SlideShare una empresa de Scribd logo
1 de 16
© 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
1 Copyright © 2013 CA. All rights reserved.
API Roles in Cloud and Mobile Security
Greg Olsen, IT Manager, Integration Services
© 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
2 Copyright © 2013 CA. All rights reserved.
 Problem Statement
 Service Gateway
 API Portal
 Current Condition
 Q&A
Agenda
© 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
3 Copyright © 2013 CA. All rights reserved.
Problems
Getting on the same page
© 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
4 Copyright © 2013 CA. All rights reserved.
 Problem Statement 1: Insufficient capabilities allowing for service
exposure and integration with customers, partners, external service
providers, and applications residing outside our internal security
domain (e.g., Amazon). Missing capabilities include consistent
application of security policy, SLA management and
enforcement, and easily usable administration interfaces.
 Problem Statement 2: Need a central discovery method for all
enterprise APIs. Missing capabilities include metrics and
documentation.
Problem Statments
© 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
5 Copyright © 2013 CA. All rights reserved.
 The project which drove the Service Gateway Project: Manager’s Hub
 1200 managers within Adobe
 Need to approve invoices/sick leave/sabbatical forms/offer letters/etc. from
internal applications (SAP) to SaaS services
 The Manager’s Hub allows approvals to be done via smart phones, tablets
and desktops – a mobile strategy
 Second driver: SAP Hana Project
 Implement 16 new services within Adobe and with select external vendors
 Roll out on June 22, 2012
 Deployed Development, Non-prod and Production in May 2012
 Deployed first set of services into Production in June 2012
Problem 1 Solution: Service Gateway
November 2011 until June 2012
© 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
6 Copyright © 2013 CA. All rights reserved.
Service Gateway: Business Capabilities &
Benefits
Capability Area Capability Description Business Benefits
Policy • Consistent service based policies across
the enterprise
• Ability to customize policies to meet
changing or unique requirements
• Creation, deployment and enforcement
Ability to provide a more
predictable and reliable level of
service for key business functions
Service Level • Service Performance
• Throughput, Availability and Utilization
Tracked over Time
• Enforce established SLAs
• Rate limiting to protect backend services
Visibility to service performance
measures allowing the business
to track how well SLAs are being
met
Security • Authentication and Authorization (OAuth,
SAML)
• Denial of Service Detection
• Encryption
• XML attack and intrusion prevention (i.e.,
nesting, injection)
Protection of key resources
through the use of state of the art
security mechanisms
Deployment • Virtual appliance (VMware, Amazon AMI,
etc.)
• Hardware based appliance
• Relevant to our current environments
Leverages existing investments
and allows for expansion into
new environments where
services are being developed
© 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
7 Copyright © 2013 CA. All rights reserved.
Integration Principles, Technologies, Services and Tools
REST, JSON, oAuth, SAML, X.509 Certs, PKCS, PCI-DSS, TLS, EDIINT (AS2), EDIFACT, ANSI
X.12, SFTP, HTTP/HTTPS, XML, Xpath, XML Schema, XSLT, SOAP, WS-Security, WS-
Trust, WSDL, WS-Policy, JMS
TIBCO BW TIBCO EMS
web
Methods
Informatica
SAP PI
Tumble
weed
Corticon
PGP
Apache CXF
7
Support
Forum
Self-Service
Portal
Online
Training
Virtual Dev
Lab
Service
Composition
Advanced
Messaging
Database
Integration
Event
Processing
Distributed
Cache
Managed File
Transfer
Service
Access &
Governance
B2B
Integration
Business
Rules Mgmt
Loose Coupling, Simplicity, Service Orientation, Global Access, Cloud
