0% found this document useful (0 votes)
16 views

API Security Introduction

The document discusses the increasing importance of API security due to the rapid rise in API usage driven by digital transformation. It outlines the challenges organizations face, including the proliferation of APIs and various attack vectors, while emphasizing the need for robust security solutions tailored for APIs. The document also presents a roadmap for enhancing API security through automated discovery, testing, and governance strategies.

Uploaded by

Rafael Reis
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

API Security Introduction

The document discusses the increasing importance of API security due to the rapid rise in API usage driven by digital transformation. It outlines the challenges organizations face, including the proliferation of APIs and various attack vectors, while emphasizing the need for robust security solutions tailored for APIs. The document also presents a roadmap for enhancing API security through automated discovery, testing, and governance strategies.

Uploaded by

Rafael Reis
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

API Security:

An Introduction

Head of API Security

Proprietary and confidential. Do not distribute.


Digital transformation is driving
an rapid increase in API usage

Organizations are exposing more APIs are the core of service-


data to B2B partners and customers oriented and microservices
architectures

APIs power mobile, single-page APIs are the underpinning of


apps, and IoT DevOps, CI/CD, and Infra-as-code

70%+
Of web requests are API calls

Proprietary and confidential. Do not distribute.


API Security Challenges

Critical business functions and Security teams struggle to keep up


data are increasingly exposed via with the rapid proliferation of API’s
APIs

300 80% 50%


Of breached records +50%
Of businesses use
Minimum average APIs3 accessed Of enterprise APIs are not
of APIs an org via APIs and apps1 managed4
manages2

Fragmented technology ecosystem is Companies are leveraging 3rd party


too complex to secure APIs without APIs more frequently and place security
impacting business agility as high as reliability

1. Verizon 2019 Data Breach Incident Report, 2. Imperva poll, 3. MuleSoft 2020 Connectivity
Benchmark report, 4. Gartner Predicts 2021

Proprietary and confidential. Do not distribute.


Categories of API Attacks
API Becoming the New Attack Surface

Authentication Service Abuse Malicious Request Business Logic


Abuse/Data Theft

Credential abuse DoS/DDoS Injection Broken


Token API call volume Schema violation Object/Function
abuse/overuse based charging Level
Server-side
abuse Authorization
Authentication Request Forgery
bypass Message structure Excessive Data
Client agent
level abuse Exposure
Weaponization bypass (bad bot)
Data Exfiltration

Proprietary and confidential. Do not distribute. 4


Security Solutions for API
Protection
From Web Application Firewall(WAF) to Web Application and API Protection(WAAP)

Evolution of Conventional Solutions API Specific Protections

API Access Management Authentication/Access


Gateways Management API Business Integrity Automated detection and
Detect
and Data Protection remediation against anomalies

+
API Service Abuse
Protection DoS/DDoS Protection
Proactive/auotmated discovery
API Security Testing of vulnerabilities
From humans vs. bots to
good vs. bad bots
Bot Protection
Always up-to-date inventory of
Visibility APIs and their data exposure
Credential theft -> API Account Takeover
abuse Protection

Rule/Signature Based
API Fuzzing Protection
WAF

Proprietary and confidential. Do not distribute.


Why Reconnaissance API Gateway
Schema
Protection API Service

Conventional Analyze API call structure using


test accounts to collect valid
tokens

Solutions Are Not Broken Object Level Authorization

Enough?
(BOLA) attack

Use test user session to access


other users data

Get https://….com//api/v1/get_user_details …

● Typical API Access Management control …


authorization: Bearer eyJhbGciOiJIUzUxMiJ9 eyJhbGciOiJIUzUxMiJ9 1

cannot stop attacker leveraging an {


…..
Id: “11111”
✅ ✅
authorized session }

● Typical schema validation cannot Return Data


About User
2

detect/stop API calls with completely “11111”

conforming object payloads Get https://….com//api/v1/get_user_details …


● Applications are left to fend for authorization: Bearer eyJhbGciOiJIUzUxMiJ9



{
eyJhbGciOiJIUzUxMiJ9
3

themselves when it comes to object


…..
Id: “11112” ✅ ✅
}

level authorization
Return Data 4
About User
“11112”
Proprietary and confidential. Do not distribute.
API Security
starts with
discovery
● API’s app specific data layer make
automatic discovery necessary
● Beyond technical specifications,
automatic discovery must be able
to identify sensitive data
● Automatically updated API
Inventory is the foundation for
detection and remediation

Proprietary and confidential. Do not distribute.


