Speaker -B01 - 5511- Strengthening API Security in a network operator
Speaker -B01 - 5511- Strengthening API Security in a network operator
1 © 2024
Purpose of talk
● As network operators embrace NetOps there will be a
plethora of APIs available
● Network operators increasingly automating and using
APIs
● APIs by network operators need to be secure
2 © 2024
Example
3 © 2024
The API Security Environment
Existing application
security solutions not
More APIs deployed built for APIs
every day
1 Gartner: Top 10 Things Software Engineering Leaders Need to Know About APIs
2 Akamai threat researchers have identified that 31% of all traffic protected by Akamai
is API traffic
4 © 2024
What is your API landscape?
Partner APIs | B2B
North-South
Authenticated
APIs you open to
the outside
East-West APIs
Inside your organization
App A App B
App C
Website
Mobile App
5 © 2024
API Abuse Can Happen Beyond WAAP
Account Takeover
Fraud / Business
Logic Abuse
Data
Harvesting
Authentication &
Authorization Cloud Security
(API Gateway) (CWPP, CSPM)
B2B / Partner
Integration
Authenticated Users &
Unauthorized
Data Access Partners are the Riskiest
User Access
6 © 2024
Real world examples : Large mobile network
operator Data Breach
1.API used during testing got exposed.
2.API had no Authentication or Authorization mechanisms.
3.API had no rate-limiting that allowed attackers to send a large
number of requests to retrieve data.
4.Customer IDs were stored in a weak format instead of the UUID
mechanism, which allowed attackers to easily guess and request
millions of records.
7 © 2024
Hypothetical example: Abusing RIR API
8 © 2024
Real world examples : Uber: Account Takeover
• How I could Have hacked your Uber Account (Anand Prakash, 2019)
• Anand got from a phone number/email address to full account takeover
• The vulnerabilities were quickly fixed by Uber
9 © 2024
Real world examples : Uber: Account Takeover
10 © 2024
Real world examples : Uber: Account Takeover
11 © 2024
Real world examples : Uber: Account Takeover
12 © 2024
Real world examples : Scoolio: Data Exposure
• Scoolio – German student app
• API exposed PII and more for any user in the paltform
13 © 2024
Real world examples : Scoolio Vulnerability
14 © 2024
Real world examples : Coinbase
15 © 2024
Real world examples : Coinbase
16 © 2024
Real world examples : Venmo
17 © 2024
Real world examples : Venmo
https://venmo.com/api/v5/public?since=14769216
00&until=1476921660&limit=1000000
18 © 2024
Why you need API Security even if u have WAF & API Gateway ?
• Discovery of APIs in
any environment
DDOS • Determine risk posture
BAD BOT (OWASP API Top 10)
WAF
API
• Understanding API user
FIREWALL behavior
East-West
• Detect API abuse
GOOD
• Perform Investigations and
Shadow API threat hunting
East-West
Shadow API
19 © 2024
Use case Network Orchestration (NetOps) by operators
● Networks vendors
using TMForum
Open APIs
20 © 2024
Use case Network Orchestration (NetOps) by operators
21 © 2024
Use case Network Orchestration (NetOps) by operators
API SECURITY
ANALYTICS
DATA LAKE
Behavior of users of
API is monitored for
any abuses
22 © 2024
Summary
● Network operators are increasingly using API across the
organization
● Security should be a main consideration
● This talk highlights the potential abuse that could happen
● A potential architecture for API Security has been proposed
23 © 2024
Q&A
24 © 2024