f5 73024 Final Deck - 995070
f5 73024 Final Deck - 995070
Keiron Shepherd
Regional Solution Architect, F5
Digital transformation
3 ©2024 F5
APIs are the connective tissue...
API
API
API
4 ©2024 F5
... for modern apps and digital experiences
UI
UI API
3rd Party Service
Data Access
Layer
Microservices Microservices Microservices
5 ©2024 F5
Modern apps and APIs drive complexity
API
Edge
6 ©2024 F5
API threats
7 ©2024 F5
APIs are risky by definition
Open by design – APIs are created to share Expose extra data – Developers build flexible APIs
access to data and applications that can provide more data than is required
Larger attack surface – Every API and endpoint Predictable structure – APIs adhere to logical
expands the potential attack surface architectures (REST) making them easy to probe
Difficult to observe – API attacks can evolve Lack protections – APIs are often deployed
slowly with small requests over weeks or months without basic protections like access control
8 ©2024 F5
OWASP Top 10 API Security Risks – 2023
API1 – Broken Object Level Authorization API6 – Unrestricted Access to Sensitive Business Flows
9 ©2024 F5
API security risks of greatest concern
11 ©2024 F5
Attack example
user1
• Attempt to access “objects” / get data
401 Unauthorized
without authentication user2 /login GET
200 OK
12 ©2024 F5
Attack example
{
"id": "019898-886878-878787-578588",
"first_name": "alexis",
?
"last_name": "da costa",
"address": "16 bis rue Champ Lagarde",
"is_admin": true,
"is_sso": true,
"permission_type": "admin"
}
13 ©2024 F5
API security challenges
14 ©2024 F5
Existing tactics for securing APIs are insufficient
Many organisations have a patchwork of security controls in place
Mitigates threats and bad actors Aggregates, manages, and directs incoming API requests
Interprets API-specific protocols Provides basic security and access control
Only protects what is in line (traffic it inspects) Fails to protect against advanced threats
Does not extend to code development Unable to quantify API risks
Does not help find and monitor all APIs
15 ©2024 F5
API Security
Key capabilities
Discover
API Gateway
Dynamically learn and document API endpoints
Monitor
API Gateway
Continuously inspect and identify anomalies with
API endpoints
API Security
Secure
API Gateway
Clients
API Gateway
16 ©2024 F5
It is critical to integrate API security into the API dev pipeline
Plan / Code Release / Deploy
Build
Operate
Test Monitor
Development SecOps
Day 0-n Day 0 90 days between Pen-Tests Day 90 n weeks of exposure Day 90+n
18 ©2024 F5
API discovery
19 ©2024 F5
API discovery in code
Shift left
20 ©2024 F5
API discovery in runtime
Inventory and shadow
Inventory
Shadow
21 ©2024 F5
Challenge – Detect and adapt drifts in API definitions
Reduce time to protect
enabled
API Discovery
APPDEV
enabled
API Discovery
V2.0 V2.0
APPDEV
DRIFT
? DRIFT discovered
and applied
V1.0 SECOPS
SECOPS
22 ©2024 F5
API discovery from external scanning
23 ©2024 F5
API enforcement
24 ©2024 F5
Behavioural
analysis of API
endpoints
25 ©2024 F5
OpenAPI spec enforcement
Automatically enforce API schema and a positive
security model
26 ©2024 F5
OpenAPI spec enforcement
Enforce known
API Validation
endpoints
GET GET
GET
/animals /animals
/locations GET
POST
/colors /locations
27 ©2024 F5
Security across distributed environments
PUBLIC CLOUD
Integrated web app
and API protection
API
PRIVATE DATA CENTER
Users Internet
28 ©2024 F5
API and AI workloads
29 ©2024 F5
Future of enterprise computing and application security
30 ©2024 F5
AI brings a whole new set of distributed apps and APIs
... which amplifies multicloud complexity and security risk
31 ©2024 F5
Enterprise adoption of AI technologies
... will unleash a flood of new AI-driven apps and an even greater number of APIs
API
AWS SaaS
API
Azure Colocation
API
API API
Data centers
Google API Traditional &
Cloud Private Cloud
API
API
API
API
Edge
32 ©2024 F5
Summary
33 ©2024 F5
Key takeaways
API protection applies along all API security must be deployable and
the API development lifecycle consumable in any environment
34 ©2024 F5
Questions?
Thank you for attending this webinar!
Walk in Ready
Add Exam Peace of Mind Protection for the assurance of
a second sitting, if needed.
https://my.isc2.org/s/Dashboard/Preferences
https://www.isc2.org/candidate
Image: Joybot via Wikimedia Commons, The Blue
Screen of Death in the Wild, CC BY-SA 2.0 DEED.
We’re currently
experiencing
difficulties.
technical