SlideShare a Scribd company logo
The API Security Platform for the Enterprise
ISABELLE MAUNY - CHIEF PRODUCT OFFICER & CO-FOUNDER
ISABELLE@42CRUNCH.COM
BETTER SECURITY
WITH AN AUTOMATED APPROACH
OWASP : FROM 2010 THROUGH 2017
2
TOP 10 2010
A1: Injection
A2: Cross-Site Scripting (XSS)
A3: Broken Authentication and Session Management
A4: Insecure Direct Object References
A5: Cross-Site Request Forgery (CSRF)
A6: Security Misconfiguration
A7: Insecure Cryptographic Storage
A8: Failure to Restrict URL Access
A9: Insufficient Transport Layer Protection
A10: Unvalidated Redirects and Forwards
Top 10 2017
A1: Injection*
A2: Broken Authentication
A3: Sensitive Data Exposure*
A4: XML External Entities (XXE)*
A5: Broken Access Control*
A6: Security Misconfiguration*
A7: Cross-Site Scripting (XSS)*
A8: Insecure Deserialization*
A9: Using Components with Known Vulnerabilities*
A10: Insufficient Logging&Monitoring
*= API related
3By 2022 APIs will become the most common attack vector - Gartner
HOW DID WE
GET THERE?
4
WE ARE
HUMANS!
5
6
COVERING
THE BASICS
7
8
KNOW YOUR
APIS
9
1
See: https://www.owasp.org/index.php/Application_Threat_Modeling
VALIDATE AND
SANITIZE INPUT
10
URL validation
Verb validation
✓ Reject if not valid
Query params validation
✓ Min / Max / Pattern-based matching
Content-Type validation
✓ Don’t accept as-is!
Accept Header validation
✓ Don’t copy into Content-Type
Data inbound
✓ Format
✓ Message Size and complexity
Data outbound
✓ Data Leakage
✓ Exception Leakage
✓ Use rules against data dictionary
2
OPENAPI SPECIFICATION to the RESCUE !
VALIDATE JWT
TOKENS
11
Don’t trust the incoming token!
Validate algorithm (the one you chose!)
✓ HS256
✓ RS256 (recommended)
Reject None!
Validate signature
✓ Prefer digital signatures over HMAC
✓ If not, be careful of key exchange
Validate standard claims and your own claims
See details Learn the best practices for keeping your JWTs secure.
3
OPENAPI SPECIFICATION (AGAIN) to the RESCUE !
FINE-GRAIN
AUTHORIZATION
12
Who is calling ?
✓ Is it your own app ?
✓ Is it a trusted user ?
What can they do ?
Example: T-Mobile number
Scopes are often not enough !
✓ Need ABAC solution (XACML!)
4
FINDING
VULNERABILITIES
13
START EARLY: SHIFT LEFT !
14
DeploymentTestingDevelopmentDesign
15
Development
Security
Operations
Business
COVER THE
BASICS
16
Automated Analysis
Static code analysis
3rd party libraries validation (CVEs), e.g.
NPS / Snyk for Node.js
GitHub dependencies graph
Manual Analysis
Code reviews
1
HACK
YOURSELVES!
17
API Scanning/Fuzzing
✓ Veracode, Coverity
✓ 42Crunch (coming soon!)
Transport analysis
✓ SSL Labs
✓ Hardenize
Further Analysis
✓ Bug Bounty
✓ Pen Testing
2
18
PROTECT YOUR
APIS
3
Protect all APIs ( public, private, SaaS)
AUTOMATICALLY deploy security measures
such as API Security Gateways/Firewalls
✓ Enforce Rate Limiting
• Brute force attacks (see N26!)
• DOS attacks
✓ Data Validation / JWT Validation / Auth / Azn
✓ Serves as Virtual Patching (as a WAF does for applications)
