SlideShare a Scribd company logo
2
Most read
5
Most read
16
Most read
How Secure Are Your APIs?
Kevin Ford
Apigee | Google Cloud
Today’s Presenter
APIs Are Under Attack
3
• Standard Interface
• Consistent Resource
model
• Easy Programmability
• Published Documentation
• Mobile App Proliferation
Proprietary and confidential
API Attacks That Made the News
“An Instagram Hack Hit Millions of
Accounts, and Victims’ Phone
Numbers are Now for Sale.”
“No Butts About It, Some Pinterest
Users Have Been Hacked.”
“Three Million Moonpig Accounts
Exposed by Flaw.”
“Nissan Leaf Hackable Through
Insecure APIs.”
“Thieves Stole Taxpayer Data from
IRS ‘Get Transcript’ Service.”
Layered Security and Governance
Backend
RBAC management
IDM Integration
Global Policies
User Provisioning
AD / LDAP
Groups
Quota/Spike Arrest
SQL threat protection
JSON bomb protection
IP based restrictions
Bot Detection (public today)
Data Security
Two-way TLS
API key
OAuth2
Threat Protection
Identity Mgmt & Governance
Management
Server
Portal Analytics
API MANAGEMENT
Data Security
Two-way TLS
IP Access Control
Logging & Auditing
Data Security
Org Boundaries
Encryption
SOC 2, PCI-DSS, HIPAA
Access Control
OAuth2
API Key Verification
IP Access Control
Logging & Auditing
Partners/
Apps
Signs of Attack on APIs
• Persistent attempts from same IP
• Unusual error rates
• Suspicious client requests
• Data crawling
• Key harvesting
• Activity bursts
• Geographical patterns
• Brute force attacks
• Bots probing for API security weakness
• Competitors scraping price data
• Credential stuffing
• Abuse of guest accounts
• Bot traffic skewing analytics and KPIs
• Using compromised API keys to access
private APIs
• Dictionary-type attacks
• Man-in-the-Middle attacks
Backend
Systems
Apigee
7
WAF
API Key
Access
Token
User Agent
Contextual
Volume
x
x
x
x
x
x
x
x
* Other
Attributes Data
Warehouse
CRM, ERP, etc.
SOA
Microservices
Why Traditional Approaches Fail
Solution: Dedicated API Security Infrastructure
APIs need a dedicated security
infrastructure to protect against the
increasing threat of malicious
behavior.
Once is happenstance. Twice is coincidence. The
third time it’s enemy action.
Ian Fleming
Intelligent
behavior
detection to
protect APIs
from attack.
9
Apigee Sense
How does Apigee Sense Protect your APIs?
● Purpose built for APIs
● Uses behavior-based rules
and algorithms
● Detects anomalous
behavior patterns at the API
layer
● Complete closed-loop
system Takes actions
based on rules specified by
administrators
Intelligent
Apigee Sense
• Studies call patterns from API
metadata
• Algorithms detect anomalies
• Analyzes customer traffic over
time
Behavior Detection
Apigee Sense
• Detects behavior
• Finds anomalies
• Proactively identifies threats
• Examines metadata
• Characterizes requests
• Flags suspicious requests
• Administrators apply desired
action for a given behavior
Hackers
Brute Force Attacks
Protect APIs
Apigee Sense
• Alerts teams
• Tags or blocks
• Takes Action based on admin
policies
• Closed-loop system
Closed Loop Protection:
Handle Flagged Requests via Configuration Handle Flagged Requests via Code
Honeypot, Conditional Routing,
Callouts, Logging
Flexible Protection
A Secure Solution
A Secure Solution… With Extreme Visibility
The Best Defense Is A Good Offense
Questions?

