Slide 1

Slide 1 text

WHY YOU NEED TO AUTOMATE API SECURITY ISABELLE MAUNY - CTO [email protected] The API Security Platform for the Enterprise

Slide 2

Slide 2 text

2 Source: https:/ /blog.appdynamics.com/product/the-importance-of-monitoring-containers-infographic/ MULTIPLICATION OF ENDPOINTS

Slide 3

Slide 3 text

TITLE TEXT 3 App icon made by https://www.flaticon.com/authors/pixel-buddha Internal Partner Public RISE OF VIRTUAL APPLICATION NETWORKS

Slide 4

Slide 4 text

TITLE TEXT EVER FASTER PACE OF APP DELIVERY 4 APPLICATION
 DEVELOPMENT APPLICATION
 SECURITY

Slide 5

Slide 5 text

API SECURITY NEEDS TO 5 EVOLVE

Slide 6

Slide 6 text

6 DEFINING “PROPER” SECURITY

Slide 7

Slide 7 text

7 Authentication Integrity (transport & message) Audit Confidentiality (transport & message) Availability (Rate Limiting) Access Control Non Repudiation Data Validity (attacks protection)

Slide 8

Slide 8 text

8 YES. You need to consider all of this… … AND you need to configure all aspects in the right way

Slide 9

Slide 9 text

9 EASY TO GET THOSE WRONG!

Slide 10

Slide 10 text

10 AND you need the right infrastructure…

Slide 11

Slide 11 text

“Security experts are going to have to figure out how to deliver ‘security as code’. Essentially, they have to translate every security requirement, every coding guideline, every ‘best practice,’ every threat model, and every security architecture into code that can run during the development, build, test, and deployment process. Even in operations, it’s critical that attack detection and response is fully automated.” Jeff Williams OWASP Top 10 project creator, about the (ex) A10 entry in OWASP Top 10. https://sdtimes.com/owasp-adds-unprotected-apis-insufficient-attack-protection-top-ten-2017-release/ 11

Slide 12

Slide 12 text

12 THE SOLUTION ? DEVOPS, BUT WITH SECURITY ON!

Slide 13

Slide 13 text

LET’S SHIFT SECURITY LEFT! 13 Deployment Testing Development Design Security vulnerabilities are bugs. The later you find them, the more costly it is to fix them.

Slide 14

Slide 14 text

HACK YOURSELF ! Automated Scans ✓ Code Scans ✓ Infrastructure Scans Automated Hacking ✓ OWASP ZAP, BURP Chaos Engineering ✓ DDOS Attacks Test Security ✓ Authentication ✓ Authorization Complementary Initiatives ✓ Pen-Testing ✓ Bug Bounty ✓ Secure Code Reviews 14 1 Choose scanning platforms/tools where 
 functionality is exposed as APIs/CLI.

Slide 15

Slide 15 text

IT’S ILLEGAL TO ATTACK SYSTEMS! UNLESS ALLOWED TO… 15

Slide 16

Slide 16 text

1. Use Threat Modelling to eval the APIs risk 2. Define security profiles by risk level 3. Apply security profiles automatically based on risk. 4. Avoid policies in code and API-specific 16 IMPLEMENT ‘POLICY AS CODE’ 2

Slide 17

Slide 17 text

1. Easy to deploy even on developer’s laptops 2. Can be deployed hundreds of times 3. Immutable 17 USE A CONTAINERIZED PEP 3 VERIFY IMAGE INTEGRITY !

Slide 18

Slide 18 text

1. Constant monitoring at all stages 2. Automated Response when possible. 3. Leverage Machine Learning (but be careful of false positives!) 18 MONITOR AND ANALYZE 4

Slide 19

Slide 19 text

FULL DEV-SEC-OPS CYCLE FOR APIS 19 Develop Assess Secure Test Document Deploy API is developed on platform of choice Continuous API testing including security testing Deploy to containerized PEP Configure and apply security policy from assessed risk Assess API description and evaluate risk level Document and annotate API with OpenAPI/Swagger

Slide 20

Slide 20 text

20 RELIES ON STRONG COLLABORATION ACROSS OPERATIONS, DEVELOPMENT, SECURITY AND BUSINESS TEAMS PROPER SECURITY

Slide 21

Slide 21 text

21 BUILD A SECURITY CHAMPIONS TEAM

Slide 22

Slide 22 text

IT’S NOT ABOUT IF, IT’S ABOUT WHEN. BE PREPARED. 22

Slide 23

Slide 23 text

23 www.42crunch.com/whitepaper

Slide 24

Slide 24 text

CONTACT: [email protected] WWW.42CRUNCH.COM The API Security Platform for the Enterprise

Slide 25

Slide 25 text

RESOURCES Chaos Engineering ✓ http:/ /principlesofchaos.org ✓ https:/ /github.com/dastergon/awesome-chaos-engineering OWASP ZAP ✓ https:/ /www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project Source Code Analysis ✓ https:/ /www.owasp.org/index.php/Source_Code_Analysis_Tools Code Security reviews ✓ https:/ /www.owasp.org/index.php/Code_Review_Introduction Systems Scans ✓ https:/ /www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools 25

Slide 26

Slide 26 text

RESOURCES SSL Setup Scan ✓ https:/ /hardenize.com ✓ https:/ /securityheaders.io ✓ https:/ /www.ssllabs.com/ssltest/ 26