SlideShare a Scribd company logo
1 of 67
Download to read offline
LIVECAST: API SECURITY 101
WHAT IS NORDIC APIS?
A international community of API practitioners and enthusiasts.
Quality events
all over the
world - 2018
High impact
blog posts
Illuminating
eBooks
UPCOMING EVENTS
● Annual Platform Summit: Oct 22-24th
2018
● API Event in Austin: TBA
PLEASE TAKE OUR SURVEY
Help us improve our events, and get 15%
off your next Nordic APIs event ticket! visit
https://nordicapis.com/
NEWSLETTER
Bi-weekly digest of critical API insights
Sign up at:
https://nordicapis.com/newsletter/
"Nordic APIs is invested in educating the community,
something that makes their work stand out"
-Kin Lane, The API Evangelist
EBOOKS
Compendiums of our top insights on niche API topics. FREE downloads:
https://nordicapis.com/api-ebooks/
Will be released Tuesday, Dec 19!
SECURING THE API
STRONGHOLD
How to properly authenticate, control access, delegate
authority, and federate credentials across a system.
● OAuth 2.0 and OpenID Connect
● Public, Private, vs Partner APIs
● Delegation of user identity across microservices
● Differentiating Authentication, Authorization,
Federation, and Delegation, and the importance of
each
● Using OpenID Connect for Native Single Sign On
(SSO), Mobile Identity Management (MIM) & secure
IoT applications
● ... and more
FREE Download: https://nordicapis.com/ebooks/
WHY FOCUS ON API SECURITY?
● Underappreciated
● Not much knowledge shared
○ Exploits, tabloids, vulnerabilities
● Experts are limited
● Effects entire industry
APIs ARE VULNERABLEREAD: https://nordicapis.com/your-api-is-vulnerable-if-these-4-risks-arent-mitigated/
● APIs are affecting all industries
○ banks, healthcare, marketing,
shipping, eCommerce, IoT,
cryptocurrency, & more
● All businesses at risk
○ DDOS Attacks
○ Reverse-Engineering
○ Code injection, spoofing
● Case Studies, exploits
● Authentication: identity control
● Authorization: user access level
● Federation: reusing credentials across
services
● Delegation: authorizing an entity to
perform actions on behalf of a user.
HOLISTIC API SECURITYREAD: https://nordicapis.com/api-security-the-4-defenses-of-the-api-stronghold/
● Rate limiting
● API Gateways
● Open standards: OAuth, JWTs,
OpenID, SCIM, ...
● Testing/debugging
● HTTP Basic Auth, API Keys
API SECURITY STRATEGIESREAD: API Security: Deep Dive into OAuth and OpenID Connect
https://nordicapis.com/api-security-oauth-openid-connect-depth/
API KEYS ≠ SECURITYREAD: https://nordicapis.com/why-api-keys-are-not-enough/
● Most common method
● Code tied to specific user. String of characters
○ Ex)
IP84UTvzJKds1Jomx8gIbTXcEEJSUilGqpxCcmnx
● Exposure of API keys is a real threat
○ API key commit to Github is common
○ Can't rely on dev consumers to secure keys
○ API provider should have responsibility.
● What we really need are robust Identity
management solutions: OAuth and OpenID Connect
NOW UP:
Pairing OAuth with
OpenID Connect
for maximum use
Combining standards to create secure identity management for
APIs
Copyright Curity AB 2017
Quick recap of OAuth
Resource Owner (RO)
Authorization
Server (AS)
Client
Resource Server
(RS)
Authentication
Server
The client requests access
Resource Owner (RO)
Client
Resource Server
(RS)
Authorization
Server (AS)
Authentication
Server
The AS requires the RO to authenticate
Resource Owner (RO)
Client
Resource Server
(RS)
Authorization
Server (AS)
Authentication
Server
The AS issues the tokens
Resource Owner (RO)
Client
Resource Server
(RS)
Authorization
Server (AS)
Authentication
Server
The Client presents the token to the RS
Resource Owner (RO)
Client
Resource Server
(RS)
Authorization
Server (AS)
Authentication
Server
Authorization
Server (AS)
The RS validates the Token
Resource Owner (RO)
Client
Resource Server
(RS)
Authentication
Server
Access!
Resource Owner (RO)
Client
Resource Server
(RS)
Authorization
Server (AS)
Authentication
Server
What about the real world?
Copyright Curity AB 2017 23
2 types of tokens
123XYZ
Jane Doe
By Value By
Reference
Contains NO information outside the network
123XYZ
Jane Doe
By Reference
Contains ALL necessary information
By Value (often JWT)
JWT - A signed JSON document
{
"sub": "janedoe",
"name" : "Jane Doe",
"email" : "jane@doe.com",
"phone_number" "+46 (0) 12345678",
"aud": "https://mymail.com",
"iss": "https://fs.oidc.net",
"nbf": 1409213888783,
"jti": "622a9973-fc4d-4797-be31-7c2116f549df",
"exp": 1409213890583,
"iat": 1409213888783
}
{
"iss": "https://fs.oidc.net",
"x5t": "5F0A1359B4BB9FBB104155908DEC1FDCB5AC8865",
"typ": "JWT",
"alg": "RS256”
}
Certificate
orQOOKvXN3jbEpBSl0RHAyaQNxcx9DFgtMsJJgMxm9Az6QJMKKy6m0WvP1UzXZA_nsK
16g9etg2yEW9IXbQU0RbSQktUtObRB9SxHtW_AcCk693XDAz15Y4aP9DeD62nROzd1M
S4FZTmY3Cgzo1-3-sqW6_4Rgzs94aLO3aLP_zoVtJycCUKtJQhGhPTyjXXYWMsp0E4uTtL8
Rif7cWu4olme_XNFlAs73pOrfzsQYc1GD2dB70l1M8SDaJZFURr9jAAaavX7Xqs_FPXY1PZ
LXLbc3ARXFmRf_-Z4B6uLCGI2shzl12ni54Yun6dflL9rQwaxXYuNZZodUWchID2cA
Signature
External vs. Internal
123XYZ
By ValueBy
Reference
Outside the network Inside the network
API Firewall /
Reverse
Proxy
API
Phantom Token
123XYZ
By ValueBy
Reference
Outside the network Inside the network
API Firewall /
Reverse
Proxy
API
Now – what does the API really
need?
Copyright Curity AB 2017 30
Adding: OpenID Connect
In the backend
sub=jacob
API
Find the Public Key
kid = 12345
…
sub=jacob
API
/JWK
S
{
"keys": [
{
"kty": "RSA",
"kid": ”12345",
"use": "sig",
"alg": "RS256",
"n":
"yMAHZiIfbAgmZJ-_4Gj-wdS8rvaKN…
"e": "AQAB",
"x5t": "MR-pGTa866RdZLjN6Vwrfay907g"
}]
}
Json Web Key Set - JWKS
•OpenID Connect endpoint
•All active public keys
•Cached and use
•On cache miss fetch new keys
When token data isn’t enough
•The goal of the Access token is to contain info most APIs
need
•Some APIs and operations require more information