Deployment Architectures
Prioritization Driven by Exposure Risks

Browsers, Apps, & Things

WAAP Gateway
Partner Access Devices

1. North-South
Public APIs
2. Externally exposed
API Gateway
Private APIs

Private Cloud

API Gateway 3. East-west Internal


APIs

Proprietary and confidential. Do not distribute.


A Full Life-cycle
Approach
● Start with deep discovery API Governance API Secure Operations
of production APIs
● Maintain an always up-to-
date API inventory to help BUIL
D C
TES
T
CD RUN
RUN
improve API governance I

● Enhance API security test


coverage automatic Help Dev with secure
API Design:
Help Dev/DevOps with
API security testing
Help DevOps and
SecOps secure APIs in
production
generation of tests from 2 Auto test gen
Spec Security 3 Discover APIs in 1
discovered APIs Assessment
from discovered
APIs
production

Spec Generation Proactive API API Anomaly


and Validation anomaly scan Detection and
Remediation

Proprietary and confidential. Do not distribute.


API Security Roadmap

DELIVERED COMING SOON (H2 2022) 2023 Future 2024


● Automated API Discovery ● Continue expansion of ● Expansion of API protocol ● Cloud Native, hybrid
with Data Classification auto-discovery (e.g. support mode, auto-scale
● API Schema Protection custom data ● Consolidation of deployment with
enhanced by auto- classification) management plane centralized management
merging of discovered ● Data centric anomaly ● Multi-form factor option
APIs detection (e.g. excessive remediation (e.g. actions ● Full support of API
● Support both SaaS and sensitive data exposure) against compromised Detection/Response
private cloud ● Tighter integration with accounts behind API ● Automated, Full Lifecycle
deployments platform features (e.g. abuses) API security:
● Automatic API Security bad bot prevention, ATO ● Cloud Native WAAP data ○ Auto-discovery driven
Test generation for protection) plane security verification
discovered APIs ● Expansion of integration ○ Auto-generation of
● API design security risk with existing API baseline from
assessment based on API Gateways monitoring API test
specifications (also called ○ Automated
API Security Audits) remediation actions
in response to API
anomaly

Proprietary and confidential. Do not distribute. 10


Back-up Slides

Proprietary and confidential. Do not distribute.


API Security Anywhere (more details) Serverless Platforms Imperva Controller Console
k8s Cluster

Management Console
Node

Pod Lambda Lambda


@ Edge Layers
Sidecar
Microsenso
r Advanced API Controller
Application (public or private cloud)

Container(s)

API Controller
Server / VM
Containers
Sniffer
Microsenso
r Additional Sources

Consumer
Services
Legacy Apps / Microservices

Server / VM

Packet Capture Log Consumer


Service Service
Microsensors Microsensors

Legacy Apps / Microservices

Network
Tap/Sniffer or
Proprietary and confidential. Do not distribute.
Traffic Mirroring
What We Found (1): Data Object Authz Risk
POST /…/…/…/orders/list/summary

13
What We Found (2): Authentication

14
API Verification
Cloud WAF API Security Add-on New Feature

Proprietary and confidential. Do not distribute.


Feature Highlight
● A new feature of the Cloud WAF API Security Add-
on
○ Generally Available now
○ Available to all add-on customers
● Two verification tools
○ API test generation for customers with no API
specification
■ Automatically generate API security tests based on discovered APIs
○ API specification security assessment for customers
who uploaded their API specification
■ Scan API specifications to generate a security assessment report on
the API design
● Customer Values
○ Enable secure API development.
■ Buyer: Security Team
■ Operator: Dev Test
○ Natural next step after API Discovery:
■ Discover and fix API vulnerabilities before they are exploited

Proprietary and confidential. Do not distribute.

You might also like