SlideShare a Scribd company logo
SECURING AN API WORLD
THE DEV, SEC AND OPS
OF APIS
ISABELLE MAUNY 

CHIEF EVANGELIST & CO-FOUNDER
ISABELLE@42CRUNCH.COM
2
âž” Chief Evangelist and co-founder @42Crunch
âž” 42Crunch is the company behind apisecurity.io
âž” Working with APIs since 2005!
âž” Most career at IBM
âž” French native, in Spain since 2003
isabelle@42crunch.com
@isamauny
3
400+
AVERAGE NUMBER OF APIS IN THE ENTERPRISE
MANY APIS, MANY DEPLOYMENTS
4
APPLICATION

DEVELOPMENT
APPLICATION

SECURITY
API SECURITY CHALLENGES
API Security is considered
too late
✓ Security teams can’t do their job
properly
API Security is hard
âś“ Complex standards, limited skills
Applying API Security at
scale
âś“ How do we cope with dozens of
deployment per week, with hundreds
of APIs to deploy ?
Detecting vulnerabilities
early
Measuring the efficiency of
our security measures
5
MEET
DEV SEC OPS
6
“DevSecOps is the philosophy of integrating security
practices within the DevOps process. 
DevSecOps involves creating a 'Security as Code'
culture with ongoing, flexible collaboration between
release engineers and security teams.”
INJECTING SECURITY AS EARLY
AS POSSIBLE IN THE API LIFECYCLE
7
DeploymentTestingDevelopmentDesign
SHIFTING SECURITY LEFT
8
Development
Security
Operations
Business
A CHANGE IN CULTURE: PEOPLE COLLABORATING…
9
…FOLLOWING ESTABLISHED PROCESSES…
10
…AND USING THE RIGHT TOOLS.
KEY BENEFITS
Everyone is responsible for security, everyone has a role to play
✓ No more “throwing over the fence” approach
Vulnerabilities found early take up to 30x less effort to solve
Secure by design principles
âś“ Automated reviews
âś“ Automated security testing
Security becomes transparent, thanks to security as code
Developers iteratively learn about best practices
Security is continuously improved 11
A DEV-SEC-OPS CYCLE FOR APIS
12From: https://jaxenter.com/exploration-devsecops-144849.html
13
1 ANALYZE
What do we need to secure ?
KNOW YOUR APIS AND
THE RISK THEY BRING
14See: https://www.owasp.org/index.php/Application_Threat_Modeling
15
SECURE
2
Establish the rules
CORE API SECURITY RULES
All APIs request/response data must
be validated
All access tokens must be validated
Proper authentication in place,
adapted to risk
Rate Limiting for all operations
Fine-grained authorization for data
access
Authenticate Apps
Managed secrets: no hardcoded/
readable APIKeys, passwords, tokens
in code or deployment scripts
Security headers must be used
No libraries with known vulnerabilities
All transactions are logged
All APIs are known and governed
16
Can we extended from “How to Prevent” section from OWASP Top 10 for APIs
17
VERIFY
3
Ensure we comply with the rules!
18
Dev QA/Testing Production/Ops
Code Analysis (SAST)
Code reviews (manual)
API contract analysis (SAST)
Software Component Analysis
API Implementation Testing (DAST)
API Contract Testing (DAST)
Negative Testing: Hack yourselves!
Container Images Analysis
Deployment Scripts Analysis
SSL/TLS Configuration
Kubernetes Configuration
Perf testing
Pen Testing (manual)
RULE OF THUMB FOR TOOLS
Fit in “developer flow”
âś“ IDEs Integration
Can be automated
âś“ Plugins for CI/CD pipelines
âś“ API driven
Can integrate with
ecosystem
âś“ Logging
âś“ Monitoring
âś“ SIEM
19
20
DEFEND4
Enforce the rules!
21
App icon made by https://www.flaticon.com/authors/pixel-buddha
Front Process Data
North
South North
South
East
West
Firewall/GW
Service Mesh
Service Mesh
PROTECT ALL APIS
•Automatic Deployment
•Protections as code
•Deployed early
22
MONITOR AND ANALYZE
Dev/QA
✓ Immediate feedback loop in developer’s IDE
âś“ Treat vulnerabilities as bugs:
âś“ Track issues found with your favorite ticketing system
Production
âś“ Analyze automatically all system logs
âś“ Profile runtime behaviour and raise potential issues automatically
KEY RECOMMENDATIONS
Start small and iterate
✓ Don’t try to address all issues at once!
Educate and help developers
âś“ Add security people to development teams
✓ Don’t throw security at them as a new responsibility
âś“ Help them by including feedback in their existing development flow
Don’t throw too many tools in the pipeline
âś“ Evaluate and choose depending on your needs
23
CONTACT US:
INFO@42CRUNCH.COM
Securing an API World
Ad

