SlideShare a Scribd company logo
REST API Security by Design
with Azure Pipelines
Security Matters in DevOps
THE J-CURVE OF TRANSFORMATION
The transformation
begins
From the State of DevOps 2018 Report by DORA
THE J-CURVE OF TRANSFORMATION
The transformation
begins
Automation helps
low performers
progress
From the State of DevOps 2018 Report by DORA
THE J-CURVE OF TRANSFORMATION
The transformation
begins
Automation helps
low performers
progress
Increased automation
demands more testing
From the State of DevOps 2018 Report by DORA
THE J-CURVE OF TRANSFORMATION
The transformation
begins
Automation helps
low performers
progress
Increased automation
demands more testing
Technical debt
is reduced, and
test
automation is
introduced
From the State of DevOps 2018 Report by DORA
THE J-CURVE OF TRANSFORMATION
From the State of DevOps 2018 Report by DORA
The transformation
begins
Automation helps
low performers
progress
Increased automation
demands more testing
Technical debt
is reduced, and
test automation
is introduced
Continuous
improvement
reduces manual
controls and
process
CATEGORIES OF PERFORMANCE
Low
✓ Deploy once a month to once every six months
✓ Going from code commit to production can be one to six months
✓ Restoring service from an incident can be between one week to one month
✓ Approximate change failure rate of 46% to 60%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
CATEGORIES OF PERFORMANCE
Medium
✓ Deploy once a week to once a month
✓ Going from code commit to production can be one week to one month
✓ Restoring service from an incident is usually less than a day
✓ Approximate change failure rate of 0% to 15%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
CATEGORIES OF PERFORMANCE
High
✓ Deploy once a day to once a week
✓ Going from code commit to production can be one day to one week
✓ Restoring service from an incident is usually less than a day
✓ Approximate change failure rate of 0% to 15%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
CATEGORIES OF PERFORMANCE
Elite
✓ Deploy on-demand (multiple deploys a day)
✓ Going from code commit to production is less than one day
✓ Restoring service from an incident is usually less than a day
✓ Approximate change failure rate of 0% to 15%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
AUTOMATION AND INTEGRATION - BUILD
Capability Low Medium High Elite
Automated build 64% 81% 91% 92%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
AUTOMATION AND INTEGRATION - TESTING
Capability Low Medium High Elite
Automated build 64% 81% 91% 92%
Automated unit tests 57% 66% 84% 87%
Automated acceptance tests 28% 38% 48% 58%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
AUTOMATION AND INTEGRATION - TESTING
Capability Low Medium High Elite
Automated build 64% 81% 91% 92%
Automated unit tests 57% 66% 84% 87%
Automated acceptance tests 28% 38% 48% 58%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
More on how Microsoft shifts tests left at
https://aka.ms/shift-tests-left
AUTOMATION AND INTEGRATION – DEPLOYMENT
Capability Low Medium High Elite
Automated build 64% 81% 91% 92%
Automated unit tests 57% 66% 84% 87%
Automated acceptance tests 28% 38% 48% 58%
Automated provisioning and
deployment to test environments
39% 54% 68% 72%
Automated deployment to
production
17% 38% 60% 69%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
AUTOMATION AND INTEGRATION - SECURITY
Capability Low Medium High Elite
Automated security tests 15% 28% 25% 31%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
WHERE IS WORK TIME SPENT
Time Spent Low Medium High Elite
New work 30% 40% 50% 50%
Unplanned work and rework 20% 20% 20% 19.5%
Remediating security issues 10% 5% 5% 5%
Working on end user reported
issues
20% 10% 10% 10%
Customer support work 15% 10% 10% 5%
