SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Downloaden Sie, um offline zu lesen
REST API Security by Design
with Azure Pipelines
Security Matters in DevOps
THE J-CURVE OF TRANSFORMATION
The transformation
begins
From the State of DevOps 2018 Report by DORA
THE J-CURVE OF TRANSFORMATION
The transformation
begins
Automation helps
low performers
progress
From the State of DevOps 2018 Report by DORA
THE J-CURVE OF TRANSFORMATION
The transformation
begins
Automation helps
low performers
progress
Increased automation
demands more testing
From the State of DevOps 2018 Report by DORA
THE J-CURVE OF TRANSFORMATION
The transformation
begins
Automation helps
low performers
progress
Increased automation
demands more testing
Technical debt
is reduced, and
test
automation is
introduced
From the State of DevOps 2018 Report by DORA
THE J-CURVE OF TRANSFORMATION
From the State of DevOps 2018 Report by DORA
The transformation
begins
Automation helps
low performers
progress
Increased automation
demands more testing
Technical debt
is reduced, and
test automation
is introduced
Continuous
improvement
reduces manual
controls and
process
CATEGORIES OF PERFORMANCE
Low
✓ Deploy once a month to once every six months
✓ Going from code commit to production can be one to six months
✓ Restoring service from an incident can be between one week to one month
✓ Approximate change failure rate of 46% to 60%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
CATEGORIES OF PERFORMANCE
Medium
✓ Deploy once a week to once a month
✓ Going from code commit to production can be one week to one month
✓ Restoring service from an incident is usually less than a day
✓ Approximate change failure rate of 0% to 15%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
CATEGORIES OF PERFORMANCE
High
✓ Deploy once a day to once a week
✓ Going from code commit to production can be one day to one week
✓ Restoring service from an incident is usually less than a day
✓ Approximate change failure rate of 0% to 15%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
CATEGORIES OF PERFORMANCE
Elite
✓ Deploy on-demand (multiple deploys a day)
✓ Going from code commit to production is less than one day
✓ Restoring service from an incident is usually less than a day
✓ Approximate change failure rate of 0% to 15%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
AUTOMATION AND INTEGRATION - BUILD
Capability Low Medium High Elite
Automated build 64% 81% 91% 92%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
AUTOMATION AND INTEGRATION - TESTING
Capability Low Medium High Elite
Automated build 64% 81% 91% 92%
Automated unit tests 57% 66% 84% 87%
Automated acceptance tests 28% 38% 48% 58%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
AUTOMATION AND INTEGRATION - TESTING
Capability Low Medium High Elite
Automated build 64% 81% 91% 92%
Automated unit tests 57% 66% 84% 87%
Automated acceptance tests 28% 38% 48% 58%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
More on how Microsoft shifts tests left at
https://aka.ms/shift-tests-left
AUTOMATION AND INTEGRATION – DEPLOYMENT
Capability Low Medium High Elite
Automated build 64% 81% 91% 92%
Automated unit tests 57% 66% 84% 87%
Automated acceptance tests 28% 38% 48% 58%
Automated provisioning and
deployment to test environments
39% 54% 68% 72%
Automated deployment to
production
17% 38% 60% 69%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
AUTOMATION AND INTEGRATION - SECURITY
Capability Low Medium High Elite
Automated security tests 15% 28% 25% 31%
From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
WHERE IS WORK TIME SPENT
Time Spent Low Medium High Elite
New work 30% 40% 50% 50%
Unplanned work and rework 20% 20% 20% 19.5%
Remediating security issues 10% 5% 5% 5%
Working on end user reported
issues