Capable, Reusability, Reliability, Transparency
Enabling
Standards and
Technologies
Products
iPaaS Services
iPaaS Tools
(Self Service)
Architecture
Principles
Layer 7
Gateway
Layer 7
API Portal
© 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
8 Copyright © 2013 CA. All rights reserved.
Service Gateway Use Cases: Priorities
Use Case Use Case Use Case
* REST to SOAP
Mediation
Apply Policies Based on
Message Data
* Resiliency
Cross-Domain Service
Mediation
Dynamic Endpoint Lookup * Scalability
* Authentication and
Authorization
Distributing Policies to
Service Gateway
Load Balancing
* Logging and Auditing Service Level
Management
SSL Offload
* Unexpected Velocity of
Transactions
Monitoring Health of the
Service Gateway
* Required – all else is a must have but can initially live without
© 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
9 Copyright © 2013 CA. All rights reserved.
 The Gateway is faster at processing than the software in the
backend – be prepared to throttle back the velocity of data!
 Some authentication models may not be approved for use by your
security teams
 Today, we use IMS or SSO tokens and validate against IMS or OpenAM
server
 Originally, we wanted to use oAuth
 Speed of adaption
 Originally we thought we’d have at least one year to ramp up
 Once it went live, EVERYONE wanted to use it
 Our current volume is higher than we thought we’d be after one year –
plan for rapid adaption
Concerns and Caveats
Service Gateway
© 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
10 Copyright © 2013 CA. All rights reserved.
 Require a single location to find all the APIs flowing through the Service
Gateway
 Track usage of the APIs
 Discovery of reusable APIs
 Documentation
 Sample code
Problem 2 Solution: API Portal
From April 2012 to August 2012
© 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
11 Copyright © 2013 CA. All rights reserved.
API Portal
© 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
12 Copyright © 2013 CA. All rights reserved.
Enterprise APIs
1. Publish & Secure APIs 2. Onboard Developers
3. Monetize your APIs Developer
Technical/Security Architect
Web Administrator
Business Manager
4. Close the Loop
API Portal
API Portal: Part of Layer 7’s Turnkey Solution
© 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
13 Copyright © 2013 CA. All rights reserved.
 All want the benefits of the portal but not the work
 Documentation needs to be completed according to templates we’ve
shared
 Most teams do not want “another set of templates” even though the value
is clear
 Adaption is slower than anticipated
 Reticence by some of our business units to use an IT-owned and
operated application
Concerns and Caveats
API Portal
© 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
14 Copyright © 2013 CA. All rights reserved.
 Developers look to off-load security work to the Service Gateway for
all their APIs – can’t keep up with demand!
 InfoSec looks to the Service Gateway to ensure data is compliant
with internal policies
 Network Security looks to the Service Gateway to monitor attacks
from the outside (we get scanned for vulnerabilities about once
every 3 days)
 Statistics after one year (ahead of forecast):
Today
Ave. Calls Per
Minute/Hour
95/5700
Max Calls Per Minute/Hour 907/54,420
Total Number of APIs 29
Number of BUs 7
© 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
15 Copyright © 2013 CA. All rights reserved.
 Had two problems to solve: a central gateway for all services and
APIs and a central registry for all those services and documentation
 Caveats
 Agreements by all (security and application owners) prior to production
roll-out
 General agreements by all developers to use API Portal
Summary: A Few Words to Remember
© 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential.
16 Copyright © 2013 CA. All rights reserved.
Q&A