Recommended

Protecting Microservices APIs with 42Crunch API Firewall
Protecting Microservices APIs with 42Crunch API Firewall
42Crunch
 
WEBINAR: OWASP API Security Top 10
WEBINAR: OWASP API Security Top 10
42Crunch
 
OWASP API Security Top 10 - Austin DevSecOps Days
OWASP API Security Top 10 - Austin DevSecOps Days
42Crunch
 
WEBINAR: Positive Security for APIs: What it is and why you need it!
WEBINAR: Positive Security for APIs: What it is and why you need it!
42Crunch
 
The Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API World
42Crunch
 
Are You Properly Using JWTs?
Are You Properly Using JWTs?
42Crunch
 
REST API Security by Design with Azure Pipelines
REST API Security by Design with Azure Pipelines
42Crunch
 
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
Adar Weidman
 
Top API Security Issues Found During POCs
Top API Security Issues Found During POCs
42Crunch
 
OWASP API Security Top 10 - API World
OWASP API Security Top 10 - API World
42Crunch
 
API Security - OWASP top 10 for APIs + tips for pentesters
API Security - OWASP top 10 for APIs + tips for pentesters
Inon Shkedy
 
Why you need API Security Automation
Why you need API Security Automation
42Crunch
 
API Security: the full story
API Security: the full story
42Crunch
 
Applying API Security at Scale
Applying API Security at Scale
Nordic APIs
 
OWASP API Security TOP 10 - 2019
OWASP API Security TOP 10 - 2019
Miguel Angel Falcón Muñoz
 
API Security in a Microservices World
API Security in a Microservices World
42Crunch
 
Guidelines to protect your APIs from threats
Guidelines to protect your APIs from threats
Isabelle Mauny
 
APISecurity_OWASP_MitigationGuide
APISecurity_OWASP_MitigationGuide
Isabelle Mauny
 
42crunch-API-security-workshop
42crunch-API-security-workshop
42Crunch
 
Data-driven API Security
Data-driven API Security
Apigee | Google Cloud
 
Advanced API Security Patterns
Advanced API Security Patterns
42Crunch
 
Owasp top 10 2017 (en)
Owasp top 10 2017 (en)
PrashantDhakol
 
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Adar Weidman
 
SecDevOps for API Security
SecDevOps for API Security
42Crunch
 
Managing Identities in the World of APIs
Managing Identities in the World of APIs
Apigee | Google Cloud
 
API Security Guidelines: Beyond SSL and OAuth.
API Security Guidelines: Beyond SSL and OAuth.
Isabelle Mauny
 
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
Apigee | Google Cloud
 
Five Principles to API Security
Five Principles to API Security
Isabelle Mauny
 
Better API Security with Automation
Better API Security with Automation
42Crunch
 
Better API Security With A SecDevOps Approach
Better API Security With A SecDevOps Approach
Nordic APIs
 

More Related Content

What's hot (20)

Top API Security Issues Found During POCs
Top API Security Issues Found During POCs
42Crunch
 
OWASP API Security Top 10 - API World
OWASP API Security Top 10 - API World
42Crunch
 
API Security - OWASP top 10 for APIs + tips for pentesters
API Security - OWASP top 10 for APIs + tips for pentesters
Inon Shkedy
 
Why you need API Security Automation
Why you need API Security Automation
42Crunch
 
API Security: the full story
API Security: the full story
42Crunch
 
Applying API Security at Scale
Applying API Security at Scale
Nordic APIs
 
OWASP API Security TOP 10 - 2019
OWASP API Security TOP 10 - 2019
Miguel Angel Falcón Muñoz
 
API Security in a Microservices World
API Security in a Microservices World
42Crunch
 
Guidelines to protect your APIs from threats
Guidelines to protect your APIs from threats
Isabelle Mauny
 
APISecurity_OWASP_MitigationGuide
APISecurity_OWASP_MitigationGuide
Isabelle Mauny
 
