Getting API security right - Philippe De Ryck - NDC London 2023

Sdílet
Vložit
  • čas přidán 13. 05. 2023
  • The shift towards an API landscape indicates a significant evolution in the way we build applications. The rise of JavaScript and mobile applications have sparked an explosion of easily-accessible REST APIs. But does the rise of APIs result in the downfall of security? Why are there so many vulnerabilities and incidents involving APIs? How can you ensure that your APIs are secure?
    In this session, we use real-world cases to dive into best practices for securing your APIs. We discuss the attack surface of an API, common authorization problems, and best practice techniques to avoid these problems. At the end of this session, you will have an actionable set of guidelines to assess and improve the security of your own APIs.
    Check out our new channel:
    NDC Clips:
    ‪@ndcclips‬
    Check out more of our featured speakers and talks at
    ndcconferences.com/
    ndclondon.com/
  • Věda a technologie

Komentáře • 27

  • @EldonElledge
    @EldonElledge Před rokem +9

    Excellent work here. Thank you. I am glad to see the focus on "Security First" instead of "Security as Technical Debt".

  • @user-yi6sh7yr4e
    @user-yi6sh7yr4e Před rokem +6

    Very good! As a junior developer I had not thought these things through so thankyou!

  • @zombie_pigdragon
    @zombie_pigdragon Před 11 měsíci +2

    I'm pretty proud to have come to the conclusion that OpenAPI is a useful tool for enforcing security between starting to play this and him suggesting exactly that.

  • @capability-snob
    @capability-snob Před 11 měsíci

    Solid talk, great points. I really love the focus on Broken Object Level Authorisation, which is absolutely everywhere.
    Even though I build Object Capability systems, which take care of many of these problems by construction, that point about WAFs is relevant to me, as DoS becomes a genuine risk when you have everything else covered.

  • @wildpett
    @wildpett Před 4 měsíci

    Excellent talk. Auditability means you should be able to read the code easily

  • @maxbarbul
    @maxbarbul Před 7 měsíci

    Great talk!

  • @myspexg
    @myspexg Před rokem +2

    👏👏👏👏👏

  • @ticler
    @ticler Před 9 měsíci +2

    I see many "Senior" developers who fail to understand these basic concepts even after hours of discussion.

  • @sidekick3rida
    @sidekick3rida Před 3 měsíci

    I was reluctant to watch this because security is boring. So glad I did.

  • @coderider3022
    @coderider3022 Před rokem

    I spent about 4 hours a week telling people people why windows integrated security requests won’t work with my azure Apim that’s secured by azure ad app reg.

  • @goldnutter412
    @goldnutter412 Před rokem

    API world !

  • @LewisCowles
    @LewisCowles Před rokem

    Surprised there is a 403 for something you are not authorized for.
    I'd argue a 403 is only for something someone can know is there (so maybe a bad idea for other user records).
    404 (deny it exists) is my strong preference if someone does not have access to an object.

    • @AlgoristHQ
      @AlgoristHQ Před rokem

      There are transformations for that, but what happens if you have a valid user but they try update an object on which they only have read access? Should we 404 then?

    • @zombie_pigdragon
      @zombie_pigdragon Před 11 měsíci

      First solution that comes to mind is to have the authorization policy return the error code to use; i.e. (C#) if (!AuthorizationPolicy.canDeleteTask(task, user, out status)) {return status}; else {/*...*/}. Very simple solution, and can do more complex handling like a 404 when the endpoint is hidden and a 403 when the operation is incorrect.

    • @Tony_Goat
      @Tony_Goat Před 10 měsíci

      ​@@AlgoristHQHe did say "403 is only for something someone can know is there," so if they have read access but not write access, they know it's there, therefore 403 if they attempt to write it.

    • @karoshi2
      @karoshi2 Před 9 měsíci

      Little is more annoying than getting a 404 because your session expired or is insufficient. Just send a 403 for the whole tree beyond /my-secure-path/ whether the item itself exists or not.
      Imagine an entrance where you have to present your batch card first. It's ok to know that access is restricted and way more obvious than a guard telling you that Mr Anderson doesn't work here until you present the proper token.
      Also feels like abuse of the status codes and security by obscurity.

  • @haroldpepete
    @haroldpepete Před rokem +6

    it's not practical at all, too much talk and less code, 90% of this conference was talk with no sense, too much

    • @goldnutter412
      @goldnutter412 Před rokem

      Free courses on his site, how is that not practical

    • @haroldpepete
      @haroldpepete Před rokem

      @@goldnutter412 too much talk, show me the code better

    • @chriss5749
      @chriss5749 Před rokem +9

      @@haroldpepete Guess you are working for T-Mobile?

    • @EldonElledge
      @EldonElledge Před rokem +9

      @@haroldpepete, a general confrence with the information needed for you to learn the topics. Now you have what you need to go do the research and implement this is whatever code language you use.

    • @coderider3022
      @coderider3022 Před rokem

      This is what they are, about taking the anarchist to some sort of path to best practice.

  • @bananasba
    @bananasba Před rokem +2

    Too much talk and self advertising 3/3