20% 10% 10% 10%
Customer support work 15% 10% 10% 5%
From the State of DevOps 2018 Report by DORA
WHERE IS WORK TIME SPENT
Time Spent Low Medium High Elite
New work 30% 40% 50% 50%
Unplanned work and rework 20% 20% 20% 19.5%
Remediating security issues 10% 5% 5% 5%
Working on end user reported
issues
20% 10% 10% 10%
Customer support work 15% 10% 10% 5%
From the State of DevOps 2018 Report by DORA
Cost of excess rework = Technical staff size ×
Average salary × Benefits multiplier ×
Percentage of technical staff time spent on
excess rework
COST OF DEFECTS ALONG THE LIFECYCLE
AUTOMATING API
THREAT PROTECTION
APIS ARE THE NEW ATTACKS VECTOR…
Data breaches via APIs are on the rise
✓ 200+ breaches reported on
apisecurity.io since Oct. 2018
✓ And those are just the public ones!
Most recurrent causes:
✓ Lack of Input validation
✓ Data/Exception leakage
✓ Broken authentication
22
“By 2022, APIs will become
the #1 attack vector.”
- Gartner, How to Build an Effective API Security Strategy -
* :// . . / / /3834704/ - - - - - - -
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
MANY APIS, DEPLOYED OFTEN
APPLICATION
DEVELOPMENT
APPLICATION
SECURITY
SECURING APIS
REQUIRES A NEW
APPROACH
26
Development
Security
Operations
Business
A CHANGE IN CULTURE: PEOPLE COLLABORATING…
27
…FOLLOWING ESTABLISHED PROCESSES…
28
…AND USING THE RIGHT TOOLS.
Deploy & Protect
API Firewall is
automatically configured
from OAS file and
deployed in line of traffic.
The firewall can be
deployed as sidecar in
Kubernetes or reverse
proxy in front of API
Management solutions.
Develop
Developer
documents the API
contract with
OpenAPI/Swagger.
API Contract security
is evaluated from
VSCode using
42Crunch plugin.
Integrate & Test
API Contract quality is
enforced via CI/CD
pipeline. Builds are
blocked when minimal
security requirements
defined by security
teams are not met.
API implementation is
tested via Conformance
Scan
Design
Developer initiates
security work at
design time.
Best practices and
recommendations
are documented.
Developers know how the
application was built!
OpenAPI specification is leveraged to
describe the API contract.
Once the API contract is defined by
the developer, the security process
becomes clear and straight forward !
ENABLING DEVELOPERS TO INITIATE SECURITY
30
“If you describe your API, we will secure it”
API
Contract
Audit
Scan
Protect
EMPOWER DEVELOPERS TO BUILD THE ULTIMATE WHITELIST
VALIDATE OPENAPI CONTRACT CONTENTS
Does it comply to best
practices ?
Does it comply to security
requirements ?
✓ Using API Keys ? OAuth ?
Basic Auth ?
How well is the data defined ?
✓ Headers, query params, path params,
form data
✓ Input/output payloads format (JSON)
✓ Is the data constrained ?
• Min/Max/Patterns/Max Items
31
AUDIT
API
Contract
Audit
Scan
Protect
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
Platform Architecture
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
DEMO PART 1:
OPENAPI EDITOR/AUDIT
FOR VSCODE
https://marketplace.visualstudio.com/items?itemName=42Crunch.vscode-openapi
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
DEMO STEP 2:
AZURE DEVOPS
INTEGRATION
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
Automated audit and API discovery
https://marketplace.visualstudio.com/items?itemName=42Crunch.cicd
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
DEV-SEC-OPS BENEFITS
When API security becomes fully
part of the API lifecycle:
• Security is applied automatically and
at scale
• Vulnerable APIs are detected early
• APIs are automatically protected as
soon as the contract is defined
© COPYRIGHT 42CRUNCH | CONFIDENTIAL
RESOURCES
• 42Crunch Website
• Azure DevOps SignUp
• Free OAS Security Audit
• OpenAPI VS Code Extension
• OpenAPI Spec Encyclopedia
• OWASP API Security Top 10
• APIsecurity.io

