26
Securing APIs in a Mobile-First World Paul Levasseur VP Service Delivery - Appdome APIWorld October 10, 2019

Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

Securing APIs in a

Mobile-First World

Paul Levasseur

VP Service Delivery - Appdome

APIWorld

October 10, 2019

Page 2: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

Appdome is...

A no-code mobile integration and

solutions platform to

Add Security to Mobile

Apps in Seconds

and speed up your

Production Deployments.

Page 3: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

THE MOBILE APP GAP Mobile Apps and Mobile Services (APIs/SDKs) don’t work out of the box

Page 4: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

To Add Mobile Services

Customer Validated

Self Service Platform fusion.appdome.com

Industry Validated

Patented

* Implementations and customers shown are not exhaustive.

To Any Mobile App

Solutions for Today's and Tomorrow's Use Cases instantly, without coding

Appdome Solves the App Gap

160+ customers

Page 5: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

Why Securing Mobile APIs

Page 6: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

(Mobile) APIs Are Not Very Secure

• There is no Mobile API standard

• Each API works differently

• Every API security implementation is different

• And as a result, it tends to be the least priority for developers

Page 7: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

Recent API Vulnerabilities and Leaks

Page 8: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

How To Secure Mobile APIs?

• Data Encryption

• Code Obfuscation

• API Shielding

• Trusted Sessions

• API Segmentation

Page 9: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

Why Data Encryption? Use AES 256 encryption to secure and protect all API data (keys, secrets, urls, tokens, payload, etc.), including in the App Sandbox and Preferences.

Unencrypted Strings – API Key and API Secret in the clear

Encrypted Strings

Page 10: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

Why Code Obfuscation? Obfuscates the binary code, native and non-native libraries, to protect the API’s flow control and logic.

With Obfuscation, strings and resources are not accessible

Page 11: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

Why API Shielding? Hardens the app with anti-tampering, anti-debugging and anti-reversing protection.

Trying to tamper with the app...

Page 12: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

Trusted Communication Protects and encrypts all data in transit. Ensures the validity of all end points and any intermediate systems in between an API and its backend servers.

Without Trusted Session

With Trusted Session

Page 13: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

Why API Segmentation?

Use strong authentication, API tokenization, segmented API workflows (key stores, cookie stores, etc.) to ensure that only the right users can access specific API resources.

Unprotected cookie files in common areas

Encrypted cookie files in segmented areas

Page 14: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019)

A1 Broken Object Level Authorization

A2 Broken Authentication

A3 Excessive Data Exposure

A4 Lack of Resources and Rate Timing

A5 Broken Function Level Authorization

A6 Mass Assignment

A7 Security Misconfiguration

A8 Injection

A9 Improper Assets Management

A10 Insufficient Logging and Monitoring

Page 15: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

A1 - Broken Object Level Authorization

• OWASP: APIs tend to expose endpoints that handle object identifiers, creating a wide attack surface Level Access Control issue. Object-level authorization checks should be considered in every function that accesses a data source using input from the user.

• Appdome helps protect against this risk with: • Data Encryption

• Code Obfuscation

• Trusted Communication

• API Segmentation

Page 16: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

A2 - Broken Authentication

• OWASP: Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens or to exploit implementation flaws to assume other user’s identities temporarily or permanently. Compromising system’s ability to identify the client/user, compromises API security overall.

• Appdome helps protect against this risk with: • Data Encryption

• Code Obfuscation

• Trusted Communication

• API Segmentation

Page 17: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

A3 - Excessive Data Exposure

• OWASP: Looking forward to generic implementations, developers tend to expose all object properties without considering their individual sensitivity, relying on clients to perform the data filtering before displaying it to the user. Without controlling the client’s state, servers receive more-and-more filters which can be abused to gain access to sensitive data.

• Appdome helps protect against this risk with: • Code Obfuscation

• API Shielding

• Trusted Communication

• API Segmentation

Page 18: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

A4 – Lack of Resources & Rate Limiting

• OWASP: Quite often, APIs do not impose any restrictions on the size or number of resources that can be requested by the client/user. Not only can this impact the API server performance, leading to Denial of Service (DoS), but also leaves the door open to authentication flaws such as brute force.

• Appdome helps protect against this risk with: • API Segmentation

Page 19: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

A5 - Broken Function Level Authorization

• OWASP: Complex access control policies with different hierarchies, groups, and roles, and an unclear separation between administrative and regular functions, tend to lead to authorization flaws. By exploiting these issues, attackers gain access to other users’ resources and/or administrative functions.

• Appdome helps protect against this risk with: • Data Encryption

• Code Obfuscation

• API Shielding

• Trusted Communication

• API Segmentation

Page 20: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

A6 – Mass Assignment

• OWASP: Binding client provided data (e.g., JSON) to data models, without proper properties filtering based on a whitelist, usually lead to Mass Assignment. Either guessing objects properties, exploring other API endpoints, reading the documentation, or providing additional object properties in request payloads, allows attackers to modify object properties they are not supposed to.

• Appdome helps protect against this risk with: • Data Encryption

• Code Obfuscation

• API Shielding

• Trusted Communication

Page 21: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

A7 – Security Misconfiguration

• OWASP: Security misconfiguration is commonly a result of unsecure default configurations, incomplete or ad-hoc configurations, open cloud storage, misconfigured HTTP headers, unnecessary HTTP methods, permissive Cross-Origin resource sharing (CORS), and verbose error messages containing sensitive information.

• Appdome helps protect against this risk with: • Code Obfuscation

• API Shielding

• Trusted Communication

• API Segmentation

Page 22: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

A8 - Injection

• OWASP: Injection flaws, such as SQL, NoSQL, Command Injection, etc. occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s malicious data can trick the interpreter into executing unintended commands or accessing data without proper authorization.

• Appdome helps protect against this risk with: • Data Encryption

• Code Obfuscation

• API Shielding

• Trusted Communication

• API Segmentation

Page 23: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

A9 – Improper Assets Management

• OWASP: APIs tend to expose more endpoints than traditional web applications, making proper and updated documentation highly important. Proper hosts and deployed API versions inventory also play an important role to mitigate issues such as deprecated API versions and exposed debug endpoints.

• Appdome helps protect against this risk with: • Data Encryption

• Code Obfuscation

• API Shielding

• Trusted Communication

• API Segmentation

Page 24: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

A10 – Insufficient Logging & Monitoring

• OWASP: Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems to tamper with, extract, or destroy data. Most breach studies demonstrate the time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring.

• Appdome helps protect against this risk with: • This risk is related to the backend API services, not the Mobile APIs.

• Network infrastructure Security companies like Appdome's partner F5 protect against this risk.

Page 25: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

DEMO

Page 26: Securing APIs in a Mobile-First World · OWASP API Security Mobile Top 10 – New Reference Guide (Sept 2019) A1 Broken Object Level Authorization A2 Broken Authentication A3 Excessive

Thank You

Paul Levasseur VP Service Delivery [email protected] www.appdome.com