From the State of DevOps 2018 Report by DORA
WHERE IS WORK TIME SPENT
Time Spent Low Medium High Elite
New work 30% 40% 50% 50%
Unplanned work and rework 20% 20% 20% 19.5%
Remediating security issues 10% 5% 5% 5%
Working on end user reported
issues
20% 10% 10% 10%
Customer support work 15% 10% 10% 5%
From the State of DevOps 2018 Report by DORA
Cost of excess rework = Technical staff size ×
Average salary × Benefits multiplier ×
Percentage of technical staff time spent on
excess rework
COST OF DEFECTS ALONG THE LIFECYCLE
AUTOMATING API
THREAT PROTECTION
APIS ARE THE NEW ATTACKS VECTOR…
Data breaches via APIs are on the rise
✓ 200+ breaches reported on
apisecurity.io since Oct. 2018
✓ And those are just the public ones!
Most recurrent causes:
✓ Lack of Input validation
✓ Data/Exception leakage
✓ Broken authentication
22
“By 2022, APIs will become
the #1 attack vector.”
- Gartner, How to Build an Effective API Security Strategy -
* :// . . / / /3834704/ - - - - - - -
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
MANY APIS, DEPLOYED OFTEN
APPLICATION
DEVELOPMENT
APPLICATION
SECURITY
SECURING APIS
REQUIRES A NEW
APPROACH
26
Development
Security
Operations
Business
A CHANGE IN CULTURE: PEOPLE COLLABORATING…
27
…FOLLOWING ESTABLISHED PROCESSES…
28
…AND USING THE RIGHT TOOLS.
Deploy & Protect
API Firewall is
automatically configured
from OAS file and
deployed in line of traffic.
The firewall can be
deployed as sidecar in
Kubernetes or reverse
proxy in front of API
Management solutions.
Develop
Developer
documents the API
contract with
OpenAPI/Swagger.
API Contract security
is evaluated from
VSCode using
42Crunch plugin.
Integrate & Test
API Contract quality is
enforced via CI/CD
pipeline. Builds are
blocked when minimal
security requirements
defined by security
teams are not met.
API implementation is
tested via Conformance
Scan
Design
Developer initiates
security work at
design time.
Best practices and
recommendations
are documented.
Developers know how the
application was built!
OpenAPI specification is leveraged to
describe the API contract.
Once the API contract is defined by
the developer, the security process
becomes clear and straight forward !
ENABLING DEVELOPERS TO INITIATE SECURITY
30
“If you describe your API, we will secure it”
API
Contract
Audit
Scan
Protect
EMPOWER DEVELOPERS TO BUILD THE ULTIMATE WHITELIST
VALIDATE OPENAPI CONTRACT CONTENTS
Does it comply to best
practices ?
Does it comply to security
requirements ?
✓ Using API Keys ? OAuth ?
Basic Auth ?
How well is the data defined ?
✓ Headers, query params, path params,
form data
✓ Input/output payloads format (JSON)
✓ Is the data constrained ?
• Min/Max/Patterns/Max Items
31
AUDIT
API
Contract
Audit
Scan
Protect
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
Platform Architecture
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
DEMO PART 1:
OPENAPI EDITOR/AUDIT
FOR VSCODE
https://marketplace.visualstudio.com/items?itemName=42Crunch.vscode-openapi
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
DEMO STEP 2:
AZURE DEVOPS
INTEGRATION
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
Automated audit and API discovery
https://marketplace.visualstudio.com/items?itemName=42Crunch.cicd
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
DEV-SEC-OPS BENEFITS
When API security becomes fully
part of the API lifecycle:
• Security is applied automatically and
at scale
• Vulnerable APIs are detected early
• APIs are automatically protected as
soon as the contract is defined
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
RESOURCES
• 42Crunch Website
• Azure DevOps SignUp
• Free OAS Security Audit
• OpenAPI VS Code Extension
• OpenAPI Spec Encyclopedia
• OWASP API Security Top 10
• APIsecurity.io
Ad