•Details about the user, access info etc.
The client requests access
Resource Owner (RO)
Client
Resource Server
(RS)
Authentication
Server
scope=openid
profile Authorization
Server (AS)
In the backend (again)
sub=jacob
scope=openid
profile
API
Call UserInfo
sub=jacob
scope=openid
profile
API
/userinf
o
{
“sub” : “jacob”,
”email”: “jacob@example.com“,
“account_type” :”premium”,
…
}
Conclusion
•OpenID Connect adds useful extension even for APIs
•It is the identity layer ontop of OAuth
•Commonly used by the client but very useful in the backend
•UserInfo is an extension to the attributes in the token
•JWKS is a handy way to avoid complex key distribution
problems
Visit curity.io or e-mail us for more information
Copyright Curity AB 2017
Q & A
NOW UP:
Securing Medical Grade Devices in the IoT
HACKING THE BODY
SETTING THE STAGE
• Implantable Myoelectric Sensors (IMESs) are being used to control
prosthetic limbs. These devices can use electromyography (EMG)
signals and wireless telemetry to control complex movements in
prosthetic limbs.
• Some pacemakers include wireless interfaces as part of their
structure. Near-field communication interfaces can be used to
adjust configurations and wireless modules can output data for
device logs and remote monitoring.
• Wireless implants are being used in some trials to delivery
temporary low-voltage jolts to nerve endings to prevent migraines
and other headaches. The device is triggered by using a near-field
handheld interface that states a duration and level of shock, which
temporarily stops the feeling of sensation in the nerve.
• Prosthetic skin is being developed that uses a series of surface
sensors to emulate feeling, returning sensations like touch,
pleasure, pain, etc. to amputees.
• This may not be common yet – but the market is
dramatically expanding. Someone here could
develop the next big medical API breakthrough
in 5-10 years.
AN EXAMPLE
In August of 2017, a pacemaker manufacturer issued an open letter to
doctors who had implanted a specific range of popular pacemakers.
465k patients implanted with this range of pacemaker were considered
at risk, and medical professionals were urged to upgrade the firmware
of the pacemaker software.
The company stated in their letter, “If there were a successful attack, an
unauthorized individual (i.e., a nearby attacker) could gain access and
issue commands to the implanted medical device through radio
frequency (RF) transmission capability, and those unauthorized
commands could modify device settings (e.g., stop pacing) or impact
device functionality.”
MORALITY
• We can’t plan for everything. Our solutions are always going to have an
inherent amount of risk. How much is too much?
• As medical devices become more integrated with APIs, it will become
almost impossible to find a non-linked system. Should we slow progress to
allow for patient trust and comfort in technology, or should we adopt
wholeheartedly while possibly exposing ourselves? Example: FDA
medicine trials.
• Privacy policies and data collection are already a fine line between value
adding and invasive. What does this mean when start tracking personal
data like heartrate, steps taken, sensations felt, etc.?
• During the Industrial Revolution, we adopted technologies and practices
that, while beneficial in the short-term, had long-term, unforeseen,
measurable negative impacts on quality of life, air pollution, and populace
health. How do we know the IoT is not the Industrial Revolution 2.0?
LEGALITY
• Who owns the data? Who’s responsible?
• Privacy policies, disclosure policies, data retention, and data destruction.
• FDA regulations – proactive security, vague demands to prioritize security.
• HIPAA and HITECH violations for data and API providers. Best case
scenario $100 per violation, maxed at $25k per year. Worst case scenario
$50k per violation, maxed at $1.5m per year.
• Exposure of additional resources. A linked network may reveal other data
that is legally protected, making your liability in legal and financial terms
exponentially larger.
SECURITY
• Passive exposure. Medical device data can be passively collected by a
malicious party for advertising purposes, geolocation, etc.
• Active exposure. Device data could be used for corporate crimes
(threatening a CEO with exposure of an embarrassing illness), harassment
(“did you know your wife’s blood sugar this morning was 76?), and “trolling”
(web-connected video doorbell ringing on a loop every five minutes).
• Active attacks. A pacemaker can be shot off, an insulin pump told to pump
too much insulin, incorrect test data replacing actual test data complicating
treatment.
• Future attacks. “Pain sensory overload” on smart skin, disabling ocular
implants, reversing prosthetic control interpretations, etc.
• The target isn’t just our digital representations of money or our web
servers – they might be our hearts, kidneys, and lungs.
LAYERED SECURITY
ORGANIZATIONAL STRUCTURAL TECHNICAL
ORGANIZATIONAL SECURITY
• Ensure proper data collection. Do we really need to be collecting as much data as we are in order to deliver the needed data to the consumer? Does a
blood glucose level analyzer need to export geolocation data, blood type, levels of salts, minerals, etc.?
• Ensure proper data disposal. Do we need to keep every single bit of data for a patient regardless of whether its used or not? How do we securely
erase stored data? Should we even store data?
• Is any data being sent outside a secure network? i.e. are we sending data to a third party without establishing a Service Level Agreement?
• Practice risk identification and evaluation. Are we securing elements of the API that should be secured? Is our internal security culture resistant to
attack?
