SlideShare a Scribd company logo
1 of 41
Download to read offline
© 2023 Sudhir Chepeni
1
Exploring Advanced
API Security
Techniques and
Technologies
Sudhir Chepeni
Director Application Security
@ Akamai Technologies
© 2023 Sudhir Chepeni
2
Global Trends Raising The Risks Of Online
Interactions
● Digitalization
● COVID 19
● More interconnectivity of
supply chains
● Cost savings
● Skills
© 2023 Sudhir Chepeni
3
App Modernization is Fuelling API Growth
Impact on Development Team
Developer efficiency + deployment speed
Better connectivity with 3rd party apps and partners
Better User Experiences and Personalization
Rapid Innovation
75% believe microservices will drive the biggest growth in APIs
80% of organizations are developing public facing APIs
APIs are everywhere as key enablers of digital transformation
strategies and modern applications.
© 2023 Sudhir Chepeni
4
Pervasive API Traffic & Attack Trends
35%
API Traffic YoY
Growth CAGR
2020-2025
+200T
API Hits by 2024
+4,500
Customers
delivering APIs
91%
Of all ESSL
requests are APIs December 2021, API calls represented 54% of
total requests, up from 52% during the first week
of February 2021.
Explosive growth in API requests only being outpaced by the growth in malicious API calls (>600% YoY)
© 2023 Sudhir Chepeni
5
Web Application Attacks
Continue to Rise
+23% Q/Q | +196% Y/Y
6.31 Billion
NEW RECORD
In Q1’22, we experienced
We analyze ~350 TB of new attack data every day
web app attacks in a single
quarter for the first time
(that’s over 1 billion more
than the prior quarter!)
6 Billion
© 2023 Sudhir Chepeni
6
API Attacks are getting global and across verticals
Case Study : Log4j
© 2023 Sudhir Chepeni
7
API Attacks are continuous and Mitigation needs be
continuous: Case Study Spring Core
© 2023 Sudhir Chepeni
8
APIs complexity leads to Risk
● Modern applications have more moving parts or pieces to manage
● The nature of collaboration is evolving - from local to global
● Development trends are changing
● Teams are often in different tooling ecosystems
More
Functionalities More Features More Users More Data
© 2023 Sudhir Chepeni
9
Source: Forrester Analytics Business Technographics Security Survey, 2021
Base: 530 Security decision-makers with network, data center, app security, or security ops responsibilities who experienced an
external attack when their company was breached
1.94
The average number
of times firms
suffered breaches
from external attacks
WHAT’S AT RISK?
© 2023 Sudhir Chepeni
10
API security flaws can result in data breaches
© 2023 Sudhir Chepeni
11
Today securing an application means…
Protecting the..
q Custom Developed Source Code
q Software that forms the supply chain
q The CI/CD pipeline itself
q Infrastructure hosting the application - a majority of which is spinning up in public cloud
q APIs powering the comms between user and inter app components
© 2023 Sudhir Chepeni
12
API Overview
© 2023 Sudhir Chepeni
13
What is an API
An application programming Interface (API) is a connection between computer programs
Your Program
(In any language say X)
My Program
(In any language say Y)
getSomething
Something
© 2023 Sudhir Chepeni
14
APIs have
TYPE
XML-RPC, SOAP, REST,
gRPC, GraphQL
TRANSPORT
HTTP(S), HTTP/2/3 ..
DATA ENCODING
XML, JSON, binary, protobuf..
INFRA
API Gateway, Service mesh, Load
balancer, Control plane
STAKEHOLDERS
• Customers, users
• Dev Teams
• Product Teams
• Admins, network, API Gateway
• Security Operations
• Mobile/IoT
API
© 2023 Sudhir Chepeni
15
15
API Types, Protocols and deployments
Public APIs allow to
expose information and
functionalities to third
parties
Private APIs are used
internally to facilitate
integration of different
applications
Partner APIs used to
facilitate
communication and
integration between
partners
Different API Types Different API Protocols
Understanding the API
Types, Protocols and
Deployments is key to
providing an API
Security Solution
Deployment of APIs
Virtualization
Services
Containers
API
© 2023 Sudhir Chepeni
16
APIs Grow
APIs will Grow
Breadth – More and more APIs
Depth – API calls create calls to other APIs
Directions
North/South Traffic – External APIs
East/West- Internal APIs
© 2023 Sudhir Chepeni
17
Server
Database
Media
Web
Mobile
Partner
Internet
Sensors
Request
Response
Interaction
Layer
Micro
Orientation
Mediation
Transformation
Traffic
Management
Network
Integration
Layer
Service
Mediation
Messaging
Connectivity
Application Layer
Business Rules
Business Process
Orchestration
Sense and Response
Service Orchestration
Infrastructure Configs
API Architecture
• API Management
• Service Management
• Platform Management
• Developer Portal
• Internal external
• Partner
• Authentication
• Authorization
• Threat Protection
• Data Privacy
• PCI DSS
• Federation
• Single Sign on
• Access Control
• API Analytics
• Operation
• Customer
• Business Customer BI
• Req reply signatures
• Token channel binding
• Context risk assessment
• App integrity checking
• Environment Risk
Assessment
• Minimize client-side API keys
API Security Thinking
• API Interface Layer
• API Trust and usage Policy
• Layer 7 Attack Protection
• Compliance checks
• Rogue API Detection
• API Implementation Layer
• Micro segmentation
• Identify propagation and
brokering
• Multilevel Authorization
• Integrate standard
infrastructure and
application platform security
• Continues API monitoring
• Configuration
API Developers
Are thinking
API Security
Needs thinking
Management Services Analytics Services
Client Services
Security Services
© 2023 Sudhir Chepeni
18
API Security Building Blocks
© 2023 Sudhir Chepeni
19
Traditional Attacks Current/Future Attacks
Recent Attacks
Bad actors targeting APIs would
attacks such as SQLi and XSS and
exploit vulnerabilities
Attackers take days, weeks, or even
months to probe and learn about
APIs, and they use “low-and-slow”
techniques that stay under the radar
of traditional security tools.
“One-and-Done” “Low-and-Slow”
Attackers focus now is on finding
vulnerabilities in the business logic of APIs.
APIs are unique, so the attacks have to be
as well. The attackers launch low and slow
attacks with reconnaissance to understand
context and start business logic abuse
“Context-Based”
