SlideShare a Scribd company logo
When Failure Looks Like Success
Building an Effective API Security
Strategy
D. Keith Casey, Jr. API Problem Solver @CaseySoftware
© Okta and/or its affiliates. All rights reserved. Okta
Confidential
2
Who Am I?
© Okta and/or its affiliates. All rights reserved. Okta
Confidential
3
Who Am I?
© Okta and/or its affiliates. All rights reserved. Okta
Confidential
4
Who Am I?
© Okta and/or its affiliates. All rights reserved. Okta
Confidential
5
Who Am I?
© Okta and/or its affiliates. All rights reserved. Okta
Confidential
6
Who Am I?
So let’s talk about Failure
You?
© Okta and/or its affiliates. All rights reserved. Okta
Confidential
9
API Journey: A Maturity Model
Phase 0
Integrate internal
systems by
introducing
Private APIs
Internal advocacy &
collaboration for
internal APIs and
CoE/Governance
Phase 2
Limited API access
to partners,
resellers and
suppliers
Phase 3
Grow these APIs as
full fledged products
with external
developer access
Either monetized directly or
to reach new customers
and enter new markets.
Security Team evaluates use
cases, interfaces,
authentication, access
management, etc, etc
Phase 1
© Okta and/or its affiliates. All rights reserved. Okta
Confidential
10
API Journey: A Maturity Model
Phase 0
Integrate internal
systems by
introducing
Private APIs
Internal advocacy &
collaboration for
internal APIs and
CoE/Governance
Phase 2
Limited API access
to partners,
resellers and
suppliers
Phase 3
Grow these APIs as
full fledged products
with external
developer access
Either monetized directly or
to reach new customers
and enter new markets.
The security issue was always
there
Phase 1
How do we
secure our
APIs?
Aspect #1:
Only expose the
interfaces we need.
Aspect #2:
Only collect and share
the data we need.
Aspect #3:
Only grant access to the
people and systems we need.
Aspect #0:
Think like a Bad Guy.
© Okta and/or its affiliates. All rights reserved. Okta
Confidential
• Read the news, look at competitors
• Talk to your legal/compliance teams
• Talk to your developers about their horror stories
• Write a Black Mirror episode
How do I think like a Bad Guy?
© Okta and/or its affiliates. All rights reserved. Okta
Confidential
• Valuable data
• Accessible infrastructure
• Simple or No authentication or authorization
• Custom developed auth systems
• To act undetected/unmonitored
What does a Bad Guy want?
Use an API
Gateway
Full Lifecycle API Management
Lifecycle
What state is it in?
• How was it
designed?
• How was it built?
• Is it deployed?
• To which GWs?
• Is it live/available?
Interface
What does it
expose?
• Which resources?
• Which methods?
• Which objects?
• Which fields?
Access
Who can use it?
• Which users/groups?
• How do they
authenticate?
• Using which clients?
• In what contexts?
Consumption
How to succeed
with it?
• API Documentation?
• Debugging/errors?
• Track usage?
• Examples/SDKs?
Business
How does it drive
business goals?
• Partner CRM
• Monetization
• Marketing
• Business Analytics
API Management Capabilities
Full Lifecycle API Management
Lifecycle
What state is it in?
• How was it
designed?
• How was it built?
• Is it deployed?
• To which GWs?
• Is it live/available?
Interface
What does it
expose?
• Which resources?
• Which methods?
• Which objects?
• Which fields?
Access
Who can use it?
• Which users/groups?
• How do they
authenticate?
• Using which clients?
• In what contexts?
Consumption
How to succeed
with it?
• API Documentation?
• Debugging/errors?
• Track usage?
• Examples/SDKs?
Business
How does it drive
business goals?
• Partner CRM
• Monetization
• Marketing
• Business Analytics
API Management Capabilities
Full Lifecycle API Management
Lifecycle
What state is it in?
• How was it
designed?
• How was it built?
• Is it deployed?
• To which GWs?
• Is it live/available?
Interface
What does it
expose?
• Which resources?
• Which methods?
• Which objects?
• Which fields?
Access
Who can use it?
• Which users/groups?
• How do they
authenticate?
• Using which clients?
• In what contexts?
Consumption
How to succeed
with it?
• API Documentation?
• Debugging/errors?
• Track usage?
• Examples/SDKs?
Business
How does it drive
business goals?
• Partner CRM
• Monetization
• Marketing
• Business Analytics
API Management Capabilities
Be Smarter
about Data
© Okta and/or its affiliates. All rights reserved. Okta
Confidential
Be Smarter about Data
• Don’t collect it if you don’t have to
• Secure it in flight (SSL/TLS)
• Encrypt it at rest
23
Ref: https://www.bbc.com/news/technology-46401890
Stick to the
standards
How to Build an Effective API Security Strategy
© Okta and/or its affiliates. All rights reserved. Okta
Confidential
26
• OpenID Connect Core 1.0 (spec)
• Authorization Code, Implicit, and Hybrid flows
• OpenID Provider Metadata (spec)
• OAuth 2.0 (RFC 6749)
• Authorization Code, Implicit, Resource Owner Password, Client Credentials
• JSON Web Token (RFC 7519)
• OAuth 2.0 Dynamic Client Registration (RFC 7591)
• OAuth 2.0 Authorization Server Metadata (spec)
• OAuth 2.0 Bearer Token Usage (RFC 6750)
• OAuth 2.0 Multiple Response Types (spec)
• OAuth 2.0 Form Response Mode (spec)
• OAuth 2.0 Token Revocation (RFC 7009)
• OAuth 2.0 Token Introspection (RFC 7662)
• Proof Key for Code Exchange for OAuth Public Clients (RFC 7636)
Common OAuth/OIDC Specifications
Integrate into
your existing
processes
How to Build an Effective API Security Strategy
Closing
Thoughts
© Okta and/or its affiliates. All rights reserved. Okta
Confidential
Questions to Ask
• What is the worst thing someone can do with our API?
• What happens if our competitors get our data?
• What data do we need to collect & expose?
• Who are your users now? In a year?
• How are we monitoring for anomalies and bad behavior?
When Failure Looks Like Success
Building an Effective API Security
Strategy
D. Keith Casey, Jr. API Problem Solver @CaseySoftware
How to Build an Effective API Security Strategy