Más contenido relacionado

La actualidad más candente

Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platform
OracleIDM
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
guest536dd0e
 
OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater
Apigee | Google Cloud
 

La actualidad más candente (18)

API Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against HacksAPI Security: Securing Digital Channels and Mobile Apps Against Hacks
API Security: Securing Digital Channels and Mobile Apps Against Hacks
 
API Security and OAuth for the Enterprise
API Security and OAuth for the EnterpriseAPI Security and OAuth for the Enterprise
API Security and OAuth for the Enterprise
 
Security as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO PerspectiveSecurity as an Enabler for the Digital World - CISO Perspective
Security as an Enabler for the Digital World - CISO Perspective
 
MuleSoft Meetup Dubai Anypoint security with api-led Connectivity
MuleSoft Meetup Dubai  Anypoint security with api-led ConnectivityMuleSoft Meetup Dubai  Anypoint security with api-led Connectivity
MuleSoft Meetup Dubai Anypoint security with api-led Connectivity
 
Managing Identities in the World of APIs
Managing Identities in the World of APIsManaging Identities in the World of APIs
Managing Identities in the World of APIs
 
Unified Security for Mobile, APIs and the Web
Unified Security for Mobile, APIs and the WebUnified Security for Mobile, APIs and the Web
Unified Security for Mobile, APIs and the Web
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platform
 
Secure Salesforce: Secret Storage in Your Salesforce Instance
Secure Salesforce: Secret Storage in Your Salesforce InstanceSecure Salesforce: Secret Storage in Your Salesforce Instance
Secure Salesforce: Secret Storage in Your Salesforce Instance
 
Building better security for your API platform using Azure API Management
Building better security for your API platform using Azure API ManagementBuilding better security for your API platform using Azure API Management
Building better security for your API platform using Azure API Management
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Best Practices for API Security
Best Practices for API SecurityBest Practices for API Security
Best Practices for API Security
 
Aruba Networks - Overview ClearPass
Aruba Networks - Overview ClearPassAruba Networks - Overview ClearPass
Aruba Networks - Overview ClearPass
 
OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater
 
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
Checkmarx meetup API Security -  API Security top 10 - Erez YalonCheckmarx meetup API Security -  API Security top 10 - Erez Yalon
Checkmarx meetup API Security - API Security top 10 - Erez Yalon
 
Extend Enterprise Application-level Security to Your AWS Environment
Extend Enterprise Application-level Security to Your AWS EnvironmentExtend Enterprise Application-level Security to Your AWS Environment
Extend Enterprise Application-level Security to Your AWS Environment
 
More databases. More hackers.
More databases. More hackers.More databases. More hackers.
More databases. More hackers.
 
Data-driven Security: Protect APIs from Adaptive Threats
Data-driven Security: Protect APIs from Adaptive ThreatsData-driven Security: Protect APIs from Adaptive Threats
Data-driven Security: Protect APIs from Adaptive Threats
 
Security in mulesoft
Security in mulesoftSecurity in mulesoft
Security in mulesoft
 

Similar a API Roles In Cloud and Mobile Security - Greg Olsen, IT Manager, Integration Services, Adobe - Layer 7 User Conference Palo Alto

Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS business
CloudPassage
 
Integrating Security into DevOps
Integrating Security into DevOpsIntegrating Security into DevOps
Integrating Security into DevOps
CloudPassage
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 
Why an innovative mobile strategy needs a robust API
Why an innovative mobile strategy needs a robust APIWhy an innovative mobile strategy needs a robust API
Why an innovative mobile strategy needs a robust API
Manmohan Gupta
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013
David Linthicum
 

Similar a API Roles In Cloud and Mobile Security - Greg Olsen, IT Manager, Integration Services, Adobe - Layer 7 User Conference Palo Alto (20)

Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps Era
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
 
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019 DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS business
 
Integrating Security into DevOps
Integrating Security into DevOpsIntegrating Security into DevOps
Integrating Security into DevOps
 
Enterprise Cloud Management - 2013 EMC World presentation
Enterprise Cloud Management - 2013 EMC World presentationEnterprise Cloud Management - 2013 EMC World presentation
Enterprise Cloud Management - 2013 EMC World presentation
 
The Top 10 Most Common Weaknesses in Serverless Applications 2018
The Top 10 Most Common Weaknesses in Serverless Applications 2018The Top 10 Most Common Weaknesses in Serverless Applications 2018
The Top 10 Most Common Weaknesses in Serverless Applications 2018
 
HP Discover - Developing new applications for the cloud
HP Discover - Developing new applications for the cloudHP Discover - Developing new applications for the cloud
HP Discover - Developing new applications for the cloud
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
 
Oracle ADF Architecture TV - Design - Architecting for ADF Mobile Integration
Oracle ADF Architecture TV - Design - Architecting for ADF Mobile IntegrationOracle ADF Architecture TV - Design - Architecting for ADF Mobile Integration
Oracle ADF Architecture TV - Design - Architecting for ADF Mobile Integration
 
Implementing cloud based devops for distributed agile projects
Implementing cloud based devops for distributed agile projectsImplementing cloud based devops for distributed agile projects
Implementing cloud based devops for distributed agile projects
 