42crunch-API-security-workshop
42crunch-API-security-workshop
42Crunch
 
Data-driven API Security
Data-driven API Security
Apigee | Google Cloud
 
Advanced API Security Patterns
Advanced API Security Patterns
42Crunch
 
Owasp top 10 2017 (en)
Owasp top 10 2017 (en)
PrashantDhakol
 
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Adar Weidman
 
SecDevOps for API Security
SecDevOps for API Security
42Crunch
 
Managing Identities in the World of APIs
Managing Identities in the World of APIs
Apigee | Google Cloud
 
API Security Guidelines: Beyond SSL and OAuth.
API Security Guidelines: Beyond SSL and OAuth.
Isabelle Mauny
 
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
Apigee | Google Cloud
 
Five Principles to API Security
Five Principles to API Security
Isabelle Mauny
 
Top API Security Issues Found During POCs
Top API Security Issues Found During POCs
42Crunch
 
OWASP API Security Top 10 - API World
OWASP API Security Top 10 - API World
42Crunch
 
API Security - OWASP top 10 for APIs + tips for pentesters
API Security - OWASP top 10 for APIs + tips for pentesters
Inon Shkedy
 
Why you need API Security Automation
Why you need API Security Automation
42Crunch
 
API Security: the full story
API Security: the full story
42Crunch
 
Applying API Security at Scale
Applying API Security at Scale
Nordic APIs
 
API Security in a Microservices World
API Security in a Microservices World
42Crunch
 
Guidelines to protect your APIs from threats
Guidelines to protect your APIs from threats
Isabelle Mauny
 
APISecurity_OWASP_MitigationGuide
APISecurity_OWASP_MitigationGuide
Isabelle Mauny
 
42crunch-API-security-workshop
42crunch-API-security-workshop
42Crunch
 
Advanced API Security Patterns
Advanced API Security Patterns
42Crunch
 
Owasp top 10 2017 (en)
Owasp top 10 2017 (en)
PrashantDhakol
 
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Adar Weidman
 
SecDevOps for API Security
SecDevOps for API Security
42Crunch
 
Managing Identities in the World of APIs
Managing Identities in the World of APIs
Apigee | Google Cloud
 
API Security Guidelines: Beyond SSL and OAuth.
API Security Guidelines: Beyond SSL and OAuth.
Isabelle Mauny
 
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
Apigee | Google Cloud
 
Five Principles to API Security
Five Principles to API Security
Isabelle Mauny
 

Similar to The Dev, Sec and Ops of API Security - NordicAPIs (20)

Better API Security with Automation
Better API Security with Automation
42Crunch
 
Better API Security With A SecDevOps Approach
Better API Security With A SecDevOps Approach
Nordic APIs
 
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...
apidays
 
apidays New York 2023 - Putting yourself out there - how to secure your publi...
apidays New York 2023 - Putting yourself out there - how to secure your publi...
apidays
 
APIDays Paris Security Workshop
APIDays Paris Security Workshop
42Crunch
 
API Security Webinar : Security Guidelines for Providing and Consuming APIs
API Security Webinar : Security Guidelines for Providing and Consuming APIs
DevOps Indonesia
 
API Security Webinar - Security Guidelines for Providing and Consuming APIs
API Security Webinar - Security Guidelines for Providing and Consuming APIs
DevOps Indonesia
 
Peeling the Onion: Making Sense of the Layers of API Security
Peeling the Onion: Making Sense of the Layers of API Security
Matt Tesauro
 
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays
 
LF_APIStrat17_Practical DevSecOps for APIs
LF_APIStrat17_Practical DevSecOps for APIs
LF_APIStrat
 
INTERFACE, by apidays - Driving the business via APIs.pptx
INTERFACE, by apidays - Driving the business via APIs.pptx
apidays
 
Virtual Meetup - API Security Best Practices
Virtual Meetup - API Security Best Practices
Jimmy Attia
 
apidays Paris 2024 - Layered Approach of API Security Strategies and its Busi...
apidays Paris 2024 - Layered Approach of API Security Strategies and its Busi...
apidays
 
Deep-Dive: Secure API Management
Deep-Dive: Secure API Management
Apigee | Google Cloud
 
Applying API Security at Scale
Applying API Security at Scale
42Crunch
 
5 step plan to securing your APIs
5 step plan to securing your APIs
đź’» Javier Garza
 
APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...
APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...
apidays
 
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
APIsecure_ Official
 
Successfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINX
NGINX, Inc.
 
