SlideShare ist ein Scribd-Unternehmen logo
1 von 26
SACON
SACON International 2020
India | Bangalore | February 21 - 22 | Taj Yeshwantpur
The Power of APIs
API Economy Trends & Market Drivers , Top 10 Security Risks and Mitigation Strategies
Suhas Desai
Infosys
Industry Principal – Cyber Security
@desai_suhas
SACON 2020
• Trends in APIs , API Management Platform Technologies
• Overview on APIs , API Management Platform & API Economy
• Wide acceptance of APIs in Industry 4.0
• Top 10 security risks in APIs, API Management Platforms
• API Security Governance Framework
• API Security Good Practices
What we will discuss today
SACON 2020
Recent News – API Security & Hacks
Source: https://www.zdnet.com/article/twitter-says-an-attacker-used-its-api-to-match-usernames-to-phone-numbers/
SACON 2020
Source: https://latesthackingnews.com/2020/01/04/starbucks-exposed-an-api-key-in-github-public-repository/
Recent News – API Security & Hacks
SACON 2020
The
APIs
ofPower
APIs
AI/MLAPI
Economy
Open
Banking
Blockchain
Cloud
APIs
The Power of APIs – Trends in Emerging Technologies
SACON 2020
Hype Cycle – API Security & API Threat Protection
SACON 2020
main()
{
int i=7;
printf(“%d”,i++*i++);
}
Quiz
SACON 2020
• Application Programming Interface
• Interface that provides programmatic access to service functionality
and data within an application or a database (Gartner)
• Interface or Set of definitions or communication protocols used to
build/integrate software's
• It can used for web based applications, OS, DB, Devices and Libraries
APIs - Overview
SACON 2020
• Private/Internal APIs – Enterprises for their own consumption.
• Partner – Specific rights/access is required. Third party/paid API consumption.
• Public/External/Open APIs – Publically available. Oauth.
Types of APIs
SACON 2020
• Database APIs
• Devices APIs
• Operating Systems APIs
• Remote APIs
• Web APIs
APIs - Examples
SACON 2020
APIs
REST
JSON
XML
SOAP
RPC
Web Services APIs
SACON 2020
API Management Platform are used to manage API life cycle.
• Design
• Publish (Provisioning / De Provisioning)
• Security (through API Gateways)
• Analytics
• Documentation
• API Monetization
API Management Platforms for API Life Cycle
SACON 2020
1. Broadcom (CA) API Management Platform
2. Google Apigee API Management Platform
3. IBM API Connect
4. Mulesoft Anypoint Platform
5. TIBCO Cloud Mashery
6. Microsoft Azure API Management (Microsoft)
7. Red Hat 3scale API Management
8. Axway AMPLIFY API Management
Top 8 API Management Platforms
SACON 2020
API Economy
“The API economy is an enabler for turning a business or organization into a
platform.” Kristin R. Moyer, vice president and distinguished analyst at Gartner
SACON 2020
API Monetization
Revenue per API call Revenue Sharing Licensing Platforms API Calls
SACON 2020
API Architecture
API Management
Platforms
API Middleware
API Gateway
Data Processing &
Analytics
API Connectors
Database
Operating
Systems
Web
Mobile
Devices
Enterprise
Application
Security
Compliance
Efficiency
Analytics
APIs at
Application or
Service Layer
Features
ChannelsChannels
API Initiation/ Requestor/Backend Services
Middleware/Platforms
SACON 2020
Top 10 Security Risks
API Security
Risks
Crypto
Services
Authentication
&
Authorization
APIs
Communication
Channels
Data Security
Business Logic
Implementation
Input
Validation
API Security
Governance
API Management
Platform
Misconfigurations
API Gateway and
Runtime Risks
Security Risks
in API
Monetization
Governance APIs & API Technology Platforms Monetization
SACON 2020
#define merge(a, b)
int main(void)
{
printf("%d ", merge(20, 40));
return 0;
}
Quiz
SACON 2020
Approach - Secure API Life Cycle
1. API Design & Architecture,
Specification Document Review
2. Black/Grey Box Risk Assessment of
APIs/Web Services/Micro Services
(e.g. REST-JSON, SOAP-XML), API
Management Platforms/Gateways,
ESB/SOA.
3. Data Security & Cryptographic
