apidays London 2023 - Overengineering Weakens your API Security, Dr. David Vazquez Cortizo, APInity

apidays
apidaysapidays
Overengineering weakens
your API security
David Vazquez Cortizo
Managing Director
2
● Two truisms (?)
○ The importance of API security
○ The energy (budget) of your organization is limited for security
● Treat security waste (over engineering and bureaucracy) as a security threat
● Take a natural and energy-efficient approach to security through
○ A simple framework
○ Tooling
○ Mindset
Preamble
Agenda
● A simple framework to address API security
● Governance - Architecture and Development
● Transparency
● API Operations
● Mindset
● Closing
4
A simple framework to address API security
OAUTH2
OAUTH2 scopes
ACL RBAC
TLS1.2
Mutual TLS
TLS1.3
end2end encryption
Fine-grained authorization
5
● Understand and challenge your needs - remove waste
○ Consider getting rid of your IP whitelisting
● What do you do with your API Gateways?
○ Consider your options:
■ SaaS
■ Managed service from your cloud provider
■ APIM vendor
○ Bring together API Gateway & Identity & Access Management solution
○ Separate domains - Security & Operations layer vs Accessibility layer
Governance - Architecture
Marketplace & Platform Features
Publish your APIs and Digital
Products (Applications) into the
catalog
Control the visibility of your
services through private,
public and internal plans
Organise your products into
services within workspaces.
Enrich them with marketing details
and business insights
Invite external companies to
consume your services with
their own workspace that they
control and manage
Provide a multi-branded and
multi-catalog experience.
Business units have their own
organisation & workspaces
External companies manage their
own subscriptions and
applications in a secure and
compliant way
Manage your APIs across the
full API lifecycle from Design to
Sunset
Visualize analytics of your
API traffic down to each
individual request and obtain
performance and use insights
Use standard policies to control
usage in a secure and compliant
way
Highly available infrastructure
in APIM with 99.99% availability
across 4 global regions
Standards, Governance and
Expertise centralised around
the platform to provide a
one-stop CoE for APIs
Define Rate limits, transactions
and pricing for Metering and
Monetization and promote new
revenue streams and innovation
Marketplace
Platform
7
● Layered approach to security for Zero Trust
○ Three doors : Web layer / API Gateway / Destination server
○ External token replacement mechanism before the API Gateway
Governance - Architecture
8
● Leverage ISO 27001 Certification - shift security left
○ Identify security-related tickets during product refinement
○ Establish security roles inside the teams and early approval processes
● Standardize API development
○ Authentication and Access control
○ Input validation libraries, error handling, CORS policies, μservice templates
● Integrate tools in your Continuous Integration pipeline
○ Verification of 3rd party libraries (versions, security threats)
○ Code quality checks & API quality
Governance - Secure development life cycle
9
● Impossible to secure APIs you do not know exist and whether or not are in use
○ You need to know your API state
● APIs as Digital Products
○ Opportunities - Monetization
○ Risks - Security and Operations
● Use API Risk assessment to prioritize security measures
○ Level of use of the API, who and how
Transparency and Discoverability
What the eyes don't see the heart doesn't grieve
10
● Alarms and Monitoring
● Robust API logging and smart processing of these logs
API Operations
Source: Antonio Damasio - Descartes´ error
Is anybody abusing my API state? How would I know?
Follow Nature´s algorithm to develop brains- Detect, defend, prevent
● Rate limiting
● Ingress / Egress control
● Periodic security assessments
● Security posture - tooling for SIEM
11
● Your security budget is limited - Act responsibly
○ Be bold: Eliminate waste from your security and compliance processes
● Understand and challenge needs and requirements
○ Need a self-managed API Gateway?
● Stay rational - Avoid over engineering & Make decisions - Go for tooling!
○ Consider your core business and possible competitive advantage
○ Consider the capabilities of the organization
○ Remember the lifetime obligation to maintain and evolve the code you own
Mindset
12
● Addressed API security with a mix of security framework, tooling and mindset
● Presented a simple framework to address API security in five dimensions
● Gave a few examples of tooling
● Mindset
Summary
The API Marketplace company
E-Commerce Journey | Gateway agnostic | Regulated Industries
1 sur 13

Contenu connexe

Similaire à apidays London 2023 - Overengineering Weakens your API Security, Dr. David Vazquez Cortizo, APInity

Chapter 15 PresentationChapter 15 Presentation
Chapter 15 PresentationAmy McMullin
2.2K vues54 diapositives

Similaire à apidays London 2023 - Overengineering Weakens your API Security, Dr. David Vazquez Cortizo, APInity(20)

Chapter 15 PresentationChapter 15 Presentation
Chapter 15 Presentation
Amy McMullin2.2K vues
Madrid MuleSoft Meetup #11.pptxMadrid MuleSoft Meetup #11.pptx
Madrid MuleSoft Meetup #11.pptx
jorgelebrato319 vues
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application Security
Jim Kaplan CIA CFE197 vues
Secure Software Development Adoption StrategySecure Software Development Adoption Strategy
Secure Software Development Adoption Strategy
Narudom Roongsiriwong, CISSP2.4K vues

Plus de apidays(20)

Dernier(20)