Weitere ähnliche Inhalte

Was ist angesagt?

Checkmarx meetup API Security - API Security top 10 - Erez Yalon
Checkmarx meetup API Security -  API Security top 10 - Erez YalonCheckmarx meetup API Security -  API Security top 10 - Erez Yalon
Checkmarx meetup API Security - API Security top 10 - Erez YalonAdar Weidman
 
The Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API WorldThe Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API World42Crunch
 
OWASP API Security Top 10 - API World
OWASP API Security Top 10 - API WorldOWASP API Security Top 10 - API World
OWASP API Security Top 10 - API World42Crunch
 
Why you need API Security Automation
Why you need API Security AutomationWhy you need API Security Automation
Why you need API Security Automation42Crunch
 
Applying API Security at Scale
Applying API Security at ScaleApplying API Security at Scale
Applying API Security at ScaleNordic APIs
 
APISecurity_OWASP_MitigationGuide
APISecurity_OWASP_MitigationGuide APISecurity_OWASP_MitigationGuide
APISecurity_OWASP_MitigationGuide Isabelle Mauny
 
Owasp top 10 2017 (en)
Owasp top 10 2017 (en)Owasp top 10 2017 (en)
Owasp top 10 2017 (en)PrashantDhakol
 
apidays LIVE Paris - Protecting financial grade API: adopting the right secur...
apidays LIVE Paris - Protecting financial grade API: adopting the right secur...apidays LIVE Paris - Protecting financial grade API: adopting the right secur...
apidays LIVE Paris - Protecting financial grade API: adopting the right secur...apidays
 
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...Apigee | Google Cloud
 
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon ShkedyCheckmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon ShkedyAdar Weidman
 
API Security in a Microservices World
API Security in a Microservices WorldAPI Security in a Microservices World
API Security in a Microservices World42Crunch
 
API Abuse - The Anatomy of An Attack
API Abuse -  The Anatomy of An AttackAPI Abuse -  The Anatomy of An Attack
API Abuse - The Anatomy of An AttackNordic APIs
 
API Security Guidelines: Beyond SSL and OAuth.
API Security Guidelines: Beyond SSL and OAuth.API Security Guidelines: Beyond SSL and OAuth.
API Security Guidelines: Beyond SSL and OAuth.Isabelle Mauny
 
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...apidays
 
API Security from the DevOps and CSO Perspectives (Webcast)
API Security from the DevOps and CSO Perspectives (Webcast)API Security from the DevOps and CSO Perspectives (Webcast)
API Security from the DevOps and CSO Perspectives (Webcast)Apigee | Google Cloud
 
Five Principles to API Security
Five Principles to API SecurityFive Principles to API Security
Five Principles to API SecurityIsabelle Mauny
 
Managing Identities in the World of APIs
Managing Identities in the World of APIsManaging Identities in the World of APIs
Managing Identities in the World of APIsApigee | Google Cloud
 

Was ist angesagt? (20)

Checkmarx meetup API Security - API Security top 10 - Erez Yalon
Checkmarx meetup API Security -  API Security top 10 - Erez YalonCheckmarx meetup API Security -  API Security top 10 - Erez Yalon
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
 
The Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API WorldThe Dev, Sec and Ops of API Security - API World
The Dev, Sec and Ops of API Security - API World
 
OWASP API Security Top 10 - API World
OWASP API Security Top 10 - API WorldOWASP API Security Top 10 - API World
OWASP API Security Top 10 - API World
 
Why you need API Security Automation
Why you need API Security AutomationWhy you need API Security Automation
Why you need API Security Automation
 
OWASP API Security TOP 10 - 2019
OWASP API Security TOP 10 - 2019OWASP API Security TOP 10 - 2019
OWASP API Security TOP 10 - 2019
 
Applying API Security at Scale
Applying API Security at ScaleApplying API Security at Scale
Applying API Security at Scale
 
APISecurity_OWASP_MitigationGuide
APISecurity_OWASP_MitigationGuide APISecurity_OWASP_MitigationGuide
APISecurity_OWASP_MitigationGuide
 
Owasp top 10 2017 (en)
Owasp top 10 2017 (en)Owasp top 10 2017 (en)
Owasp top 10 2017 (en)
 
Open APIs Design
Open APIs DesignOpen APIs Design
Open APIs Design
 
apidays LIVE Paris - Protecting financial grade API: adopting the right secur...
apidays LIVE Paris - Protecting financial grade API: adopting the right secur...apidays LIVE Paris - Protecting financial grade API: adopting the right secur...
apidays LIVE Paris - Protecting financial grade API: adopting the right secur...
 