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
apidays
 
Better API Security with Automation
Better API Security with Automation
42Crunch
 
Better API Security With A SecDevOps Approach
Better API Security With A SecDevOps Approach
Nordic APIs
 
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...
apidays
 
apidays New York 2023 - Putting yourself out there - how to secure your publi...
apidays New York 2023 - Putting yourself out there - how to secure your publi...
apidays
 
APIDays Paris Security Workshop
APIDays Paris Security Workshop
42Crunch
 
API Security Webinar : Security Guidelines for Providing and Consuming APIs
API Security Webinar : Security Guidelines for Providing and Consuming APIs
DevOps Indonesia
 
API Security Webinar - Security Guidelines for Providing and Consuming APIs
API Security Webinar - Security Guidelines for Providing and Consuming APIs
DevOps Indonesia
 
Peeling the Onion: Making Sense of the Layers of API Security
Peeling the Onion: Making Sense of the Layers of API Security
Matt Tesauro
 
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays
 
LF_APIStrat17_Practical DevSecOps for APIs
LF_APIStrat17_Practical DevSecOps for APIs
LF_APIStrat
 
INTERFACE, by apidays - Driving the business via APIs.pptx
INTERFACE, by apidays - Driving the business via APIs.pptx
apidays
 
Virtual Meetup - API Security Best Practices
Virtual Meetup - API Security Best Practices
Jimmy Attia
 
apidays Paris 2024 - Layered Approach of API Security Strategies and its Busi...
apidays Paris 2024 - Layered Approach of API Security Strategies and its Busi...
apidays
 
Deep-Dive: Secure API Management
Deep-Dive: Secure API Management
Apigee | Google Cloud
 
Applying API Security at Scale
Applying API Security at Scale
42Crunch
 
5 step plan to securing your APIs
5 step plan to securing your APIs
đź’» Javier Garza
 
APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...
APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...
apidays
 
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
APIsecure_ Official
 
Successfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINX
NGINX, Inc.
 
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
apidays
 
Ad

Recently uploaded (20)

Artificial Intelligence Workloads and Data Center Management
Artificial Intelligence Workloads and Data Center Management
SandeepKS52
 
Porting Qt 5 QML Modules to Qt 6 Webinar
Porting Qt 5 QML Modules to Qt 6 Webinar
ICS
 
Async-ronizing Success at Wix - Patterns for Seamless Microservices - Devoxx ...
Async-ronizing Success at Wix - Patterns for Seamless Microservices - Devoxx ...
Natan Silnitsky
 
On-Device AI: Is It Time to Go All-In, or Do We Still Need the Cloud?
On-Device AI: Is It Time to Go All-In, or Do We Still Need the Cloud?
Hassan Abid
 
Download Adobe Illustrator Crack free for Windows 2025?
Download Adobe Illustrator Crack free for Windows 2025?
grete1122g
 
Enable Your Cloud Journey With Microsoft Trusted Partner | IFI Tech
Enable Your Cloud Journey With Microsoft Trusted Partner | IFI Tech
IFI Techsolutions
 
Step by step guide to install Flutter and Dart
Step by step guide to install Flutter and Dart
S Pranav (Deepu)
 
Women in Tech: Marketo Engage User Group - June 2025 - AJO with AWS
Women in Tech: Marketo Engage User Group - June 2025 - AJO with AWS
BradBedford3
 
Transmission Media. (Computer Networks)
Transmission Media. (Computer Networks)
S Pranav (Deepu)
 
SAP Datasphere Catalog L2 (2024-02-07).pptx
SAP Datasphere Catalog L2 (2024-02-07).pptx
HimanshuSachdeva46
 
MOVIE RECOMMENDATION SYSTEM, UDUMULA GOPI REDDY, Y24MC13085.pptx
MOVIE RECOMMENDATION SYSTEM, UDUMULA GOPI REDDY, Y24MC13085.pptx
Maharshi Mallela
 
Making significant Software Architecture decisions
Making significant Software Architecture decisions
Bert Jan Schrijver
 
Folding Cheat Sheet # 9 - List Unfolding 𝑢𝑛𝑓𝑜𝑙𝑑 as the Computational Dual of ...
Folding Cheat Sheet # 9 - List Unfolding 𝑢𝑛𝑓𝑜𝑙𝑑 as the Computational Dual of ...
Philip Schwarz
 
How the US Navy Approaches DevSecOps with Raise 2.0
How the US Navy Approaches DevSecOps with Raise 2.0
Anchore
 
