Тёмный
No video :(

Getting API security right - Philippe De Ryck - NDC London 2023 

NDC Conferences
Подписаться 196 тыс.
Просмотров 27 тыс.
50% 1

The shift towards an API landscape indicates a significant evolution in the way we build applications. The rise of JavaScript and mobile applications have sparked an explosion of easily-accessible REST APIs. But does the rise of APIs result in the downfall of security? Why are there so many vulnerabilities and incidents involving APIs? How can you ensure that your APIs are secure?
In this session, we use real-world cases to dive into best practices for securing your APIs. We discuss the attack surface of an API, common authorization problems, and best practice techniques to avoid these problems. At the end of this session, you will have an actionable set of guidelines to assess and improve the security of your own APIs.
Check out our new channel:
NDC Clips:
‪@ndcclips‬
Check out more of our featured speakers and talks at
ndcconferences...
ndclondon.com/

Опубликовано:

 

27 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 29   
@EldonElledge
@EldonElledge Год назад
Excellent work here. Thank you. I am glad to see the focus on "Security First" instead of "Security as Technical Debt".
@user-yi6sh7yr4e
@user-yi6sh7yr4e Год назад
Very good! As a junior developer I had not thought these things through so thankyou!
@zombie_pigdragon
@zombie_pigdragon Год назад
I'm pretty proud to have come to the conclusion that OpenAPI is a useful tool for enforcing security between starting to play this and him suggesting exactly that.
@capability-snob
@capability-snob Год назад
Solid talk, great points. I really love the focus on Broken Object Level Authorisation, which is absolutely everywhere. Even though I build Object Capability systems, which take care of many of these problems by construction, that point about WAFs is relevant to me, as DoS becomes a genuine risk when you have everything else covered.
@wildpett
@wildpett 6 месяцев назад
Excellent talk. Auditability means you should be able to read the code easily
@maxbarbul
@maxbarbul 9 месяцев назад
Great talk!
@sidekick3rida
@sidekick3rida 5 месяцев назад
I was reluctant to watch this because security is boring. So glad I did.
@ticler
@ticler 11 месяцев назад
I see many "Senior" developers who fail to understand these basic concepts even after hours of discussion.
@coderider3022
@coderider3022 Год назад
I spent about 4 hours a week telling people people why windows integrated security requests won’t work with my azure Apim that’s secured by azure ad app reg.
@myspexg
@myspexg Год назад
👏👏👏👏👏
@LewisCowles
@LewisCowles Год назад
Surprised there is a 403 for something you are not authorized for. I'd argue a 403 is only for something someone can know is there (so maybe a bad idea for other user records). 404 (deny it exists) is my strong preference if someone does not have access to an object.
@AlgoristHQ
@AlgoristHQ Год назад
There are transformations for that, but what happens if you have a valid user but they try update an object on which they only have read access? Should we 404 then?
@zombie_pigdragon
@zombie_pigdragon Год назад
First solution that comes to mind is to have the authorization policy return the error code to use; i.e. (C#) if (!AuthorizationPolicy.canDeleteTask(task, user, out status)) {return status}; else {/*...*/}. Very simple solution, and can do more complex handling like a 404 when the endpoint is hidden and a 403 when the operation is incorrect.
@Tony_Goat
@Tony_Goat Год назад
​@@AlgoristHQHe did say "403 is only for something someone can know is there," so if they have read access but not write access, they know it's there, therefore 403 if they attempt to write it.
@karoshi2
@karoshi2 11 месяцев назад
Little is more annoying than getting a 404 because your session expired or is insufficient. Just send a 403 for the whole tree beyond /my-secure-path/ whether the item itself exists or not. Imagine an entrance where you have to present your batch card first. It's ok to know that access is restricted and way more obvious than a guard telling you that Mr Anderson doesn't work here until you present the proper token. Also feels like abuse of the status codes and security by obscurity.
@sinamobasheri
@sinamobasheri Месяц назад
It SHOULD NOT be problem, if it is, you are doing "security through obscurity" for lack of a better term
@sinamobasheri
@sinamobasheri Месяц назад
34:33
@goldnutter412
@goldnutter412 Год назад
API world !
@haroldpepete
@haroldpepete Год назад
it's not practical at all, too much talk and less code, 90% of this conference was talk with no sense, too much
@goldnutter412
@goldnutter412 Год назад
Free courses on his site, how is that not practical
@haroldpepete
@haroldpepete Год назад
@@goldnutter412 too much talk, show me the code better
@chriss5749
@chriss5749 Год назад
@@haroldpepete Guess you are working for T-Mobile?
@EldonElledge
@EldonElledge Год назад
@@haroldpepete, a general confrence with the information needed for you to learn the topics. Now you have what you need to go do the research and implement this is whatever code language you use.
@coderider3022
@coderider3022 Год назад
This is what they are, about taking the anarchist to some sort of path to best practice.
@bananasba
@bananasba Год назад
Too much talk and self advertising 3/3
@goldnutter412
@goldnutter412 Год назад
Free courses on his site
Далее
The Fan’s Fang Skin🔥 | Brawl Stars Sneak Peek
00:16
娜美这是在浪费食物 #路飞#海贼王
00:20
Просмотров 3,9 млн
SEVEN things about API security By Philippe De Ryck
53:30
Common mistakes in EF Core - Jernej Kavka - NDC Oslo 2023
1:03:43
The Fan’s Fang Skin🔥 | Brawl Stars Sneak Peek
00:16