APIs The Next Hacker Target Or a Business and Security Opportunity?



Similar documents
API Management: Powered by SOA Software Dedicated Cloud

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

Flexible Identity Federation

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

QuickBooks Online: Security & Infrastructure

05.0 Application Development

Enterprise Access Control Patterns For REST and Web APIs

API Security: A Guide To Securing Your Digital Channels Akana, All Rights Reserved Contact Us Privacy Policy

White paper. Four Best Practices for Secure Web Access

Threat Modeling Cloud Applications

Security of Cloud Computing for the Power Grid

Glinda Cummings World Wide Tivoli Security Product Manager

Apigee Edge API Services Manage, scale, secure, and build APIs and apps

Where every interaction matters.

IBM API Management Overview IBM Corporation

MySQL Security: Best Practices

Mobile Security. Policies, Standards, Frameworks, Guidelines

SECURITY AND REGULATORY COMPLIANCE OVERVIEW

managing SSO with shared credentials

Evaluating IaaS security risks

locuz.com Professional Services Security Audit Services

Onegini Token server / Web API Platform

End-to-End Application Security from the Cloud

Vulnerability Management

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

Live Guide System Architecture and Security TECHNICAL ARTICLE

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

API-Security Gateway Dirk Krafzig

Intelligent Security Design, Development and Acquisition

Cloud Essentials for Architects using OpenStack

Compliance & Data Protection in the Big Data Age - MongoDB Security Architecture

The following chart provides the breakdown of exam as to the weight of each section of the exam.

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

Creating a Strong Security Infrastructure for Exposing JBoss Services

Identity, Privacy, and Data Protection in the Cloud XACML. David Brossard Product Manager, Axiomatics

A Survey on Cloud Security Issues and Techniques

Security Practices, Architecture and Technologies

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

JVA-122. Secure Java Web Development

Akamai Security Products

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Cloud security architecture

About SecuPi. Your business runs on applications We secure them. Tel Aviv, Founded

Strategic Information Security. Attacking and Defending Web Services

Beyond passwords: Protect the mobile enterprise with smarter security solutions

SERENA SOFTWARE Serena Service Manager Security

An enterprise- grade cloud management platform that enables on- demand, self- service IT operating models for Global 2000 enterprises

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Building Energy Security Framework

Security Solution Architecture for VDI

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Strengthen security with intelligent identity and access management

Apigee Gateway Specifications

An Oracle White Paper Dec Oracle Access Management Security Token Service

The Top 5 Federated Single Sign-On Scenarios

The bridge to delivering digital applications across cloud, mobile and partner channels

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Cisco Software-as-a-Service (SaaS) Access Control

Thank you for joining us today! The presentation will begin shortly. Thank you for your patience.

Windows Least Privilege Management and Beyond

Security. Tiffany Trent-Abram VP, Global Product Management. November 6 th, One Connection - A World of Opportunities

Infrastructure for more security and flexibility to deliver the Next-Generation Data Center

Introduction to SAML

Ensuring the Security of Your Company s Data & Identities. a best practices guide

F5 Silverline Web Application Firewall Onboarding: Technical Note

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Rational AppScan & Ounce Products

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

Authentication Strategy: Balancing Security and Convenience

NCSU SSO. Case Study

White Paper. What is an Identity Provider, and Why Should My Organization Become One?

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Cloud-Security: Show-Stopper or Enabling Technology?

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire

Security Overview Enterprise-Class Secure Mobile File Sharing

Identity Centric Security: Control Identity Sprawl to Remove a Growing Risk

ASP.NET MVC Secure Coding 4-Day hands on Course. Course Syllabus

Log Management Standard 1.0 INTRODUCTION 2.0 SYSTEM AND APPLICATION MONITORING STANDARD. 2.1 Required Logging

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

Transcription:

APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim

Why Should You Care About APIs? Amazon Web Services EC2 alone has 148 APIs 2

Programmable Web Tracks over 10,500 APIs publicly available to developers 3

API Calls Per Day = Billions Served 4

APIs Are Big Business Expedia s affiliate network conducts > USD $2 billion worth of transactions per year via APIs alone 5

Reality of API Security Snapchat API hack December 2013 Personal information breach Mass phone number harvesting Creation of bogus accounts Poised to become a mass spamming platform 6

Where to Begin? Do you even know what APIs your organization has or is using? Do you even know what data is being shared via APIs with your trusted and untrusted customers, partners, and / or vendors? 7

Consumption versus Exposure Consumption Trust Boundary Exposure 8

End-to-End Security is Needed Consumption Exposure Flexible application level access control Consistent backend service protection Enable developers for security automation Enable API team to securely expose backend services Security for app-to-api Security for API-to-backend End-to-End Security User App Developer API API Team Backend 9

Edge Delivers End-to-End Security Stakeholders API Exposure Security API Consumption Security DevOps App Developers IT security API architects Business owner End users API management solutions must address the security considerations of various stakeholders and consumers of APIs 10 10

Security Components Security for Consumption Security for Exposure Analytics Services Threat Protection Advanced API Services Apps Partner Developers Identity Services Authentication & Authorization Traffic Management Developer Security API Services Developer Services Security & Identity Capabilities Threat Protection Identity Services Authentication & Authorization Logging & Auditing Security Analytics Backend Service 11 11

End-to-End Security for App & API Developers Developer Services Developer Portal Token/API Key Management Logging & Auditing TLS Management Developer User Management RBAC Policy Management API Team Auditing, Logging, TLS Analytics Services Users Apps Developers APIs Systems API Services Basic/OA uth 3 rd Party Sign-in Token Management Delegated Auth (LDAP) Quota/Rate Limiting App Secure Reg Two-way TLS OAuth/SA ML Authorization RBAC for APIs Backend 12 12

