0% found this document useful (0 votes)
13 views42 pages

f5 73024 Final Deck - 995070

The document discusses the importance of API security in the context of modern applications and the increasing complexity of digital environments. It highlights the various risks associated with APIs, including common vulnerabilities and recent breaches, while emphasizing the need for integrated security solutions throughout the API development lifecycle. Key takeaways include the role of AI in enhancing API security and the necessity for deployable security measures across diverse environments.

Uploaded by

amaranthmalia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views42 pages

f5 73024 Final Deck - 995070

The document discusses the importance of API security in the context of modern applications and the increasing complexity of digital environments. It highlights the various risks associated with APIs, including common vulnerabilities and recent breaches, while emphasizing the need for integrated security solutions throughout the API development lifecycle. Key takeaways include the role of AI in enhancing API security and the necessity for deployable security measures across diverse environments.

Uploaded by

amaranthmalia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

Shielding Your APIs:

Practical Tips and AI-Powered Solutions


Keiron Shepherd: Regional Solution Architect, F5
Brandon Dunlap: Moderator
Shielding Your APIs: Practical
Tips and AI-Powered Solutions

Keiron Shepherd
Regional Solution Architect, F5
Digital transformation

Trends driving The rise of modern apps


architectural
complexity and
API sprawl IoT and edge computing

The rise of generative AI

3 ©2024 F5
APIs are the connective tissue...

API
API

Edge API API Data Center


Modern Apps Legacy and Modern Apps

CDN Public Cloud


API Modern, Legacy, and Cloud-Native Apps
Modern and Legacy Apps
API
API

API

4 ©2024 F5
... for modern apps and digital experiences

UI
UI API
3rd Party Service

Business Logic API API


API API

Data Access
Layer
Microservices Microservices Microservices

Architectural complexity | Larger attack surface | Data exposure

5 ©2024 F5
Modern apps and APIs drive complexity

AWS API SaaS

• More complex architectures and


expanded attack surface API API API

API

• Microservices and their APIs change Azure


API
Colocation
more rapidly and independently API

• More attacks are logic-based,


bypassing rule-based defences API API

• Patchwork of point-solutions leads Google API


Data Centers
Cloud Traditional and
to blind spots and inconsistent API Private Cloud
security posture API
API

Edge

6 ©2024 F5
API threats

7 ©2024 F5
APIs are risky by definition

Open by design – APIs are created to share Expose extra data – Developers build flexible APIs
access to data and applications that can provide more data than is required

Larger attack surface – Every API and endpoint Predictable structure – APIs adhere to logical
expands the potential attack surface architectures (REST) making them easy to probe

Difficult to observe – API attacks can evolve Lack protections – APIs are often deployed
slowly with small requests over weeks or months without basic protections like access control

8 ©2024 F5
OWASP Top 10 API Security Risks – 2023

API1 – Broken Object Level Authorization API6 – Unrestricted Access to Sensitive Business Flows

API2 – Broken Authentication API7 – Server Side Request Forgery

API3 – Broken Object Property Level Authorization API8 – Security Misconfiguration

API4 – Unrestricted Ressource Consumption API9 – Improper Inventory Management

API5 – Broken Function Level Authorization API10 – Unsafe Consumption of APIs

9 ©2024 F5
API security risks of greatest concern

Multiple choices allowed.

10 ©2024 F5 Source: 2023 State of the API Report, Postman


Recent API breaches: Scraping at scale

Facebook 2021 Twitter 2021


• API used to link phone numbers • API used to link phone numbers
• Leaked over 500M accounts and email addresses
• Millions of accounts leaked

Trello 2021 Dell 2024


• API flaw • Partner API
• Lost over 15M accounts • Queried 5,000
• For three weeks

11 ©2024 F5
Attack example

user1
• Attempt to access “objects” / get data
401 Unauthorized
without authentication user2 /login GET

• Find and re-use successful logins 401 Unauthorized

(access token) user3 /login GET

200 OK

• Static token without expiration /login GET

• Weak JWT configuration


user3

• No PKCE on client side (Oauth) 200 OK


GET
?
POST
/profil
PUT
DEL

12 ©2024 F5
Attack example

• Modify object data which shouldn’t be


accessible without authorisation user1

• Change object properties to escalate 200 OK


GET
priviledges /customer/profile
user1
• Add “roles” or permission 200 OK
PUT
/customer/profile

{
"id": "019898-886878-878787-578588",
"first_name": "alexis",
?
"last_name": "da costa",
"address": "16 bis rue Champ Lagarde",
"is_admin": true,
"is_sso": true,
"permission_type": "admin"
}

13 ©2024 F5
API security challenges

14 ©2024 F5
Existing tactics for securing APIs are insufficient
Many organisations have a patchwork of security controls in place

Can a WAF protect APIs? What is the function of an API Gateway?