Recommended

WEBINAR: OWASP API Security Top 10
WEBINAR: OWASP API Security Top 10
42Crunch
 
Protecting Microservices APIs with 42Crunch API Firewall
Protecting Microservices APIs with 42Crunch API Firewall
42Crunch
 
OWASP API Security Top 10 - Austin DevSecOps Days
OWASP API Security Top 10 - Austin DevSecOps Days
42Crunch
 
The Dev, Sec and Ops of API Security - NordicAPIs
The Dev, Sec and Ops of API Security - NordicAPIs
42Crunch
 
API Security - OWASP top 10 for APIs + tips for pentesters
API Security - OWASP top 10 for APIs + tips for pentesters
Inon Shkedy
 
Are You Properly Using JWTs?
Are You Properly Using JWTs?
42Crunch
 
WEBINAR: Positive Security for APIs: What it is and why you need it!
WEBINAR: Positive Security for APIs: What it is and why you need it!
42Crunch
 
Top API Security Issues Found During POCs
Top API Security Issues Found During POCs
42Crunch
 
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
Adar Weidman
 
The Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API World
42Crunch
 
OWASP API Security Top 10 - API World
OWASP API Security Top 10 - API World
42Crunch
 
Why you need API Security Automation
Why you need API Security Automation
42Crunch
 
OWASP API Security TOP 10 - 2019
OWASP API Security TOP 10 - 2019
Miguel Angel Falcón Muñoz
 
Applying API Security at Scale
Applying API Security at Scale
Nordic APIs
 
APISecurity_OWASP_MitigationGuide
APISecurity_OWASP_MitigationGuide
Isabelle Mauny
 
Owasp top 10 2017 (en)
Owasp top 10 2017 (en)
PrashantDhakol
 
Open APIs Design
Open APIs Design
Isabelle Mauny
 
apidays LIVE Paris - Protecting financial grade API: adopting the right secur...
apidays LIVE Paris - Protecting financial grade API: adopting the right secur...
apidays
 
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
Apigee | Google Cloud
 
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Adar Weidman
 
API Security in a Microservices World
API Security in a Microservices World
42Crunch
 
API Abuse - The Anatomy of An Attack
API Abuse - The Anatomy of An Attack
Nordic APIs
 
API Security Guidelines: Beyond SSL and OAuth.
API Security Guidelines: Beyond SSL and OAuth.
Isabelle Mauny
 
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays
 
API Security from the DevOps and CSO Perspectives (Webcast)
API Security from the DevOps and CSO Perspectives (Webcast)
Apigee | Google Cloud
 
Five Principles to API Security
Five Principles to API Security
Isabelle Mauny
 
Data-driven API Security
Data-driven API Security
Apigee | Google Cloud
 
Managing Identities in the World of APIs
Managing Identities in the World of APIs
Apigee | Google Cloud
 
Velocity 2014 Tool Chain Choices
Velocity 2014 Tool Chain Choices
Mark Sigler
 
OPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu Slides
VMware Tanzu
 

More Related Content

What's hot (20)

Checkmarx meetup API Security - API Security top 10 - Erez Yalon
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
Adar Weidman
 
The Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API World
42Crunch
 
OWASP API Security Top 10 - API World
OWASP API Security Top 10 - API World
42Crunch
 
Why you need API Security Automation
Why you need API Security Automation
42Crunch
 
OWASP API Security TOP 10 - 2019
OWASP API Security TOP 10 - 2019
Miguel Angel Falcón Muñoz
 
Applying API Security at Scale
Applying API Security at Scale
Nordic APIs
 
APISecurity_OWASP_MitigationGuide
APISecurity_OWASP_MitigationGuide
Isabelle Mauny
 
Owasp top 10 2017 (en)
Owasp top 10 2017 (en)
PrashantDhakol
 
Open APIs Design
Open APIs Design
Isabelle Mauny
 
apidays LIVE Paris - Protecting financial grade API: adopting the right secur...
apidays LIVE Paris - Protecting financial grade API: adopting the right secur...
apidays
 
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
Apigee | Google Cloud
 
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Adar Weidman
 
API Security in a Microservices World
API Security in a Microservices World
42Crunch
 
API Abuse - The Anatomy of An Attack
API Abuse - The Anatomy of An Attack
Nordic APIs
 
API Security Guidelines: Beyond SSL and OAuth.
API Security Guidelines: Beyond SSL and OAuth.
Isabelle Mauny
 
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays
 
API Security from the DevOps and CSO Perspectives (Webcast)
API Security from the DevOps and CSO Perspectives (Webcast)
Apigee | Google Cloud
 
Five Principles to API Security
Five Principles to API Security
Isabelle Mauny
 
Data-driven API Security
Data-driven API Security
Apigee | Google Cloud
 
Managing Identities in the World of APIs
Managing Identities in the World of APIs
Apigee | Google Cloud
 
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
Adar Weidman
 
The Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API World
42Crunch
 
OWASP API Security Top 10 - API World
OWASP API Security Top 10 - API World
42Crunch
 