Evolution of API Attacks
© 2023 Sudhir Chepeni
20
API Attack Classes
DDOS
Network DDOS
HTTP Flood
Application DOS
Data Breach
Internal data made public
Excessive data exposure
Authentication weakness
Abuse of
Functionality
Business logic flaws
API
© 2023 Sudhir Chepeni
21
DDoS
© 2023 Sudhir Chepeni
22
API DDoS Attack Surface
© 2023 Sudhir Chepeni
23
Global WAAP DDoS Attacks
© 2023 Sudhir Chepeni
24
BOTS
© 2023 Sudhir Chepeni
25
API’s Protection From BOTs
© 2023 Sudhir Chepeni
26
Global Bot Activity
Malicious Bots Plague Businesses
January – June
2021
July – December
2021
January –
April
2022
40B
30B
20B
0
Number
of
Bot
Requests
Malicious Benign
10B
© 2023 Sudhir Chepeni
27
Malicious bot activity
jumped more than
during India’s Diwali
shopping holidays.
55%
© 2023 Sudhir Chepeni
28
Business Logic
© 2023 Sudhir Chepeni
29
OWASP Top 10
A01:2021-Broken Access Control
A02:2021-Cryptographic Failures
A03:2021-Injection
A04:2021-Insecure Design
A05:2021-Security Misconfiguration
A06:2021-Vulnerable and Outdated Components
A07:2021-Identification and Authentication
Failures
A08:2021-Software and Data Integrity Failures
A09:2021-Security Logging and Monitoring
Failures
A10:2021-Server-Side Request Forgery
© 2023 Sudhir Chepeni
30
Real World Examples
30
API Vulnerability Exploited Impact
Authentication, Authorization, Excessive
Data Exposure
60 million customers data compromised due to broken
access control which allowed logged in users to access
account information of others
Authentication and Authorization 13+ million customer PII, IMEI, IMSI data leaked. Some
instances of SIM Swap scams with MFA bypass
Authentication, Excessive Data Access,
Anti-Automation
200 million user transactions were set to public by
default and available to anyone causing big data breach
Authentication 37+ million Panera bread customer profile data exposed
due to breach in unauthenticated API endpoint
Authorization and Excessive Data Exposure Account Impersonation/Takeover of any Uber user,
driver, partner
Authentication, Configuration Issues Ability to access remote functionality of millions of
cars in China
Authentication and Excessive Data
Exposure
FICO Score and Risk factors for 100+ million
people in the US
© 2023 Sudhir Chepeni
31
API Security Solutions
© 2023 Sudhir Chepeni
32
API Security Technologies
© 2023 Sudhir Chepeni
33
Vestibulum congue tempus
Lorem ipsum
Vestibulum congue tempus
Lorem ipsum
Vestibulum congue tempus
Lorem ipsum
Vestibulum congue tempus
Lorem ipsum
Vestibulum congue tempus
Lorem ipsum
Vestibulum congue tempus
Lorem ipsum
Vestibulum congue tempus
Lorem ipsum
Vestibulum congue tempus
Lorem ipsum
Vestibulum congue tempus
Lorem ipsum
Vestibulum congue tempus
Lorem ipsum
Vestibulum congue tempus
Lorem ipsum
Vestibulum congue tempus
Lorem ipsum
●DoS & Automation
●Injection Attacks
●Business Logic Abuse &
●Industry Specific Workflows
Runtime Detections
●API Discovery & Profiling
●API Misconfigurations
●Risk Assessment & Prioritization
Visibility and Posture
Management
●Integration into CI/CD
●API Security Testing
SDLC Integrations
●API centric threat hunting
●API centric analytics
●Integrations with prevention and
response tools
Threat Hunting,
Analytics
API Security Framework
© 2023 Sudhir Chepeni
34
API Security Solution for what?
DEV or Runtime
Security Posture
• Inventory of APIs
• Mapping of data
• Who what from where
Runtime Security
• Monitoring watching inspecting traffic
• Behavior based models for anomaly detection
• Heuristic, ML, AI modeling with continuous learning
• Threshold of abnormal traffic alerts and protection
1 2
© 2023 Sudhir Chepeni
35
APIs Runtime
Versions
Design, Develop, Build, Test
and Deploy
APIs in running in
Production
API Security and
Build time
API Security and
Runtime
Monitor, Protect , Observe,
Behavior based detections
Security
Posture
Runtime
© 2023 Sudhir Chepeni
36
API Security Full Cycle
© 2023 Sudhir Chepeni
37
API Security
DISCOVER
ALERT &
PROTECT
DETECT
Full Lifecycle API Attacks
and Abuse security
1. Continuous catalog of APIs
2. Sensitive Data Discovery
3. Discover deprecated, undocumented APIs
4. Identify 3rd party APIs
1. OWASP API Top 10 Attacks Detection
2. Behavior Based detections
3. ML assisted analysis to help reduce
false positive rates
1. Generate Actionable Alerts
2. Protect the APIs Ex at WAF
API Security Solution
© 2023 Sudhir Chepeni
38
API Discovery
& Profiling
Automatically
discover and profile
unknown and/or
changing APIs
VISIBILITY
Network
Set API network lists
(allowlists and/or
blocklists) based on
IP/Geography
Rate controls for API
endpoints based on
API key. Protection
from low and slow
attacks (slow POST)
DDOS
PROTECTION
Authentication
& Authorization
Secure
authentication and
authorization via
JSON Web Token
(JWT) validation
+/- API SECURITY &
GOVERNANCE
Threat Assessment
Automated assessment
of API risk
Prioritized API
protection
Behavior based API
Security
Analyze API Behavior,
session behavior to
uncover advanced attacks
AI, ML MODEL
BASED
AUTOMATED THREAT
ASSESMENT
API Security Path
© 2023 Sudhir Chepeni
39
PROTECT ALL APPS AND APIS
Design Time and Runtime
Layered Defense To Protect Against Evolving API
Threats
Attack surface reduction & prevent
lateral movement
Cloud misconfigurations
Supply chain attacks, known
vulnerabilities
Edge WAAP
Visibility to all apps & APIs
Devops deployment, rapid config changes,
native to public cloud
DDoS, Bots, Injection-based Attacks
Container breakout, container
misconfigurations, supply chain attacks
Container Runtime
Security
Container Vulnerability
Mgt
Attack Surface Mapping
Cloud Configuration Audits
Microsegmentation
Origin WAF
Edge WAAP
Cloud Workload
Protection
Platform
Cloud Security Posture
Management
© 2023 Sudhir Chepeni
40
Recommendations
1. Think about full lifecycle of APIs for API Security Solutions
2. API security is Discovery Detection and Protection
3. API security is a layered, choose fewer tools
4. Use automation to alert right people in time
5. Focus on observability, use tools to automatically detect and protect
© 2023 Sudhir Chepeni
41 41
Customers expect their
digital experience to be
consistently fast,
consistently engaging,
completely secure
APIs are at the Center of Modern Experience

