SlideShare a Scribd company logo
2
Most read
5
Most read
16
Most read
How Secure Are Your APIs?
Kevin Ford
Apigee | Google Cloud
Today’s Presenter
APIs Are Under Attack
3
• Standard Interface
• Consistent Resource
model
• Easy Programmability
• Published Documentation
• Mobile App Proliferation
Proprietary and confidential
API Attacks That Made the News
“An Instagram Hack Hit Millions of
Accounts, and Victims’ Phone
Numbers are Now for Sale.”
“No Butts About It, Some Pinterest
Users Have Been Hacked.”
“Three Million Moonpig Accounts
Exposed by Flaw.”
“Nissan Leaf Hackable Through
Insecure APIs.”
“Thieves Stole Taxpayer Data from
IRS ‘Get Transcript’ Service.”
Layered Security and Governance
Backend
RBAC management
IDM Integration
Global Policies
User Provisioning
AD / LDAP
Groups
Quota/Spike Arrest
SQL threat protection
JSON bomb protection
IP based restrictions
Bot Detection (public today)
Data Security
Two-way TLS
API key
OAuth2
Threat Protection
Identity Mgmt & Governance
Management
Server
Portal Analytics
API MANAGEMENT
Data Security
Two-way TLS
IP Access Control
Logging & Auditing
Data Security
Org Boundaries
Encryption
SOC 2, PCI-DSS, HIPAA
Access Control
OAuth2
API Key Verification
IP Access Control
Logging & Auditing
Partners/
Apps
Signs of Attack on APIs
• Persistent attempts from same IP
• Unusual error rates
• Suspicious client requests
• Data crawling
• Key harvesting
• Activity bursts
• Geographical patterns
• Brute force attacks
• Bots probing for API security weakness
• Competitors scraping price data
• Credential stuffing
• Abuse of guest accounts
• Bot traffic skewing analytics and KPIs
• Using compromised API keys to access
private APIs
• Dictionary-type attacks
• Man-in-the-Middle attacks
Backend
Systems
Apigee
7
WAF
API Key
Access
Token
User Agent
Contextual
Volume
x
x
x
x
x
x
x
x
* Other
Attributes Data
Warehouse
CRM, ERP, etc.
SOA
Microservices
Why Traditional Approaches Fail
Solution: Dedicated API Security Infrastructure
APIs need a dedicated security
infrastructure to protect against the
increasing threat of malicious
behavior.
Once is happenstance. Twice is coincidence. The
third time it’s enemy action.
Ian Fleming
Intelligent
behavior
detection to
protect APIs
from attack.
9
Apigee Sense
How does Apigee Sense Protect your APIs?
● Purpose built for APIs
● Uses behavior-based rules
and algorithms
● Detects anomalous
behavior patterns at the API
layer
● Complete closed-loop
system Takes actions
based on rules specified by
administrators
Intelligent
Apigee Sense
• Studies call patterns from API
metadata
• Algorithms detect anomalies
• Analyzes customer traffic over
time
Behavior Detection
Apigee Sense
• Detects behavior
• Finds anomalies
• Proactively identifies threats
• Examines metadata
• Characterizes requests
• Flags suspicious requests
• Administrators apply desired
action for a given behavior
Hackers
Brute Force Attacks
Protect APIs
Apigee Sense
• Alerts teams
• Tags or blocks
• Takes Action based on admin
policies
• Closed-loop system
Closed Loop Protection:
Handle Flagged Requests via Configuration Handle Flagged Requests via Code
Honeypot, Conditional Routing,
Callouts, Logging
Flexible Protection
A Secure Solution
A Secure Solution… With Extreme Visibility
The Best Defense Is A Good Offense
Questions?

More Related Content

PDF
Apigee Demo: API Platform Overview
PDF
Architecting an Enterprise API Management Strategy
PPTX
Apigee Edge Overview and Roadmap
PPTX
API Management in Digital Transformation
PPTX
API Management Within a Microservices Architecture
PPTX
Apigee Products Overview
PPTX
API Strategy Introduction
PPTX
API Security Lifecycle
Apigee Demo: API Platform Overview
Architecting an Enterprise API Management Strategy
Apigee Edge Overview and Roadmap
API Management in Digital Transformation
API Management Within a Microservices Architecture
Apigee Products Overview
API Strategy Introduction
API Security Lifecycle

What's hot (20)

