16
Enterprise Security APIs DEVELOPMENT IN SUPPORT OF APPLICATION SECURITY

Enterprise Security APIs

Embed Size (px)

DESCRIPTION

Development in support of application security

Citation preview

Page 1: Enterprise Security APIs

Enterprise Security APIsDEVELOPMENT IN SUPPORT OF APPLICATION SECURITY

Page 2: Enterprise Security APIs

Enterprise Security APIsWe can further improve application security by developing reusable software that provides securitycentric functionality, makes it easier to develop secure software or both.

Page 3: Enterprise Security APIs

Vulnerability Management Lifecycle

Prevent

Detect

Remediate

PreventBest practices and testing

DetectDiscover, assess and rank

RemediateCatalog, prioritize and fix

Page 4: Enterprise Security APIs

Application Security

• Policy enforcement and trainingPrevent

• Monitor, scan and reviewDetect

• Management and resourcingRemediate

Page 5: Enterprise Security APIs

Development happens…AND SECURITY TOO

Page 6: Enterprise Security APIs

Authentication APILoosen coupling to the system

Enforce policy More control and granularity

Standardize across applicationsConsistent user experience

Page 7: Enterprise Security APIs

Cryptography APIEnsure that best practices are followedStandardize key managementStop storing secrets in configuration

Page 8: Enterprise Security APIs

CSRF Encrypted TokenDetect and remediate as a separated concern

Use the Cryptography API

Page 9: Enterprise Security APIs

API backed Application Security

•Security built-in by expertsPrevent

•Purpose built monitoringDetect

•The fix is the APIRemediate

Page 10: Enterprise Security APIs

Creating an API…THAT DEVELOPERS WANT TO USE (THAT ’S THE HARD PART)

Page 11: Enterprise Security APIs

Getting startedDerive from existing use-cases

Get input from the application developers

Start with simple but extensible (SOLID)

Beware of anti-patterns!Abstraction Inversion

Bullet-point engineering

Page 12: Enterprise Security APIs

MaintenanceRefactor for extensibility

Use Semantic Versioning

Support the developers who use itHelp developers proactively

Implement fixes and extensions quickly

Triage issues quickly

Page 13: Enterprise Security APIs

Other concernsUse a façade to abstract third-party componentsSimplify and constrain

Use open sourceModularity is key so choose and integrate carefully

Use OpenID Connect or SAML at the boundaries

Page 14: Enterprise Security APIs

What’s importantEase of useDevelopers have to want to use it

So make the developer’s life easier

Modularity and portabilityLow barrier to integration

Page 15: Enterprise Security APIs

Remember to…Create APIs to address application security concerns

Make them easy for developers to use

Make them easy to integrate

Page 16: Enterprise Security APIs

Thanks!Adam Migus: www.migusgroup.com/adam

Email: [email protected]

Twitter: @amigus

Links:

http://en.wikipedia.org/wiki/Solid_(object-oriented_design)

http://semver.org/

http://openid.net/connect/