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
I Love APIs 2015: Advanced Security Extensions in Apigee Edge - HMAC and http...
 
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon ShkedyCheckmarx meetup API Security - API Security in depth - Inon Shkedy
Checkmarx meetup API Security - API Security in depth - Inon Shkedy
 
API Security in a Microservices World
API Security in a Microservices WorldAPI Security in a Microservices World
API Security in a Microservices World
 
API Abuse - The Anatomy of An Attack
API Abuse -  The Anatomy of An AttackAPI Abuse -  The Anatomy of An Attack
API Abuse - The Anatomy of An Attack
 
API Security Guidelines: Beyond SSL and OAuth.
API Security Guidelines: Beyond SSL and OAuth.API Security Guidelines: Beyond SSL and OAuth.
API Security Guidelines: Beyond SSL and OAuth.
 
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
apidays LIVE Paris 2021 - Addressing OWASP API Security Top 10 by Isabelle Ma...
 
API Security from the DevOps and CSO Perspectives (Webcast)
API Security from the DevOps and CSO Perspectives (Webcast)API Security from the DevOps and CSO Perspectives (Webcast)
API Security from the DevOps and CSO Perspectives (Webcast)
 
Five Principles to API Security
Five Principles to API SecurityFive Principles to API Security
Five Principles to API Security
 
Data-driven API Security
Data-driven API SecurityData-driven API Security
Data-driven API Security
 
Managing Identities in the World of APIs
Managing Identities in the World of APIsManaging Identities in the World of APIs
Managing Identities in the World of APIs
 

Ähnlich wie REST API Security by Design with Azure Pipelines

Velocity 2014 Tool Chain Choices
Velocity 2014 Tool Chain ChoicesVelocity 2014 Tool Chain Choices
Velocity 2014 Tool Chain ChoicesMark Sigler
 
OPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu SlidesOPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu SlidesVMware Tanzu
 
Don’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital TransformationDon’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital TransformationDevOps.com
 
Don’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital TransformationDon’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital TransformationDevOps.com
 
Don't Let Technology Slow Down Your Digital Transformation
Don't Let Technology Slow Down Your Digital Transformation Don't Let Technology Slow Down Your Digital Transformation
Don't Let Technology Slow Down Your Digital Transformation XebiaLabs
 
Software Quality as a Competitive Differentiator
Software Quality as a Competitive Differentiator Software Quality as a Competitive Differentiator
Software Quality as a Competitive Differentiator DevOps.com
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayCA Technologies
 
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)TelecomValley
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...CA Technologies
 
Transform Digital Business with DevOps
Transform Digital Business with DevOpsTransform Digital Business with DevOps
Transform Digital Business with DevOpsDaniel Oh
 
Application Programming Interface Implementation For Building Software Applic...
Application Programming Interface Implementation For Building Software Applic...Application Programming Interface Implementation For Building Software Applic...
Application Programming Interface Implementation For Building Software Applic...SlideTeam
 
Don't be a DevOps Failure
Don't be a DevOps FailureDon't be a DevOps Failure
Don't be a DevOps FailureDevOps.com
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...CA Technologies
 
Leverage Service Virtualization on Your Roadmap for Success
Leverage Service Virtualization on Your Roadmap for SuccessLeverage Service Virtualization on Your Roadmap for Success
Leverage Service Virtualization on Your Roadmap for SuccessCA Technologies
 
