Modernizing API Architecture – Part 1 of X

dev-bloguser

admin

September 27, 2022

Development

[

An API MESH

https://www.axway.com/sites/default/files/resources/whitepapers/axway_wp_10_ways_modernize_api_strategy_en.pdf

https://apifriends.com/api-management/modernize-apis/

https://www.google.com/search?sxsrf=ALeKk03egwfcVTwTLXjWgOl-xOGTD1V_Yw%3A1587303882554&ei=ylWcXsm9IeyyytMPrZu72AE&q=ROI+for+modernizing+your+API&oq=ROI+for+modernizing+your+API&gs_lcp=CgZwc3ktYWIQAzoECCMQJzoHCCMQsAIQJ1DZVVjQYmDpZGgAcAB4AIABYogBiQaSAQIxMJgBAKABAaoBB2d3cy13aXo&sclient=psy-ab&ved=0ahUKEwjJysfgz_ToAhVsmXIEHa3NDhsQ4dUDCAw&uact=5

Modern Architecture

What is modern API Architecture

API Engineering – https://docs.google.com/document/d/1uUrvbYGYOfShMpjf9mvlg3C4F838aA-dJGZFvzf7rJ0/edit#heading=h.dlncwkhndmi0

API Guidelines

https://docs.google.com/document/d/1lh409oFiNB419g0Tpw_B3RbbnDKXkVgkf0YKQmknY-0/edit#heading=h.k4aoc9ykvvrc

API Authentication

https://docs.google.com/document/d/1dvdVT46HwvNrUZlwm0ADRTLzN83lo1AnlHprmj3S4Dk/edit

APIs are a simple concept: they connect data to create new digital experiences. If we look at the IT modernization trends driving digital transformation, APIs play a critical role in all of them. Cloud projects use APIs. Software that interacts with IoT sensors uses APIs. Contextual mobile apps use APIs. And getting big data into systems to be ingested and analyzed is the task of the humble API. So they aren’t a fad; they are the key technology that makes new business models, product offerings, insights, and many other IT changes possible, and they are increasingly seen as a critical part of the successful digital transformation of any organization.

Regardless of how you use APIs, it’s critical to take a strategic, rather than tactical, view of how you plan, design, secure, and manage them. A strategic view will enable you to address the tactical needs of today while providing the flexibility clearly needed to modernize and thrive in the digital world

WAF Evaluation Checklist

Detection Capabilities

An API should have built-in protection for common threats, such as OWASP Top 10 and OWASP API Security Top 10.

Many organizations struggle to keep up with updates and patching new vulnerabilities. A WAF should offer virtual patching, which blocks attempts to exploit known vulnerabilities.

New vulnerabilities are discovered every day. A WAF’s database of known attacks should be regularly updated to provide up-to-date protection.

Account takeover attacks (such as brute force password guessing or credential stuffing) are increasingly common. A WAF should automatically detect and block these attempted attacks.

Some attacks (such as cookie tampering and directory traversal) target the business logic of an application. A WAF should detect and block attempts to exploit these attack vectors.

A WAF should be able to correctly identify and report requests coming from known data centers (in contrast to requests coming from residential IP addresses), Tor exit points, and proxy servers.

Supported Services

A WAF should provide comprehensive protection for websites of any type. This includes single-page applications (SPA), websites, and web applications.

APIs are a growing and vital component of an organization’s digital infrastructure. A WAF should support common API protocols, including XML-based (like SOAP), JSON-based (like REST), GraphQL, and gRPC.

Serverless applications are growing in popularity. A WAF should be able to protect AWS Lambda, Azure Functions, and GCP Cloud Functions.

Deployment

A WAF should be able to provide protection in any deployment environment. This includes public, private, hybrid, and multiple clouds, private data centers, Kubernetes clusters, and service-mesh.

Organizations are increasingly moving their applications to the cloud. A WAF should be designed to operate in cloud environments and take advantage of the cloud deployment (e.g. to be deployed in Kubernetes as a sidecar proxy or Ingress controller).