• Are we properly securing data according to regulation and compliance documents? Is data properly encrypted, destroyed in compliance, is PHI stored
in plaintext, etc.?
• Medical data might have additional regulation and compliance concerns unrelated to medical regulations. Devices that track the usage of diabetic
equipment and report results might also have an integrated ordering mechanism, and might thus handle payment processing – this would be covered
under regulation like PCI-DSS.
STRUCTURAL SECURITY
• How much cross-talk do we allow between devices? It might makes for a simpler data flow, but it makes for a more exposed one.
• What protocol do we use? What technology? Do we incorporate wi-fi, and if so, which standard? Do we utilize Bluetooth? NFC? Can we
standardize this?
• Where is the processing for authentication/authorization located? Larger devices such as EKG monitors can have (in theory) as much
processor power, RAM, storage, etc. that it could need. What about a pacemaker, where the device needs to be as small as possible?
What about micro-IoT devices in the brain or spinal cord?
• Do we implicitly trust data and only reject at the source of computation outside given parameters? Do we try and limit API data at the
device itself?
• Where exactly do we implement security in a practical sense?
TECHNICAL SECURITY
• How do we encrypt data? Do we rely on PKI? What about small devices without processor power to decrypt?
• Do we encrypt data in transit? Do we encrypt all data, or just some data?
• What encryption standard do we adopt? What protocol do we use for data transit? Can we leverage TLS/IPSec?
• Can we utilize hard-coded provisioned credentials? What about revocation? Hard-coded is more for identification, not useful for
authentication – but could it help build a system that is?
• Can we call on cellular tech security? UICC and SIM authentication – viable options?
• Solutions are great – but how do monitor to ensure breaches don’t happen?
1
2
Our solution has to be small. Storage space is a premium, and we have limited physical space to fit logical data
storage into the system.
Our solution must be efficient. Space is at a premium, and so is processing power. We can’t have a heavy
protocol.
WHAT’S THE BEST SOLUTION?
3
4
5
Our solution needs to be revocable. Updating hard-coded solutions in most devices would require surgery or
invasive placement of surface nodes, as well as the creation of security flaws.
Our solution needs to be monitor-enabled. We need to check that things are functioning correctly, and prove
authentication/authorization.
Our solution needs to work within a network. We should be able to share trust amongst networked devices.
• JWTs are mobile. They can be pushed through HTTP headers, POST
parameters, etc.
• JWTs are small. JSON scheme + base64 encoding means small
package sizes (assuming you keep Claims to a minimum).
• JWTs are efficient. In theory, a JWT can package PHI and medical data
as a signed, encoded package, ensuring integrity and transmission with
minimal overhead.
• They’re an important part of security – JWTs can encode and sign with
HMAC or RSA (RSA functions in the PKI configuration). They can be
encrypted using RFC 7517 JSON Web Encryption (also referred to as
JOSE, Javascript Object Signing and Encryption).
JSON Web Tokens
JWTs
• CWT is JWT – but in CBOR.
• Concise Binary Object Representation reduces some of the bulk in the
JSON encoding scheme.
• CBOR also results in faster processing.
• Skips the encoding step, represents in binary, quicker transmission and
easier encoding.
CBOR Web Tokens
CWTs
• Symmetric algorithms use the same key for both encryption and
decryption. While this is faster, there can be significant security
concerns (in some implementations).
• AES is relatively lightweight, but at smaller key sizes, can be broken.
Camellia is generally considered equal to AES, and is given equal
standing in international uses.
• This is still being (rapidly) developed for IoT-specific applications.
Tohoku University Research Group and NEC Corporation published
an AES application in 2016 that uses 50% less energy, resulting in a
much smaller and more efficient circuit. For embedded devices, we’re
on the cusp.
Symmetric Algorithms
Encryption (Symmetric)
• Asymmetric algorithms use different keys for encryption and
decryption. While this is slower, security is increased.
• RSA has long been considered the top asymmetric algorithm. It still
suffers from speed issues, however.
• NTRUEncypt is considerably faster than RSA, as has even been
acknowledged by RSA Labs staff. In many cases, it’s even faster than
ECC. It’s only recently moved into the public domain, however, and is
not considered a “mature” algorithm (in other words, not properly
tested).
Asymmetric Algorithms
Encryption (Asymmetric)
Assorted Encryption Speed Comparison
Aamer Nadeem et al, "A Performance Comparison of Data Encryption Algorithms", IEEE 2005
All tests were conducted using P-II 266 MHz
• Binds a token to a device given some encrypted data.
• When a client makes a request for an access token, it includes this
crypto piece, akin to a public key.
• The access token then takes this encrypted code and integrates it into
requests.
• When a request is made using the access token, the request is seen as
signed by the authorization service, and can be challenged.
• The challenge will either prove the token is held and being used by the
assigned device, or that it is not a proper request.
Proof for Integrity and Trust
Proof of Possession
Q & A
SPONSOR
Curity.io
@curityio
! THANK YOU !
FOLLOW NORDIC APIS
@nordicapis
slack.nordicapis.com
INTERESTED IN
PARTICIPATING IN OUR
NEXT LIVECAST?
Contact us:
info@nordicapis.com
LiveCast: API Security 101