Deliver Differentiating Apps – that Leverage the Mainframe – Faster with CA A...
Deliver Differentiating Apps – that Leverage the Mainframe – Faster with CA A...Deliver Differentiating Apps – that Leverage the Mainframe – Faster with CA A...
Deliver Differentiating Apps – that Leverage the Mainframe – Faster with CA A...CA Technologies
 
Fueling DevOps with a Testing Trifecta: How the New World of Testing is Driv...
Fueling DevOps with a Testing Trifecta:  How the New World of Testing is Driv...Fueling DevOps with a Testing Trifecta:  How the New World of Testing is Driv...
Fueling DevOps with a Testing Trifecta: How the New World of Testing is Driv...CA Technologies
 
04 accelerating businessvaluewithdevops
04 accelerating businessvaluewithdevops04 accelerating businessvaluewithdevops
04 accelerating businessvaluewithdevopsKhairul Zebua
 
CWIN17 Toulouse / Safe 4.5 and agile devops-ca technologies-r.bajul
CWIN17 Toulouse / Safe 4.5 and agile devops-ca technologies-r.bajulCWIN17 Toulouse / Safe 4.5 and agile devops-ca technologies-r.bajul
CWIN17 Toulouse / Safe 4.5 and agile devops-ca technologies-r.bajulCapgemini
 
Guidewire Connections 2023 DE-4 Using AI to Accelerate Application Integration
Guidewire Connections 2023 DE-4 Using AI to Accelerate Application IntegrationGuidewire Connections 2023 DE-4 Using AI to Accelerate Application Integration
Guidewire Connections 2023 DE-4 Using AI to Accelerate Application IntegrationBrianPetrini
 
Using Lean Thinking to Identify and Address Delivery Pipeline Bottlenecks
Using Lean Thinking to Identify and Address Delivery Pipeline BottlenecksUsing Lean Thinking to Identify and Address Delivery Pipeline Bottlenecks
Using Lean Thinking to Identify and Address Delivery Pipeline BottlenecksIBM UrbanCode Products
 

Ähnlich wie REST API Security by Design with Azure Pipelines (20)

Velocity 2014 Tool Chain Choices
Velocity 2014 Tool Chain ChoicesVelocity 2014 Tool Chain Choices
Velocity 2014 Tool Chain Choices
 
OPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu SlidesOPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu Slides
 
Don’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital TransformationDon’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital Transformation
 
Don’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital TransformationDon’t Let Technology Slow Down Your Digital Transformation
Don’t Let Technology Slow Down Your Digital Transformation
 
Don't Let Technology Slow Down Your Digital Transformation
Don't Let Technology Slow Down Your Digital Transformation Don't Let Technology Slow Down Your Digital Transformation
Don't Let Technology Slow Down Your Digital Transformation
 
Software Quality as a Competitive Differentiator
Software Quality as a Competitive Differentiator Software Quality as a Competitive Differentiator
Software Quality as a Competitive Differentiator
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned Way
 
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)
Soirée du Test Logiciel - Présentation de Kiuwan (Jack ABDO)
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
 
Transform Digital Business with DevOps
Transform Digital Business with DevOpsTransform Digital Business with DevOps
Transform Digital Business with DevOps
 
Application Programming Interface Implementation For Building Software Applic...
Application Programming Interface Implementation For Building Software Applic...Application Programming Interface Implementation For Building Software Applic...
Application Programming Interface Implementation For Building Software Applic...
 
Don't be a DevOps Failure
Don't be a DevOps FailureDon't be a DevOps Failure
Don't be a DevOps Failure
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
 
Leverage Service Virtualization on Your Roadmap for Success
Leverage Service Virtualization on Your Roadmap for SuccessLeverage Service Virtualization on Your Roadmap for Success
Leverage Service Virtualization on Your Roadmap for Success
 
Deliver Differentiating Apps – that Leverage the Mainframe – Faster with CA A...
Deliver Differentiating Apps – that Leverage the Mainframe – Faster with CA A...Deliver Differentiating Apps – that Leverage the Mainframe – Faster with CA A...
Deliver Differentiating Apps – that Leverage the Mainframe – Faster with CA A...
 