DevOps for AI: running LLMs in production with Kubernetes and KubeFlow
DevOps for AI: running LLMs in production with Kubernetes and KubeFlow
Aarno Aukia
 
Software Testing & it’s types (DevOps)
Software Testing & it’s types (DevOps)
S Pranav (Deepu)
 
SAP PM Module Level-IV Training Complete.ppt
SAP PM Module Level-IV Training Complete.ppt
MuhammadShaheryar36
 
Wondershare PDFelement Pro 11.4.20.3548 Crack Free Download
Wondershare PDFelement Pro 11.4.20.3548 Crack Free Download
Puppy jhon
 
dp-700 exam questions sample docume .pdf
dp-700 exam questions sample docume .pdf
pravkumarbiz
 
Insurance Underwriting Software Enhancing Accuracy and Efficiency
Insurance Underwriting Software Enhancing Accuracy and Efficiency
Insurance Tech Services
 
Artificial Intelligence Workloads and Data Center Management
Artificial Intelligence Workloads and Data Center Management
SandeepKS52
 
Porting Qt 5 QML Modules to Qt 6 Webinar
Porting Qt 5 QML Modules to Qt 6 Webinar
ICS
 
Async-ronizing Success at Wix - Patterns for Seamless Microservices - Devoxx ...
Async-ronizing Success at Wix - Patterns for Seamless Microservices - Devoxx ...
Natan Silnitsky
 
On-Device AI: Is It Time to Go All-In, or Do We Still Need the Cloud?
On-Device AI: Is It Time to Go All-In, or Do We Still Need the Cloud?
Hassan Abid
 
Download Adobe Illustrator Crack free for Windows 2025?
Download Adobe Illustrator Crack free for Windows 2025?
grete1122g
 
Enable Your Cloud Journey With Microsoft Trusted Partner | IFI Tech
Enable Your Cloud Journey With Microsoft Trusted Partner | IFI Tech
IFI Techsolutions
 
Step by step guide to install Flutter and Dart
Step by step guide to install Flutter and Dart
S Pranav (Deepu)
 
Women in Tech: Marketo Engage User Group - June 2025 - AJO with AWS
Women in Tech: Marketo Engage User Group - June 2025 - AJO with AWS
BradBedford3
 
Transmission Media. (Computer Networks)
Transmission Media. (Computer Networks)
S Pranav (Deepu)
 
SAP Datasphere Catalog L2 (2024-02-07).pptx
SAP Datasphere Catalog L2 (2024-02-07).pptx
HimanshuSachdeva46
 
MOVIE RECOMMENDATION SYSTEM, UDUMULA GOPI REDDY, Y24MC13085.pptx
MOVIE RECOMMENDATION SYSTEM, UDUMULA GOPI REDDY, Y24MC13085.pptx
Maharshi Mallela
 
Making significant Software Architecture decisions
Making significant Software Architecture decisions
Bert Jan Schrijver
 
Folding Cheat Sheet # 9 - List Unfolding 𝑢𝑛𝑓𝑜𝑙𝑑 as the Computational Dual of ...
Folding Cheat Sheet # 9 - List Unfolding 𝑢𝑛𝑓𝑜𝑙𝑑 as the Computational Dual of ...
Philip Schwarz
 
How the US Navy Approaches DevSecOps with Raise 2.0
How the US Navy Approaches DevSecOps with Raise 2.0
Anchore
 
DevOps for AI: running LLMs in production with Kubernetes and KubeFlow
DevOps for AI: running LLMs in production with Kubernetes and KubeFlow
Aarno Aukia
 
Software Testing & it’s types (DevOps)
Software Testing & it’s types (DevOps)
S Pranav (Deepu)
 
SAP PM Module Level-IV Training Complete.ppt
SAP PM Module Level-IV Training Complete.ppt
MuhammadShaheryar36
 
Wondershare PDFelement Pro 11.4.20.3548 Crack Free Download
Wondershare PDFelement Pro 11.4.20.3548 Crack Free Download
Puppy jhon
 
dp-700 exam questions sample docume .pdf
dp-700 exam questions sample docume .pdf
pravkumarbiz
 
Insurance Underwriting Software Enhancing Accuracy and Efficiency
Insurance Underwriting Software Enhancing Accuracy and Efficiency
Insurance Tech Services
 