More Related Content

What's hot

OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater
Apigee | Google Cloud
 
1400 ping madsen-nordicapis-connect-01
1400 ping madsen-nordicapis-connect-011400 ping madsen-nordicapis-connect-01
1400 ping madsen-nordicapis-connect-01
Nordic APIs
 

What's hot (20)

Health Identity Management & Role-Based Access Control in a Federated NHIN - ...
Health Identity Management & Role-Based Access Control in a Federated NHIN - ...Health Identity Management & Role-Based Access Control in a Federated NHIN - ...
Health Identity Management & Role-Based Access Control in a Federated NHIN - ...
 
Data Driven Security
Data Driven SecurityData Driven Security
Data Driven Security
 
apidays LIVE Paris 2021 - API Attack Simulator - Find your API vulnerabilitie...
apidays LIVE Paris 2021 - API Attack Simulator - Find your API vulnerabilitie...apidays LIVE Paris 2021 - API Attack Simulator - Find your API vulnerabilitie...
apidays LIVE Paris 2021 - API Attack Simulator - Find your API vulnerabilitie...
 
OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater
 
Enhancing your Security APIs
Enhancing your Security APIsEnhancing your Security APIs
Enhancing your Security APIs
 
How to Achieve Agile API Security
How to Achieve Agile API SecurityHow to Achieve Agile API Security
How to Achieve Agile API Security
 
Unlocking Value From the Internet of Things (IoT) with APIs
Unlocking Value From the Internet of Things (IoT) with APIsUnlocking Value From the Internet of Things (IoT) with APIs
Unlocking Value From the Internet of Things (IoT) with APIs
 
Managing Sensitive Information in an API and Microservices World
Managing Sensitive Information in an API and Microservices WorldManaging Sensitive Information in an API and Microservices World
Managing Sensitive Information in an API and Microservices World
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
 
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...
apidays LIVE New York 2021 - Playing with FHIR without getting burned by  Dav...apidays LIVE New York 2021 - Playing with FHIR without getting burned by  Dav...
apidays LIVE New York 2021 - Playing with FHIR without getting burned by Dav...
 
API Security and OAuth for the Enterprise
API Security and OAuth for the EnterpriseAPI Security and OAuth for the Enterprise
API Security and OAuth for the Enterprise
 
Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?Is Your API Being Abused – And Would You Even Notice If It Was?
Is Your API Being Abused – And Would You Even Notice If It Was?
 
The Internet of Things and Developers: What the Enterprise Needs to Know
The Internet of Things and Developers: What the Enterprise Needs to KnowThe Internet of Things and Developers: What the Enterprise Needs to Know
The Internet of Things and Developers: What the Enterprise Needs to Know
 
1400 ping madsen-nordicapis-connect-01
1400 ping madsen-nordicapis-connect-011400 ping madsen-nordicapis-connect-01
1400 ping madsen-nordicapis-connect-01
 
Mesh the Gears: Mastering the Economics of Digital Leverage
Mesh the Gears: Mastering the Economics of Digital LeverageMesh the Gears: Mastering the Economics of Digital Leverage
Mesh the Gears: Mastering the Economics of Digital Leverage
 
IoT Architecture: Insights from Global Deployments
IoT Architecture: Insights from Global DeploymentsIoT Architecture: Insights from Global Deployments
IoT Architecture: Insights from Global Deployments
 
Guidelines for implementation of open API Policy
Guidelines for implementation of open API PolicyGuidelines for implementation of open API Policy
Guidelines for implementation of open API Policy
 
Mobile Defense-in-Dev (Depth)
Mobile Defense-in-Dev (Depth)Mobile Defense-in-Dev (Depth)
Mobile Defense-in-Dev (Depth)
 
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
apidays LIVE Singapore 2021 - Securing the Open Source supply chain by Liran ...
 
Webcast: Pragmatic REST: The Next Generation
Webcast: Pragmatic REST: The Next GenerationWebcast: Pragmatic REST: The Next Generation
Webcast: Pragmatic REST: The Next Generation
 

Similar to LiveCast: API Security 101

19 secure iccp-integration
19 secure iccp-integration19 secure iccp-integration
19 secure iccp-integration
Ivan Carmona
 
Key Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systemsKey Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systems
Pratul Sharma
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
amburyj3c9
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC Project
ERPScan
 

Similar to LiveCast: API Security 101 (20)

ATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real WorldATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real World
 
HIPAA Solutions on Cloud Foundry
HIPAA Solutions on Cloud FoundryHIPAA Solutions on Cloud Foundry
HIPAA Solutions on Cloud Foundry
 
apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...
apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...
apidays LIVE Singapore 2021 - Novel approaches in API security by Dr Tal Stei...
 