Delivering a Secure App and API Infrastructure App to API (Consumption) API to Backend (Exposure) Authentication (TLS, OAuth, API key) API key and token management Two-way TLS Authorization (permission management) Runtime policy SLA enforcement Logging and auditing Analytics Security reports Run time detection reports (volume based, traffic properties) Authentication (TLS, OAuth, SAML) Two-way TLS Delegated authentication (LDAP, AD) Integration with custom identity providers Fine grain authorization Logging and auditing Threat Protection Identity Infrastructure Security and Compliance XML/JSON Poisoning/Injection SQL Injection DDoS/App-DoS Attacks Quota/Spike Arrest IP based access restrictions User provisioning RBAC management Groups Identity provider Cloud or on-premise Cloud-based security (AWS + other) SOC 2, PCI-DSS, HIPAA 24 x 7 organizational support 13 13

Security Architecture Identity & Management Developers Keys/token management Certificate management Policy management RBAC management User management IT security /architect API security Apps Authentication Authorization Policy enforcement Traffic management Logging & auditing Key store Policy store Log store Threat Protection TLS DDoS Rate limiting & quota Payload protection Analytics Compliance (SOC 2, PCI DSS, HIPAA) and cloud security 14

Built-in Security + Flexible Security Integration Identity OAuth X.509 API Key TLS ACL DDoS XML Threats Rate Limit Log & Audit TLS 3 rd Party Security Services (AAA, Logs, Analytics) Apps Partner HTTPS External Firewall API management platform TLS Internal Firewall Backend Service Identity LDAP RBAC X.509 Developers Identity X.509 SAML OAuth LDAP RBAC TLS Enterprise Identity Store 15

Authentication & Authorization Scenario Authentication Authorization Business to Business Trusted developers Untrusted developers HTML5 applications Identity tracking TLS Cert, API Key API Key, OAuth Token, IP Address SAML identity control policies Generate SAML Assertion Validate SAML Assertion API Key, OAuth Token SAML identity control policies Two-way TLS Identity-based access tracking policy Verify API Key OAuth 1.0a & OAuth 2.0 policies Client credentials grant (two-legged Oauth) OAuth 1.0a & OAuth 2.0 policies Resource owner password grant OAuth 1.0a & OAuth 2.0 policies Authorization code grant (three-legged OAuth) Implicit grant 16

Threats to APIs 17

API Threats What Is New? Spoofing of identity Denial of service by bad actors, inadvertent errors, and botnets Network eavesdropping in the communication chain between app and enterprise backend services Replay attacks Unauthorized access to management system and configuration data Man-in-the-middle attacks Velocity attack using legitimate API calls Elevation of privilege by applications and developers Data tampering and injection attacks that lead to information disclosure Disclosure of confidential data stored and processed in mobile, API, and backend services Theft of credentials, API keys, tokens, or encryption keys 18

Threat Protection Scenario Denial of Service attack Threat Protection Spike Arrest policy Protection against instantaneous bursts of traffic Access Control policy Imposing limits on who can access your API Injection and Scripting attacks Regular Expression Protection policy Allow you to scan payloads for SQL, JavaScript, etc. XML/JSON threats XML and JSON Threat Protection policies Keep malformed payloads out of your system 19

Identity Scenario User Provisioning RBAC Management Manage Groups Identity Provider Identity Configure fine-grain control of user access to data features and functionality. Flexible provisioning and management of users. Enhanced system security with out-of-the-box roles. Employ RBAC at every layer to protect sensitive information API keys TLS certificates OAuth tokens audit logs Convenient and practical grouping of users based on any number of criteria including location and interests. Integrate with any identity provider that: has an API supports SAML supports LDAP v3 (for on-premise only) 20

Infrastructure & Compliance Scenario Infrastructure Security & Compliance SOC 2 PCI-DSS, HIPAA You or your provider will almost certainly need this You or your provider might need this European Data Directive API health visibility If you or your provider are doing business in Europe, then this will be required Round-the-clock monitoring Real-time and historic API health visibility API security and compliance tracking Component and process monitoring 21

Security: More Than Securing a New Channel APIs are making it easier to integrate the customer experience across channels. Partner with developers and the business to build security into the API architecture Instrument security telemetry to seamlessly integrate with your existing Security Information Event Management System (SIEM) Protect customer PII data and prevent data breaches via API channels Secure not just the API communications layer but also the payload Build a security analytics program that will actually provide value and help mitigate new threats and manage risk to your enterprise 22

Use Case Secure Partner Collaboration Backend Service (Internal Domain) Data Analysts Dashboard All Interactions (events) Metrics Security Analytics Apps API Platform Security & Identity Insights Or Customer Analytics Service Backend Service (External Domain) 23 23

Use Case API Enabled Data Federation Tools API management platform Partners Analysts Multiple Access Levels Enforceable Data Store Integration API Fine Granular Access Control Diverse Data Stores 24 24

Do The Following Matter in App & API Security? Kerberos for authentication Kerberos is not suitable for Web services authentication and can be replaced with OAuth, OpenID connect for AuthN and AuthZ. XACML based policy management (AuthZ) XACML not suitable for cloud and mobile apps given the complexity, payload size and not friendly to developers who prefer lightweight mechanisms that promote agility. WS-* security services SOA centric and heavy weight for REST centric API architecture. 25 25

Thank You