✓ Deploy at the edge and/or close to APIs (microservices
architecture)
Use Development ticketing system for
tracking issues
Analyse runtime behaviour and raise
issues automatically
19
MONITOR AND
ANALYZE
4
JOIN THE MAILING LIST !
APISECURITY.IO
NEWS AND TOOLS FOR BETTER API SECURITY
ADDITIONAL
INFORMATION
21
PROPOSAL FOR A DEV-SEC-OPS CYCLE FOR APIS
22
Monitor
Assess
Protect
Test
Develop Deploy
Monitor Security
Vulnerabilities and
runtime behavior
Continuous API hardening
including API fuzzing
Deploy to containerized
PEP
Configure and apply
security policies from
assessed risk
Assess API description
and evaluate risk level
Develop and document API
with OpenAPI/Swagger
CONTENT INJECTION: WORDPRESS API
23https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html
TITLE TEXT
Remote Command Execution (A1)
SQL Injection (A1)
JSON injection (A1)
Information Leakage (A3)
Broken Access Control (A5)
Check: https://blog.talosintelligence.com/2018/07/
samsung-smartthings-vulns.html
24
25
https://www.talosintelligence.com/reports/TALOS-2018-0539/
26
Information Leakage (A3)
Broken Access Control (A5)
Check: https://www1.cs.fau.de/
filepool/projects/n26/n26-roots.pdf
N26 CONTINUED…
27
28
Failed to properly validate that you
can’t input any other number than
yours!
UNPROTECTED API ! (A6)
Remote Command Execution
SQL Injection
Buffer Overflow
JSON injection
Information Leakage
Check: https://blog.talosintelligence.com/2018/07/samsung-
smartthings-vulns.html
29
AND OF COURSE …. EQUIFAX FOR A9
30
JWT TOKEN VALIDATION
31
Failed to properly validate JWT token (A5)
Algorithm (set to None)
Claims (audience)
RESOURCES
OWASP Top 10
✓ https://www.owasp.org/index.php/Category:OWASP_Top_Ten_2017_Project
OWASP DevSlop Project
✓ https://www.owasp.org/index.php/OWASP_DevSlop_Project
Chaos Engineering
✓ http://principlesofchaos.org
✓ https://github.com/dastergon/awesome-chaos-engineering
OWASP ZAP
✓ https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
Source Code Analysis
✓ https://www.owasp.org/index.php/Source_Code_Analysis_Tools
Code Security reviews
✓ https://www.owasp.org/index.php/Code_Review_Introduction
Systems Scans
✓ https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools
Security Methodology
✓ https://developer.rackspace.com/blog/fanatical-security-delivered-by-quality-engineering-security-team/ 32
RESOURCES
SSL Setup Scan
✓ https://hardenize.com
✓ https://securityheaders.io
✓ https://www.ssllabs.com/ssltest/
Threat Modelling
✓ https://www.owasp.org/index.php/Application_Threat_Modeling
Attacks Type Information
✓ XSS: https://excess-xss.com
✓ Buffer Overflow: https://www.youtube.com/watch?v=1S0aBV-Waeo
✓ SQL injection: https://www.youtube.com/watch?v=ciNHn38EyRc
✓ Cookie stealing /XSS: https://www.youtube.com/watch?v=T1QEs3mdJoc
Pixi / DevSlop
✓ https://github.com/DevSlop/Pixi
✓ https://devslop.co
JWT as session data
✓ https://dzone.com/articles/stop-using-jwts-as-session-tokens
33