Controls Review
4. Configuration & Audit Logs Review
5. Calculating Severity Score based on
threat & impact of the vulnerability.
6. Risk Mitigation
1. Design API
Management Platform
Architecture
2. Implement Security
Controls API
Management
Platforms
3. Implement Security
Configurations of API
Management
Platforms
1. API provisioning & de-
provisioning
2. Security Governance
through Platform
3. Monitor Security Incidence
4. Incidence Management
API Platform Management
& Sustenance Programme
API Platform
Implementation
API Security Assessment
Secured API
Management Platform
Provisioning &
De-provisioning
Incident Monitoring &
Management
1. Review of Current
Security Processes &
Policies.
2. Documents & Evidence
Validation against
Compliance Audit Points
3. Data Security &
Cryptographic Controls
Review
4. Calculating Risk Score
based on threat &
impact against non-
compliance point.
API Security Audit
Compliant API
Ecosystem
Policies &
Procedures
Advisory on
Roadmap &
Strategy
Secured API
Ecosystem
Security Assurance in APIs, Digital Channels & Platform Implementation Managed Services
SACON 2020
API Security Governance Framework
Security Governance Risk Compliance Policy Management Assurance BCP & DR Awareness
Monitoring &
Logging
SIEM Threat Intelligence Analytics Traffic Monitoring
API Metering and
Billing
API Management API Provisioning
Entity/Resource
Onboarding
API Governance, Risk &
Compliance
Traffic Mediation Versioning
API Security PKI, OAuth2, OpenID Connect Digital Signature Threat Protection
Input/Schema
Validation
Traffic Shaping
Data Security Data Encryption Data Masking Data Classification DRM Data Loss Prevention
Network Security WAF IDS/IPS
Advanced Persistent
Threats
Gateway
Security
DoS Prevention
Unified Threat
Management
SACON 2020
OWASP – API Security
Broken Object
Level
Authorization
Excessive Data
Exposure
Mass AssignmentBroken Function
Level
Authorization
Broken User
Authentication
Security
Misconfiguration
Improper Assets Management
API Security Top 10 2019
Lack of Resources
& Rate Limiting
Insufficient Logging & Monitoring
Injection
SACON 2020
• Fiddler
• Wireshark
• Metasploit Framework
• SoapUI Pro
• Katalon
• Apigee
• Postman
• Parasoft Soatest
• Jmeter
API Security Assessment Tools
SACON 2020
Good Practices to secure APIs
1 Enforce Strong SSL/TLS encryption over a Communication Channel
Digitally Sign the API Request Data with Current Timestamp in Request Headers to Prevent against from Request
Tampering & Replay Attacks.
Encrypt Sensitive Request Payloads while Requesting an API. Never expose API Sessions Tokens or Keys, Passwords in URL,
instead pass it through API Request Headers.
Validate & Sanitize Users Untrusted Input before processing at the Backend.
Authenticate API Resources and Requesting Entities mutually using PKI certificates. Make use of OAuth/OpenID Connect for
Authorization based on Users Control Access to the API Resources.
2
3
4
5
6 Set Quota Limit on Usage of Bandwidth, API Requests processing per unit time to avoid Denial of Service Attacks.
7 Implement and Make Use of Audit Logging & Monitoring Features to Uncover API Transaction Processing Disputes that may
have happened in the Past.
Setting up SLAs, Performance Benchmarks, Ensure Regulatory Governance, Risk & Compliance (GRC) Policy & Procedures are
being properly followed, according to below standards.
For e.g. Sarbanes Oxley (SOX), PCI DSS, GDPR, HIPAA, COBIT etc.
8
SACON 2020
• Secure Design of API, API Management Platform
• Security Governance and Security Assurance
• Good Practices in API Life Cycle
Summary
SACON 2020Source:: Linux Journal : Author – Suhas Desai
Crypto + Steganography with Python
Need community contribution to embed more cryptography & steganography libraries and APIs!
SACON 2020
For more details please contact:
Suhas Desai, Industry Principal – Infosys
E: suhasanandrao.desai@Infosys.com
Thank You!