More Related Content

PPT
Self-Contained Breathing Apparatus
PDF
Epicor Enterprise Resource Planning Overview
PDF
Dagcoin whitepaper
PPTX
How to Build an Effective API Security Strategy
PDF
WSO2Con EU 2015: API Management Strategies and Best Practices
PDF
APIdays Paris 2019 - API Gateway & Identity Providers, a Match Made in Micros...
PPTX
The Platform Big Picture
PDF
Reshape Integration - Think Beyond the ESB
Self-Contained Breathing Apparatus
Epicor Enterprise Resource Planning Overview
Dagcoin whitepaper
How to Build an Effective API Security Strategy
WSO2Con EU 2015: API Management Strategies and Best Practices
APIdays Paris 2019 - API Gateway & Identity Providers, a Match Made in Micros...
The Platform Big Picture
Reshape Integration - Think Beyond the ESB

Similar to How to Build an Effective API Security Strategy (20)

PPTX
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
PPT
Six Steps To Build A Successful API
PPT
Six Steps to Build Successful APIs
PDF
CA API Developer Portal
PPTX
Secure and Optimize APIs using Azure API Management
PDF
Webcast: Deep-Dive Apigee Edge Microgateway
PDF
Keith Casey - Transform the customer experience with a modern customer identi...
PDF
How to Build, Manage, and Promote APIs
PDF
5 Pillars of Building Enterprise0grade APIs
PDF
Hyperledger Austin meetup July 10, 2018
PDF
Oracle - Hyperledger Silicon Valley meetup, June 20, 2018
PPTX
Platform for Secure Digital Business
PPTX
Global Azure 2022 - Architecting Modern Serverless APIs with Azure Functions ...
PDF
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
PDF
Proven Practices for Office 365 Deployment, Security and Management
PPTX
Platform for Secure Digital Business
PPTX
Optimizing IAM with Single Sign-On From the Cloud to On-Premise
PDF
Identiverse - Microservices Security
PDF
[Workshop] API-driven Integration
PPTX
FortiAuthenticator vs Ping Identity Guide
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
Six Steps To Build A Successful API
Six Steps to Build Successful APIs
CA API Developer Portal
Secure and Optimize APIs using Azure API Management
Webcast: Deep-Dive Apigee Edge Microgateway
Keith Casey - Transform the customer experience with a modern customer identi...
How to Build, Manage, and Promote APIs
5 Pillars of Building Enterprise0grade APIs
Hyperledger Austin meetup July 10, 2018
Oracle - Hyperledger Silicon Valley meetup, June 20, 2018
Platform for Secure Digital Business
Global Azure 2022 - Architecting Modern Serverless APIs with Azure Functions ...
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Proven Practices for Office 365 Deployment, Security and Management
Platform for Secure Digital Business
Optimizing IAM with Single Sign-On From the Cloud to On-Premise
Identiverse - Microservices Security
[Workshop] API-driven Integration
FortiAuthenticator vs Ping Identity Guide
Ad