Big Data Fundamentals 6.6.18
Big Data Fundamentals 6.6.18Big Data Fundamentals 6.6.18
Big Data Fundamentals 6.6.18
 
Big Data Fundamentals
Big Data FundamentalsBig Data Fundamentals
Big Data Fundamentals
 
2022 APIsecure_The Real World, API Security Edition
2022 APIsecure_The Real World, API Security Edition2022 APIsecure_The Real World, API Security Edition
2022 APIsecure_The Real World, API Security Edition
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Modernizing an Existing SOA-based Architecture with APIs
Modernizing an Existing SOA-based Architecture with APIsModernizing an Existing SOA-based Architecture with APIs
Modernizing an Existing SOA-based Architecture with APIs
 
Why an innovative mobile strategy needs a robust API
Why an innovative mobile strategy needs a robust APIWhy an innovative mobile strategy needs a robust API
Why an innovative mobile strategy needs a robust API
 
Why an Innovative Mobile Strategy Requires a Robust API
Why an Innovative Mobile Strategy Requires a Robust API Why an Innovative Mobile Strategy Requires a Robust API
Why an Innovative Mobile Strategy Requires a Robust API
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013
 

Más de CA API Management

5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
CA API Management
 

Más de CA API Management (20)

Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterprise
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your Data
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & Win
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

API Roles In Cloud and Mobile Security - Greg Olsen, IT Manager, Integration Services, Adobe - Layer 7 User Conference Palo Alto