Weitere ähnliche Inhalte

Was ist angesagt?

63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASB
Kyle Watson
 

Was ist angesagt? (20)

(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
(SACON) Apoorv Raj Saxena - Hacking and Securing Kubernetes and Dockers in Cl...
 
SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
 
Security as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO PerspectiveSecurity as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO Perspective
 
Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)
 
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
(SACON) Nilanjan, Jitendra chauhan & Abhisek Datta - How does an attacker kno...
 
SACON - API Security (Suhas Desai)
SACON - API Security (Suhas Desai)SACON - API Security (Suhas Desai)
SACON - API Security (Suhas Desai)
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
 
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon (SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
(SACON) Sameer anja - Privacy in Technology: Kickstart of the Hackathon
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
 
(SACON) Wasim Halani - OSINT threat hunting
(SACON) Wasim Halani - OSINT threat hunting(SACON) Wasim Halani - OSINT threat hunting
(SACON) Wasim Halani - OSINT threat hunting
 
LogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEMLogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEM
 
Building Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessBuilding Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of Business
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASB
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
 

Ähnlich wie (SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers, Security Risks and Mitigation Strategies

Extend soa with api management Doag18
Extend soa with api management Doag18Extend soa with api management Doag18
Extend soa with api management Doag18
Vinay Kumar
 

Ähnlich wie (SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers, Security Risks and Mitigation Strategies (20)

apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accentureapidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
apidays LIVE New York 2021 - API Security & AI by Deb Roy, Accenture
 
WEBINAR: OWASP API Security Top 10
WEBINAR: OWASP API Security Top 10WEBINAR: OWASP API Security Top 10
WEBINAR: OWASP API Security Top 10
 
Extend soa with api management spoug- Madrid
Extend soa with api management   spoug- MadridExtend soa with api management   spoug- Madrid
Extend soa with api management spoug- Madrid
 
OWASP API Security Top 10 - Austin DevSecOps Days
OWASP API Security Top 10 - Austin DevSecOps DaysOWASP API Security Top 10 - Austin DevSecOps Days
OWASP API Security Top 10 - Austin DevSecOps Days
 
Gateway/APIC security
Gateway/APIC securityGateway/APIC security
Gateway/APIC security
 
Test and Protect Your API
Test and Protect Your APITest and Protect Your API
Test and Protect Your API
 
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
2022 APIsecure_From Shift Left to Full Circle - A Pragmatic Approach to Catch...
 
Oracle API Platform Cloud Service Best Practices & Lessons Learnt
Oracle API Platform Cloud Service Best Practices & Lessons LearntOracle API Platform Cloud Service Best Practices & Lessons Learnt
Oracle API Platform Cloud Service Best Practices & Lessons Learnt
 
TEC-Roundtable-API
TEC-Roundtable-APITEC-Roundtable-API
TEC-Roundtable-API
 
API, Integration, and SOA Convergence
API, Integration, and SOA ConvergenceAPI, Integration, and SOA Convergence
API, Integration, and SOA Convergence
 
Extend soa with api management Doag18
Extend soa with api management Doag18Extend soa with api management Doag18
Extend soa with api management Doag18
 
APIdays London 2019 - Value in the API Economy: Insights from the world’s lar...
APIdays London 2019 - Value in the API Economy: Insights from the world’s lar...APIdays London 2019 - Value in the API Economy: Insights from the world’s lar...
APIdays London 2019 - Value in the API Economy: Insights from the world’s lar...
 
apidays LIVE Hong Kong - Orchestrating APIs at Scale by Hieu Nguyen Nhu
apidays LIVE Hong Kong - Orchestrating APIs at Scale by Hieu Nguyen Nhuapidays LIVE Hong Kong - Orchestrating APIs at Scale by Hieu Nguyen Nhu
apidays LIVE Hong Kong - Orchestrating APIs at Scale by Hieu Nguyen Nhu
 
Enterprise API deployment best practice
Enterprise API deployment best practiceEnterprise API deployment best practice
Enterprise API deployment best practice
 
Extend soa with api management Sangam18
Extend soa with api management Sangam18Extend soa with api management Sangam18
Extend soa with api management Sangam18
 
API Management Microservices beyond HIP
API Management Microservices beyond HIPAPI Management Microservices beyond HIP
API Management Microservices beyond HIP
 
apidays London 2023 - API Metrics matters in APIOps, Ludovic Pourrat, Lombar...
apidays London 2023 - API Metrics matters in APIOps, Ludovic Pourrat,  Lombar...apidays London 2023 - API Metrics matters in APIOps, Ludovic Pourrat,  Lombar...
apidays London 2023 - API Metrics matters in APIOps, Ludovic Pourrat, Lombar...
 