Ad

The Dev, Sec and Ops of API Security - NordicAPIs

  • 1. SECURING AN API WORLD THE DEV, SEC AND OPS OF APIS ISABELLE MAUNY 
 CHIEF EVANGELIST & CO-FOUNDER [email protected]
  • 2. 2 âž” Chief Evangelist and co-founder @42Crunch âž” 42Crunch is the company behind apisecurity.io âž” Working with APIs since 2005! âž” Most career at IBM âž” French native, in Spain since 2003 [email protected] @isamauny
  • 3. 3 400+ AVERAGE NUMBER OF APIS IN THE ENTERPRISE
  • 4. MANY APIS, MANY DEPLOYMENTS 4 APPLICATION
 DEVELOPMENT APPLICATION
 SECURITY
  • 5. API SECURITY CHALLENGES API Security is considered too late âś“ Security teams can’t do their job properly API Security is hard âś“ Complex standards, limited skills Applying API Security at scale âś“ How do we cope with dozens of deployment per week, with hundreds of APIs to deploy ? Detecting vulnerabilities early Measuring the efficiency of our security measures 5
  • 6. MEET DEV SEC OPS 6 “DevSecOps is the philosophy of integrating security practices within the DevOps process.  DevSecOps involves creating a 'Security as Code' culture with ongoing, flexible collaboration between release engineers and security teams.”
  • 7. INJECTING SECURITY AS EARLY AS POSSIBLE IN THE API LIFECYCLE 7 DeploymentTestingDevelopmentDesign SHIFTING SECURITY LEFT
  • 8. 8 Development Security Operations Business A CHANGE IN CULTURE: PEOPLE COLLABORATING…
  • 10. 10 …AND USING THE RIGHT TOOLS.
  • 11. KEY BENEFITS Everyone is responsible for security, everyone has a role to play âś“ No more “throwing over the fence” approach Vulnerabilities found early take up to 30x less effort to solve Secure by design principles âś“ Automated reviews âś“ Automated security testing Security becomes transparent, thanks to security as code Developers iteratively learn about best practices Security is continuously improved 11
  • 12. A DEV-SEC-OPS CYCLE FOR APIS 12From: https://jaxenter.com/exploration-devsecops-144849.html
  • 13. 13 1 ANALYZE What do we need to secure ?
  • 14. KNOW YOUR APIS AND THE RISK THEY BRING 14See: https://www.owasp.org/index.php/Application_Threat_Modeling
  • 16. CORE API SECURITY RULES All APIs request/response data must be validated All access tokens must be validated Proper authentication in place, adapted to risk Rate Limiting for all operations Fine-grained authorization for data access Authenticate Apps Managed secrets: no hardcoded/ readable APIKeys, passwords, tokens in code or deployment scripts Security headers must be used No libraries with known vulnerabilities All transactions are logged All APIs are known and governed 16 Can we extended from “How to Prevent” section from OWASP Top 10 for APIs
  • 17. 17 VERIFY 3 Ensure we comply with the rules!
  • 18. 18 Dev QA/Testing Production/Ops Code Analysis (SAST) Code reviews (manual) API contract analysis (SAST) Software Component Analysis API Implementation Testing (DAST) API Contract Testing (DAST) Negative Testing: Hack yourselves! Container Images Analysis Deployment Scripts Analysis SSL/TLS Configuration Kubernetes Configuration Perf testing Pen Testing (manual)
  • 19. RULE OF THUMB FOR TOOLS Fit in “developer flow” âś“ IDEs Integration Can be automated âś“ Plugins for CI/CD pipelines âś“ API driven Can integrate with ecosystem âś“ Logging âś“ Monitoring âś“ SIEM 19
  • 21. 21 App icon made by https://www.flaticon.com/authors/pixel-buddha Front Process Data North South North South East West Firewall/GW Service Mesh Service Mesh PROTECT ALL APIS •Automatic Deployment •Protections as code •Deployed early
  • 22. 22 MONITOR AND ANALYZE Dev/QA âś“ Immediate feedback loop in developer’s IDE âś“ Treat vulnerabilities as bugs: âś“ Track issues found with your favorite ticketing system Production âś“ Analyze automatically all system logs âś“ Profile runtime behaviour and raise potential issues automatically
  • 23. KEY RECOMMENDATIONS Start small and iterate âś“ Don’t try to address all issues at once! Educate and help developers âś“ Add security people to development teams âś“ Don’t throw security at them as a new responsibility âś“ Help them by including feedback in their existing development flow Don’t throw too many tools in the pipeline âś“ Evaluate and choose depending on your needs 23