More Related Content

What's hot (20)

PPTX
API Management in Digital Transformation
Aditya Thatte
 
PDF
API Gateway How-To: The Many Ways to Apply the Gateway Pattern
VMware Tanzu
 
PPTX
Api testing
HamzaMajid13
 
PPTX
Apigee Edge Product Demo
Apigee | Google Cloud
 
PPTX
API Strategy Introduction
Doug Gregory
 
PDF
Why API Ops is the Next Wave of DevOps
John Musser
 
PDF
Definitive Guide to API Management
Apigee | Google Cloud
 
PPTX
Introducing OpenAPI Version 3.1
SmartBear
 
PDF
Introduction to Kong API Gateway
Yohann Ciurlik
 
PDF
API Management - Why it matters!
Sven Bernhardt
 
PDF
API Business Models
John Musser
 
PDF
Designing APIs with OpenAPI Spec
Adam Paxton
 
PPTX
Api types
Sarah Maddox
 
PPTX
Api Testing
Vishwanath KC
 
PPTX
What is APIGEE? What are the benefits of APIGEE?
IQ Online Training
 
PPTX
What is an API Gateway?
LunchBadger
 
PDF
Architecting an Enterprise API Management Strategy
WSO2
 
PPTX
Rest API Security - A quick understanding of Rest API Security
Mohammed Fazuluddin
 
PDF
API for Beginners
Sébastien Saunier
 
PPTX
What's an api
Jacques Ledoux
 
API Management in Digital Transformation
Aditya Thatte
 
API Gateway How-To: The Many Ways to Apply the Gateway Pattern
VMware Tanzu
 
Api testing
HamzaMajid13
 
Apigee Edge Product Demo
Apigee | Google Cloud
 
API Strategy Introduction
Doug Gregory
 
Why API Ops is the Next Wave of DevOps
John Musser
 
Definitive Guide to API Management
Apigee | Google Cloud
 
Introducing OpenAPI Version 3.1
SmartBear
 
Introduction to Kong API Gateway
Yohann Ciurlik
 
API Management - Why it matters!
Sven Bernhardt
 
API Business Models
John Musser
 
Designing APIs with OpenAPI Spec
Adam Paxton
 
Api types
Sarah Maddox
 
Api Testing
Vishwanath KC
 
What is APIGEE? What are the benefits of APIGEE?
IQ Online Training
 
What is an API Gateway?
LunchBadger
 
Architecting an Enterprise API Management Strategy
WSO2
 
Rest API Security - A quick understanding of Rest API Security
Mohammed Fazuluddin
 
API for Beginners
Sébastien Saunier
 
What's an api
Jacques Ledoux
 

Similar to How Secure Are Your APIs? (20)

PPTX
Deep-Dive: Secure API Management
Apigee | Google Cloud
 
PPTX
Adapt or Die Sydney - API Security
Apigee | Google Cloud
 
PPTX
APIs: The New Security Layer
Apigee | Google Cloud
 
PDF
Outpost24 webinar Why API security matters and how to get it right.pdf
Outpost24
 
PPTX
Outpost24 webinar - Api security
Outpost24
 
PDF
Enhancing your Security APIs
Apigee | Google Cloud
 
PDF
5 step plan to securing your APIs
💻 Javier Garza
 
PPTX
Data-driven API Security
Apigee | Google Cloud
 
PDF
What is API Security and How Does It Keep Apps Safe_.pdf
CyberPro Magazine
 
PDF
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSI®
United States Cybersecurity Institute (USCSI®)
 
PPTX
London Adapt or Die: Securing your APIs the Right Way!
Apigee | Google Cloud
 
PDF
Peeling the Onion: Making Sense of the Layers of API Security
Matt Tesauro
 
PDF
Guidelines to protect your APIs from threats
Isabelle Mauny
 
PPTX
What Is an API? | API Security Explained | API Security Best Practices | Simp...
Simplilearn
 
PDF
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
apidays
 
PDF
apidays Australia 2023 - API Security Breach Analysis & Empowering Devs to M...
apidays
 
PPTX
API Security using Mulesoft
Pritam Prakash
 
PPTX
Protect your APIs from Cyber Threats
Apigee | Google Cloud
 
PPTX
Layered API Security: What Hackers Don't Want You To Know
AaronLieberman5
 
PDF
Virtual Meetup - API Security Best Practices
Jimmy Attia
 
Deep-Dive: Secure API Management
Apigee | Google Cloud
 
Adapt or Die Sydney - API Security
Apigee | Google Cloud
 
APIs: The New Security Layer
Apigee | Google Cloud
 
Outpost24 webinar Why API security matters and how to get it right.pdf
Outpost24
 
Outpost24 webinar - Api security
Outpost24
 
Enhancing your Security APIs
Apigee | Google Cloud
 
5 step plan to securing your APIs
💻 Javier Garza
 
Data-driven API Security
Apigee | Google Cloud
 
What is API Security and How Does It Keep Apps Safe_.pdf
CyberPro Magazine
 
What Is API Security? Threats, Tools, and Best Practices in 2025 | USCSI®
United States Cybersecurity Institute (USCSI®)
 