42Crunch Security Audit for WSO2 API Manager 3.1
42Crunch Security Audit for WSO2 API Manager 3.142Crunch Security Audit for WSO2 API Manager 3.1
42Crunch Security Audit for WSO2 API Manager 3.1
 
Apigee Edge Product Demo
Apigee Edge Product DemoApigee Edge Product Demo
Apigee Edge Product Demo
 
João Emilio Santos Bento da Silva - Estratégia de APIs
João Emilio Santos Bento da Silva - Estratégia de APIsJoão Emilio Santos Bento da Silva - Estratégia de APIs
João Emilio Santos Bento da Silva - Estratégia de APIs
 

Mehr von Priyanka Aash

Mehr von Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers, Security Risks and Mitigation Strategies

  • 1. SACON SACON International 2020 India | Bangalore | February 21 - 22 | Taj Yeshwantpur The Power of APIs API Economy Trends & Market Drivers , Top 10 Security Risks and Mitigation Strategies Suhas Desai Infosys Industry Principal – Cyber Security @desai_suhas
  • 2. SACON 2020 • Trends in APIs , API Management Platform Technologies • Overview on APIs , API Management Platform & API Economy • Wide acceptance of APIs in Industry 4.0 • Top 10 security risks in APIs, API Management Platforms • API Security Governance Framework • API Security Good Practices What we will discuss today
  • 3. SACON 2020 Recent News – API Security & Hacks Source: https://www.zdnet.com/article/twitter-says-an-attacker-used-its-api-to-match-usernames-to-phone-numbers/
  • 6. SACON 2020 Hype Cycle – API Security & API Threat Protection
  • 8. SACON 2020 • Application Programming Interface • Interface that provides programmatic access to service functionality and data within an application or a database (Gartner) • Interface or Set of definitions or communication protocols used to build/integrate software's • It can used for web based applications, OS, DB, Devices and Libraries APIs - Overview
  • 9. SACON 2020 • Private/Internal APIs – Enterprises for their own consumption. • Partner – Specific rights/access is required. Third party/paid API consumption. • Public/External/Open APIs – Publically available. Oauth. Types of APIs
  • 10. SACON 2020 • Database APIs • Devices APIs • Operating Systems APIs • Remote APIs • Web APIs APIs - Examples
  • 12. SACON 2020 API Management Platform are used to manage API life cycle. • Design • Publish (Provisioning / De Provisioning) • Security (through API Gateways) • Analytics • Documentation • API Monetization API Management Platforms for API Life Cycle
  • 13. SACON 2020 1. Broadcom (CA) API Management Platform 2. Google Apigee API Management Platform 3. IBM API Connect 4. Mulesoft Anypoint Platform 5. TIBCO Cloud Mashery 6. Microsoft Azure API Management (Microsoft) 7. Red Hat 3scale API Management 8. Axway AMPLIFY API Management Top 8 API Management Platforms
  • 14. SACON 2020 API Economy “The API economy is an enabler for turning a business or organization into a platform.” Kristin R. Moyer, vice president and distinguished analyst at Gartner
  • 15. SACON 2020 API Monetization Revenue per API call Revenue Sharing Licensing Platforms API Calls
  • 16. SACON 2020 API Architecture API Management Platforms API Middleware API Gateway Data Processing & Analytics API Connectors Database Operating Systems Web Mobile Devices Enterprise Application Security Compliance Efficiency Analytics APIs at Application or Service Layer Features ChannelsChannels API Initiation/ Requestor/Backend Services Middleware/Platforms
  • 17. SACON 2020 Top 10 Security Risks API Security Risks Crypto Services Authentication & Authorization APIs Communication Channels Data Security Business Logic Implementation Input Validation API Security Governance API Management Platform Misconfigurations API Gateway and Runtime Risks Security Risks in API Monetization Governance APIs & API Technology Platforms Monetization
  • 18. SACON 2020 #define merge(a, b) int main(void) { printf("%d ", merge(20, 40)); return 0; } Quiz