More from Nordic APIs (20)

PPTX
How to Choose the Right API Platform - We Have the Tool You Need! - Mikkel Iv...
PPTX
Bulletproof Backend Architecture: Building Adaptive Services with Self-Descri...
PDF
Implementing Zero Trust Security in API Gateway with Cilium - Pubudu Gunatila...
PPTX
Event-Driven Architecture the Cloud-Native Way - Manuel Ottlik, HDI Global SE
PPTX
Navigating the Post-OpenAPI Era with Innovative API Design Frameworks - Danie...
PDF
Using Typespec for Open Finance Standards - Chris Wood, Ozone API
PPTX
Schema-first API Design Using Typespec - Cailin Smith, Microsoft
PPTX
Avoiding APIpocalypse; API Resiliency Testing FTW! - Naresh Jain, Xnsio
PPTX
How to Build an Integration Platform with Open Source - Magnus Hedner, Benify
PPTX
API Design First in Practise – An Experience Report - Hari Krishnan, Specmatic
PPTX
The Right Kind of API – How To Choose Appropriate API Protocols and Data Form...
PPTX
Why Frequent API Hackathons Are Key to Product Market Feedback and Go-to-Mark...
PPTX
Maximizing API Management Efficiency: The Power of Shifting Down with APIOps ...
PPTX
APIs Vs Events - Bala Bairapaka, Sandvik AB
PPTX
GraphQL in the Post-Hype Era - Daniel Hervas, Reckon Digital
PPTX
From Good API Design to Secure Design - Axel Grosse, 42Crunch
PPTX
API Revolution in IoT: How Platform Engineering Streamlines API Development -...
PPTX
Unlocking the ROI of API Platforms: What Success Actually Looks Like - Budhad...
PDF
Increase Your Productivity with No-Code GraphQL Mocking - Hugo Guerrero, Red Hat
PPTX
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Theodo ...
How to Choose the Right API Platform - We Have the Tool You Need! - Mikkel Iv...
Bulletproof Backend Architecture: Building Adaptive Services with Self-Descri...
Implementing Zero Trust Security in API Gateway with Cilium - Pubudu Gunatila...
Event-Driven Architecture the Cloud-Native Way - Manuel Ottlik, HDI Global SE
Navigating the Post-OpenAPI Era with Innovative API Design Frameworks - Danie...
Using Typespec for Open Finance Standards - Chris Wood, Ozone API
Schema-first API Design Using Typespec - Cailin Smith, Microsoft
Avoiding APIpocalypse; API Resiliency Testing FTW! - Naresh Jain, Xnsio
How to Build an Integration Platform with Open Source - Magnus Hedner, Benify
API Design First in Practise – An Experience Report - Hari Krishnan, Specmatic
The Right Kind of API – How To Choose Appropriate API Protocols and Data Form...
Why Frequent API Hackathons Are Key to Product Market Feedback and Go-to-Mark...
Maximizing API Management Efficiency: The Power of Shifting Down with APIOps ...
APIs Vs Events - Bala Bairapaka, Sandvik AB
GraphQL in the Post-Hype Era - Daniel Hervas, Reckon Digital
From Good API Design to Secure Design - Axel Grosse, 42Crunch
API Revolution in IoT: How Platform Engineering Streamlines API Development -...
Unlocking the ROI of API Platforms: What Success Actually Looks Like - Budhad...
Increase Your Productivity with No-Code GraphQL Mocking - Hugo Guerrero, Red Hat
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Theodo ...
Ad