Fueling DevOps with a Testing Trifecta: How the New World of Testing is Driv...
Fueling DevOps with a Testing Trifecta:  How the New World of Testing is Driv...Fueling DevOps with a Testing Trifecta:  How the New World of Testing is Driv...
Fueling DevOps with a Testing Trifecta: How the New World of Testing is Driv...
 
04 accelerating businessvaluewithdevops
04 accelerating businessvaluewithdevops04 accelerating businessvaluewithdevops
04 accelerating businessvaluewithdevops
 
CWIN17 Toulouse / Safe 4.5 and agile devops-ca technologies-r.bajul
CWIN17 Toulouse / Safe 4.5 and agile devops-ca technologies-r.bajulCWIN17 Toulouse / Safe 4.5 and agile devops-ca technologies-r.bajul
CWIN17 Toulouse / Safe 4.5 and agile devops-ca technologies-r.bajul
 
Guidewire Connections 2023 DE-4 Using AI to Accelerate Application Integration
Guidewire Connections 2023 DE-4 Using AI to Accelerate Application IntegrationGuidewire Connections 2023 DE-4 Using AI to Accelerate Application Integration
Guidewire Connections 2023 DE-4 Using AI to Accelerate Application Integration
 
Using Lean Thinking to Identify and Address Delivery Pipeline Bottlenecks
Using Lean Thinking to Identify and Address Delivery Pipeline BottlenecksUsing Lean Thinking to Identify and Address Delivery Pipeline Bottlenecks
Using Lean Thinking to Identify and Address Delivery Pipeline Bottlenecks
 

Mehr von 42Crunch

OWASP API Security Top 10 Examples
OWASP API Security Top 10 ExamplesOWASP API Security Top 10 Examples
OWASP API Security Top 10 Examples42Crunch
 
Applying API Security at Scale
Applying API Security at ScaleApplying API Security at Scale
Applying API Security at Scale42Crunch
 
APIDays Paris Security Workshop
APIDays Paris Security WorkshopAPIDays Paris Security Workshop
APIDays Paris Security Workshop42Crunch
 
Better API Security with Automation
Better API Security with Automation Better API Security with Automation
Better API Security with Automation 42Crunch
 
Advanced API Security Patterns
Advanced API Security PatternsAdvanced API Security Patterns
Advanced API Security Patterns42Crunch
 
SecDevOps for API Security
SecDevOps for API SecuritySecDevOps for API Security
SecDevOps for API Security42Crunch
 
42crunch-API-security-workshop
42crunch-API-security-workshop42crunch-API-security-workshop
42crunch-API-security-workshop42Crunch
 
API Security: the full story
API Security: the full storyAPI Security: the full story
API Security: the full story42Crunch
 

Mehr von 42Crunch (8)

OWASP API Security Top 10 Examples
OWASP API Security Top 10 ExamplesOWASP API Security Top 10 Examples
OWASP API Security Top 10 Examples
 
Applying API Security at Scale
Applying API Security at ScaleApplying API Security at Scale
Applying API Security at Scale
 
APIDays Paris Security Workshop
APIDays Paris Security WorkshopAPIDays Paris Security Workshop
APIDays Paris Security Workshop
 
Better API Security with Automation
Better API Security with Automation Better API Security with Automation
Better API Security with Automation
 
Advanced API Security Patterns
Advanced API Security PatternsAdvanced API Security Patterns
Advanced API Security Patterns
 
SecDevOps for API Security
SecDevOps for API SecuritySecDevOps for API Security
SecDevOps for API Security
 
42crunch-API-security-workshop
42crunch-API-security-workshop42crunch-API-security-workshop
42crunch-API-security-workshop
 
API Security: the full story
API Security: the full storyAPI Security: the full story
API Security: the full story
 

Kürzlich hochgeladen

Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfLivetecs LLC
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 

Kürzlich hochgeladen (20)

Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdf
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 