More Related Content

What's hot

API Management architect presentation
API Management architect presentationAPI Management architect presentation
API Management architect presentationsflynn073
 
RefCard API Architecture Strategy
RefCard API Architecture StrategyRefCard API Architecture Strategy
RefCard API Architecture StrategyOCTO Technology
 
Azure API Management
Azure API ManagementAzure API Management
Azure API Managementjeremysbrown
 
Building an API Security Strategy
Building an API Security StrategyBuilding an API Security Strategy
Building an API Security StrategySmartBear
 
API-first design - Basis for an consistent API-Management approach
API-first design - Basis for an consistent API-Management approachAPI-first design - Basis for an consistent API-Management approach
API-first design - Basis for an consistent API-Management approachSven Bernhardt
 
API Maturity Model (Webcast with Accenture)
API Maturity Model (Webcast with Accenture)API Maturity Model (Webcast with Accenture)
API Maturity Model (Webcast with Accenture)Apigee | Google Cloud
 
INTERFACE by apidays 2023 - Everything you need to know about API security, T...
INTERFACE by apidays 2023 - Everything you need to know about API security, T...INTERFACE by apidays 2023 - Everything you need to know about API security, T...
INTERFACE by apidays 2023 - Everything you need to know about API security, T...apidays
 
2022 APIsecure_Shift Left API Security - The Right Way
2022 APIsecure_Shift Left API Security - The Right Way2022 APIsecure_Shift Left API Security - The Right Way
2022 APIsecure_Shift Left API Security - The Right WayAPIsecure_ Official
 
API Management Within a Microservices Architecture
API Management Within a Microservices Architecture API Management Within a Microservices Architecture
API Management Within a Microservices Architecture Nadeesha Gamage
 
The Architecture of an API Platform
The Architecture of an API PlatformThe Architecture of an API Platform
The Architecture of an API PlatformJohannes Ridderstedt
 
INTERFACE by apidays 2023 - How APIs are fueling the growth of 5G and MEC
INTERFACE by apidays 2023 - How APIs are fueling the growth of 5G and MECINTERFACE by apidays 2023 - How APIs are fueling the growth of 5G and MEC
INTERFACE by apidays 2023 - How APIs are fueling the growth of 5G and MECapidays
 
apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...
apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...
apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...apidays
 
apidays Australia 2023 - API Strategy In The Era Of Generative AI,Shreshta Sh...
apidays Australia 2023 - API Strategy In The Era Of Generative AI,Shreshta Sh...apidays Australia 2023 - API Strategy In The Era Of Generative AI,Shreshta Sh...
apidays Australia 2023 - API Strategy In The Era Of Generative AI,Shreshta Sh...apidays
 
INTERFACE by apidays 2023 - API-as-a-product: The Key to a Successful API Pro...
INTERFACE by apidays 2023 - API-as-a-product: The Key to a Successful API Pro...INTERFACE by apidays 2023 - API-as-a-product: The Key to a Successful API Pro...
INTERFACE by apidays 2023 - API-as-a-product: The Key to a Successful API Pro...apidays
 
What do you mean by “API as a Product”?
What do you mean by “API as a Product”?What do you mean by “API as a Product”?
What do you mean by “API as a Product”?Nordic APIs
 
Azure API Management
Azure API ManagementAzure API Management
Azure API ManagementDaniel Toomey
 
apidays New York 2023 - Embedded Payments in B2B and B2C use cases, Adrita Bh...
apidays New York 2023 - Embedded Payments in B2B and B2C use cases, Adrita Bh...apidays New York 2023 - Embedded Payments in B2B and B2C use cases, Adrita Bh...
apidays New York 2023 - Embedded Payments in B2B and B2C use cases, Adrita Bh...apidays
 

What's hot (20)

API Management architect presentation
API Management architect presentationAPI Management architect presentation
API Management architect presentation
 
RefCard API Architecture Strategy
RefCard API Architecture StrategyRefCard API Architecture Strategy
RefCard API Architecture Strategy
 
Azure API Management
Azure API ManagementAzure API Management
Azure API Management
 
Building an API Security Strategy
Building an API Security StrategyBuilding an API Security Strategy
Building an API Security Strategy
 
API-first design - Basis for an consistent API-Management approach
API-first design - Basis for an consistent API-Management approachAPI-first design - Basis for an consistent API-Management approach
API-first design - Basis for an consistent API-Management approach
 
API Maturity Model (Webcast with Accenture)
API Maturity Model (Webcast with Accenture)API Maturity Model (Webcast with Accenture)
API Maturity Model (Webcast with Accenture)
 
INTERFACE by apidays 2023 - Everything you need to know about API security, T...
INTERFACE by apidays 2023 - Everything you need to know about API security, T...INTERFACE by apidays 2023 - Everything you need to know about API security, T...
INTERFACE by apidays 2023 - Everything you need to know about API security, T...
 