London Adapt or Die: Securing your APIs the Right Way!
Apigee | Google Cloud
 
Peeling the Onion: Making Sense of the Layers of API Security
Matt Tesauro
 
Guidelines to protect your APIs from threats
Isabelle Mauny
 
What Is an API? | API Security Explained | API Security Best Practices | Simp...
Simplilearn
 
apidays London 2023 - APIs: The Attack Surface That Connects Us All, Stefan M...
apidays
 
apidays Australia 2023 - API Security Breach Analysis & Empowering Devs to M...
apidays
 
API Security using Mulesoft
Pritam Prakash
 
Protect your APIs from Cyber Threats
Apigee | Google Cloud
 
Layered API Security: What Hackers Don't Want You To Know
AaronLieberman5
 
Virtual Meetup - API Security Best Practices
Jimmy Attia
 
Ad

More from Apigee | Google Cloud (20)

PDF
Magazine Luiza at a glance (1)
Apigee | Google Cloud
 
PPTX
Monetization: Unlock More Value from Your APIs
Apigee | Google Cloud
 
PDF
Ticketmaster at a glance
Apigee | Google Cloud
 
PDF
AccuWeather: Recasting API Experiences in a Developer-First World
Apigee | Google Cloud
 
PDF
Which Application Modernization Pattern Is Right For You?
Apigee | Google Cloud
 
PPTX
Apigee Product Roadmap Part 2
Apigee | Google Cloud
 
PPTX
The Four Transformative Forces of the API Management Market
Apigee | Google Cloud
 
PDF
Walgreens at a glance
Apigee | Google Cloud
 
PDF
Apigee Edge: Intro to Microgateway
Apigee | Google Cloud
 
PDF
Managing the Complexity of Microservices Deployments
Apigee | Google Cloud
 
PDF
Pitney Bowes at a glance
Apigee | Google Cloud
 
PPTX
Microservices Done Right: Key Ingredients for Microservices Success
Apigee | Google Cloud
 
PDF
Adapt or Die: Opening Keynote with Chet Kapoor
Apigee | Google Cloud
 
PDF
Adapt or Die: Keynote with Greg Brail
Apigee | Google Cloud
 
PDF
Adapt or Die: Keynote with Anant Jhingran
Apigee | Google Cloud
 
PDF
London Adapt or Die: Opening Keynot
Apigee | Google Cloud
 
PDF
London Adapt or Die: Lunch keynote
Apigee | Google Cloud
 
PDF
London Adapt or Die: Closing Keynote — Adapt Now!
Apigee | Google Cloud
 
PPTX
London adapt or-die opening keynote chet kapoor
Apigee | Google Cloud
 
PPTX
London Adapt or Die: Opening Keynote with Chet Kapoor
Apigee | Google Cloud
 
Magazine Luiza at a glance (1)
Apigee | Google Cloud
 
Monetization: Unlock More Value from Your APIs
Apigee | Google Cloud
 
Ticketmaster at a glance
Apigee | Google Cloud
 
AccuWeather: Recasting API Experiences in a Developer-First World
Apigee | Google Cloud
 
Which Application Modernization Pattern Is Right For You?
Apigee | Google Cloud
 
Apigee Product Roadmap Part 2
Apigee | Google Cloud
 
The Four Transformative Forces of the API Management Market
Apigee | Google Cloud
 
Walgreens at a glance
Apigee | Google Cloud
 
Apigee Edge: Intro to Microgateway
Apigee | Google Cloud
 
Managing the Complexity of Microservices Deployments
Apigee | Google Cloud
 
Pitney Bowes at a glance
Apigee | Google Cloud
 
Microservices Done Right: Key Ingredients for Microservices Success
Apigee | Google Cloud
 