ColonyOSColonyOS
ColonyOS
JohanKristiansson69 vues
PTicketInput.pdfPTicketInput.pdf
PTicketInput.pdf
stuartmcphersonflipm286 vues
How Leaders See Data? (Level 1)How Leaders See Data? (Level 1)
How Leaders See Data? (Level 1)
Narendra Narendra10 vues
Data structure and algorithm. Data structure and algorithm.
Data structure and algorithm.
Abdul salam 12 vues
MOSORE_BRESCIAMOSORE_BRESCIA
MOSORE_BRESCIA
Federico Karagulian5 vues
3196 The Case of The East River3196 The Case of The East River
3196 The Case of The East River
ErickANDRADE909 vues
Journey of Generative AIJourney of Generative AI
Journey of Generative AI
thomasjvarghese4917 vues
Building Real-Time Travel AlertsBuilding Real-Time Travel Alerts
Building Real-Time Travel Alerts
Timothy Spann88 vues
PROGRAMME.pdfPROGRAMME.pdf
PROGRAMME.pdf
HiNedHaJar7 vues
Microsoft Fabric.pptxMicrosoft Fabric.pptx
Microsoft Fabric.pptx
Shruti Chaurasia17 vues

apidays London 2023 - Overengineering Weakens your API Security, Dr. David Vazquez Cortizo, APInity

  • 1. Overengineering weakens your API security David Vazquez Cortizo Managing Director
  • 2. 2 ● Two truisms (?) ○ The importance of API security ○ The energy (budget) of your organization is limited for security ● Treat security waste (over engineering and bureaucracy) as a security threat ● Take a natural and energy-efficient approach to security through ○ A simple framework ○ Tooling ○ Mindset Preamble
  • 3. Agenda ● A simple framework to address API security ● Governance - Architecture and Development ● Transparency ● API Operations ● Mindset ● Closing
  • 4. 4 A simple framework to address API security OAUTH2 OAUTH2 scopes ACL RBAC TLS1.2 Mutual TLS TLS1.3 end2end encryption Fine-grained authorization
  • 5. 5 ● Understand and challenge your needs - remove waste ○ Consider getting rid of your IP whitelisting ● What do you do with your API Gateways? ○ Consider your options: ■ SaaS ■ Managed service from your cloud provider ■ APIM vendor ○ Bring together API Gateway & Identity & Access Management solution ○ Separate domains - Security & Operations layer vs Accessibility layer Governance - Architecture
  • 6. Marketplace & Platform Features Publish your APIs and Digital Products (Applications) into the catalog Control the visibility of your services through private, public and internal plans Organise your products into services within workspaces. Enrich them with marketing details and business insights Invite external companies to consume your services with their own workspace that they control and manage Provide a multi-branded and multi-catalog experience. Business units have their own organisation & workspaces External companies manage their own subscriptions and applications in a secure and compliant way Manage your APIs across the full API lifecycle from Design to Sunset Visualize analytics of your API traffic down to each individual request and obtain performance and use insights Use standard policies to control usage in a secure and compliant way Highly available infrastructure in APIM with 99.99% availability across 4 global regions Standards, Governance and Expertise centralised around the platform to provide a one-stop CoE for APIs Define Rate limits, transactions and pricing for Metering and Monetization and promote new revenue streams and innovation Marketplace Platform
  • 7. 7 ● Layered approach to security for Zero Trust ○ Three doors : Web layer / API Gateway / Destination server ○ External token replacement mechanism before the API Gateway Governance - Architecture
  • 8. 8 ● Leverage ISO 27001 Certification - shift security left ○ Identify security-related tickets during product refinement ○ Establish security roles inside the teams and early approval processes ● Standardize API development ○ Authentication and Access control ○ Input validation libraries, error handling, CORS policies, μservice templates ● Integrate tools in your Continuous Integration pipeline ○ Verification of 3rd party libraries (versions, security threats) ○ Code quality checks & API quality Governance - Secure development life cycle
  • 9. 9 ● Impossible to secure APIs you do not know exist and whether or not are in use ○ You need to know your API state ● APIs as Digital Products ○ Opportunities - Monetization ○ Risks - Security and Operations ● Use API Risk assessment to prioritize security measures ○ Level of use of the API, who and how Transparency and Discoverability What the eyes don't see the heart doesn't grieve
  • 10. 10 ● Alarms and Monitoring ● Robust API logging and smart processing of these logs API Operations Source: Antonio Damasio - Descartes´ error Is anybody abusing my API state? How would I know? Follow Nature´s algorithm to develop brains- Detect, defend, prevent ● Rate limiting ● Ingress / Egress control ● Periodic security assessments ● Security posture - tooling for SIEM
  • 11. 11 ● Your security budget is limited - Act responsibly ○ Be bold: Eliminate waste from your security and compliance processes ● Understand and challenge needs and requirements ○ Need a self-managed API Gateway? ● Stay rational - Avoid over engineering & Make decisions - Go for tooling! ○ Consider your core business and possible competitive advantage ○ Consider the capabilities of the organization ○ Remember the lifetime obligation to maintain and evolve the code you own Mindset
  • 12. 12 ● Addressed API security with a mix of security framework, tooling and mindset ● Presented a simple framework to address API security in five dimensions ● Gave a few examples of tooling ● Mindset Summary
  • 13. The API Marketplace company E-Commerce Journey | Gateway agnostic | Regulated Industries