2022 APIsecure_Shift Left API Security - The Right Way
2022 APIsecure_Shift Left API Security - The Right Way2022 APIsecure_Shift Left API Security - The Right Way
2022 APIsecure_Shift Left API Security - The Right Way
 
API Management Within a Microservices Architecture
API Management Within a Microservices Architecture API Management Within a Microservices Architecture
API Management Within a Microservices Architecture
 
Apigee Products Overview
Apigee Products OverviewApigee Products Overview
Apigee Products Overview
 
The Architecture of an API Platform
The Architecture of an API PlatformThe Architecture of an API Platform
The Architecture of an API Platform
 
INTERFACE by apidays 2023 - How APIs are fueling the growth of 5G and MEC
INTERFACE by apidays 2023 - How APIs are fueling the growth of 5G and MECINTERFACE by apidays 2023 - How APIs are fueling the growth of 5G and MEC
INTERFACE by apidays 2023 - How APIs are fueling the growth of 5G and MEC
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
API Governance
API Governance API Governance
API Governance
 
apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...
apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...
apidays Paris 2022 - API design best practices, Ryan Clifford & Ros Bennis, F...
 
apidays Australia 2023 - API Strategy In The Era Of Generative AI,Shreshta Sh...
apidays Australia 2023 - API Strategy In The Era Of Generative AI,Shreshta Sh...apidays Australia 2023 - API Strategy In The Era Of Generative AI,Shreshta Sh...
apidays Australia 2023 - API Strategy In The Era Of Generative AI,Shreshta Sh...
 
INTERFACE by apidays 2023 - API-as-a-product: The Key to a Successful API Pro...
INTERFACE by apidays 2023 - API-as-a-product: The Key to a Successful API Pro...INTERFACE by apidays 2023 - API-as-a-product: The Key to a Successful API Pro...
INTERFACE by apidays 2023 - API-as-a-product: The Key to a Successful API Pro...
 
What do you mean by “API as a Product”?
What do you mean by “API as a Product”?What do you mean by “API as a Product”?
What do you mean by “API as a Product”?
 
Azure API Management
Azure API ManagementAzure API Management
Azure API Management
 
apidays New York 2023 - Embedded Payments in B2B and B2C use cases, Adrita Bh...
apidays New York 2023 - Embedded Payments in B2B and B2C use cases, Adrita Bh...apidays New York 2023 - Embedded Payments in B2B and B2C use cases, Adrita Bh...
apidays New York 2023 - Embedded Payments in B2B and B2C use cases, Adrita Bh...
 

Similar to APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies, Sudhir Chepeni

F5-API-Security-Best-Practices.pdf
F5-API-Security-Best-Practices.pdfF5-API-Security-Best-Practices.pdf
F5-API-Security-Best-Practices.pdfFahmiDzikrullah
 
2022 APIsecure_Harnessing the Speed of Innovation
2022 APIsecure_Harnessing the Speed of Innovation2022 APIsecure_Harnessing the Speed of Innovation
2022 APIsecure_Harnessing the Speed of InnovationAPIsecure_ Official
 
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...apidays
 
Outpost24 webinar Why API security matters and how to get it right.pdf
Outpost24 webinar Why API security matters and how to get it right.pdfOutpost24 webinar Why API security matters and how to get it right.pdf
Outpost24 webinar Why API security matters and how to get it right.pdfOutpost24
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014Andrew Ames
 
Develop - App Explosion: Modernizing Your Development Skills
Develop - App Explosion: Modernizing Your Development SkillsDevelop - App Explosion: Modernizing Your Development Skills
Develop - App Explosion: Modernizing Your Development SkillsLaurenWendler
 
apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...
apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...
apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...apidays
 
API Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIsAPI Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIsAaronLieberman5
 
API, Integration, and SOA Convergence
API, Integration, and SOA ConvergenceAPI, Integration, and SOA Convergence
API, Integration, and SOA ConvergenceKasun Indrasiri
 
API SECURITY by krishna murari and vikas maurya
API SECURITY by krishna murari and vikas mauryaAPI SECURITY by krishna murari and vikas maurya
API SECURITY by krishna murari and vikas mauryaKrishna Murari
 
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accentureapidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accentureapidays
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverPing Identity
 
LF_APIStrat17_OWASP’s Latest Category: API Underprotection
LF_APIStrat17_OWASP’s Latest Category: API UnderprotectionLF_APIStrat17_OWASP’s Latest Category: API Underprotection
LF_APIStrat17_OWASP’s Latest Category: API UnderprotectionLF_APIStrat
 
Cloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksCloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksHarry Gunns
 
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...apidays
 
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...APIsecure_ Official
 
Successfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINXSuccessfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINXNGINX, Inc.
 

Similar to APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies, Sudhir Chepeni (20)

F5-API-Security-Best-Practices.pdf
F5-API-Security-Best-Practices.pdfF5-API-Security-Best-Practices.pdf
F5-API-Security-Best-Practices.pdf
 
2022 APIsecure_Harnessing the Speed of Innovation
2022 APIsecure_Harnessing the Speed of Innovation2022 APIsecure_Harnessing the Speed of Innovation
2022 APIsecure_Harnessing the Speed of Innovation
 
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
 
Outpost24 webinar Why API security matters and how to get it right.pdf
Outpost24 webinar Why API security matters and how to get it right.pdfOutpost24 webinar Why API security matters and how to get it right.pdf
Outpost24 webinar Why API security matters and how to get it right.pdf
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014
 
Api security-present
Api security-presentApi security-present
Api security-present
 
Develop - App Explosion: Modernizing Your Development Skills
Develop - App Explosion: Modernizing Your Development SkillsDevelop - App Explosion: Modernizing Your Development Skills
Develop - App Explosion: Modernizing Your Development Skills
 
apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...
apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...
apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...
 
API Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIsAPI Security - Everything You Need to Know To Protect Your APIs
API Security - Everything You Need to Know To Protect Your APIs
 
Webinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or RealityWebinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or Reality
 
API, Integration, and SOA Convergence
API, Integration, and SOA ConvergenceAPI, Integration, and SOA Convergence
API, Integration, and SOA Convergence
 
API SECURITY by krishna murari and vikas maurya
API SECURITY by krishna murari and vikas mauryaAPI SECURITY by krishna murari and vikas maurya
API SECURITY by krishna murari and vikas maurya
 
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accentureapidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than Ever
 
LF_APIStrat17_OWASP’s Latest Category: API Underprotection
LF_APIStrat17_OWASP’s Latest Category: API UnderprotectionLF_APIStrat17_OWASP’s Latest Category: API Underprotection
LF_APIStrat17_OWASP’s Latest Category: API Underprotection
 
Cloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksCloud Security Primer - F5 Networks
Cloud Security Primer - F5 Networks
 
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
 
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
 
Successfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINXSuccessfully Implement Your API Strategy with NGINX
Successfully Implement Your API Strategy with NGINX
 
Financial services rely on APIs
Financial services rely on APIsFinancial services rely on APIs
Financial services rely on APIs
 

More from apidays

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - The secrets to Graph success, by Leah Hurwich Adler, ...
Apidays New York 2024 - The secrets to Graph success, by Leah Hurwich Adler, ...Apidays New York 2024 - The secrets to Graph success, by Leah Hurwich Adler, ...
Apidays New York 2024 - The secrets to Graph success, by Leah Hurwich Adler, ...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - API Discovery - From Crawl to Run by Rob Dickinson, G...
Apidays New York 2024 - API Discovery - From Crawl to Run by Rob Dickinson, G...Apidays New York 2024 - API Discovery - From Crawl to Run by Rob Dickinson, G...
Apidays New York 2024 - API Discovery - From Crawl to Run by Rob Dickinson, G...apidays
 
Apidays Singapore 2024 - Building with the Planet in Mind by Sandeep Joshi, M...
Apidays Singapore 2024 - Building with the Planet in Mind by Sandeep Joshi, M...Apidays Singapore 2024 - Building with the Planet in Mind by Sandeep Joshi, M...
Apidays Singapore 2024 - Building with the Planet in Mind by Sandeep Joshi, M...apidays
 
Apidays Singapore 2024 - Connecting Cross Border Commerce with Payments by Gu...
Apidays Singapore 2024 - Connecting Cross Border Commerce with Payments by Gu...Apidays Singapore 2024 - Connecting Cross Border Commerce with Payments by Gu...
Apidays Singapore 2024 - Connecting Cross Border Commerce with Payments by Gu...apidays
 
Apidays Singapore 2024 - Privacy Enhancing Technologies for AI by Mark Choo, ...
Apidays Singapore 2024 - Privacy Enhancing Technologies for AI by Mark Choo, ...Apidays Singapore 2024 - Privacy Enhancing Technologies for AI by Mark Choo, ...
Apidays Singapore 2024 - Privacy Enhancing Technologies for AI by Mark Choo, ...apidays
 
Apidays Singapore 2024 - Blending AI and IoT for Smarter Health by Matthew Ch...
Apidays Singapore 2024 - Blending AI and IoT for Smarter Health by Matthew Ch...Apidays Singapore 2024 - Blending AI and IoT for Smarter Health by Matthew Ch...
Apidays Singapore 2024 - Blending AI and IoT for Smarter Health by Matthew Ch...apidays
 
Apidays Singapore 2024 - OpenTelemetry for API Monitoring by Danielle Kayumbi...
Apidays Singapore 2024 - OpenTelemetry for API Monitoring by Danielle Kayumbi...Apidays Singapore 2024 - OpenTelemetry for API Monitoring by Danielle Kayumbi...
Apidays Singapore 2024 - OpenTelemetry for API Monitoring by Danielle Kayumbi...apidays
 
Apidays Singapore 2024 - Connecting Product and Engineering Teams with Testin...
Apidays Singapore 2024 - Connecting Product and Engineering Teams with Testin...Apidays Singapore 2024 - Connecting Product and Engineering Teams with Testin...
Apidays Singapore 2024 - Connecting Product and Engineering Teams with Testin...apidays
 
Apidays Singapore 2024 - The Growing Carbon Footprint of Digitalization and H...
Apidays Singapore 2024 - The Growing Carbon Footprint of Digitalization and H...Apidays Singapore 2024 - The Growing Carbon Footprint of Digitalization and H...
Apidays Singapore 2024 - The Growing Carbon Footprint of Digitalization and H...apidays
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Apidays Singapore 2024 - API Monitoring x SRE by Ryan Ashneil and Eugene Wong...
Apidays Singapore 2024 - API Monitoring x SRE by Ryan Ashneil and Eugene Wong...Apidays Singapore 2024 - API Monitoring x SRE by Ryan Ashneil and Eugene Wong...
Apidays Singapore 2024 - API Monitoring x SRE by Ryan Ashneil and Eugene Wong...apidays
 
Apidays Singapore 2024 - A nuanced approach on AI costs and benefits for the ...
Apidays Singapore 2024 - A nuanced approach on AI costs and benefits for the ...Apidays Singapore 2024 - A nuanced approach on AI costs and benefits for the ...
Apidays Singapore 2024 - A nuanced approach on AI costs and benefits for the ...apidays
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Apidays Singapore 2024 - How APIs drive business at BNP Paribas by Quy-Doan D...
Apidays Singapore 2024 - How APIs drive business at BNP Paribas by Quy-Doan D...Apidays Singapore 2024 - How APIs drive business at BNP Paribas by Quy-Doan D...
Apidays Singapore 2024 - How APIs drive business at BNP Paribas by Quy-Doan D...apidays
 