  • 19. SACON 2020 Approach - Secure API Life Cycle 1. API Design & Architecture, Specification Document Review 2. Black/Grey Box Risk Assessment of APIs/Web Services/Micro Services (e.g. REST-JSON, SOAP-XML), API Management Platforms/Gateways, ESB/SOA. 3. Data Security & Cryptographic Controls Review 4. Configuration & Audit Logs Review 5. Calculating Severity Score based on threat & impact of the vulnerability. 6. Risk Mitigation 1. Design API Management Platform Architecture 2. Implement Security Controls API Management Platforms 3. Implement Security Configurations of API Management Platforms 1. API provisioning & de- provisioning 2. Security Governance through Platform 3. Monitor Security Incidence 4. Incidence Management API Platform Management & Sustenance Programme API Platform Implementation API Security Assessment Secured API Management Platform Provisioning & De-provisioning Incident Monitoring & Management 1. Review of Current Security Processes & Policies. 2. Documents & Evidence Validation against Compliance Audit Points 3. Data Security & Cryptographic Controls Review 4. Calculating Risk Score based on threat & impact against non- compliance point. API Security Audit Compliant API Ecosystem Policies & Procedures Advisory on Roadmap & Strategy Secured API Ecosystem Security Assurance in APIs, Digital Channels & Platform Implementation Managed Services
  • 20. SACON 2020 API Security Governance Framework Security Governance Risk Compliance Policy Management Assurance BCP & DR Awareness Monitoring & Logging SIEM Threat Intelligence Analytics Traffic Monitoring API Metering and Billing API Management API Provisioning Entity/Resource Onboarding API Governance, Risk & Compliance Traffic Mediation Versioning API Security PKI, OAuth2, OpenID Connect Digital Signature Threat Protection Input/Schema Validation Traffic Shaping Data Security Data Encryption Data Masking Data Classification DRM Data Loss Prevention Network Security WAF IDS/IPS Advanced Persistent Threats Gateway Security DoS Prevention Unified Threat Management
  • 21. SACON 2020 OWASP – API Security Broken Object Level Authorization Excessive Data Exposure Mass AssignmentBroken Function Level Authorization Broken User Authentication Security Misconfiguration Improper Assets Management API Security Top 10 2019 Lack of Resources & Rate Limiting Insufficient Logging & Monitoring Injection
  • 22. SACON 2020 • Fiddler • Wireshark • Metasploit Framework • SoapUI Pro • Katalon • Apigee • Postman • Parasoft Soatest • Jmeter API Security Assessment Tools
  • 23. SACON 2020 Good Practices to secure APIs 1 Enforce Strong SSL/TLS encryption over a Communication Channel Digitally Sign the API Request Data with Current Timestamp in Request Headers to Prevent against from Request Tampering & Replay Attacks. Encrypt Sensitive Request Payloads while Requesting an API. Never expose API Sessions Tokens or Keys, Passwords in URL, instead pass it through API Request Headers. Validate & Sanitize Users Untrusted Input before processing at the Backend. Authenticate API Resources and Requesting Entities mutually using PKI certificates. Make use of OAuth/OpenID Connect for Authorization based on Users Control Access to the API Resources. 2 3 4 5 6 Set Quota Limit on Usage of Bandwidth, API Requests processing per unit time to avoid Denial of Service Attacks. 7 Implement and Make Use of Audit Logging & Monitoring Features to Uncover API Transaction Processing Disputes that may have happened in the Past. Setting up SLAs, Performance Benchmarks, Ensure Regulatory Governance, Risk & Compliance (GRC) Policy & Procedures are being properly followed, according to below standards. For e.g. Sarbanes Oxley (SOX), PCI DSS, GDPR, HIPAA, COBIT etc. 8
  • 24. SACON 2020 • Secure Design of API, API Management Platform • Security Governance and Security Assurance • Good Practices in API Life Cycle Summary
  • 25. SACON 2020Source:: Linux Journal : Author – Suhas Desai Crypto + Steganography with Python Need community contribution to embed more cryptography & steganography libraries and APIs!
  • 26. SACON 2020 For more details please contact: Suhas Desai, Industry Principal – Infosys E: suhasanandrao.desai@Infosys.com Thank You!