The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc....

21
© 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This presentation, including all supporting materials, is proprietary to Gartner, Inc. and/or its affiliates and is for the sole internal use of the intended recipients. Because this presentation may contain information that is confidential, proprietary or otherwise legally protected, it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates. Mark O’Neill 15 November 2018 The CIO Guide to API Security: Enabling Innovation Without Enabling Attacks and Data Breaches

Transcript of The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc....

Page 1: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

© 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This presentation, including all supporting materials, is proprietary to Gartner, Inc. and/or its affiliates and is for the sole internal use of the intended recipients. Because this presentation may contain information that is confidential, proprietary or otherwise legally protected, it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates.

Mark O’Neill 15 November 2018

The CIO Guide to API Security: Enabling Innovation Without Enabling Attacks and Data Breaches

Page 2: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

1 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

By 2022, API abuses will be the most frequent attack vector resulting in data breaches for enterprise web applications.

Source: “How to Build an Effective API Security Strategy” (G00342236)

Page 3: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

API Security

1. What exactly are the security problems with APIs? 2. What can be done about API security? 3. Where should you start?

Page 4: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

3 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

API Security

1. What exactly are the security problems with APIs? 2. What can be done about API security? 3. Where should you start?

Page 5: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

4 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

APIs Are Intended to Be Easy to Use

! Commonly understood technologies: – JSON, web protocols, XML

! Typically published in a developer portal: – … or used “under the hood” in a web or mobile framework

! Emphasis is placed on “Quick time to Hello World”

Page 6: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

5 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

Most organizations currently use APIs

Currently use APIs, 73%

Currently implementing

APIs, 17%

Plan to implement APIs in the next 12

months, 10%

Source: Gartner Survey “API Usage and its Role in Digital Platform Growth Report” 2018

Page 7: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

6 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

APIs are often implemented to help with integration and data access but also digital business

[VALUE]

11%

10%

8%

8%

8%

7%

6%

6%

6%

6%

Integration between various platforms/apps/systems

Digital business/transformation/services

Data accessibility

Better time to market.

Interchange Data/services with another company

Flexibility

Standardization

Shared interfaces

Better customer experience

Security/ risk

Faster/easier connectivity

Top business goals or objectives organizations address with APIs (coded)

Data flow 4% Improve business processes 4% Reusability 4% Automation 3% Cost efficiencies 3% Innovation 3% Interchange Data/services with customer 3% Legacy modernization 2% New/ improved services/products 2% Regulation (PSD2) 2% Mobile applications 2% Decoupling customer engagement systems 2% Easier application assembly 2% Increase revenue 2% Platform strategy 2% User experience 2% Data monetization 1% Other 2%

Other mentions

Percent of respondents

Page 8: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

7 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

APIs are often implemented to help with integration and data access Business goal or objective organizations address with APIs (open-ended)

APIs gives business more agility in their project, gives them the ability to get more value from the information that are no longer hidden in an application, but exposed with APIs.

Re-usable integration platform in support of a common information model. Ability to increase the reuse of integration points. Ability to incorporate business rules within the API transactions for data/record validation.

Improve integration between new and legacy applications. Standardize how business functionality exposed by APIs is governed, managed and consumed.

Standardize processes for data access across teams and reuse where possible, manage through governance, monitor and manage response.

Page 9: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

8 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

Internal APIs are widespread; less than a third plan to deploy public / externally exposed APIs Types of API’s organizations currently use/plan to use

[VALUE]