More from apidays (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The secrets to Graph success, by Leah Hurwich Adler, ...
Apidays New York 2024 - The secrets to Graph success, by Leah Hurwich Adler, ...Apidays New York 2024 - The secrets to Graph success, by Leah Hurwich Adler, ...
Apidays New York 2024 - The secrets to Graph success, by Leah Hurwich Adler, ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - API Discovery - From Crawl to Run by Rob Dickinson, G...
Apidays New York 2024 - API Discovery - From Crawl to Run by Rob Dickinson, G...Apidays New York 2024 - API Discovery - From Crawl to Run by Rob Dickinson, G...
Apidays New York 2024 - API Discovery - From Crawl to Run by Rob Dickinson, G...
 
Apidays Singapore 2024 - Building with the Planet in Mind by Sandeep Joshi, M...
Apidays Singapore 2024 - Building with the Planet in Mind by Sandeep Joshi, M...Apidays Singapore 2024 - Building with the Planet in Mind by Sandeep Joshi, M...
Apidays Singapore 2024 - Building with the Planet in Mind by Sandeep Joshi, M...
 
Apidays Singapore 2024 - Connecting Cross Border Commerce with Payments by Gu...
Apidays Singapore 2024 - Connecting Cross Border Commerce with Payments by Gu...Apidays Singapore 2024 - Connecting Cross Border Commerce with Payments by Gu...
Apidays Singapore 2024 - Connecting Cross Border Commerce with Payments by Gu...
 
Apidays Singapore 2024 - Privacy Enhancing Technologies for AI by Mark Choo, ...
Apidays Singapore 2024 - Privacy Enhancing Technologies for AI by Mark Choo, ...Apidays Singapore 2024 - Privacy Enhancing Technologies for AI by Mark Choo, ...
Apidays Singapore 2024 - Privacy Enhancing Technologies for AI by Mark Choo, ...
 
Apidays Singapore 2024 - Blending AI and IoT for Smarter Health by Matthew Ch...
Apidays Singapore 2024 - Blending AI and IoT for Smarter Health by Matthew Ch...Apidays Singapore 2024 - Blending AI and IoT for Smarter Health by Matthew Ch...
Apidays Singapore 2024 - Blending AI and IoT for Smarter Health by Matthew Ch...
 
Apidays Singapore 2024 - OpenTelemetry for API Monitoring by Danielle Kayumbi...
Apidays Singapore 2024 - OpenTelemetry for API Monitoring by Danielle Kayumbi...Apidays Singapore 2024 - OpenTelemetry for API Monitoring by Danielle Kayumbi...
Apidays Singapore 2024 - OpenTelemetry for API Monitoring by Danielle Kayumbi...
 
Apidays Singapore 2024 - Connecting Product and Engineering Teams with Testin...
Apidays Singapore 2024 - Connecting Product and Engineering Teams with Testin...Apidays Singapore 2024 - Connecting Product and Engineering Teams with Testin...
Apidays Singapore 2024 - Connecting Product and Engineering Teams with Testin...
 
Apidays Singapore 2024 - The Growing Carbon Footprint of Digitalization and H...
Apidays Singapore 2024 - The Growing Carbon Footprint of Digitalization and H...Apidays Singapore 2024 - The Growing Carbon Footprint of Digitalization and H...
Apidays Singapore 2024 - The Growing Carbon Footprint of Digitalization and H...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays Singapore 2024 - API Monitoring x SRE by Ryan Ashneil and Eugene Wong...
Apidays Singapore 2024 - API Monitoring x SRE by Ryan Ashneil and Eugene Wong...Apidays Singapore 2024 - API Monitoring x SRE by Ryan Ashneil and Eugene Wong...
Apidays Singapore 2024 - API Monitoring x SRE by Ryan Ashneil and Eugene Wong...
 
Apidays Singapore 2024 - A nuanced approach on AI costs and benefits for the ...
Apidays Singapore 2024 - A nuanced approach on AI costs and benefits for the ...Apidays Singapore 2024 - A nuanced approach on AI costs and benefits for the ...
Apidays Singapore 2024 - A nuanced approach on AI costs and benefits for the ...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays Singapore 2024 - How APIs drive business at BNP Paribas by Quy-Doan D...
Apidays Singapore 2024 - How APIs drive business at BNP Paribas by Quy-Doan D...Apidays Singapore 2024 - How APIs drive business at BNP Paribas by Quy-Doan D...
Apidays Singapore 2024 - How APIs drive business at BNP Paribas by Quy-Doan D...
 

Recently uploaded

Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Datingkojalkojal131
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...SUHANI PANDEY
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...nilamkumrai
 

Recently uploaded (20)

Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 

APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies, Sudhir Chepeni

  • 1. © 2023 Sudhir Chepeni 1 Exploring Advanced API Security Techniques and Technologies Sudhir Chepeni Director Application Security @ Akamai Technologies
  • 2. © 2023 Sudhir Chepeni 2 Global Trends Raising The Risks Of Online Interactions ● Digitalization ● COVID 19 ● More interconnectivity of supply chains ● Cost savings ● Skills
  • 3. © 2023 Sudhir Chepeni 3 App Modernization is Fuelling API Growth Impact on Development Team Developer efficiency + deployment speed Better connectivity with 3rd party apps and partners Better User Experiences and Personalization Rapid Innovation 75% believe microservices will drive the biggest growth in APIs 80% of organizations are developing public facing APIs APIs are everywhere as key enablers of digital transformation strategies and modern applications.
  • 4. © 2023 Sudhir Chepeni 4 Pervasive API Traffic & Attack Trends 35% API Traffic YoY Growth CAGR 2020-2025 +200T API Hits by 2024 +4,500 Customers delivering APIs 91% Of all ESSL requests are APIs December 2021, API calls represented 54% of total requests, up from 52% during the first week of February 2021. Explosive growth in API requests only being outpaced by the growth in malicious API calls (>600% YoY)
  • 5. © 2023 Sudhir Chepeni 5 Web Application Attacks Continue to Rise +23% Q/Q | +196% Y/Y 6.31 Billion NEW RECORD In Q1’22, we experienced We analyze ~350 TB of new attack data every day web app attacks in a single quarter for the first time (that’s over 1 billion more than the prior quarter!) 6 Billion
  • 6. © 2023 Sudhir Chepeni 6 API Attacks are getting global and across verticals Case Study : Log4j
  • 7. © 2023 Sudhir Chepeni 7 API Attacks are continuous and Mitigation needs be continuous: Case Study Spring Core
  • 8. © 2023 Sudhir Chepeni 8 APIs complexity leads to Risk ● Modern applications have more moving parts or pieces to manage ● The nature of collaboration is evolving - from local to global ● Development trends are changing ● Teams are often in different tooling ecosystems More Functionalities More Features More Users More Data
  • 9. © 2023 Sudhir Chepeni 9 Source: Forrester Analytics Business Technographics Security Survey, 2021 Base: 530 Security decision-makers with network, data center, app security, or security ops responsibilities who experienced an external attack when their company was breached 1.94 The average number of times firms suffered breaches from external attacks WHAT’S AT RISK?
  • 10. © 2023 Sudhir Chepeni 10 API security flaws can result in data breaches
  • 11. © 2023 Sudhir Chepeni 11 Today securing an application means… Protecting the.. q Custom Developed Source Code q Software that forms the supply chain q The CI/CD pipeline itself q Infrastructure hosting the application - a majority of which is spinning up in public cloud q APIs powering the comms between user and inter app components
  • 12. © 2023 Sudhir Chepeni 12 API Overview
  • 13. © 2023 Sudhir Chepeni 13 What is an API An application programming Interface (API) is a connection between computer programs Your Program (In any language say X) My Program (In any language say Y) getSomething Something
  • 14. © 2023 Sudhir Chepeni 14 APIs have TYPE XML-RPC, SOAP, REST, gRPC, GraphQL TRANSPORT HTTP(S), HTTP/2/3 .. DATA ENCODING XML, JSON, binary, protobuf.. INFRA API Gateway, Service mesh, Load balancer, Control plane STAKEHOLDERS • Customers, users • Dev Teams • Product Teams • Admins, network, API Gateway • Security Operations • Mobile/IoT API
  • 15. © 2023 Sudhir Chepeni 15 15 API Types, Protocols and deployments Public APIs allow to expose information and functionalities to third parties Private APIs are used internally to facilitate integration of different applications Partner APIs used to facilitate communication and integration between partners Different API Types Different API Protocols Understanding the API Types, Protocols and Deployments is key to providing an API Security Solution Deployment of APIs Virtualization Services Containers API
  • 16. © 2023 Sudhir Chepeni 16 APIs Grow APIs will Grow Breadth – More and more APIs Depth – API calls create calls to other APIs Directions North/South Traffic – External APIs East/West- Internal APIs
  • 17. © 2023 Sudhir Chepeni 17 Server Database Media Web Mobile Partner Internet Sensors Request Response Interaction Layer Micro Orientation Mediation Transformation Traffic Management Network Integration Layer Service Mediation Messaging Connectivity Application Layer Business Rules Business Process Orchestration Sense and Response Service Orchestration Infrastructure Configs API Architecture • API Management • Service Management • Platform Management • Developer Portal • Internal external • Partner • Authentication • Authorization • Threat Protection • Data Privacy • PCI DSS • Federation • Single Sign on • Access Control • API Analytics • Operation • Customer • Business Customer BI • Req reply signatures • Token channel binding • Context risk assessment • App integrity checking • Environment Risk Assessment • Minimize client-side API keys API Security Thinking • API Interface Layer • API Trust and usage Policy • Layer 7 Attack Protection • Compliance checks • Rogue API Detection • API Implementation Layer • Micro segmentation • Identify propagation and brokering • Multilevel Authorization • Integrate standard infrastructure and application platform security • Continues API monitoring • Configuration API Developers Are thinking API Security Needs thinking Management Services Analytics Services Client Services Security Services
  • 18. © 2023 Sudhir Chepeni 18 API Security Building Blocks
  • 19. © 2023 Sudhir Chepeni 19 Traditional Attacks Current/Future Attacks Recent Attacks Bad actors targeting APIs would attacks such as SQLi and XSS and exploit vulnerabilities Attackers take days, weeks, or even months to probe and learn about APIs, and they use “low-and-slow” techniques that stay under the radar of traditional security tools. “One-and-Done” “Low-and-Slow” Attackers focus now is on finding vulnerabilities in the business logic of APIs. APIs are unique, so the attacks have to be as well. The attackers launch low and slow attacks with reconnaissance to understand context and start business logic abuse “Context-Based” Evolution of API Attacks