19 secure iccp-integration
19 secure iccp-integration19 secure iccp-integration
19 secure iccp-integration
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
 
Whitepaper the application network
Whitepaper   the application networkWhitepaper   the application network
Whitepaper the application network
 
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
 
Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance
 
OpenChain @ Bitkom Forum Open Source 2022
OpenChain @ Bitkom Forum Open Source 2022OpenChain @ Bitkom Forum Open Source 2022
OpenChain @ Bitkom Forum Open Source 2022
 
MuleSoft Manchester Meetup slides 4th July 2019
MuleSoft Manchester Meetup slides 4th July 2019MuleSoft Manchester Meetup slides 4th July 2019
MuleSoft Manchester Meetup slides 4th July 2019
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
IRJET - Audio Guide for Patient Regarding Doctor’s Prescription
IRJET - Audio Guide for Patient Regarding Doctor’s PrescriptionIRJET - Audio Guide for Patient Regarding Doctor’s Prescription
IRJET - Audio Guide for Patient Regarding Doctor’s Prescription
 
Key Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systemsKey Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systems
 
Webinar: API Extravaganza! Combining Google Analytics and ORCID API
Webinar: API Extravaganza! Combining Google Analytics and ORCID APIWebinar: API Extravaganza! Combining Google Analytics and ORCID API
Webinar: API Extravaganza! Combining Google Analytics and ORCID API
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?
 
Cyber security and ISMS
Cyber security and ISMSCyber security and ISMS
Cyber security and ISMS
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC Project
 
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
 
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
 

More from Nordic APIs

The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...
The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...
The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...
Nordic APIs
 
Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...
Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...
Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...
Nordic APIs
 

More from Nordic APIs (20)

How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...
How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...
How I Built Bill, the AI-Powered Chatbot That Reads Our Docs for Fun , by Tod...
 
The Art of API Design, by David Biesack at Apiture
The Art of API Design, by David Biesack at ApitureThe Art of API Design, by David Biesack at Apiture
The Art of API Design, by David Biesack at Apiture
 
ABAC, ReBAC, Zanzibar, ALFA… How Should I Implement AuthZ in My APIs? by Dav...
ABAC, ReBAC, Zanzibar, ALFA…  How Should I Implement AuthZ in My APIs? by Dav...ABAC, ReBAC, Zanzibar, ALFA…  How Should I Implement AuthZ in My APIs? by Dav...
ABAC, ReBAC, Zanzibar, ALFA… How Should I Implement AuthZ in My APIs? by Dav...
 
Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...
Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...
Crafting a Cloud Native API Platform to Accelerate Your Platform Maturity - B...
 
The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...
The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...
The Federated Future: Pioneering Next-Gen Solutions in API Management - Marku...
 
API Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNL
API Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNLAPI Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNL
API Authorization Using an Identity Server and Gateway - Aldo Pietropaolo, SGNL
 
API Discovery from Crawl to Run - Rob Dickinson, Graylog
API Discovery from Crawl to Run - Rob Dickinson, GraylogAPI Discovery from Crawl to Run - Rob Dickinson, Graylog
API Discovery from Crawl to Run - Rob Dickinson, Graylog
 
Productizing and Monetizing APIs - Derric Gilling, Moseif
Productizing and Monetizing APIs - Derric Gilling, MoseifProductizing and Monetizing APIs - Derric Gilling, Moseif
Productizing and Monetizing APIs - Derric Gilling, Moseif
 
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Sipios
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, SipiosSecurely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Sipios
Securely Boosting Any Product with Generative AI APIs - Ruben Sitbon, Sipios
 
Security of LLM APIs by Ankita Gupta, Akto.io
Security of LLM APIs by Ankita Gupta, Akto.ioSecurity of LLM APIs by Ankita Gupta, Akto.io
Security of LLM APIs by Ankita Gupta, Akto.io
 
I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...
I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...
I'm an API Hacker, Here's How to Go from Making APIs to Breaking Them - Katie...
 
Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...
Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...
Unleashing the Potential of GraphQL with Streaming Data - Kishore Banala, Net...
 
Reigniting the API Description Wars with TypeSpec and the Next Generation of ...
Reigniting the API Description Wars with TypeSpec and the Next Generation of...Reigniting the API Description Wars with TypeSpec and the Next Generation of...
Reigniting the API Description Wars with TypeSpec and the Next Generation of ...
 
Establish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAny
Establish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAnyEstablish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAny
Establish, Grow, and Mature Your API Platform - James Higginbotham, LaunchAny
 
Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...
Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...
Inclusive, Accessible Tech: Bias-Free Language in Code and Configurations - A...
 
Going Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIs
Going Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIsGoing Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIs
Going Platinum: How to Make a Hit API by Bill Doerrfeld, Nordic APIs
 
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
 
GenAI: Producing and Consuming APIs by Paul Dumas, Gartner
GenAI: Producing and Consuming APIs by Paul Dumas, GartnerGenAI: Producing and Consuming APIs by Paul Dumas, Gartner
GenAI: Producing and Consuming APIs by Paul Dumas, Gartner
 
The SAS developer portal – developer.sas.com 2.0: How we built it by Joe Furb...
The SAS developer portal –developer.sas.com 2.0: How we built it by Joe Furb...The SAS developer portal –developer.sas.com 2.0: How we built it by Joe Furb...
The SAS developer portal – developer.sas.com 2.0: How we built it by Joe Furb...
 
How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...
How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...
How Netflix Uses Data Abstraction to Operate Services at Scale - Vidhya Arvin...
 