Why you need API Security Automation
Why you need API Security Automation
42Crunch
 
Applying API Security at Scale
Applying API Security at Scale
Nordic APIs
 
APISecurity_OWASP_MitigationGuide
APISecurity_OWASP_MitigationGuide
Isabelle Mauny
 
Owasp top 10 2017 (en)
Owasp top 10 2017 (en)
PrashantDhakol
 
apidays LIVE Paris - Protecting financial grade API: adopting the right secur...
apidays LIVE Paris - Protecting financial grade API: adopting the right secur...
apidays
 
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
Apigee | Google Cloud
 
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Adar Weidman
 
API Security in a Microservices World
API Security in a Microservices World
42Crunch
 
API Abuse - The Anatomy of An Attack
API Abuse - The Anatomy of An Attack
Nordic APIs
 
API Security Guidelines: Beyond SSL and OAuth.
API Security Guidelines: Beyond SSL and OAuth.
Isabelle Mauny
 
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays
 
API Security from the DevOps and CSO Perspectives (Webcast)
API Security from the DevOps and CSO Perspectives (Webcast)
Apigee | Google Cloud
 
Five Principles to API Security
Five Principles to API Security
Isabelle Mauny
 
Managing Identities in the World of APIs
Managing Identities in the World of APIs
Apigee | Google Cloud
 

Similar to REST API Security by Design with Azure Pipelines (20)

Velocity 2014 Tool Chain Choices
Velocity 2014 Tool Chain Choices
Mark Sigler
 
OPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu Slides
VMware Tanzu
 
Don’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital Transformation
DevOps.com
 
Don’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital Transformation
DevOps.com
 
Don't Let Technology Slow Down Your Digital Transformation
Don't Let Technology Slow Down Your Digital Transformation
XebiaLabs
 
Software Quality as a Competitive Differentiator
Software Quality as a Competitive Differentiator
DevOps.com
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned Way
CA Technologies
 
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)
TelecomValley
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
CA Technologies
 
Transform Digital Business with DevOps
Transform Digital Business with DevOps
Daniel Oh
 
Application Programming Interface Implementation For Building Software Applic...
Application Programming Interface Implementation For Building Software Applic...
SlideTeam
 
Don't be a DevOps Failure
Don't be a DevOps Failure
DevOps.com
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
CA Technologies
 
Leverage Service Virtualization on Your Roadmap for Success
Leverage Service Virtualization on Your Roadmap for Success
CA Technologies
 
Deliver Differentiating Apps – that Leverage the Mainframe – Faster with CA A...
Deliver Differentiating Apps – that Leverage the Mainframe – Faster with CA A...
CA Technologies
 
Fueling DevOps with a Testing Trifecta: How the New World of Testing is Driv...
Fueling DevOps with a Testing Trifecta: How the New World of Testing is Driv...
CA Technologies
 
04 accelerating businessvaluewithdevops
04 accelerating businessvaluewithdevops
Khairul Zebua
 
CWIN17 Toulouse / Safe 4.5 and agile devops-ca technologies-r.bajul
CWIN17 Toulouse / Safe 4.5 and agile devops-ca technologies-r.bajul
Capgemini
 
Guidewire Connections 2023 DE-4 Using AI to Accelerate Application Integration
Guidewire Connections 2023 DE-4 Using AI to Accelerate Application Integration
BrianPetrini
 
Using Lean Thinking to Identify and Address Delivery Pipeline Bottlenecks
Using Lean Thinking to Identify and Address Delivery Pipeline Bottlenecks
IBM UrbanCode Products
 
Velocity 2014 Tool Chain Choices
Velocity 2014 Tool Chain Choices
Mark Sigler
 
OPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu Slides
VMware Tanzu
 
Don’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital Transformation
DevOps.com
 
Don’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital Transformation
DevOps.com
 
Don't Let Technology Slow Down Your Digital Transformation
Don't Let Technology Slow Down Your Digital Transformation
XebiaLabs
 
Software Quality as a Competitive Differentiator
Software Quality as a Competitive Differentiator
DevOps.com
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned Way
CA Technologies
 
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)
TelecomValley
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
CA Technologies
 