REST API Security by Design with Azure Pipelines

  • 1. REST API Security by Design with Azure Pipelines
  • 3. THE J-CURVE OF TRANSFORMATION The transformation begins From the State of DevOps 2018 Report by DORA
  • 4. THE J-CURVE OF TRANSFORMATION The transformation begins Automation helps low performers progress From the State of DevOps 2018 Report by DORA
  • 5. THE J-CURVE OF TRANSFORMATION The transformation begins Automation helps low performers progress Increased automation demands more testing From the State of DevOps 2018 Report by DORA
  • 6. THE J-CURVE OF TRANSFORMATION The transformation begins Automation helps low performers progress Increased automation demands more testing Technical debt is reduced, and test automation is introduced From the State of DevOps 2018 Report by DORA
  • 7. THE J-CURVE OF TRANSFORMATION From the State of DevOps 2018 Report by DORA The transformation begins Automation helps low performers progress Increased automation demands more testing Technical debt is reduced, and test automation is introduced Continuous improvement reduces manual controls and process
  • 8. CATEGORIES OF PERFORMANCE Low ✓ Deploy once a month to once every six months ✓ Going from code commit to production can be one to six months ✓ Restoring service from an incident can be between one week to one month ✓ Approximate change failure rate of 46% to 60% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 9. CATEGORIES OF PERFORMANCE Medium ✓ Deploy once a week to once a month ✓ Going from code commit to production can be one week to one month ✓ Restoring service from an incident is usually less than a day ✓ Approximate change failure rate of 0% to 15% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 10. CATEGORIES OF PERFORMANCE High ✓ Deploy once a day to once a week ✓ Going from code commit to production can be one day to one week ✓ Restoring service from an incident is usually less than a day ✓ Approximate change failure rate of 0% to 15% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 11. CATEGORIES OF PERFORMANCE Elite ✓ Deploy on-demand (multiple deploys a day) ✓ Going from code commit to production is less than one day ✓ Restoring service from an incident is usually less than a day ✓ Approximate change failure rate of 0% to 15% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 12. AUTOMATION AND INTEGRATION - BUILD Capability Low Medium High Elite Automated build 64% 81% 91% 92% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 13. AUTOMATION AND INTEGRATION - TESTING Capability Low Medium High Elite Automated build 64% 81% 91% 92% Automated unit tests 57% 66% 84% 87% Automated acceptance tests 28% 38% 48% 58% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 14. AUTOMATION AND INTEGRATION - TESTING Capability Low Medium High Elite Automated build 64% 81% 91% 92% Automated unit tests 57% 66% 84% 87% Automated acceptance tests 28% 38% 48% 58% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops More on how Microsoft shifts tests left at https://aka.ms/shift-tests-left
  • 15. AUTOMATION AND INTEGRATION – DEPLOYMENT Capability Low Medium High Elite Automated build 64% 81% 91% 92% Automated unit tests 57% 66% 84% 87% Automated acceptance tests 28% 38% 48% 58% Automated provisioning and deployment to test environments 39% 54% 68% 72% Automated deployment to production 17% 38% 60% 69% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 16. AUTOMATION AND INTEGRATION - SECURITY Capability Low Medium High Elite Automated security tests 15% 28% 25% 31% From the State of DevOps 2019 Report by DORA – https://aka.ms/2019-state-of-devops
  • 17. WHERE IS WORK TIME SPENT Time Spent Low Medium High Elite New work 30% 40% 50% 50% Unplanned work and rework 20% 20% 20% 19.5% Remediating security issues 10% 5% 5% 5% Working on end user reported issues 20% 10% 10% 10% Customer support work 15% 10% 10% 5% From the State of DevOps 2018 Report by DORA