  • 20. © 2023 Sudhir Chepeni 20 API Attack Classes DDOS Network DDOS HTTP Flood Application DOS Data Breach Internal data made public Excessive data exposure Authentication weakness Abuse of Functionality Business logic flaws API
  • 21. © 2023 Sudhir Chepeni 21 DDoS
  • 22. © 2023 Sudhir Chepeni 22 API DDoS Attack Surface
  • 23. © 2023 Sudhir Chepeni 23 Global WAAP DDoS Attacks
  • 24. © 2023 Sudhir Chepeni 24 BOTS
  • 25. © 2023 Sudhir Chepeni 25 API’s Protection From BOTs
  • 26. © 2023 Sudhir Chepeni 26 Global Bot Activity Malicious Bots Plague Businesses January – June 2021 July – December 2021 January – April 2022 40B 30B 20B 0 Number of Bot Requests Malicious Benign 10B
  • 27. © 2023 Sudhir Chepeni 27 Malicious bot activity jumped more than during India’s Diwali shopping holidays. 55%
  • 28. © 2023 Sudhir Chepeni 28 Business Logic
  • 29. © 2023 Sudhir Chepeni 29 OWASP Top 10 A01:2021-Broken Access Control A02:2021-Cryptographic Failures A03:2021-Injection A04:2021-Insecure Design A05:2021-Security Misconfiguration A06:2021-Vulnerable and Outdated Components A07:2021-Identification and Authentication Failures A08:2021-Software and Data Integrity Failures A09:2021-Security Logging and Monitoring Failures A10:2021-Server-Side Request Forgery
  • 30. © 2023 Sudhir Chepeni 30 Real World Examples 30 API Vulnerability Exploited Impact Authentication, Authorization, Excessive Data Exposure 60 million customers data compromised due to broken access control which allowed logged in users to access account information of others Authentication and Authorization 13+ million customer PII, IMEI, IMSI data leaked. Some instances of SIM Swap scams with MFA bypass Authentication, Excessive Data Access, Anti-Automation 200 million user transactions were set to public by default and available to anyone causing big data breach Authentication 37+ million Panera bread customer profile data exposed due to breach in unauthenticated API endpoint Authorization and Excessive Data Exposure Account Impersonation/Takeover of any Uber user, driver, partner Authentication, Configuration Issues Ability to access remote functionality of millions of cars in China Authentication and Excessive Data Exposure FICO Score and Risk factors for 100+ million people in the US
  • 31. © 2023 Sudhir Chepeni 31 API Security Solutions
  • 32. © 2023 Sudhir Chepeni 32 API Security Technologies
  • 33. © 2023 Sudhir Chepeni 33 Vestibulum congue tempus Lorem ipsum Vestibulum congue tempus Lorem ipsum Vestibulum congue tempus Lorem ipsum Vestibulum congue tempus Lorem ipsum Vestibulum congue tempus Lorem ipsum Vestibulum congue tempus Lorem ipsum Vestibulum congue tempus Lorem ipsum Vestibulum congue tempus Lorem ipsum Vestibulum congue tempus Lorem ipsum Vestibulum congue tempus Lorem ipsum Vestibulum congue tempus Lorem ipsum Vestibulum congue tempus Lorem ipsum ●DoS & Automation ●Injection Attacks ●Business Logic Abuse & ●Industry Specific Workflows Runtime Detections ●API Discovery & Profiling ●API Misconfigurations ●Risk Assessment & Prioritization Visibility and Posture Management ●Integration into CI/CD ●API Security Testing SDLC Integrations ●API centric threat hunting ●API centric analytics ●Integrations with prevention and response tools Threat Hunting, Analytics API Security Framework
  • 34. © 2023 Sudhir Chepeni 34 API Security Solution for what? DEV or Runtime Security Posture • Inventory of APIs • Mapping of data • Who what from where Runtime Security • Monitoring watching inspecting traffic • Behavior based models for anomaly detection • Heuristic, ML, AI modeling with continuous learning • Threshold of abnormal traffic alerts and protection 1 2
  • 35. © 2023 Sudhir Chepeni 35 APIs Runtime Versions Design, Develop, Build, Test and Deploy APIs in running in Production API Security and Build time API Security and Runtime Monitor, Protect , Observe, Behavior based detections Security Posture Runtime
  • 36. © 2023 Sudhir Chepeni 36 API Security Full Cycle
  • 37. © 2023 Sudhir Chepeni 37 API Security DISCOVER ALERT & PROTECT DETECT Full Lifecycle API Attacks and Abuse security 1. Continuous catalog of APIs 2. Sensitive Data Discovery 3. Discover deprecated, undocumented APIs 4. Identify 3rd party APIs 1. OWASP API Top 10 Attacks Detection 2. Behavior Based detections 3. ML assisted analysis to help reduce false positive rates 1. Generate Actionable Alerts 2. Protect the APIs Ex at WAF API Security Solution
  • 38. © 2023 Sudhir Chepeni 38 API Discovery & Profiling Automatically discover and profile unknown and/or changing APIs VISIBILITY Network Set API network lists (allowlists and/or blocklists) based on IP/Geography Rate controls for API endpoints based on API key. Protection from low and slow attacks (slow POST) DDOS PROTECTION Authentication & Authorization Secure authentication and authorization via JSON Web Token (JWT) validation +/- API SECURITY & GOVERNANCE Threat Assessment Automated assessment of API risk Prioritized API protection Behavior based API Security Analyze API Behavior, session behavior to uncover advanced attacks AI, ML MODEL BASED AUTOMATED THREAT ASSESMENT API Security Path
  • 39. © 2023 Sudhir Chepeni 39 PROTECT ALL APPS AND APIS Design Time and Runtime Layered Defense To Protect Against Evolving API Threats Attack surface reduction & prevent lateral movement Cloud misconfigurations Supply chain attacks, known vulnerabilities Edge WAAP Visibility to all apps & APIs Devops deployment, rapid config changes, native to public cloud DDoS, Bots, Injection-based Attacks Container breakout, container misconfigurations, supply chain attacks Container Runtime Security Container Vulnerability Mgt Attack Surface Mapping Cloud Configuration Audits Microsegmentation Origin WAF Edge WAAP Cloud Workload Protection Platform Cloud Security Posture Management
  • 40. © 2023 Sudhir Chepeni 40 Recommendations 1. Think about full lifecycle of APIs for API Security Solutions 2. API security is Discovery Detection and Protection 3. API security is a layered, choose fewer tools 4. Use automation to alert right people in time 5. Focus on observability, use tools to automatically detect and protect
  • 41. © 2023 Sudhir Chepeni 41 41 Customers expect their digital experience to be consistently fast, consistently engaging, completely secure APIs are at the Center of Modern Experience