Transform Digital Business with DevOps
Transform Digital Business with DevOps
Daniel Oh
 
Application Programming Interface Implementation For Building Software Applic...
Application Programming Interface Implementation For Building Software Applic...
SlideTeam
 
Don't be a DevOps Failure
Don't be a DevOps Failure
DevOps.com
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
CA Technologies
 
Leverage Service Virtualization on Your Roadmap for Success
Leverage Service Virtualization on Your Roadmap for Success
CA Technologies
 
Deliver Differentiating Apps – that Leverage the Mainframe – Faster with CA A...
Deliver Differentiating Apps – that Leverage the Mainframe – Faster with CA A...
CA Technologies
 
Fueling DevOps with a Testing Trifecta: How the New World of Testing is Driv...
Fueling DevOps with a Testing Trifecta: How the New World of Testing is Driv...
CA Technologies
 
04 accelerating businessvaluewithdevops
04 accelerating businessvaluewithdevops
Khairul Zebua
 
CWIN17 Toulouse / Safe 4.5 and agile devops-ca technologies-r.bajul
CWIN17 Toulouse / Safe 4.5 and agile devops-ca technologies-r.bajul
Capgemini
 
Guidewire Connections 2023 DE-4 Using AI to Accelerate Application Integration
Guidewire Connections 2023 DE-4 Using AI to Accelerate Application Integration
BrianPetrini
 
Using Lean Thinking to Identify and Address Delivery Pipeline Bottlenecks
Using Lean Thinking to Identify and Address Delivery Pipeline Bottlenecks
IBM UrbanCode Products
 
Ad

More from 42Crunch (8)

OWASP API Security Top 10 Examples
OWASP API Security Top 10 Examples
42Crunch
 
Applying API Security at Scale
Applying API Security at Scale
42Crunch
 
APIDays Paris Security Workshop
APIDays Paris Security Workshop
42Crunch
 
Better API Security with Automation
Better API Security with Automation
42Crunch
 
Advanced API Security Patterns
Advanced API Security Patterns
42Crunch
 
SecDevOps for API Security
SecDevOps for API Security
42Crunch
 
42crunch-API-security-workshop
42crunch-API-security-workshop
42Crunch
 
API Security: the full story
API Security: the full story
42Crunch
 
OWASP API Security Top 10 Examples
OWASP API Security Top 10 Examples
42Crunch
 
Applying API Security at Scale
Applying API Security at Scale
42Crunch
 
APIDays Paris Security Workshop
APIDays Paris Security Workshop
42Crunch
 
Better API Security with Automation
Better API Security with Automation
42Crunch
 
Advanced API Security Patterns
Advanced API Security Patterns
42Crunch
 
SecDevOps for API Security
SecDevOps for API Security
42Crunch
 
42crunch-API-security-workshop
42crunch-API-security-workshop
42Crunch
 
API Security: the full story
API Security: the full story
42Crunch
 
Ad

Recently uploaded (20)

SAP Datasphere Catalog L2 (2024-02-07).pptx
SAP Datasphere Catalog L2 (2024-02-07).pptx
HimanshuSachdeva46
 
SAP PM Module Level-IV Training Complete.ppt
SAP PM Module Level-IV Training Complete.ppt
MuhammadShaheryar36
 
OpenTelemetry 101 Cloud Native Barcelona
OpenTelemetry 101 Cloud Native Barcelona
Imma Valls Bernaus
 
How Insurance Policy Management Software Streamlines Operations
How Insurance Policy Management Software Streamlines Operations
Insurance Tech Services
 
Zoneranker’s Digital marketing solutions
Zoneranker’s Digital marketing solutions
reenashriee
 
Advanced Token Development - Decentralized Innovation
Advanced Token Development - Decentralized Innovation
arohisinghas720
 
Migrating to Azure Cosmos DB the Right Way
Migrating to Azure Cosmos DB the Right Way
Alexander (Alex) Komyagin
 
wAIred_RabobankIgniteSession_12062025.pptx
wAIred_RabobankIgniteSession_12062025.pptx
SimonedeGijt
 
Rierino Commerce Platform - CMS Solution
Rierino Commerce Platform - CMS Solution
Rierino
 
Who will create the languages of the future?
Who will create the languages of the future?
Jordi Cabot
 
