17
1 Protecting APIs from Mobile threats - Beyond OAuth Subra Kumaraswamy, Apigee Caleb Sima, Bluebox

Protecting APIs from Mobile Threats- Beyond Oauth

  • Upload
    apigee

  • View
    468

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Protecting APIs from Mobile Threats- Beyond Oauth

1

Protecting APIs from Mobile threats - Beyond OAuthSubra Kumaraswamy,

ApigeeCaleb Sima, Bluebox

Page 2: Protecting APIs from Mobile Threats- Beyond Oauth

2©2015 Apigee. All Rights Reserved.

Agenda

1111. API Security – Threats & Protection

Subra Kumaraswamy

2. Mobile Security – Threats & Protection Caleb Sima

Page 3: Protecting APIs from Mobile Threats- Beyond Oauth

Securing the APIs – End-to-End

3

- Managing Identities in world of APIs – Tomorrow @10.50 am - Data Driven Security – Tomorrow @ 11:40 am - Securing the API Lifecycle – Tomorrow @ 2.00 pm

Page 4: Protecting APIs from Mobile Threats- Beyond Oauth

Securing the API – Run-time

4

Page 5: Protecting APIs from Mobile Threats- Beyond Oauth

Secure Your Assets

5

Backend

Mutual TLSIP Access control

Apps

API keyOAuth2

TLSIP Access Control

Hardened App

APIs

Spike ArrestRate Limits

Threat ProtectionIntrusion Detection

DDoS

Page 6: Protecting APIs from Mobile Threats- Beyond Oauth

Secure Your Access

Developers

Federation & SSOAuditing

MediationMasking

RBAC

AccessBlock

RevokeSSO

RBAC

Users

OAuth2MFA

Federated Login

PA I

API Team

Page 7: Protecting APIs from Mobile Threats- Beyond Oauth

©2015 Apigee. All Rights Reserved.

Mobile Security

7

Page 8: Protecting APIs from Mobile Threats- Beyond Oauth

Developer/Debug Screens & Hidden APIs

Page 9: Protecting APIs from Mobile Threats- Beyond Oauth

Static Crypto Keys & CC numbers

Page 10: Protecting APIs from Mobile Threats- Beyond Oauth

Private API tokens & Access to Private Betas

Page 11: Protecting APIs from Mobile Threats- Beyond Oauth

Bypass In-App-Purchase & Cheat in Games

Page 12: Protecting APIs from Mobile Threats- Beyond Oauth

©2015 Apigee. All Rights Reserved.

Demo

12

Page 13: Protecting APIs from Mobile Threats- Beyond Oauth

Mobile App Security : Best Practices

Secure• API key &

OAuth2• Open source

encryption packages like SQL Cipher

• SSL/TLS Pin your connections

Defend•Android: Check your signatures •iOS: Check for Apples signature

Respond• Rotate API Keys• Suspend/Kill App• Detection/

Analysis

Secure data at rest & in transit

Eliminate attack surface & make it expensive for attackers

Real time threat intelligence & response to active attacks

Page 14: Protecting APIs from Mobile Threats- Beyond Oauth

Key Takeaways• Follow API security best practices for both Mobile and API security–SSO, Access control (OAuth, SAML), Two-way TLS –Protect sensitive data stored in mobile end points

•Use Edge Policies to protect your backend from OWASP Top 10 threats.• Augment Mobile data security using Open source or commercial solutions e.g. Bluebox

14

Page 15: Protecting APIs from Mobile Threats- Beyond Oauth

Thank You!

Q&A

Demo of Bluebox at Innovation Labs

Page 16: Protecting APIs from Mobile Threats- Beyond Oauth

APPENDIX

Page 17: Protecting APIs from Mobile Threats- Beyond Oauth

API Specific Threats – How we mitigate?

17

Threats to API Apigee EdgeDoS Attacks Rate Limiting PolicyDeveloper Abuse Quota PolicyToken Harvesting 2-way TLS (Inbound and

Outbound)Key Theft Secure Key StorageXML/JSON Bombs XML/JSON Injection policyRun-time Privilege escalation OAuth with API ProductsManagement Privilege escalation

RBAC for Management Team