Adapt or Die: Opening Keynote with Chet Kapoor
Apigee | Google Cloud
 
Adapt or Die: Keynote with Greg Brail
Apigee | Google Cloud
 
Adapt or Die: Keynote with Anant Jhingran
Apigee | Google Cloud
 
London Adapt or Die: Opening Keynot
Apigee | Google Cloud
 
London Adapt or Die: Lunch keynote
Apigee | Google Cloud
 
London Adapt or Die: Closing Keynote — Adapt Now!
Apigee | Google Cloud
 
London adapt or-die opening keynote chet kapoor
Apigee | Google Cloud
 
London Adapt or Die: Opening Keynote with Chet Kapoor
Apigee | Google Cloud
 
Ad

Recently uploaded (20)

PDF
What Makes Contify’s News API Stand Out: Key Features at a Glance
Contify
 
PDF
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
Biography of Daniel Podor.pdf
Daniel Podor
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
PDF
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PDF
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
What Makes Contify’s News API Stand Out: Key Features at a Glance
Contify
 
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
Biography of Daniel Podor.pdf
Daniel Podor
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 

How Secure Are Your APIs?

  • 1. How Secure Are Your APIs? Kevin Ford Apigee | Google Cloud
  • 3. APIs Are Under Attack 3 • Standard Interface • Consistent Resource model • Easy Programmability • Published Documentation • Mobile App Proliferation
  • 4. Proprietary and confidential API Attacks That Made the News “An Instagram Hack Hit Millions of Accounts, and Victims’ Phone Numbers are Now for Sale.” “No Butts About It, Some Pinterest Users Have Been Hacked.” “Three Million Moonpig Accounts Exposed by Flaw.” “Nissan Leaf Hackable Through Insecure APIs.” “Thieves Stole Taxpayer Data from IRS ‘Get Transcript’ Service.”
  • 5. Layered Security and Governance Backend RBAC management IDM Integration Global Policies User Provisioning AD / LDAP Groups Quota/Spike Arrest SQL threat protection JSON bomb protection IP based restrictions Bot Detection (public today) Data Security Two-way TLS API key OAuth2 Threat Protection Identity Mgmt & Governance Management Server Portal Analytics API MANAGEMENT Data Security Two-way TLS IP Access Control Logging & Auditing Data Security Org Boundaries Encryption SOC 2, PCI-DSS, HIPAA Access Control OAuth2 API Key Verification IP Access Control Logging & Auditing Partners/ Apps
  • 6. Signs of Attack on APIs • Persistent attempts from same IP • Unusual error rates • Suspicious client requests • Data crawling • Key harvesting • Activity bursts • Geographical patterns • Brute force attacks • Bots probing for API security weakness • Competitors scraping price data • Credential stuffing • Abuse of guest accounts • Bot traffic skewing analytics and KPIs • Using compromised API keys to access private APIs • Dictionary-type attacks • Man-in-the-Middle attacks
  • 7. Backend Systems Apigee 7 WAF API Key Access Token User Agent Contextual Volume x x x x x x x x * Other Attributes Data Warehouse CRM, ERP, etc. SOA Microservices Why Traditional Approaches Fail
  • 8. Solution: Dedicated API Security Infrastructure APIs need a dedicated security infrastructure to protect against the increasing threat of malicious behavior. Once is happenstance. Twice is coincidence. The third time it’s enemy action. Ian Fleming
  • 10. How does Apigee Sense Protect your APIs? ● Purpose built for APIs ● Uses behavior-based rules and algorithms ● Detects anomalous behavior patterns at the API layer ● Complete closed-loop system Takes actions based on rules specified by administrators
  • 11. Intelligent Apigee Sense • Studies call patterns from API metadata • Algorithms detect anomalies • Analyzes customer traffic over time
  • 12. Behavior Detection Apigee Sense • Detects behavior • Finds anomalies • Proactively identifies threats • Examines metadata • Characterizes requests • Flags suspicious requests • Administrators apply desired action for a given behavior Hackers Brute Force Attacks
  • 13. Protect APIs Apigee Sense • Alerts teams • Tags or blocks • Takes Action based on admin policies • Closed-loop system
  • 15. Handle Flagged Requests via Configuration Handle Flagged Requests via Code Honeypot, Conditional Routing, Callouts, Logging Flexible Protection
  • 17. A Secure Solution… With Extreme Visibility
  • 18. The Best Defense Is A Good Offense