Insurance Underwriting Software Enhancing Accuracy and Efficiency
Insurance Underwriting Software Enhancing Accuracy and Efficiency
Insurance Tech Services
 
How the US Navy Approaches DevSecOps with Raise 2.0
How the US Navy Approaches DevSecOps with Raise 2.0
Anchore
 
How to Choose the Right Web Development Agency.pdf
How to Choose the Right Web Development Agency.pdf
Creative Fosters
 
Code and No-Code Journeys: The Coverage Overlook
Code and No-Code Journeys: The Coverage Overlook
Applitools
 
Milwaukee Marketo User Group June 2025 - Optimize and Enhance Efficiency - Sm...
Milwaukee Marketo User Group June 2025 - Optimize and Enhance Efficiency - Sm...
BradBedford3
 
Looking for a BIRT Report Alternative Here’s Why Helical Insight Stands Out.pdf
Looking for a BIRT Report Alternative Here’s Why Helical Insight Stands Out.pdf
Varsha Nayak
 
Folding Cheat Sheet # 9 - List Unfolding 𝑢𝑛𝑓𝑜𝑙𝑑 as the Computational Dual of ...
Folding Cheat Sheet # 9 - List Unfolding 𝑢𝑛𝑓𝑜𝑙𝑑 as the Computational Dual of ...
Philip Schwarz
 
Transmission Media. (Computer Networks)
Transmission Media. (Computer Networks)
S Pranav (Deepu)
 
Microsoft Business-230T01A-ENU-PowerPoint_01.pptx
Microsoft Business-230T01A-ENU-PowerPoint_01.pptx
soulamaabdoulaye128
 
What is data visualization and how data visualization tool can help.pptx
What is data visualization and how data visualization tool can help.pptx
Varsha Nayak
 
SAP Datasphere Catalog L2 (2024-02-07).pptx
SAP Datasphere Catalog L2 (2024-02-07).pptx
HimanshuSachdeva46
 
SAP PM Module Level-IV Training Complete.ppt
SAP PM Module Level-IV Training Complete.ppt
MuhammadShaheryar36
 
OpenTelemetry 101 Cloud Native Barcelona
OpenTelemetry 101 Cloud Native Barcelona
Imma Valls Bernaus
 
How Insurance Policy Management Software Streamlines Operations
How Insurance Policy Management Software Streamlines Operations
Insurance Tech Services
 
Zoneranker’s Digital marketing solutions
Zoneranker’s Digital marketing solutions
reenashriee
 
Advanced Token Development - Decentralized Innovation
Advanced Token Development - Decentralized Innovation
arohisinghas720
 
wAIred_RabobankIgniteSession_12062025.pptx
wAIred_RabobankIgniteSession_12062025.pptx
SimonedeGijt
 
Rierino Commerce Platform - CMS Solution
Rierino Commerce Platform - CMS Solution
Rierino
 
Who will create the languages of the future?
Who will create the languages of the future?
Jordi Cabot
 
Insurance Underwriting Software Enhancing Accuracy and Efficiency
Insurance Underwriting Software Enhancing Accuracy and Efficiency
Insurance Tech Services
 
How the US Navy Approaches DevSecOps with Raise 2.0
How the US Navy Approaches DevSecOps with Raise 2.0
Anchore
 
How to Choose the Right Web Development Agency.pdf
How to Choose the Right Web Development Agency.pdf
Creative Fosters
 
Code and No-Code Journeys: The Coverage Overlook
Code and No-Code Journeys: The Coverage Overlook
Applitools
 
Milwaukee Marketo User Group June 2025 - Optimize and Enhance Efficiency - Sm...
Milwaukee Marketo User Group June 2025 - Optimize and Enhance Efficiency - Sm...
BradBedford3
 
Looking for a BIRT Report Alternative Here’s Why Helical Insight Stands Out.pdf
Looking for a BIRT Report Alternative Here’s Why Helical Insight Stands Out.pdf
Varsha Nayak
 
Folding Cheat Sheet # 9 - List Unfolding 𝑢𝑛𝑓𝑜𝑙𝑑 as the Computational Dual of ...
Folding Cheat Sheet # 9 - List Unfolding 𝑢𝑛𝑓𝑜𝑙𝑑 as the Computational Dual of ...
Philip Schwarz
 