Recently uploaded

Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Sheetaleventcompany
 

Recently uploaded (20)

VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 

LiveCast: API Security 101

  • 1.
  • 2.
  • 4. WHAT IS NORDIC APIS? A international community of API practitioners and enthusiasts. Quality events all over the world - 2018 High impact blog posts Illuminating eBooks
  • 5. UPCOMING EVENTS ● Annual Platform Summit: Oct 22-24th 2018 ● API Event in Austin: TBA PLEASE TAKE OUR SURVEY Help us improve our events, and get 15% off your next Nordic APIs event ticket! visit https://nordicapis.com/
  • 6. NEWSLETTER Bi-weekly digest of critical API insights Sign up at: https://nordicapis.com/newsletter/ "Nordic APIs is invested in educating the community, something that makes their work stand out" -Kin Lane, The API Evangelist
  • 7. EBOOKS Compendiums of our top insights on niche API topics. FREE downloads: https://nordicapis.com/api-ebooks/ Will be released Tuesday, Dec 19!
  • 8. SECURING THE API STRONGHOLD How to properly authenticate, control access, delegate authority, and federate credentials across a system. ● OAuth 2.0 and OpenID Connect ● Public, Private, vs Partner APIs ● Delegation of user identity across microservices ● Differentiating Authentication, Authorization, Federation, and Delegation, and the importance of each ● Using OpenID Connect for Native Single Sign On (SSO), Mobile Identity Management (MIM) & secure IoT applications ● ... and more FREE Download: https://nordicapis.com/ebooks/
  • 9. WHY FOCUS ON API SECURITY? ● Underappreciated ● Not much knowledge shared ○ Exploits, tabloids, vulnerabilities ● Experts are limited ● Effects entire industry
  • 10. APIs ARE VULNERABLEREAD: https://nordicapis.com/your-api-is-vulnerable-if-these-4-risks-arent-mitigated/ ● APIs are affecting all industries ○ banks, healthcare, marketing, shipping, eCommerce, IoT, cryptocurrency, & more ● All businesses at risk ○ DDOS Attacks ○ Reverse-Engineering ○ Code injection, spoofing ● Case Studies, exploits
  • 11. ● Authentication: identity control ● Authorization: user access level ● Federation: reusing credentials across services ● Delegation: authorizing an entity to perform actions on behalf of a user. HOLISTIC API SECURITYREAD: https://nordicapis.com/api-security-the-4-defenses-of-the-api-stronghold/
  • 12. ● Rate limiting ● API Gateways ● Open standards: OAuth, JWTs, OpenID, SCIM, ... ● Testing/debugging ● HTTP Basic Auth, API Keys API SECURITY STRATEGIESREAD: API Security: Deep Dive into OAuth and OpenID Connect https://nordicapis.com/api-security-oauth-openid-connect-depth/
  • 13. API KEYS ≠ SECURITYREAD: https://nordicapis.com/why-api-keys-are-not-enough/ ● Most common method ● Code tied to specific user. String of characters ○ Ex) IP84UTvzJKds1Jomx8gIbTXcEEJSUilGqpxCcmnx ● Exposure of API keys is a real threat ○ API key commit to Github is common ○ Can't rely on dev consumers to secure keys ○ API provider should have responsibility. ● What we really need are robust Identity management solutions: OAuth and OpenID Connect
  • 15. Pairing OAuth with OpenID Connect for maximum use Combining standards to create secure identity management for APIs Copyright Curity AB 2017
  • 16. Quick recap of OAuth Resource Owner (RO) Authorization Server (AS) Client Resource Server (RS) Authentication Server
  • 17. The client requests access Resource Owner (RO) Client Resource Server (RS) Authorization Server (AS) Authentication Server
  • 18. The AS requires the RO to authenticate Resource Owner (RO) Client Resource Server (RS) Authorization Server (AS) Authentication Server
  • 19. The AS issues the tokens Resource Owner (RO) Client Resource Server (RS) Authorization Server (AS) Authentication Server
  • 20. The Client presents the token to the RS Resource Owner (RO) Client Resource Server (RS) Authorization Server (AS) Authentication Server
  • 21. Authorization Server (AS) The RS validates the Token Resource Owner (RO) Client Resource Server (RS) Authentication Server
  • 22. Access! Resource Owner (RO) Client Resource Server (RS) Authorization Server (AS) Authentication Server
  • 23. What about the real world? Copyright Curity AB 2017 23
  • 24. 2 types of tokens 123XYZ Jane Doe By Value By Reference
  • 25. Contains NO information outside the network 123XYZ Jane Doe By Reference
  • 26. Contains ALL necessary information By Value (often JWT)
  • 27. JWT - A signed JSON document { "sub": "janedoe", "name" : "Jane Doe", "email" : "jane@doe.com", "phone_number" "+46 (0) 12345678", "aud": "https://mymail.com", "iss": "https://fs.oidc.net", "nbf": 1409213888783, "jti": "622a9973-fc4d-4797-be31-7c2116f549df", "exp": 1409213890583, "iat": 1409213888783 } { "iss": "https://fs.oidc.net", "x5t": "5F0A1359B4BB9FBB104155908DEC1FDCB5AC8865", "typ": "JWT", "alg": "RS256” } Certificate orQOOKvXN3jbEpBSl0RHAyaQNxcx9DFgtMsJJgMxm9Az6QJMKKy6m0WvP1UzXZA_nsK 16g9etg2yEW9IXbQU0RbSQktUtObRB9SxHtW_AcCk693XDAz15Y4aP9DeD62nROzd1M S4FZTmY3Cgzo1-3-sqW6_4Rgzs94aLO3aLP_zoVtJycCUKtJQhGhPTyjXXYWMsp0E4uTtL8 Rif7cWu4olme_XNFlAs73pOrfzsQYc1GD2dB70l1M8SDaJZFURr9jAAaavX7Xqs_FPXY1PZ LXLbc3ARXFmRf_-Z4B6uLCGI2shzl12ni54Yun6dflL9rQwaxXYuNZZodUWchID2cA Signature
  • 28. External vs. Internal 123XYZ By ValueBy Reference Outside the network Inside the network API Firewall / Reverse Proxy API
  • 29. Phantom Token 123XYZ By ValueBy Reference Outside the network Inside the network API Firewall / Reverse Proxy API
  • 30. Now – what does the API really need? Copyright Curity AB 2017 30
  • 33. Find the Public Key kid = 12345 … sub=jacob API /JWK S { "keys": [ { "kty": "RSA", "kid": ”12345", "use": "sig", "alg": "RS256", "n": "yMAHZiIfbAgmZJ-_4Gj-wdS8rvaKN… "e": "AQAB", "x5t": "MR-pGTa866RdZLjN6Vwrfay907g" }] }
  • 34. Json Web Key Set - JWKS •OpenID Connect endpoint •All active public keys •Cached and use •On cache miss fetch new keys