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Machine learning based COVID-19 study performance prediction
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
cuic standard and advanced reporting.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
A Presentation on Artificial Intelligence
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
Teaching material agriculture food technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Encapsulation theory and applications.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Machine learning based COVID-19 study performance prediction
NewMind AI Weekly Chronicles - August'25 Week I
NewMind AI Monthly Chronicles - July 2025
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
cuic standard and advanced reporting.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
20250228 LYD VKU AI Blended-Learning.pptx
A Presentation on Artificial Intelligence
Understanding_Digital_Forensics_Presentation.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Teaching material agriculture food technology
Empathic Computing: Creating Shared Understanding
Chapter 3 Spatial Domain Image Processing.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Digital-Transformation-Roadmap-for-Companies.pptx
Network Security Unit 5.pdf for BCA BBA.
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

How to Build an Effective API Security Strategy

  • 1. When Failure Looks Like Success Building an Effective API Security Strategy D. Keith Casey, Jr. API Problem Solver @CaseySoftware
  • 2. © Okta and/or its affiliates. All rights reserved. Okta Confidential 2 Who Am I?
  • 3. © Okta and/or its affiliates. All rights reserved. Okta Confidential 3 Who Am I?
  • 4. © Okta and/or its affiliates. All rights reserved. Okta Confidential 4 Who Am I?
  • 5. © Okta and/or its affiliates. All rights reserved. Okta Confidential 5 Who Am I?
  • 6. © Okta and/or its affiliates. All rights reserved. Okta Confidential 6 Who Am I?
  • 7. So let’s talk about Failure
  • 9. © Okta and/or its affiliates. All rights reserved. Okta Confidential 9 API Journey: A Maturity Model Phase 0 Integrate internal systems by introducing Private APIs Internal advocacy & collaboration for internal APIs and CoE/Governance Phase 2 Limited API access to partners, resellers and suppliers Phase 3 Grow these APIs as full fledged products with external developer access Either monetized directly or to reach new customers and enter new markets. Security Team evaluates use cases, interfaces, authentication, access management, etc, etc Phase 1
  • 10. © Okta and/or its affiliates. All rights reserved. Okta Confidential 10 API Journey: A Maturity Model Phase 0 Integrate internal systems by introducing Private APIs Internal advocacy & collaboration for internal APIs and CoE/Governance Phase 2 Limited API access to partners, resellers and suppliers Phase 3 Grow these APIs as full fledged products with external developer access Either monetized directly or to reach new customers and enter new markets. The security issue was always there Phase 1
  • 11. How do we secure our APIs?
  • 12. Aspect #1: Only expose the interfaces we need.
  • 13. Aspect #2: Only collect and share the data we need.
  • 14. Aspect #3: Only grant access to the people and systems we need.
  • 15. Aspect #0: Think like a Bad Guy.
  • 16. © Okta and/or its affiliates. All rights reserved. Okta Confidential • Read the news, look at competitors • Talk to your legal/compliance teams • Talk to your developers about their horror stories • Write a Black Mirror episode How do I think like a Bad Guy?
  • 17. © Okta and/or its affiliates. All rights reserved. Okta Confidential • Valuable data • Accessible infrastructure • Simple or No authentication or authorization • Custom developed auth systems • To act undetected/unmonitored What does a Bad Guy want?
  • 19. Full Lifecycle API Management Lifecycle What state is it in? • How was it designed? • How was it built? • Is it deployed? • To which GWs? • Is it live/available? Interface What does it expose? • Which resources? • Which methods? • Which objects? • Which fields? Access Who can use it? • Which users/groups? • How do they authenticate? • Using which clients? • In what contexts? Consumption How to succeed with it? • API Documentation? • Debugging/errors? • Track usage? • Examples/SDKs? Business How does it drive business goals? • Partner CRM • Monetization • Marketing • Business Analytics API Management Capabilities
  • 20. Full Lifecycle API Management Lifecycle What state is it in? • How was it designed? • How was it built? • Is it deployed? • To which GWs? • Is it live/available? Interface What does it expose? • Which resources? • Which methods? • Which objects? • Which fields? Access Who can use it? • Which users/groups? • How do they authenticate? • Using which clients? • In what contexts? Consumption How to succeed with it? • API Documentation? • Debugging/errors? • Track usage? • Examples/SDKs? Business How does it drive business goals? • Partner CRM • Monetization • Marketing • Business Analytics API Management Capabilities
  • 21. Full Lifecycle API Management Lifecycle What state is it in? • How was it designed? • How was it built? • Is it deployed? • To which GWs? • Is it live/available? Interface What does it expose? • Which resources? • Which methods? • Which objects? • Which fields? Access Who can use it? • Which users/groups? • How do they authenticate? • Using which clients? • In what contexts? Consumption How to succeed with it? • API Documentation? • Debugging/errors? • Track usage? • Examples/SDKs? Business How does it drive business goals? • Partner CRM • Monetization • Marketing • Business Analytics API Management Capabilities
  • 23. © Okta and/or its affiliates. All rights reserved. Okta Confidential Be Smarter about Data • Don’t collect it if you don’t have to • Secure it in flight (SSL/TLS) • Encrypt it at rest 23 Ref: https://www.bbc.com/news/technology-46401890
  • 26. © Okta and/or its affiliates. All rights reserved. Okta Confidential 26 • OpenID Connect Core 1.0 (spec) • Authorization Code, Implicit, and Hybrid flows • OpenID Provider Metadata (spec) • OAuth 2.0 (RFC 6749) • Authorization Code, Implicit, Resource Owner Password, Client Credentials • JSON Web Token (RFC 7519) • OAuth 2.0 Dynamic Client Registration (RFC 7591) • OAuth 2.0 Authorization Server Metadata (spec) • OAuth 2.0 Bearer Token Usage (RFC 6750) • OAuth 2.0 Multiple Response Types (spec) • OAuth 2.0 Form Response Mode (spec) • OAuth 2.0 Token Revocation (RFC 7009) • OAuth 2.0 Token Introspection (RFC 7662) • Proof Key for Code Exchange for OAuth Public Clients (RFC 7636) Common OAuth/OIDC Specifications
  • 30. © Okta and/or its affiliates. All rights reserved. Okta Confidential Questions to Ask • What is the worst thing someone can do with our API? • What happens if our competitors get our data? • What data do we need to collect & expose? • Who are your users now? In a year? • How are we monitoring for anomalies and bad behavior?
  • 31. When Failure Looks Like Success Building an Effective API Security Strategy D. Keith Casey, Jr. API Problem Solver @CaseySoftware