Transmission Media. (Computer Networks)
Transmission Media. (Computer Networks)
S Pranav (Deepu)
 
Microsoft Business-230T01A-ENU-PowerPoint_01.pptx
Microsoft Business-230T01A-ENU-PowerPoint_01.pptx
soulamaabdoulaye128
 
What is data visualization and how data visualization tool can help.pptx
What is data visualization and how data visualization tool can help.pptx
Varsha Nayak
 

REST API Security by Design with Azure Pipelines

  • 1. REST API Security by Design with Azure Pipelines
  • 3. THE J-CURVE OF TRANSFORMATION The transformation begins From the State of DevOps 2018 Report by DORA
  • 4. THE J-CURVE OF TRANSFORMATION The transformation begins Automation helps low performers progress From the State of DevOps 2018 Report by DORA
  • 5. THE J-CURVE OF TRANSFORMATION The transformation begins Automation helps low performers progress Increased automation demands more testing From the State of DevOps 2018 Report by DORA
  • 6. THE J-CURVE OF TRANSFORMATION The transformation begins Automation helps low performers progress Increased automation demands more testing Technical debt is reduced, and test automation is introduced From the State of DevOps 2018 Report by DORA
  • 7. THE J-CURVE OF TRANSFORMATION From the State of DevOps 2018 Report by DORA The transformation begins Automation helps low performers progress Increased automation demands more testing Technical debt is reduced, and test automation is introduced Continuous improvement reduces manual controls and process
  • 8. CATEGORIES OF PERFORMANCE Low ✓ Deploy once a month to once every six months ✓ Going from code commit to production can be one to six months ✓ Restoring service from an incident can be between one week to one month ✓ Approximate change failure rate of 46% to 60% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 9. CATEGORIES OF PERFORMANCE Medium ✓ Deploy once a week to once a month ✓ Going from code commit to production can be one week to one month ✓ Restoring service from an incident is usually less than a day ✓ Approximate change failure rate of 0% to 15% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 10. CATEGORIES OF PERFORMANCE High ✓ Deploy once a day to once a week ✓ Going from code commit to production can be one day to one week ✓ Restoring service from an incident is usually less than a day ✓ Approximate change failure rate of 0% to 15% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 11. CATEGORIES OF PERFORMANCE Elite ✓ Deploy on-demand (multiple deploys a day) ✓ Going from code commit to production is less than one day ✓ Restoring service from an incident is usually less than a day ✓ Approximate change failure rate of 0% to 15% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 12. AUTOMATION AND INTEGRATION - BUILD Capability Low Medium High Elite Automated build 64% 81% 91% 92% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 13. AUTOMATION AND INTEGRATION - TESTING Capability Low Medium High Elite Automated build 64% 81% 91% 92% Automated unit tests 57% 66% 84% 87% Automated acceptance tests 28% 38% 48% 58% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 14. AUTOMATION AND INTEGRATION - TESTING Capability Low Medium High Elite Automated build 64% 81% 91% 92% Automated unit tests 57% 66% 84% 87% Automated acceptance tests 28% 38% 48% 58% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops More on how Microsoft shifts tests left at https://aka.ms/shift-tests-left
  • 15. AUTOMATION AND INTEGRATION – DEPLOYMENT Capability Low Medium High Elite Automated build 64% 81% 91% 92% Automated unit tests 57% 66% 84% 87% Automated acceptance tests 28% 38% 48% 58% Automated provisioning and deployment to test environments 39% 54% 68% 72% Automated deployment to production 17% 38% 60% 69% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 16. AUTOMATION AND INTEGRATION - SECURITY Capability Low Medium High Elite Automated security tests 15% 28% 25% 31% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 17. WHERE IS WORK TIME SPENT Time Spent Low Medium High Elite New work 30% 40% 50% 50% Unplanned work and rework 20% 20% 20% 19.5% Remediating security issues 10% 5% 5% 5% Working on end user reported issues 20% 10% 10% 10% Customer support work 15% 10% 10% 5% From the State of DevOps 2018 Report by DORA