PPTX
Apigee Edge Product Demo
PPTX
API Best Practices
PPTX
How to Execute a Successful API Strategy
PDF
Definitive Guide to API Management
PDF
API strategy with IBM API connect
PDF
KPIs for APIs (and how API Calls are the new Web Hits, and you may be measuri...
PDF
apidays Singapore 2023 - State of the API Industry, Manjunath Bhat, Gartner
PPSX
APIs as a Product Strategy
PPTX
What do you mean by “API as a Product”?
PPTX
Deep-Dive: Secure API Management
PDF
MuleSoft Event Driven Architecture (EDA Patterns in MuleSoft) - VirtualMuleys63
PPTX
How to Execute a Successful API Strategy
PDF
API Management - Why it matters!
PDF
API Governance
PPTX
Api-First service design
PDF
API Management Solution Powerpoint Presentation Slides
PDF
API Monetization
PDF
API Security Best Practices & Guidelines
PPTX
Driving API Economy with Apigee.pptx
Apigee Edge Product Demo
API Best Practices
How to Execute a Successful API Strategy
Definitive Guide to API Management
API strategy with IBM API connect
KPIs for APIs (and how API Calls are the new Web Hits, and you may be measuri...
apidays Singapore 2023 - State of the API Industry, Manjunath Bhat, Gartner
APIs as a Product Strategy
What do you mean by “API as a Product”?
Deep-Dive: Secure API Management
MuleSoft Event Driven Architecture (EDA Patterns in MuleSoft) - VirtualMuleys63
How to Execute a Successful API Strategy
API Management - Why it matters!
API Governance
Api-First service design
API Management Solution Powerpoint Presentation Slides
API Monetization
API Security Best Practices & Guidelines
Driving API Economy with Apigee.pptx
Ad

Similar to How Secure Are Your APIs? (20)

PDF
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...
PDF
API Security - Everything You Need to Know To Protect Your APIs
PDF
APIsecure 2023 - The Importance of Real-Time Protection in API Security, Jere...
PPTX
Layered API Security: What Hackers Don't Want You To Know
PPTX
Data-driven Security: Protect APIs from Adaptive Threats
PDF
Outpost24 webinar Why API security matters and how to get it right.pdf
PDF
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
PDF
5 step plan to securing your APIs
PPTX
Mining API Traffic Metadata
PDF
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
PPTX
2022 APIsecure_Hackers with Valid Credentials
PPTX
apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...
PPTX
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
PPTX
apidays Paris 2024 - Layered Approach of API Security Strategies and its Busi...
PDF
7 Best Practices for Secure API Development .pdf
DOCX
7 Best Practices for Secure API Development .docx
PDF
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
PPTX
Outpost24 webinar - Api security
PPTX
Combatting API Vulnerabilities with the 3 Pillars of API Security
PDF
How to Achieve Agile API Security
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...
API Security - Everything You Need to Know To Protect Your APIs
APIsecure 2023 - The Importance of Real-Time Protection in API Security, Jere...
Layered API Security: What Hackers Don't Want You To Know
Data-driven Security: Protect APIs from Adaptive Threats
Outpost24 webinar Why API security matters and how to get it right.pdf
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
5 step plan to securing your APIs
Mining API Traffic Metadata
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
2022 APIsecure_Hackers with Valid Credentials
apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
apidays Paris 2024 - Layered Approach of API Security Strategies and its Busi...
7 Best Practices for Secure API Development .pdf
7 Best Practices for Secure API Development .docx
apidays LIVE London 2021 - Application to API Security, drivers to the Shift ...
Outpost24 webinar - Api security
Combatting API Vulnerabilities with the 3 Pillars of API Security
How to Achieve Agile API Security
Ad

More from Apigee | Google Cloud (20)

PDF
Magazine Luiza at a glance (1)
PPTX
Monetization: Unlock More Value from Your APIs
PDF
Ticketmaster at a glance
PDF
AccuWeather: Recasting API Experiences in a Developer-First World
PDF
Which Application Modernization Pattern Is Right For You?
PPTX
Apigee Product Roadmap Part 2
PPTX
The Four Transformative Forces of the API Management Market
PDF
Walgreens at a glance
PDF
Apigee Edge: Intro to Microgateway
PDF
Managing the Complexity of Microservices Deployments
PDF
Pitney Bowes at a glance
PPTX
Microservices Done Right: Key Ingredients for Microservices Success
PDF
Adapt or Die: Opening Keynote with Chet Kapoor
PDF
Adapt or Die: Keynote with Greg Brail
PDF
Adapt or Die: Keynote with Anant Jhingran
PDF
London Adapt or Die: Opening Keynot
PDF
London Adapt or Die: Lunch keynote
PDF
London Adapt or Die: Closing Keynote — Adapt Now!
PPTX
London adapt or-die opening keynote chet kapoor
PPTX
London Adapt or Die: Opening Keynote with Chet Kapoor
Magazine Luiza at a glance (1)
Monetization: Unlock More Value from Your APIs
Ticketmaster at a glance
AccuWeather: Recasting API Experiences in a Developer-First World
Which Application Modernization Pattern Is Right For You?
Apigee Product Roadmap Part 2
The Four Transformative Forces of the API Management Market
Walgreens at a glance
Apigee Edge: Intro to Microgateway
Managing the Complexity of Microservices Deployments
Pitney Bowes at a glance
Microservices Done Right: Key Ingredients for Microservices Success
Adapt or Die: Opening Keynote with Chet Kapoor
Adapt or Die: Keynote with Greg Brail
Adapt or Die: Keynote with Anant Jhingran
London Adapt or Die: Opening Keynot
London Adapt or Die: Lunch keynote
London Adapt or Die: Closing Keynote — Adapt Now!
London adapt or-die opening keynote chet kapoor
London Adapt or Die: Opening Keynote with Chet Kapoor