  • 35. When token data isn’t enough •The goal of the Access token is to contain info most APIs need •Some APIs and operations require more information •Details about the user, access info etc.
  • 36. The client requests access Resource Owner (RO) Client Resource Server (RS) Authentication Server scope=openid profile Authorization Server (AS)
  • 37. In the backend (again) sub=jacob scope=openid profile API
  • 38. Call UserInfo sub=jacob scope=openid profile API /userinf o { “sub” : “jacob”, ”email”: “jacob@example.com“, “account_type” :”premium”, … }
  • 39. Conclusion •OpenID Connect adds useful extension even for APIs •It is the identity layer ontop of OAuth •Commonly used by the client but very useful in the backend •UserInfo is an extension to the attributes in the token •JWKS is a handy way to avoid complex key distribution problems
  • 40. Visit curity.io or e-mail us for more information Copyright Curity AB 2017
  • 41. Q & A
  • 42.
  • 44. Securing Medical Grade Devices in the IoT HACKING THE BODY
  • 45. SETTING THE STAGE • Implantable Myoelectric Sensors (IMESs) are being used to control prosthetic limbs. These devices can use electromyography (EMG) signals and wireless telemetry to control complex movements in prosthetic limbs. • Some pacemakers include wireless interfaces as part of their structure. Near-field communication interfaces can be used to adjust configurations and wireless modules can output data for device logs and remote monitoring. • Wireless implants are being used in some trials to delivery temporary low-voltage jolts to nerve endings to prevent migraines and other headaches. The device is triggered by using a near-field handheld interface that states a duration and level of shock, which temporarily stops the feeling of sensation in the nerve. • Prosthetic skin is being developed that uses a series of surface sensors to emulate feeling, returning sensations like touch, pleasure, pain, etc. to amputees. • This may not be common yet – but the market is dramatically expanding. Someone here could develop the next big medical API breakthrough in 5-10 years.
  • 46. AN EXAMPLE In August of 2017, a pacemaker manufacturer issued an open letter to doctors who had implanted a specific range of popular pacemakers. 465k patients implanted with this range of pacemaker were considered at risk, and medical professionals were urged to upgrade the firmware of the pacemaker software. The company stated in their letter, “If there were a successful attack, an unauthorized individual (i.e., a nearby attacker) could gain access and issue commands to the implanted medical device through radio frequency (RF) transmission capability, and those unauthorized commands could modify device settings (e.g., stop pacing) or impact device functionality.”
  • 47. MORALITY • We can’t plan for everything. Our solutions are always going to have an inherent amount of risk. How much is too much? • As medical devices become more integrated with APIs, it will become almost impossible to find a non-linked system. Should we slow progress to allow for patient trust and comfort in technology, or should we adopt wholeheartedly while possibly exposing ourselves? Example: FDA medicine trials. • Privacy policies and data collection are already a fine line between value adding and invasive. What does this mean when start tracking personal data like heartrate, steps taken, sensations felt, etc.? • During the Industrial Revolution, we adopted technologies and practices that, while beneficial in the short-term, had long-term, unforeseen, measurable negative impacts on quality of life, air pollution, and populace health. How do we know the IoT is not the Industrial Revolution 2.0?
  • 48. LEGALITY • Who owns the data? Who’s responsible? • Privacy policies, disclosure policies, data retention, and data destruction. • FDA regulations – proactive security, vague demands to prioritize security. • HIPAA and HITECH violations for data and API providers. Best case scenario $100 per violation, maxed at $25k per year. Worst case scenario $50k per violation, maxed at $1.5m per year. • Exposure of additional resources. A linked network may reveal other data that is legally protected, making your liability in legal and financial terms exponentially larger.
  • 49. SECURITY • Passive exposure. Medical device data can be passively collected by a malicious party for advertising purposes, geolocation, etc. • Active exposure. Device data could be used for corporate crimes (threatening a CEO with exposure of an embarrassing illness), harassment (“did you know your wife’s blood sugar this morning was 76?), and “trolling” (web-connected video doorbell ringing on a loop every five minutes). • Active attacks. A pacemaker can be shot off, an insulin pump told to pump too much insulin, incorrect test data replacing actual test data complicating treatment. • Future attacks. “Pain sensory overload” on smart skin, disabling ocular implants, reversing prosthetic control interpretations, etc. • The target isn’t just our digital representations of money or our web servers – they might be our hearts, kidneys, and lungs.
  • 51. ORGANIZATIONAL SECURITY • Ensure proper data collection. Do we really need to be collecting as much data as we are in order to deliver the needed data to the consumer? Does a blood glucose level analyzer need to export geolocation data, blood type, levels of salts, minerals, etc.? • Ensure proper data disposal. Do we need to keep every single bit of data for a patient regardless of whether its used or not? How do we securely erase stored data? Should we even store data? • Is any data being sent outside a secure network? i.e. are we sending data to a third party without establishing a Service Level Agreement? • Practice risk identification and evaluation. Are we securing elements of the API that should be secured? Is our internal security culture resistant to attack? • Are we properly securing data according to regulation and compliance documents? Is data properly encrypted, destroyed in compliance, is PHI stored in plaintext, etc.? • Medical data might have additional regulation and compliance concerns unrelated to medical regulations. Devices that track the usage of diabetic equipment and report results might also have an integrated ordering mechanism, and might thus handle payment processing – this would be covered under regulation like PCI-DSS.