Editor's Notes

  • #2: This deck is intended as a general overview of thinking about API security.
  • #11: So we need to step back and figure out how to secure our API from beginning to end, whether it’s inside our firewall or not.
  • #19: Alright, so let’s do something useful.. Let’s use an API Management Platform or API Gateway
  • #20: An API gateway does a ton of things, in this conversation, we only care about a couple of them.. Single point of access
  • #21: First, the interface management helps us choose which endpoints we’re sharing and how to interact with them. Going back to our three aspects, this addresses the first two very directly: This lets us choose and define the interfaces to share.. So we can choose whether we expose a way to delete users or just create them. Second, this lets us accept or reject input. If we’re a bank and accept pictures of receipts for processing, we can reject mp3 files or youtube videos. If we’re a major US credit reporting agency, we can detect when people are downloading our entire database user by user.
  • #22: The third aspect – only granting access to users we intend - is handled by the access management portion. Every gateway has its own user information so you can quickly add users and get started with it. Now, there is a drawback of having Yet Another User Database that we have to keep up to date but we’ll address that in a bit..
  • #23: Alright, so let’s do something useful.. Let’s use an API Management Platform or API Gateway
  • #25: The most common approach is an API key “Effectively a password sent on every request used to validate access” – Validate access could mean anything from “yes, this is a valid account” for a free API to “yes, this is a valid account and it has a positive balance” for a paid API like Mailchimp or Twilio
  • #28: The most common approach is an API key “Effectively a password sent on every request used to validate access” – Validate access could mean anything from “yes, this is a valid account” for a free API to “yes, this is a valid account and it has a positive balance” for a paid API like Mailchimp or Twilio
  • #32: This deck is intended as a general overview of how API Access Management fits within API Gateways.