Security at DevOps Speed and Portfolio Scale
Should You Use Security Point Solutions?
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
TDC PoA submission

What's hot (20)

PPTX
2017-11 Three Ways of Security - OWASP London
PDF
SHOWDOWN: Threat Stack vs. Red Hat AuditD
PPTX
It All Started With a Wager About System Upgrades
PDF
Secure Software Development Lifecycle - Devoxx MA 2018
PPTX
The path of secure software by Katy Anton
PDF
Scaling security in a cloud environment v0.5 (Sep 2017)
PDF
5 Important Secure Coding Practices
PDF
4 Steps to Effectively Integrate DevOps Workflows With Cloud Security Practices
PDF
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
PPTX
Assess all the things
PDF
The Intersection of Security & DevOps
PDF
Threat Modeling workshop by Robert Hurlbut
ODP
Basic of SSDLC
PPTX
The road goes ever on and on by Ciaran Conliffe
PPT
Software Security Engineering
PDF
Threat Modeling: Best Practices
PDF
Application Security Risk Assessment
PDF
SentinelOne Buyers Guide
PPTX
Secure Design: Threat Modeling
PDF
Application Security at DevOps Speed - DevOpsDays Singapore 2016
2017-11 Three Ways of Security - OWASP London
SHOWDOWN: Threat Stack vs. Red Hat AuditD
It All Started With a Wager About System Upgrades
Secure Software Development Lifecycle - Devoxx MA 2018
The path of secure software by Katy Anton
Scaling security in a cloud environment v0.5 (Sep 2017)
5 Important Secure Coding Practices
4 Steps to Effectively Integrate DevOps Workflows With Cloud Security Practices
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Assess all the things
The Intersection of Security & DevOps
Threat Modeling workshop by Robert Hurlbut
Basic of SSDLC
The road goes ever on and on by Ciaran Conliffe
Software Security Engineering
Threat Modeling: Best Practices
Application Security Risk Assessment
SentinelOne Buyers Guide
Secure Design: Threat Modeling
Application Security at DevOps Speed - DevOpsDays Singapore 2016
Ad

Similar to Evolving challenges for modern enterprise architectures in the age of APIs (20)

PPTX
CompTIA CySA Domain 3 Security Operations and Monitoring.pptx
PPTX
Security engineering 101 when good design & security work together
PPTX
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
PDF
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
PDF
Alienvault how to build a security operations center (on a budget) (2017, a...
PPTX
Appsec2013 assurance tagging-robert martin
PDF
What Every Developer And Tester Should Know About Software Security
PPTX
Hacker Halted Miami , USA 2010
PDF
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
PPSX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PPTX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PPTX
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
PDF
How to Become a Cyber Security Analyst in 2021..
PPTX
Securing Underprotected APIs - Deja vu Security
PPT
Software Security in the Real World
PDF
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
PDF
Cybersecurity Basics for Non-Techie Startup Founders
PDF
Security Shift Leftmost - Secure Architecture.pdf
PPS
BISS - 11nov2011
DOCX
Project Quality-SIPOCSelect a process of your choice and creat.docx
CompTIA CySA Domain 3 Security Operations and Monitoring.pptx
Security engineering 101 when good design & security work together
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Alienvault how to build a security operations center (on a budget) (2017, a...
Appsec2013 assurance tagging-robert martin
What Every Developer And Tester Should Know About Software Security
Hacker Halted Miami , USA 2010
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
How to Become a Cyber Security Analyst in 2021..
Securing Underprotected APIs - Deja vu Security
Software Security in the Real World
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Cybersecurity Basics for Non-Techie Startup Founders
Security Shift Leftmost - Secure Architecture.pdf
BISS - 11nov2011
Project Quality-SIPOCSelect a process of your choice and creat.docx
Ad

More from Dinis Cruz (20)

PDF
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
PDF
Glasswall - Safety and Integrity Through Trusted Files
PDF
Glasswall - How to Prevent, Detect and React to Ransomware incidents
PDF
The benefits of police and industry investigation - NPCC Conference
PDF
Serverless Security Workflows - cyber talks - 19th nov 2019
PDF
Modern security using graphs, automation and data science
PDF
Using Wardley Maps to Understand Security's Landscape and Strategy
PDF
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
PDF
Making fact based decisions and 4 board decisions (Oct 2019)
PDF
CISO Application presentation - Babylon health security
PDF
Using OWASP Security Bot (OSBot) to make Fact Based Security Decisions
PDF
GSBot Commands (Slack Bot used to access Jira data)
PDF
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6
PDF
OSBot - Data transformation workflow (from GSheet to Jupyter)
PDF
Jira schemas - Open Security Summit (Working Session 21th May 2019)
PDF
Template for "Sharing anonymised risk theme dashboards v0.8"
PDF
Owasp and summits (may 2019)
PDF
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...
PDF
Open security summit 2019 owasp london 25th feb
PDF
Owasp summit 2019 - OWASP London 25th feb
Map camp - Why context is your crown jewels (Wardley Maps and Threat Modeling)
Glasswall - Safety and Integrity Through Trusted Files
Glasswall - How to Prevent, Detect and React to Ransomware incidents
The benefits of police and industry investigation - NPCC Conference
Serverless Security Workflows - cyber talks - 19th nov 2019
Modern security using graphs, automation and data science
Using Wardley Maps to Understand Security's Landscape and Strategy
Dinis Cruz (CV) - CISO and Transformation Agent v1.2
Making fact based decisions and 4 board decisions (Oct 2019)
CISO Application presentation - Babylon health security
Using OWASP Security Bot (OSBot) to make Fact Based Security Decisions
GSBot Commands (Slack Bot used to access Jira data)
(OLD VERSION) Dinis Cruz (CV) - CISO and Transformation Agent v0.6
OSBot - Data transformation workflow (from GSheet to Jupyter)
Jira schemas - Open Security Summit (Working Session 21th May 2019)
Template for "Sharing anonymised risk theme dashboards v0.8"
Owasp and summits (may 2019)
Creating a graph based security organisation - Apr 2019 (OWASP London chapter...
Open security summit 2019 owasp london 25th feb
Owasp summit 2019 - OWASP London 25th feb

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Getting Started with Data Integration: FME Form 101
PPTX
A Presentation on Artificial Intelligence
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Approach and Philosophy of On baking technology
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation theory and applications.pdf
PPTX
1. Introduction to Computer Programming.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Big Data Technologies - Introduction.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Getting Started with Data Integration: FME Form 101
A Presentation on Artificial Intelligence
Mobile App Security Testing_ A Comprehensive Guide.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Reach Out and Touch Someone: Haptics and Empathic Computing
“AI and Expert System Decision Support & Business Intelligence Systems”
Approach and Philosophy of On baking technology
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation theory and applications.pdf
1. Introduction to Computer Programming.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Per capita expenditure prediction using model stacking based on satellite ima...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Big Data Technologies - Introduction.pptx
SOPHOS-XG Firewall Administrator PPT.pptx

Evolving challenges for modern enterprise architectures in the age of APIs