More Related Content

PDF
42crunch-API-security-workshop
PDF
SecDevOps for API Security
PDF
Advanced API Security Patterns
PDF
APIDays Paris Security Workshop
PDF
API Security: the full story
PDF
Guidelines to protect your APIs from threats
PDF
Why you need API Security Automation
PDF
API Security in a Microservices World
42crunch-API-security-workshop
SecDevOps for API Security
Advanced API Security Patterns
APIDays Paris Security Workshop
API Security: the full story
Guidelines to protect your APIs from threats
Why you need API Security Automation
API Security in a Microservices World

What's hot (20)

PDF
OWASP API Security Top 10 Examples
PDF
API Security Guidelines: Beyond SSL and OAuth.
PDF
Top API Security Issues Found During POCs
PDF
The Dev, Sec and Ops of API Security - API World
PDF
Five Principles to API Security
PDF
Applying API Security at Scale
PDF
APISecurity_OWASP_MitigationGuide
PDF
Protecting Microservices APIs with 42Crunch API Firewall
PDF
OWASP API Security TOP 10 - 2019
PDF
OWASP API Security Top 10 - Austin DevSecOps Days
PDF
The Dev, Sec and Ops of API Security - NordicAPIs
PDF
OWASP API Security Top 10 - API World
PDF
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
PDF
WEBINAR: OWASP API Security Top 10
PDF
Injecting Security into vulnerable web apps at Runtime
PDF
API Security - OWASP top 10 for APIs + tips for pentesters
PDF
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
PDF
Injecting Security into Web apps at Runtime Whitepaper
PPTX
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
PPTX
OWASP Top 10 - 2017 Top 10 web application security risks
OWASP API Security Top 10 Examples
API Security Guidelines: Beyond SSL and OAuth.
Top API Security Issues Found During POCs
The Dev, Sec and Ops of API Security - API World
Five Principles to API Security
Applying API Security at Scale
APISecurity_OWASP_MitigationGuide
Protecting Microservices APIs with 42Crunch API Firewall
OWASP API Security TOP 10 - 2019
OWASP API Security Top 10 - Austin DevSecOps Days
The Dev, Sec and Ops of API Security - NordicAPIs
OWASP API Security Top 10 - API World
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
WEBINAR: OWASP API Security Top 10
Injecting Security into vulnerable web apps at Runtime
API Security - OWASP top 10 for APIs + tips for pentesters
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Injecting Security into Web apps at Runtime Whitepaper
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - 2017 Top 10 web application security risks
Ad

Similar to Better API Security with Automation (20)

PDF
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...
PDF
Peeling the Onion: Making Sense of the Layers of API Security
PDF
apidays New York 2023 - Putting yourself out there - how to secure your publi...
PDF
APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...
PDF
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
PDF
API Security Webinar : Security Guidelines for Providing and Consuming APIs
PDF
API Security Webinar - Security Guidelines for Providing and Consuming APIs
PPTX
Outpost24 webinar - Api security
PDF
OWASPAPISecurity
PDF
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSI®
PPTX
apidays Paris 2024 - Layered Approach of API Security Strategies and its Busi...
PDF
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
PDF
Outpost24 webinar Why API security matters and how to get it right.pdf
PDF
apidays LIVE LONDON - Protecting financial-grade APIs - Getting the right API...
PDF
API Security Best Practices and Guidelines
PDF
Virtual Meetup - API Security Best Practices
PDF
apidays Australia 2023 - API Security Breach Analysis & Empowering Devs to M...
PDF
apidays LIVE Paris - Protecting financial grade API: adopting the right secur...
PDF
apidays Hong Kong - Attack API Architecture, Alvin Tam, Hong Kong Computer So...
PDF
HowYourAPIBeMyAPI
APIsecure 2023 - Time to Take the "F*^!" out of ShiFt Left, Christine Bevilac...
Peeling the Onion: Making Sense of the Layers of API Security
apidays New York 2023 - Putting yourself out there - how to secure your publi...
APIdays London 2019 - API Security Tips for Developers with Isabelle Mauny, 4...
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
API Security Webinar : Security Guidelines for Providing and Consuming APIs
API Security Webinar - Security Guidelines for Providing and Consuming APIs
Outpost24 webinar - Api security
OWASPAPISecurity
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSI®
apidays Paris 2024 - Layered Approach of API Security Strategies and its Busi...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
Outpost24 webinar Why API security matters and how to get it right.pdf
apidays LIVE LONDON - Protecting financial-grade APIs - Getting the right API...
API Security Best Practices and Guidelines
Virtual Meetup - API Security Best Practices
apidays Australia 2023 - API Security Breach Analysis & Empowering Devs to M...
apidays LIVE Paris - Protecting financial grade API: adopting the right secur...
apidays Hong Kong - Attack API Architecture, Alvin Tam, Hong Kong Computer So...
HowYourAPIBeMyAPI
Ad

Recently uploaded (20)