  • 18. WHERE IS WORK TIME SPENT Time Spent Low Medium High Elite New work 30% 40% 50% 50% Unplanned work and rework 20% 20% 20% 19.5% Remediating security issues 10% 5% 5% 5% Working on end user reported issues 20% 10% 10% 10% Customer support work 15% 10% 10% 5% From the State of DevOps 2018 Report by DORA
  • 19. Cost of excess rework = Technical staff size × Average salary × Benefits multiplier × Percentage of technical staff time spent on excess rework
  • 20. COST OF DEFECTS ALONG THE LIFECYCLE
  • 22. APIS ARE THE NEW ATTACKS VECTOR… Data breaches via APIs are on the rise ✓ 200+ breaches reported on apisecurity.io since Oct. 2018 ✓ And those are just the public ones! Most recurrent causes: ✓ Lack of Input validation ✓ Data/Exception leakage ✓ Broken authentication 22
  • 23. “By 2022, APIs will become the #1 attack vector.” - Gartner, How to Build an Effective API Security Strategy - * :// . . / / /3834704/ - - - - - - -
  • 24. © COPYRIGHT 42CRUNCH | CONFIDENTIAL MANY APIS, DEPLOYED OFTEN APPLICATION DEVELOPMENT APPLICATION SECURITY
  • 25. SECURING APIS REQUIRES A NEW APPROACH
  • 28. 28 …AND USING THE RIGHT TOOLS.
  • 29. Deploy & Protect API Firewall is automatically configured from OAS file and deployed in line of traffic. The firewall can be deployed as sidecar in Kubernetes or reverse proxy in front of API Management solutions. Develop Developer documents the API contract with OpenAPI/Swagger. API Contract security is evaluated from VSCode using 42Crunch plugin. Integrate & Test API Contract quality is enforced via CI/CD pipeline. Builds are blocked when minimal security requirements defined by security teams are not met. API implementation is tested via Conformance Scan Design Developer initiates security work at design time. Best practices and recommendations are documented.
  • 30. Developers know how the application was built! OpenAPI specification is leveraged to describe the API contract. Once the API contract is defined by the developer, the security process becomes clear and straight forward ! ENABLING DEVELOPERS TO INITIATE SECURITY 30 “If you describe your API, we will secure it”
  • 31. API Contract Audit Scan Protect EMPOWER DEVELOPERS TO BUILD THE ULTIMATE WHITELIST VALIDATE OPENAPI CONTRACT CONTENTS Does it comply to best practices ? Does it comply to security requirements ? ✓ Using API Keys ? OAuth ? Basic Auth ? How well is the data defined ? ✓ Headers, query params, path params, form data ✓ Input/output payloads format (JSON) ✓ Is the data constrained ? • Min/Max/Patterns/Max Items 31 AUDIT API Contract Audit Scan Protect
  • 32. © COPYRIGHT 42CRUNCH | CONFIDENTIAL Platform Architecture
  • 33. © COPYRIGHT 42CRUNCH | CONFIDENTIAL DEMO PART 1: OPENAPI EDITOR/AUDIT FOR VSCODE https://marketplace.visualstudio.com/items?itemName=42Crunch.vscode-openapi
  • 34. © COPYRIGHT 42CRUNCH | CONFIDENTIAL
  • 35. © COPYRIGHT 42CRUNCH | CONFIDENTIAL
  • 36. © COPYRIGHT 42CRUNCH | CONFIDENTIAL DEMO STEP 2: AZURE DEVOPS INTEGRATION
  • 37. © COPYRIGHT 42CRUNCH | CONFIDENTIAL Automated audit and API discovery https://marketplace.visualstudio.com/items?itemName=42Crunch.cicd
  • 38. © COPYRIGHT 42CRUNCH | CONFIDENTIAL DEV-SEC-OPS BENEFITS When API security becomes fully part of the API lifecycle: • Security is applied automatically and at scale • Vulnerable APIs are detected early • APIs are automatically protected as soon as the contract is defined
  • 39. © COPYRIGHT 42CRUNCH | CONFIDENTIAL RESOURCES • 42Crunch Website • Azure DevOps SignUp • Free OAS Security Audit • OpenAPI VS Code Extension • OpenAPI Spec Encyclopedia • OWASP API Security Top 10 • APIsecurity.io