  • 52. STRUCTURAL SECURITY • How much cross-talk do we allow between devices? It might makes for a simpler data flow, but it makes for a more exposed one. • What protocol do we use? What technology? Do we incorporate wi-fi, and if so, which standard? Do we utilize Bluetooth? NFC? Can we standardize this? • Where is the processing for authentication/authorization located? Larger devices such as EKG monitors can have (in theory) as much processor power, RAM, storage, etc. that it could need. What about a pacemaker, where the device needs to be as small as possible? What about micro-IoT devices in the brain or spinal cord? • Do we implicitly trust data and only reject at the source of computation outside given parameters? Do we try and limit API data at the device itself? • Where exactly do we implement security in a practical sense?
  • 53. TECHNICAL SECURITY • How do we encrypt data? Do we rely on PKI? What about small devices without processor power to decrypt? • Do we encrypt data in transit? Do we encrypt all data, or just some data? • What encryption standard do we adopt? What protocol do we use for data transit? Can we leverage TLS/IPSec? • Can we utilize hard-coded provisioned credentials? What about revocation? Hard-coded is more for identification, not useful for authentication – but could it help build a system that is? • Can we call on cellular tech security? UICC and SIM authentication – viable options? • Solutions are great – but how do monitor to ensure breaches don’t happen?
  • 54. 1 2 Our solution has to be small. Storage space is a premium, and we have limited physical space to fit logical data storage into the system. Our solution must be efficient. Space is at a premium, and so is processing power. We can’t have a heavy protocol. WHAT’S THE BEST SOLUTION?
  • 55. 3 4 5 Our solution needs to be revocable. Updating hard-coded solutions in most devices would require surgery or invasive placement of surface nodes, as well as the creation of security flaws. Our solution needs to be monitor-enabled. We need to check that things are functioning correctly, and prove authentication/authorization. Our solution needs to work within a network. We should be able to share trust amongst networked devices.
  • 56. • JWTs are mobile. They can be pushed through HTTP headers, POST parameters, etc. • JWTs are small. JSON scheme + base64 encoding means small package sizes (assuming you keep Claims to a minimum). • JWTs are efficient. In theory, a JWT can package PHI and medical data as a signed, encoded package, ensuring integrity and transmission with minimal overhead. • They’re an important part of security – JWTs can encode and sign with HMAC or RSA (RSA functions in the PKI configuration). They can be encrypted using RFC 7517 JSON Web Encryption (also referred to as JOSE, Javascript Object Signing and Encryption). JSON Web Tokens JWTs
  • 57. • CWT is JWT – but in CBOR. • Concise Binary Object Representation reduces some of the bulk in the JSON encoding scheme. • CBOR also results in faster processing. • Skips the encoding step, represents in binary, quicker transmission and easier encoding. CBOR Web Tokens CWTs
  • 58. • Symmetric algorithms use the same key for both encryption and decryption. While this is faster, there can be significant security concerns (in some implementations). • AES is relatively lightweight, but at smaller key sizes, can be broken. Camellia is generally considered equal to AES, and is given equal standing in international uses. • This is still being (rapidly) developed for IoT-specific applications. Tohoku University Research Group and NEC Corporation published an AES application in 2016 that uses 50% less energy, resulting in a much smaller and more efficient circuit. For embedded devices, we’re on the cusp. Symmetric Algorithms Encryption (Symmetric)
  • 59. • Asymmetric algorithms use different keys for encryption and decryption. While this is slower, security is increased. • RSA has long been considered the top asymmetric algorithm. It still suffers from speed issues, however. • NTRUEncypt is considerably faster than RSA, as has even been acknowledged by RSA Labs staff. In many cases, it’s even faster than ECC. It’s only recently moved into the public domain, however, and is not considered a “mature” algorithm (in other words, not properly tested). Asymmetric Algorithms Encryption (Asymmetric)
  • 60. Assorted Encryption Speed Comparison Aamer Nadeem et al, "A Performance Comparison of Data Encryption Algorithms", IEEE 2005 All tests were conducted using P-II 266 MHz
  • 61. • Binds a token to a device given some encrypted data. • When a client makes a request for an access token, it includes this crypto piece, akin to a public key. • The access token then takes this encrypted code and integrates it into requests. • When a request is made using the access token, the request is seen as signed by the authorization service, and can be challenged. • The challenge will either prove the token is held and being used by the assigned device, or that it is not a proper request. Proof for Integrity and Trust Proof of Possession
  • 62. Q & A
  • 63.
  • 66. INTERESTED IN PARTICIPATING IN OUR NEXT LIVECAST? Contact us: info@nordicapis.com