PPTX
Online Work Permit System for Fast Permit Processing
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Understanding NFT Marketplace Development_ Trends and Innovations.pdf
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
top salesforce developer skills in 2025.pdf
PPTX
FLIGHT TICKET RESERVATION SYSTEM | FLIGHT BOOKING ENGINE API
PPTX
Introduction to Artificial Intelligence
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PPTX
Essential Infomation Tech presentation.pptx
PPT
Introduction Database Management System for Course Database
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Transform Your Business with a Software ERP System
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
medical staffing services at VALiNTRY
PDF
System and Network Administraation Chapter 3
DOCX
The Five Best AI Cover Tools in 2025.docx
PDF
Digital Strategies for Manufacturing Companies
DOCX
Looking for a Tableau Alternative Try Helical Insight Open Source BI Platform...
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Online Work Permit System for Fast Permit Processing
Upgrade and Innovation Strategies for SAP ERP Customers
Understanding NFT Marketplace Development_ Trends and Innovations.pdf
How to Choose the Right IT Partner for Your Business in Malaysia
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
top salesforce developer skills in 2025.pdf
FLIGHT TICKET RESERVATION SYSTEM | FLIGHT BOOKING ENGINE API
Introduction to Artificial Intelligence
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
Essential Infomation Tech presentation.pptx
Introduction Database Management System for Course Database
PTS Company Brochure 2025 (1).pdf.......
Transform Your Business with a Software ERP System
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
medical staffing services at VALiNTRY
System and Network Administraation Chapter 3
The Five Best AI Cover Tools in 2025.docx
Digital Strategies for Manufacturing Companies
Looking for a Tableau Alternative Try Helical Insight Open Source BI Platform...
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf

Better API Security with Automation

  • 1. The API Security Platform for the Enterprise ISABELLE MAUNY - CHIEF PRODUCT OFFICER & CO-FOUNDER [email protected] BETTER SECURITY WITH AN AUTOMATED APPROACH
  • 2. OWASP : FROM 2010 THROUGH 2017 2 TOP 10 2010 A1: Injection A2: Cross-Site Scripting (XSS) A3: Broken Authentication and Session Management A4: Insecure Direct Object References A5: Cross-Site Request Forgery (CSRF) A6: Security Misconfiguration A7: Insecure Cryptographic Storage A8: Failure to Restrict URL Access A9: Insufficient Transport Layer Protection A10: Unvalidated Redirects and Forwards Top 10 2017 A1: Injection* A2: Broken Authentication A3: Sensitive Data Exposure* A4: XML External Entities (XXE)* A5: Broken Access Control* A6: Security Misconfiguration* A7: Cross-Site Scripting (XSS)* A8: Insecure Deserialization* A9: Using Components with Known Vulnerabilities* A10: Insufficient Logging&Monitoring *= API related
  • 3. 3By 2022 APIs will become the most common attack vector - Gartner
  • 4. HOW DID WE GET THERE? 4
  • 6. 6
  • 8. 8
  • 10. VALIDATE AND SANITIZE INPUT 10 URL validation Verb validation ✓ Reject if not valid Query params validation ✓ Min / Max / Pattern-based matching Content-Type validation ✓ Don’t accept as-is! Accept Header validation ✓ Don’t copy into Content-Type Data inbound ✓ Format ✓ Message Size and complexity Data outbound ✓ Data Leakage ✓ Exception Leakage ✓ Use rules against data dictionary 2 OPENAPI SPECIFICATION to the RESCUE !
  • 11. VALIDATE JWT TOKENS 11 Don’t trust the incoming token! Validate algorithm (the one you chose!) ✓ HS256 ✓ RS256 (recommended) Reject None! Validate signature ✓ Prefer digital signatures over HMAC ✓ If not, be careful of key exchange Validate standard claims and your own claims See details Learn the best practices for keeping your JWTs secure. 3 OPENAPI SPECIFICATION (AGAIN) to the RESCUE !
  • 12. FINE-GRAIN AUTHORIZATION 12 Who is calling ? ✓ Is it your own app ? ✓ Is it a trusted user ? What can they do ? Example: T-Mobile number Scopes are often not enough ! ✓ Need ABAC solution (XACML!) 4
  • 14. START EARLY: SHIFT LEFT ! 14 DeploymentTestingDevelopmentDesign
  • 16. COVER THE BASICS 16 Automated Analysis Static code analysis 3rd party libraries validation (CVEs), e.g. NPS / Snyk for Node.js GitHub dependencies graph Manual Analysis Code reviews 1
  • 17. HACK YOURSELVES! 17 API Scanning/Fuzzing ✓ Veracode, Coverity ✓ 42Crunch (coming soon!) Transport analysis ✓ SSL Labs ✓ Hardenize Further Analysis ✓ Bug Bounty ✓ Pen Testing 2
  • 18. 18 PROTECT YOUR APIS 3 Protect all APIs ( public, private, SaaS) AUTOMATICALLY deploy security measures such as API Security Gateways/Firewalls ✓ Enforce Rate Limiting • Brute force attacks (see N26!) • DOS attacks ✓ Data Validation / JWT Validation / Auth / Azn ✓ Serves as Virtual Patching (as a WAF does for applications) ✓ Deploy at the edge and/or close to APIs (microservices architecture)
  • 19. Use Development ticketing system for tracking issues Analyse runtime behaviour and raise issues automatically 19 MONITOR AND ANALYZE 4
  • 20. JOIN THE MAILING LIST ! APISECURITY.IO NEWS AND TOOLS FOR BETTER API SECURITY
  • 22. PROPOSAL FOR A DEV-SEC-OPS CYCLE FOR APIS 22 Monitor Assess Protect Test Develop Deploy Monitor Security Vulnerabilities and runtime behavior Continuous API hardening including API fuzzing Deploy to containerized PEP Configure and apply security policies from assessed risk Assess API description and evaluate risk level Develop and document API with OpenAPI/Swagger
  • 23. CONTENT INJECTION: WORDPRESS API 23https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-rest-api.html
  • 24. TITLE TEXT Remote Command Execution (A1) SQL Injection (A1) JSON injection (A1) Information Leakage (A3) Broken Access Control (A5) Check: https://blog.talosintelligence.com/2018/07/ samsung-smartthings-vulns.html 24
  • 26. 26 Information Leakage (A3) Broken Access Control (A5) Check: https://www1.cs.fau.de/ filepool/projects/n26/n26-roots.pdf
  • 28. 28 Failed to properly validate that you can’t input any other number than yours!
  • 29. UNPROTECTED API ! (A6) Remote Command Execution SQL Injection Buffer Overflow JSON injection Information Leakage Check: https://blog.talosintelligence.com/2018/07/samsung- smartthings-vulns.html 29
  • 30. AND OF COURSE …. EQUIFAX FOR A9 30
  • 31. JWT TOKEN VALIDATION 31 Failed to properly validate JWT token (A5) Algorithm (set to None) Claims (audience)
  • 32. RESOURCES OWASP Top 10 ✓ https://www.owasp.org/index.php/Category:OWASP_Top_Ten_2017_Project OWASP DevSlop Project ✓ https://www.owasp.org/index.php/OWASP_DevSlop_Project Chaos Engineering ✓ http://principlesofchaos.org ✓ https://github.com/dastergon/awesome-chaos-engineering OWASP ZAP ✓ https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project Source Code Analysis ✓ https://www.owasp.org/index.php/Source_Code_Analysis_Tools Code Security reviews ✓ https://www.owasp.org/index.php/Code_Review_Introduction Systems Scans ✓ https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools Security Methodology ✓ https://developer.rackspace.com/blog/fanatical-security-delivered-by-quality-engineering-security-team/ 32
  • 33. RESOURCES SSL Setup Scan ✓ https://hardenize.com ✓ https://securityheaders.io ✓ https://www.ssllabs.com/ssltest/ Threat Modelling ✓ https://www.owasp.org/index.php/Application_Threat_Modeling Attacks Type Information ✓ XSS: https://excess-xss.com ✓ Buffer Overflow: https://www.youtube.com/watch?v=1S0aBV-Waeo ✓ SQL injection: https://www.youtube.com/watch?v=ciNHn38EyRc ✓ Cookie stealing /XSS: https://www.youtube.com/watch?v=T1QEs3mdJoc Pixi / DevSlop ✓ https://github.com/DevSlop/Pixi ✓ https://devslop.co JWT as session data ✓ https://dzone.com/articles/stop-using-jwts-as-session-tokens 33