An organization may have multiple different sites (or multiple departments/subsidiaries) that it wants to protect against attacks. A WAF should offer multitenancy to enable multiple sites to be protected by a single solution with proper user permissions management capability.

Low Management overhead

High false-positive rates commonly drive WAF users to deploy solutions in passive/monitoring mode. A WAF should offer a low false-positive rate to make production deployment usable

A signature-based WAF is typically more difficult to manage (add rules to avoid false positives) while keeping a high level of application protection. Your WAF should be able to block malicious requests without a need to manage signatures.

Per customer and per applications. A WAF should automatically learn the application structure and create necessary security rules

WAF solutions with vendor Cloud-based monitoring & protection module should provide SOC capability to the customers as a part of subscription service.

Scalability

Users should be able to deploy it to any Public Cloud like AWS, Azure, or GCP.

A WAF should support a module-based integration in your existing NGINX load balancer.

It should be easy to deploy an auto-scaling cluster of WAF nodes using provided Terraform automation code.

API Protection

Built on the modern tech stack and using REST, SOAP, gRPC, GraphQL, WebSocket.

Not all attacks against an API are designed to exploit known vulnerabilities. A WAF should also be able to identify and block traffic that abuses an organization’s API.

A WAF should be able to automatically protect API endpoints without a need for the user to provide API schema definitions.

Observability

An organization’s security team needs to be able to easily determine the current status of its web security and respond to potential threats. A WAF should offer a web-based user-friendly dashboard to maximize the effectiveness of an organization’s security team.

Give me a cap.

Compliance and Reporting

Most organizations are subject to a number of different regulations with associated security and reporting requirements. A WAF should offer support for common regulations (like PCI DSS or GDPR) and enable users to easily collect data and generate reports for auditors or regulatory authorities.

An organization’s security team may need to generate reports for executives, auditors, etc. A WAF should have integrated support for generating common reports.

WAF vendors should meet SOC2 compliance requirements & have SOC2 certificates to meet customer standards and practices.

Usability

An organization needs to be able to easily configure its WAF to meet its unique business needs and install updates to take advantage of new features and functionality.

A WAF solution should provide a detailed documentation site about how to deploy and use the system.

Cost

Cyber Protection becomes a key part of IT infrastructure today & customers should be able to afford WAF protection relevant to their size & infra maturity level.

Many WAF vendors make pricing structure unclear & complicated, so customers are exposed to unexpected price increases with more traffic & usage. Ideally, WAF vendors should have a single trigger for price increases with a predictable & transparent pricing model, so customers can plan ahead with the growth of their operations.

Integrations

A WAF should include a publicly-accessible API. This enables users to integrate it with a variety of different external solutions, such as log management with an ELK stack.

A WAF should incorporate support for webhooks – this enables the development of custom issue tracking and analytics platforms.

A Security Information and Event Management (SIEM) solution is designed to provide security data aggregation and analytics. A WAF should have integrations for major SIEM platforms: Splunk, Sumo Logic, IBM QRadar.

Adoption of DevOps principles means that development teams need to be able to automate testing and deployment activities. A WAF should integrate into DevOps pipelines to enable rapid configuration updates. A WAF should have built-in integrations for major DevOps tools like PagerDuty and OpsGenie.

Security teams need to rapidly respond to potential incidents. A WAF should include integration with common messaging platforms for instantaneous notifications: Slack & Microsoft Teams.

WAF customers should be able to customize & set events notifications (also known as “Triggers”) including integrations with SIEM, DevOps & Messenger tools. Apart from notifications on events (like attacks), WAF Customers should be able to use “smart” blocking techniques & set quick action rules.

WAF nodes should provide helpful monitoring metrics in popular Prometheus format.

Active Checks / Vulnerability Scanner Capabilities

A WAF should automatically identify potential vulnerabilities within an organization’s applications. Detections should be based upon active/passive scanning, threat intelligence, and knowledge of public vulnerabilities.

A WAF should be capable of detecting and alerting on misconfigurations that impact the security or usability of an application or API.

Share

smartlybuilt-facebook-blog smartlybuilt-linkedin-blog smartlybuilt-twitter-blog

Similar Posts