Mitigates threats and bad actors Aggregates, manages, and directs incoming API requests
Interprets API-specific protocols Provides basic security and access control

Only protects what is in line (traffic it inspects) Fails to protect against advanced threats
Does not extend to code development Unable to quantify API risks
Does not help find and monitor all APIs

15 ©2024 F5
API Security
Key capabilities

Discover
API Gateway
Dynamically learn and document API endpoints

Monitor
API Gateway
Continuously inspect and identify anomalies with
API endpoints
API Security

Secure
API Gateway
Clients

Enforce API behaviour and block/limit undesirable or


malicious traffic

API Gateway

16 ©2024 F5
It is critical to integrate API security into the API dev pipeline
Plan / Code Release / Deploy

Build

Operate

Test Monitor

SHIFT LEFT SHIELD RIGHT

API scanning API discovery and Runtime protection


API code analysis
and testing traffic analysis and enforcement
17 ©2024 F5
A shift left approach is critical to reduce risks and API exposure
Solving for the built-in 90-day exposure window

Developer introduces Vulnerable API Pen-Tester discovered the


Detection Response
a new PII vulnerability deployed to Prod vulnerability exposing customer data

Development SecOps

Day 0-n Day 0 90 days between Pen-Tests Day 90 n weeks of exposure Day 90+n

Eliminate >90 days of exposure Without early detection and


Introducing continuous and automated API security remediation, the “negotiations”
between security and dev start here

18 ©2024 F5
API discovery

19 ©2024 F5
API discovery in code
Shift left

20 ©2024 F5
API discovery in runtime
Inventory and shadow

Inventory

• Defined by Swagger Inventory


• Enforceable (validation)

Shadow

• Discovered, not inventoried Shadow


• Enforceable (fall through validation)

21 ©2024 F5
Challenge – Detect and adapt drifts in API definitions
Reduce time to protect

enabled
API Discovery
APPDEV

enabled
API Discovery
V2.0 V2.0
APPDEV
DRIFT

V1.0 V2.0 SECOPS

? DRIFT discovered
and applied

V1.0 SECOPS

SECOPS

Current version New version Detect / Inform Adjust / Protect

22 ©2024 F5
API discovery from external scanning

• Discovering and mapping public-facing services is


critical to avoid cyber attacks and data breaches

• Recon in web app scanning to automatically create


accurate, complete inventories of apps and API
services across domains
• Reducing attack surface and protecting sensitive
data in apps

23 ©2024 F5
API enforcement

24 ©2024 F5
Behavioural
analysis of API
endpoints

• Monitor and baseline API


behaviour continuously with
machine learning (ML) engine

• Identify anomalies (e.g., spikes


in request rates, latency,
response size, etc.)

• Identify any PII in API


communications

25 ©2024 F5
OpenAPI spec enforcement
Automatically enforce API schema and a positive
security model

• Upload existing API schema for


enforcement of appropriate API behaviour

Avoid wasting time on configuring and


Source: https://swagger.io/

deploying APIs

• Allow valid requests and block any method


that the schema doesn’t support

• Import via UI or the API and integrate into


a CI/CD pipeline

26 ©2024 F5
OpenAPI spec enforcement

Enforce known
API Validation
endpoints
GET GET

GET
/animals /animals

Req and Resp body


POST

/locations GET

POST

/colors /locations

27 ©2024 F5
Security across distributed environments

SaaS Console – Centralised


management and analytics

PUBLIC CLOUD
Integrated web app
and API protection

API
PRIVATE DATA CENTER
Users Internet

Integrated web app Internal Apps


and API protection

28 ©2024 F5
API and AI workloads

29 ©2024 F5
Future of enterprise computing and application security

Multicloud API-first Powered by AI

30 ©2024 F5
AI brings a whole new set of distributed apps and APIs
... which amplifies multicloud complexity and security risk

AI is a powerful accelerant for each of these secular trends

Growing number of applications

Growing number of APIs in


front of applications

Increasing distribution of apps across


hybrid and multicloud environments

Increasing cyber risk with more business


value accessible via apps and APIs

31 ©2024 F5
Enterprise adoption of AI technologies
... will unleash a flood of new AI-driven apps and an even greater number of APIs

API
AWS SaaS

API API API


API

API
Azure Colocation
API

API API

Data centers
Google API Traditional &
Cloud Private Cloud
API
API
API
API

Edge

32 ©2024 F5
Summary

33 ©2024 F5
Key takeaways

API security is an integral part of AI and ML technologies can


an application security solution improve efficacy of API security

API protection applies along all API security must be deployable and
the API development lifecycle consumable in any environment

34 ©2024 F5
Questions?
Thank you for attending this webinar!

Please visit the


“Attachments” tab.
There you’ll find supporting
assets and speaker’s LinkedIn
information.
Cybersecurity’s Professional Mark of
Excellence

Always the Highest Standards

Register for the Exam


Test now on the current CISSP content. On April 15, 2024,
the domains will be refreshed as part of our rigorous
process to ensure relevancy.

Prep for the Exam


Take Official ISC2 CISSP Training to build a strong
understanding of the topics covered in the CISSP exam
outline. For a limited time, save 40% on online self-paced
training when you sign up for 90-day access.

Walk in Ready
Add Exam Peace of Mind Protection for the assurance of
a second sitting, if needed.

Learn more at isc2.org/landing/cissp-anniversary


Early Bird Savings are On!
Register by August 4 for your best price.
Please take a moment to leave
your feedback and comments
in the “Rate This” tab.
Stay Connected!
Update your email preferences to receive
news about upcoming ISC2 webinars, research & more!

Certified Members, Associates and ISC2 Candidates:

https://my.isc2.org/s/Dashboard/Preferences

New to ISC2? Join free as an ISC2 Candidate!

https://www.isc2.org/candidate
Image: Joybot via Wikimedia Commons, The Blue
Screen of Death in the Wild, CC BY-SA 2.0 DEED.
We’re currently
experiencing

difficulties.
technical

You might also like