Recently uploaded (20)

PDF
Advanced IT Governance
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
KodekX | Application Modernization Development
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Advanced IT Governance
“AI and Expert System Decision Support & Business Intelligence Systems”
Reach Out and Touch Someone: Haptics and Empathic Computing
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
NewMind AI Weekly Chronicles - August'25 Week I
The AUB Centre for AI in Media Proposal.docx
Spectral efficient network and resource selection model in 5G networks
GamePlan Trading System Review: Professional Trader's Honest Take
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
KodekX | Application Modernization Development
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
20250228 LYD VKU AI Blended-Learning.pptx
cuic standard and advanced reporting.pdf
Approach and Philosophy of On baking technology
Mobile App Security Testing_ A Comprehensive Guide.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

How Secure Are Your APIs?

  • 1. How Secure Are Your APIs? Kevin Ford Apigee | Google Cloud
  • 3. APIs Are Under Attack 3 • Standard Interface • Consistent Resource model • Easy Programmability • Published Documentation • Mobile App Proliferation
  • 4. Proprietary and confidential API Attacks That Made the News “An Instagram Hack Hit Millions of Accounts, and Victims’ Phone Numbers are Now for Sale.” “No Butts About It, Some Pinterest Users Have Been Hacked.” “Three Million Moonpig Accounts Exposed by Flaw.” “Nissan Leaf Hackable Through Insecure APIs.” “Thieves Stole Taxpayer Data from IRS ‘Get Transcript’ Service.”
  • 5. Layered Security and Governance Backend RBAC management IDM Integration Global Policies User Provisioning AD / LDAP Groups Quota/Spike Arrest SQL threat protection JSON bomb protection IP based restrictions Bot Detection (public today) Data Security Two-way TLS API key OAuth2 Threat Protection Identity Mgmt & Governance Management Server Portal Analytics API MANAGEMENT Data Security Two-way TLS IP Access Control Logging & Auditing Data Security Org Boundaries Encryption SOC 2, PCI-DSS, HIPAA Access Control OAuth2 API Key Verification IP Access Control Logging & Auditing Partners/ Apps
  • 6. Signs of Attack on APIs • Persistent attempts from same IP • Unusual error rates • Suspicious client requests • Data crawling • Key harvesting • Activity bursts • Geographical patterns • Brute force attacks • Bots probing for API security weakness • Competitors scraping price data • Credential stuffing • Abuse of guest accounts • Bot traffic skewing analytics and KPIs • Using compromised API keys to access private APIs • Dictionary-type attacks • Man-in-the-Middle attacks
  • 7. Backend Systems Apigee 7 WAF API Key Access Token User Agent Contextual Volume x x x x x x x x * Other Attributes Data Warehouse CRM, ERP, etc. SOA Microservices Why Traditional Approaches Fail
  • 8. Solution: Dedicated API Security Infrastructure APIs need a dedicated security infrastructure to protect against the increasing threat of malicious behavior. Once is happenstance. Twice is coincidence. The third time it’s enemy action. Ian Fleming
  • 10. How does Apigee Sense Protect your APIs? ● Purpose built for APIs ● Uses behavior-based rules and algorithms ● Detects anomalous behavior patterns at the API layer ● Complete closed-loop system Takes actions based on rules specified by administrators
  • 11. Intelligent Apigee Sense • Studies call patterns from API metadata • Algorithms detect anomalies • Analyzes customer traffic over time
  • 12. Behavior Detection Apigee Sense • Detects behavior • Finds anomalies • Proactively identifies threats • Examines metadata • Characterizes requests • Flags suspicious requests • Administrators apply desired action for a given behavior Hackers Brute Force Attacks
  • 13. Protect APIs Apigee Sense • Alerts teams • Tags or blocks • Takes Action based on admin policies • Closed-loop system
  • 15. Handle Flagged Requests via Configuration Handle Flagged Requests via Code Honeypot, Conditional Routing, Callouts, Logging Flexible Protection
  • 17. A Secure Solution… With Extreme Visibility
  • 18. The Best Defense Is A Good Offense