  • 18. WHERE IS WORK TIME SPENT Time Spent Low Medium High Elite New work 30% 40% 50% 50% Unplanned work and rework 20% 20% 20% 19.5% Remediating security issues 10% 5% 5% 5% Working on end user reported issues 20% 10% 10% 10% Customer support work 15% 10% 10% 5% From the State of DevOps 2018 Report by DORA
  • 19. Cost of excess rework = Technical staff size × Average salary × Benefits multiplier × Percentage of technical staff time spent on excess rework
  • 20. COST OF DEFECTS ALONG THE LIFECYCLE
  • 22. APIS ARE THE NEW ATTACKS VECTOR… Data breaches via APIs are on the rise ✓ 200+ breaches reported on apisecurity.io since Oct. 2018 ✓ And those are just the public ones! Most recurrent causes: ✓ Lack of Input validation ✓ Data/Exception leakage ✓ Broken authentication 22
  • 23. “By 2022, APIs will become the #1 attack vector.” - Gartner, How to Build an Effective API Security Strategy - * :// . . / / /3834704/ - - - - - - -
  • 24. © COPYRIGHT 42CRUNCH | CONFIDENTIAL MANY APIS, DEPLOYED OFTEN APPLICATION DEVELOPMENT APPLICATION SECURITY
  • 25. SECURING APIS REQUIRES A NEW APPROACH
  • 28. 28 …AND USING THE RIGHT TOOLS.
  • 29. Deploy & Protect API Firewall is automatically configured from OAS file and deployed in line of traffic. The firewall can be deployed as sidecar in Kubernetes or reverse proxy in front of API Management solutions. Develop Developer documents the API contract with OpenAPI/Swagger. API Contract security is evaluated from VSCode using 42Crunch plugin. Integrate & Test API Contract quality is enforced via CI/CD pipeline. Builds are blocked when minimal security requirements defined by security teams are not met. API implementation is tested via Conformance Scan Design Developer initiates security work at design time. Best practices and recommendations are documented.
  • 30. Developers know how the application was built! OpenAPI specification is leveraged to describe the API contract. Once the API contract is defined by the developer, the security process becomes clear and straight forward ! ENABLING DEVELOPERS TO INITIATE SECURITY 30 “If you describe your API, we will secure it”
  • 31. API Contract Audit Scan Protect EMPOWER DEVELOPERS TO BUILD THE ULTIMATE WHITELIST VALIDATE OPENAPI CONTRACT CONTENTS Does it comply to best practices ? Does it comply to security requirements ? ✓ Using API Keys ? OAuth ? Basic Auth ? How well is the data defined ? ✓ Headers, query params, path params, form data ✓ Input/output payloads format (JSON) ✓ Is the data constrained ? • Min/Max/Patterns/Max Items 31 AUDIT API Contract Audit Scan Protect
  • 32. © COPYRIGHT 42CRUNCH | CONFIDENTIAL Platform Architecture
  • 33. © COPYRIGHT 42CRUNCH | CONFIDENTIAL DEMO PART 1: OPENAPI EDITOR/AUDIT FOR VSCODE https://marketplace.visualstudio.com/items?itemName=42Crunch.vscode-openapi
  • 34. © COPYRIGHT 42CRUNCH | CONFIDENTIAL
  • 35. © COPYRIGHT 42CRUNCH | CONFIDENTIAL
  • 36. © COPYRIGHT 42CRUNCH | CONFIDENTIAL DEMO STEP 2: AZURE DEVOPS INTEGRATION
  • 37. © COPYRIGHT 42CRUNCH | CONFIDENTIAL Automated audit and API discovery https://marketplace.visualstudio.com/items?itemName=42Crunch.cicd
  • 38. © COPYRIGHT 42CRUNCH | CONFIDENTIAL DEV-SEC-OPS BENEFITS When API security becomes fully part of the API lifecycle: • Security is applied automatically and at scale • Vulnerable APIs are detected early • APIs are automatically protected as soon as the contract is defined
  • 39. © COPYRIGHT 42CRUNCH | CONFIDENTIAL RESOURCES • 42Crunch Website • Azure DevOps SignUp • Free OAS Security Audit • OpenAPI VS Code Extension • OpenAPI Spec Encyclopedia • OWASP API Security Top 10 • APIsecurity.io