protect your apis from cyber threats

23
Droid Wars: Protect your APIs from cyber threats 1 ©2015 Apigee. All Rights Reserved.

Upload: apigee-google-cloud

Post on 15-Apr-2017

3.758 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Protect your APIs from Cyber Threats

Droid Wars: Protect your APIs from cyber threats

1©2015 Apigee. All Rights Reserved.

Page 2: Protect your APIs from Cyber Threats

youtube.com/apigee

Page 3: Protect your APIs from Cyber Threats

slideshare.net/apigee

Page 4: Protect your APIs from Cyber Threats

@SubrakSubra Kumaraswamy

@DavidandrzDavid Andrzejek

Page 5: Protect your APIs from Cyber Threats

5https://en.wikipedia.org/wiki/C-3PO

•Search engine indexing

•Health monitoring

•Performance testing

Page 6: Protect your APIs from Cyber Threats

6http://ideas.wikia.com/http://starwars.wikia.com/

•Scrapers: Content, price data, inventory data

•Reconnaissance: probe for API security weakness

•Bruteforce bots: DDoS attacks, etc.

Page 7: Protect your APIs from Cyber Threats

7http://ideas.wikia.com/http://starwars.wikia.com/

•Theft of data and business

•Promotion abuse

•Bot traffic skews analytics and KPIs

•Create performance overhead on Web Operations

Page 8: Protect your APIs from Cyber Threats

There is also reputational risk!

8

Page 9: Protect your APIs from Cyber Threats

What’s different about APIs?

9

Page 10: Protect your APIs from Cyber Threats

10http://starwars..com/

Page 11: Protect your APIs from Cyber Threats

11

API Security is Unique• Your APIs are vulnerable to the typical OWASP Top 10

attacks

• IN ADDITION, you have to worry about:– Hackers reverse engineering apps to access private APIs– API key theft—looks like legit usage!– Traffic spike protection by way of bots or DoS attacks– Identity tracking across API sessions– XML/JSON injection-type attacks– Token harvesting due to insecure communication or storage

Page 12: Protect your APIs from Cyber Threats

Secure Your APIs

12

Users Apps APIs Backend

Mutual TLSIP access control

Spike arrestRate limits

Threat protectionIntrusion detection

DDoS

API keyOAuth2

TLSIP access control

OAuth2MFA

Federated login

Page 13: Protect your APIs from Cyber Threats

13

Am I Secure Now?

Security Policies Configured

Page 14: Protect your APIs from Cyber Threats

14

Page 15: Protect your APIs from Cyber Threats

15

Need to rethink the “known known” security approach

15

Backend Service

Legitimate Traffic

API Bots

IP Blacklist

Apps

Page 16: Protect your APIs from Cyber Threats

16

Page 17: Protect your APIs from Cyber Threats

Data-driven approach to security

17

Page 18: Protect your APIs from Cyber Threats

Vol

URI

+many other kinds…

VS.

Vol

URI Password guessers Screen scrapers

Data-driven approach to security

Page 19: Protect your APIs from Cyber Threats

API Security: Data-Driven Approach

Page 20: Protect your APIs from Cyber Threats

Closed Loop Protection: Analyze, Detect, Protect

API clients

Target Services

API

Dashboard

Machine learning models and rules

Action (Block/Throttle/Alert)

Blacklist

Your traffic System-

widepurchased

Page 21: Protect your APIs from Cyber Threats

Key Takeaways

21

• If you have valuable data, you will be targeted.

• APIs bring unique challenges. Old approaches don’t work.

• Sophisticated rules and machine learning algorithms are the only way to discern bots from real traffic.

• An automated system is needed, to capture, analyze, report, and act.

Page 22: Protect your APIs from Cyber Threats

Securing APIs: End-to-End

22

Page 23: Protect your APIs from Cyber Threats

Thank you