agile api securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 ·...

29
Agile API Security Apigee @apigee Subra Kumaraswamy @subrak

Upload: others

Post on 15-Jul-2020

27 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

Agile API Security

Apigee@apigee

Subra Kumaraswamy@subrak

Page 2: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

youtube.com/apigee

Page 3: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

slideshare.net/apigee

Page 4: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

@Subrak  Subra  Kumaraswamy

Page 5: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

Agenda

•  Why Agile Security matters•  Agile API Security enablers and approaches•  Key takeaways•  Q&A

Page 6: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

Why Agile security?

6

Deve

loper

Ag

ility

Secu

rity

Risk

s

Page 7: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

API security stakeholders

7

Product ManagerHow can I release features with built-in security?

How I can reduce the release cycle?

Business ownerHow to reduce risk while expanding API exposure?

How to meet compliance?

OpsHow do I enforce consistent security policy across APIs?What controls I have to mitigate attacks like DoS?

App DeveloperWhat options I have to secure data in rest and transit?How to I enable Social login?How can I manage and revoke keys?

Page 8: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

Have implemented layers of security to protect crown jewels..

Security layers – good enough?

Page 9: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

That’s not enough, need security, with flexibility

9

Page 10: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

A new approach is required

Page 11: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

Agile API security

11

API First Architecture with built-in Security

Data Security governance

Security for API exposure

Security for consumption (Apps)

Secure and Agile SDLC Threat Assessment

Secure Coding Testing Verification

Page 12: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

API-first architecture

API Tier

All Apps

Analytics

App Servers ESB

Social Apps

Web Apps

Mobile Apps

BackendServices

OrchestrationPersistence Security

Internet

Consistent security policies & access

control(Exposure)

Flexible security for Apps �

(Consumption)

Developers

IT security architect

Page 13: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

API security architecture

Policy Store Log Store

API Security

Authentication

Authorization

TrafficManagement

Logging & Auditing

Identity for API Management

User Management RBAC Management

Policy Management

Certificate Management

Keys/Token Management

Threat Protection TLS DDoS Rate Limiting &

Quota Payload Protection Analytics

Compliance (SOC 2, PCI DSS, HIPAA)

Developers

Apps

IT Security /Architect

Key Store

Policy Enforcement

Page 14: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

Identity landscape in the API world

Page 15: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

15

þ  API First Architecture with Security

Data Security governance

Security for API exposure

Security for consumption (Apps)

Secure and Agile SDLC Threat Assessment

Secure Coding Testing Verification

Agile API security

Page 16: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

Security Design

Agile SDLC – Focus on automation

Threat Assessment

Secure Coding Testing Verification

API Threat Modeling

Secure Coding Practices

Static Analysis

Security Unit Testing

Dynamic Analysis

Secure Development Training

Black Box Pen Testing

Continuous Security

Monitoring

•  API product centric

•  Aligned with Epic and stories

•  Integrated into Development using Maven and Jenkin plugins

•  Vulnerabilities prioritized based in criticality and threat model requirements

•  Blackbox testing aligned with major release

•  Monitoring of API to verify policies

Page 17: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

•  What categories of developers or applications do you have? –  internal developers

–  partners (at various service levels)

–  public developers (open adoption) •  What APIs should each class of developers or applications have

access to?•  What Authentication and Authorization schemes are supported by

Apps to consume APIs?•  What type of data is exposed via API?•  What threats do you want protect against?

API Product security design considerations

Page 18: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

API threats•  Spoofing of identity •  Denial of service •  Network eavesdropping (App-to-API)•  Replay attacks•  Unauthorized access to management system and configuration data•  Man-in-the-middle attacks•  Velocity attack using legitimate API keys•  Elevation of privilege by applications and developers•  Disclosure of confidential data stored and processed in mobile, API, and

backend services•  Theft of credentials, API keys, tokens, or encryption keys

Page 19: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

19

þ  API First Architecture with Security

Data Security Governance

Security for API exposure

Security for consumption (Apps)

þ  Secure and Agile SDLC Threat Assessment

Secure Coding Testing Verification

Agile API security

Page 20: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

Centralize API security for exposure

20

Backend �Service

Authentication & Authorization

Identity Services (IdP)

Logging & Auditing

Security Analytics

Authentication & Authorization

Secure API Exposure

TLS

AppsSecurity & Identity"

Capabilities

Page 21: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

21

API exposure – security checklistAPI Security

API Developer Securityþ Authentication & SSO (SAML, OAuth)þ API Management Roles (RBAC)þ  Internal Vs External Developerþ Data Maskingþ Logging and auditing

Governance & Compliance

þ Policy Enforcementþ PCI/HIPAA Compliance

API (Backend) Securityþ Secure communication (TLS – 1 way or 2 way)þ Authentication (TLS, OAuth, SAML) þ Versioningþ  Integration with Enterprise identity providersþ Logging and auditing

Analytics

þ Run time detection reports (Volume based, Traffic properties)

Page 22: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

22

þ  API First Architecture with Security

Data Security Governance

þ  Security for API exposure

Security for Consumption (Apps)

þ  Secure and Agile SDLC Threat Assessment

Secure Coding Testing Verification

Agile API security

Page 23: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

Standardize App security for consumption

Security & Identity" Capabilities

Threat Protection

Application Security

Security for Consumption

Authentication & Authorization

TLS

Developers

Backend �Services

Apps

Page 24: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

24

API consumption – security checklistAPI Security

App Developer Securityþ Developer Key Management (Workflow,

Governance)þ Developer provisioning þ Authentication & SSO (SAML, OAuth)þ  Internal Vs External Developerþ Developer permission (RBAC)

App Securityþ Secure communication (TLS – 1 way or 2 way)

– Mobile Vs Partner þ Authentication (OAuth patterns) þ API key with Product Scopeþ Quota Enforcementþ  IP Based Whitelist/Blacklist

Threat Protection

þ XML/JSON Poisoning/Injection þ SQL Injectionþ DDoS/App-DoS Attacksþ Spike Arrest

Page 25: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

25

þ  API First Architecture with Security

Data Security Focused – API Products

þ  Security for API exposure

þ  Security for App Standardized

þ  Secure and Agile SDLC Threat Assessment

Secure Coding Testing Verification

Agile API security

Page 26: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

26

•  Organize your APIs as API products for fine granular data security management•  Central mechanism for authorization and access control to your APIs•  API products with Key and OAuth Scope protects your API

•  Protect payload data using encryption, hashing and secure key management•  Improve API agility by aligning Secure SDLC with data security sensitivity

API data security

Page 27: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

Key takeaways

27

þ  Practice API First Architecture for �security with flexibility

þ  Use API Products to enable tiered � security

þ  Centralize your API security for � consistent policy enforcement

þ  Standardize App security across � channels for frictionless user experience

þ  Implement SDLC with automation for agilityThreat

AssessmentSecure Coding Testing Verification

Page 28: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

@Subrak  Subra  Kumaraswamy

Thank You

Questions?

Page 29: Agile API Securitycqi611.weblog.esaunggul.ac.id/wp-content/uploads/sites/... · 2019-02-20 · Agile API security 11 API First Architecture with built-in Security Data Security governance

Thank  You  

Apigee@apigee