  • 1. © 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 1 Copyright © 2013 CA. All rights reserved. API Roles in Cloud and Mobile Security Greg Olsen, IT Manager, Integration Services
  • 2. © 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 2 Copyright © 2013 CA. All rights reserved.  Problem Statement  Service Gateway  API Portal  Current Condition  Q&A Agenda
  • 3. © 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 3 Copyright © 2013 CA. All rights reserved. Problems Getting on the same page
  • 4. © 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 4 Copyright © 2013 CA. All rights reserved.  Problem Statement 1: Insufficient capabilities allowing for service exposure and integration with customers, partners, external service providers, and applications residing outside our internal security domain (e.g., Amazon). Missing capabilities include consistent application of security policy, SLA management and enforcement, and easily usable administration interfaces.  Problem Statement 2: Need a central discovery method for all enterprise APIs. Missing capabilities include metrics and documentation. Problem Statments
  • 5. © 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 5 Copyright © 2013 CA. All rights reserved.  The project which drove the Service Gateway Project: Manager’s Hub  1200 managers within Adobe  Need to approve invoices/sick leave/sabbatical forms/offer letters/etc. from internal applications (SAP) to SaaS services  The Manager’s Hub allows approvals to be done via smart phones, tablets and desktops – a mobile strategy  Second driver: SAP Hana Project  Implement 16 new services within Adobe and with select external vendors  Roll out on June 22, 2012  Deployed Development, Non-prod and Production in May 2012  Deployed first set of services into Production in June 2012 Problem 1 Solution: Service Gateway November 2011 until June 2012
  • 6. © 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 6 Copyright © 2013 CA. All rights reserved. Service Gateway: Business Capabilities & Benefits Capability Area Capability Description Business Benefits Policy • Consistent service based policies across the enterprise • Ability to customize policies to meet changing or unique requirements • Creation, deployment and enforcement Ability to provide a more predictable and reliable level of service for key business functions Service Level • Service Performance • Throughput, Availability and Utilization Tracked over Time • Enforce established SLAs • Rate limiting to protect backend services Visibility to service performance measures allowing the business to track how well SLAs are being met Security • Authentication and Authorization (OAuth, SAML) • Denial of Service Detection • Encryption • XML attack and intrusion prevention (i.e., nesting, injection) Protection of key resources through the use of state of the art security mechanisms Deployment • Virtual appliance (VMware, Amazon AMI, etc.) • Hardware based appliance • Relevant to our current environments Leverages existing investments and allows for expansion into new environments where services are being developed
  • 7. © 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 7 Copyright © 2013 CA. All rights reserved. Integration Principles, Technologies, Services and Tools REST, JSON, oAuth, SAML, X.509 Certs, PKCS, PCI-DSS, TLS, EDIINT (AS2), EDIFACT, ANSI X.12, SFTP, HTTP/HTTPS, XML, Xpath, XML Schema, XSLT, SOAP, WS-Security, WS- Trust, WSDL, WS-Policy, JMS TIBCO BW TIBCO EMS web Methods Informatica SAP PI Tumble weed Corticon PGP Apache CXF 7 Support Forum Self-Service Portal Online Training Virtual Dev Lab Service Composition Advanced Messaging Database Integration Event Processing Distributed Cache Managed File Transfer Service Access & Governance B2B Integration Business Rules Mgmt Loose Coupling, Simplicity, Service Orientation, Global Access, Cloud Capable, Reusability, Reliability, Transparency Enabling Standards and Technologies Products iPaaS Services iPaaS Tools (Self Service) Architecture Principles Layer 7 Gateway Layer 7 API Portal
  • 8. © 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 8 Copyright © 2013 CA. All rights reserved. Service Gateway Use Cases: Priorities Use Case Use Case Use Case * REST to SOAP Mediation Apply Policies Based on Message Data * Resiliency Cross-Domain Service Mediation Dynamic Endpoint Lookup * Scalability * Authentication and Authorization Distributing Policies to Service Gateway Load Balancing * Logging and Auditing Service Level Management SSL Offload * Unexpected Velocity of Transactions Monitoring Health of the Service Gateway * Required – all else is a must have but can initially live without
  • 9. © 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 9 Copyright © 2013 CA. All rights reserved.  The Gateway is faster at processing than the software in the backend – be prepared to throttle back the velocity of data!  Some authentication models may not be approved for use by your security teams  Today, we use IMS or SSO tokens and validate against IMS or OpenAM server  Originally, we wanted to use oAuth  Speed of adaption  Originally we thought we’d have at least one year to ramp up  Once it went live, EVERYONE wanted to use it  Our current volume is higher than we thought we’d be after one year – plan for rapid adaption Concerns and Caveats Service Gateway
  • 10. © 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 10 Copyright © 2013 CA. All rights reserved.  Require a single location to find all the APIs flowing through the Service Gateway  Track usage of the APIs  Discovery of reusable APIs  Documentation  Sample code Problem 2 Solution: API Portal From April 2012 to August 2012
  • 11. © 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 11 Copyright © 2013 CA. All rights reserved. API Portal
  • 12. © 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 12 Copyright © 2013 CA. All rights reserved. Enterprise APIs 1. Publish & Secure APIs 2. Onboard Developers 3. Monetize your APIs Developer Technical/Security Architect Web Administrator Business Manager 4. Close the Loop API Portal API Portal: Part of Layer 7’s Turnkey Solution
  • 13. © 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 13 Copyright © 2013 CA. All rights reserved.  All want the benefits of the portal but not the work  Documentation needs to be completed according to templates we’ve shared  Most teams do not want “another set of templates” even though the value is clear  Adaption is slower than anticipated  Reticence by some of our business units to use an IT-owned and operated application Concerns and Caveats API Portal
  • 14. © 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 14 Copyright © 2013 CA. All rights reserved.  Developers look to off-load security work to the Service Gateway for all their APIs – can’t keep up with demand!  InfoSec looks to the Service Gateway to ensure data is compliant with internal policies  Network Security looks to the Service Gateway to monitor attacks from the outside (we get scanned for vulnerabilities about once every 3 days)  Statistics after one year (ahead of forecast): Today Ave. Calls Per Minute/Hour 95/5700 Max Calls Per Minute/Hour 907/54,420 Total Number of APIs 29 Number of BUs 7
  • 15. © 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 15 Copyright © 2013 CA. All rights reserved.  Had two problems to solve: a central gateway for all services and APIs and a central registry for all those services and documentation  Caveats  Agreements by all (security and application owners) prior to production roll-out  General agreements by all developers to use API Portal Summary: A Few Words to Remember
  • 16. © 2013 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 16 Copyright © 2013 CA. All rights reserved. Q&A