57%

44%

32%

2%

Internal APIs

Private APIs to connect with other businesses in your network or support chain

APIs provided by third parties

Public/externally exposed APIs

Other

Percent of respondents

Page 10: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

9 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

Attackers Go After Targets That Are the Most Valuable

Calls APIs

The data and applications

are here

!  Data breaches !  Denial of Service !  “Scraping” attacks

Page 11: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

10 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

Page 12: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

11 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

19%

20%

15%

14%

11%

8%

6%

7%

17%

16%

21%

17%

9%

5%

4%

2%

14%

12%

12%

11%

10%

13%

2%

4%

50%

48%

48%

42%

30%

26%

11%

13%

Security concerns

Lack of skills

Lack of API standards

Missing key roles, such as API product manager

Immature tooling

Obtaining executive buy-in

No digital program

Other

Rank 1 Rank 2 Rank 3 SUM of Top 3

Good News: There Is Awareness of the Problem

The top 3 challenges to organizational API strategy Percent of respondents

Page 13: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

12 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

API Security

1. What exactly are the security problems with APIs? 2. What can be done about API security? 3. Where should you start?

Page 14: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

13 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

3.  Secure: Create a policy to secure your APIs.

1.  Discover: Inventory APIs that have been delivered, or are in the development process. APIs consumed from third-parties should also be included.

2.  Monitor: Observe your API usage. Learn what “normal” is for API behavior.

API

API

Follow These Three Steps

Page 15: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

14 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

Designing an API Management and Security Policy

! Think about: – How your APIs will be used (Mobile clients? Application-to-application traffic?) – Expected API usage patterns – Internal vs. external usage – Where API gateways can be placed (Cloud/On-premises/Both?) – Potential threats to your APIs – Authentication of both end users and API clients – Data security

Page 16: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

15 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

Web Application Firewalls (WAFs) and API Gateways

WAF: Threat Protection !  DDoS protection !  Bot mitigation !  Attack signatures (OWASP) !  Whitelist management !  Anomaly detection

API Gateway: API Access Control !  Transformation/Orchestration !  Per-API authorization management !  Performance optimization (caching) !  Scope management — throttling

API gateway is the application delivery controller for APIs. WAFs provide threat detection for public-facing web applications.

Page 17: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

16 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

API Security

1. What exactly are the security problems with APIs? 2. What can be done about API security? 3. Where should you start?

Page 18: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

17 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

Quota management/ traffic throttling

Authentication of the API client

(e.g., mobile app)

Authentication of the end user

Tokenization of sensitive information (e.g., account No.)

Content inspection Content validation (JSON schema, XML schema)

Content encryption/ decryption

Automated attack/ bot detection

Transport security (TLS/SSL)

API key management Store audit logs Signature validation

Third-party identity provider (IdP) or social login

Token Issuance (OAuth 2.0, JWT Token)

Fine-grained authorization (e.g., on OAuth scopes)

Alerting, including to security incident event management (SIEM)

Integration with access management

XML/SOAP security (WS-security, etc.)

Your API Security Building Blocks

Source: “How to Build an Effective API Security Strategy” (G00342236)

Page 19: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

18 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

Creating an Effective API Security Policy

Source: “How to Build an Effective API Security Strategy” (G00342236) API

Client

Transport security (TLS/SSL)

Authentication of the API client

(e.g., mobile app)

Content inspection Alerting (including to SIEM)

Tokenization of sensitive information (e.g., account No.)

Content validation (JSON schema, XML schema)

Store audit logs

Transport security (TLS/SSL)

Integration with access management

Quota management/ traffic throttling

Automated attack/ bot detection

Page 20: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

19 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

Recommendations

" Start and maintain an inventory of your APIs: – Discover the APIs you have built – Also inventory the APIs you consume from others

" Construct API security policies that include: – Authentication and authorization – Attack protection – Data security

Page 21: The CIO Guide to API Security: Enabling Innovation Without ...€¦ · 2 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner,

20 © 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates.

For information, please contact your Gartner representative.

Recommended Gartner Research

!  How to Build an Effective API Security Strategy Mark O’Neill, Dionisio Zumerle and Jeremy D’Hoinne (G00342236)

!  Selecting the Right API Gateway to Protect Your APIs and Microservices Mary Ruddy and Michael Isbitski (G00349440)

!  Managing the Consumption of Third-Party APIs Mark O’Neill (G00348312)

!  Magic Quadrant for Full Life Cycle API Management Paolo Malinverno and Mark O’Neill (G00319327)

!  Critical Capabilities for Full Life Cycle API Management Mark O’Neill and Paolo Malinverno (G00334223)