42Crunch CEO, Jacques Declas, sat down with Alan Shimel of Digital Anarchist at this year’s RSA APJ show to discuss new trends in API Security, DevSecOps, and what tools you need to keep up!
[Alan Shimel] Hey everyone, itās Alan Shimel for DevOps.com Security Boulevard. Weāre here in Singapore at RSA APJ. Weāre right on the edge of the show floor interviewing speakers, attendees, vendors ā just getting the temperature and feel for this year’s RSA APJ. It always gets me excited when I can find a new DevSecOps company, and just walking around the floor earlier I came across a company that had DevSecOps all over their stuff and I was like ā I never heard of these guys. So I walked over and introduced myself and I met this gentleman here Jacques Declas. Heās the CEO of a company called 42Crunch. Ok, so 42Crunch, what is it ā it’s DevSecOps ā but what do you guys do? What are you about?
[Jacques Declas] Well, weāre trying to change the way security has been done for 15 years by putting security in the code of applications. You’re going to hear us talk a lot about security as code ā like Kubernetes did for the infrastructure ā we’re trying to do the same for security. We feel security hasnāt been done the right way, and itās been a bit of a failure trying to secure applications from the edge of a network ā which is disappearing really fast. We created a cloud platform for the customers to use and to put enforcement on security anywhere in the network. And we followed the developers, so we’re putting security into the developersā hands.
[Alan Shimel] Sounds like DevSecOps to me! A couple of things we’ll jump into. First of all, I got into DevSecOps six/seven years ago for exactly the same reason. I felt that DevOps and the whole shift-left and security as code gave us a chance to right some wrongs that we’ve seen in the past. What I’ve seen over the last six/seven years though is we still have security for what’s called SecOps. We have security through the Ops people. What we’re seeing as part of that shift-left security for developers ā let’s call that DevSec. So you have DevSec and SecOps ā DevSecOps. And they’re not necessarily mutually exclusive, but that’s just how it’s done. So you’re clearly going for the DevSec element.
[Jacques Declas] Yes, but we also have a good story for the operations people who with DevOps these days ā all the Ops have been decimated because it’s kind of done by the developers. Things like Kubernetes, your developers write five lines of code and thatās it ā Kubernetes is a mini datacenter on its own taking most of the complex network configuration away from operations.
[Alan Shimel] Kubernetes is shacking the whole DevOps space up ā from chef to puppet toā¦
[Jacques Declas] It’s a revolution
[Alan Shimel] Yeah, it’s changed things.
[Jacques Declas] Through my experience of being in security for a long time ā and especially seeing the exponential proliferation of APIs ā those thin interfaces that connect everything to anything these days ā we saw some real old traditional ways of trying to secure those applications becoming more and more painful ā and the more APIs talk to other APIs, outside my data center, out to partners, data I own, data I donāt. It’s just becoming really difficult ā more or less impossible. That’s when we had the idea to really try to shift left and put security in the hands of developers ā because they build the applications so they know exactly what data in coming in and out, how sensitive a particular data is and so on. So they know and therefore security doesnāt need to guess anymore what the application does.
[Alan Shimel] You got to start it there because if you’re waiting for it to be hereā¦
[Jacques Declas] And that’s why people talk about artificial intelligence. I think it’s great, but what it means ā it means we’re still trying to understand what the developers did because we still don’t know. So what we’re doing is going back to them and say we’re not asking you to do security as such in your code, weāre asking you to define properly what you do. Let security help you to put the right things in place for the whole DevOps cycles and CI/CD ā because what we found is those API through agile development and competition and bringing those mobile app in the last 10 years as fast as possible ā those APIs were changing weekly. Before you contacted security to secure it, there was a new version coming out, so it never happened. So we’re putting it in the code, it goes to the CI/CD, weāre integrating with all the Jenkins and pipelines and GitHub and GitLab.
[Alan Shimel] Jenkins is another thing being disrupted by Kubernetes. In talking to some of your team I stopped by the booth and I watched ā and youāre really focusing on the APIs that are being used here.
[Jacques Declas] That’s right. There’s a particular reason for that. First, I’ve been involved in the API before they were called API ā they were SOAP, before that XML and EDI. I could tell they were going to really take over the world. I don’t know if you saw it, there was a research published by Akamai, The State of the Internet in 2018, and it said that JSON API traffic in 2010 was 2% of web traffic, and it went up to 83% last year! I mean it’s just everywhere. So for us, API security is quickly replacing the web application security, itās just everywhere.
[Alan Shimel] So CA Technologies, right, since the acquisition they’re a little bit different ā but before the acquisition they really had it, right? They said we live ā I remember interviewing their CEO ā who said we’re living in an API driven economy ā itās the APIs that are driving it. Yes there’s great applications, but every single application we use ā well first of all it’s 85% open source components, right, and then behind the scenes all these applications a lot of what they do is make API calls out to dependencies or they’re dependent on these other apps and functions and so forth. I’m reminded of a company I knew in Boulder Colorado, SendGrid, I donāt know if you ever heard of them. This company went for a couple of billion dollars, they got sold, but all they were was the Ā e-mail piece that went into your app when you had to fire an email off, so everyone used that, but in the background what was really happening isā¦
[Jacques Declas] ā¦the API made a visit. I mean I’ll give you another example. If you look at Netflix, they were really the first one to say hey we’ve got this streaming media type of technology ā how are we going to become a media company? They just wrote a really nice API, really well documented, and said it’s opening up ā everybody can use it ā come on in, and they had thousands. And suddenly through their API program they took over the world.
[Alan Shimel] Slack is another one. Otherwise Slack is just AOL instant messenger without the API to integrate all these things.
[Jacques Declas] Exactly, but the problem is an API calls another API that calls 5 other APIs ā it starts to become too complex to handleā¦
[Alan Shimel] and insecure!
[Jacques Declas] ā¦which data is coming in from where, authentication, authorization, what’s it allowed to do, how do you filter all this traffic and make sure the right API talks to the right API and more importantly than the API is not compromise.
[Alan Shimel] Thereās another piece to it too Jacques, and thatās this: As a developer you want to get your stuff done. You want it to work and want to get it done. Youāve got an API for me that means I don’t have to reinvent the wheel. Hey man give it to me. Great. But I donāt check it. How do I know that API is secure? How do I know ā the same way when I bring an open source component into my app ā how do I know that componentās not a vulnerable edition or version of that. It’s the same thing with this APIā¦
[Jacques Declas] …What kind of library is calling in the back, who’s done it, and who’s maintainingā¦
[Alan Shimel] But I think ā you know developers want to get stuff done, and they don’t necessarily check that. Is that part of what you guys are doing?
[Jacques Declas] Yes. What we do is weāve got an out of the box static analysis of the API, sort of a SAST. The good news between API and web application is that in the API world you have a contract. That’s where we concentrate. It’s a standard where you can define your data. We help developers define it properly in the contract. So you can’t just say this is a string. We say āwell, hang on a minute, I can put all kinds of garbage in a stringā. Tell me if it’s an integer if it’s a credit card ā what is it? Email address? We really give them the tool to have a correct description of the contract and then we automatically apply about 250 rules statically on this. We give them an automatic report and help them by giving code snippets. They don’t even need to come to our platform ā we integrate with VS Code ā so they stay in their environment. It’s free because they don’t like to spend any money ā the developers. So thatās how we are helping them to scan and go all the way to effectively producing firewall functionality across their API and connection.
[Alan Shimel] Because then there’s that real time element you have as well.
[Jacques Declas] So, because we try to integrate our firewall technology and our protection into the CI/CD pipeline. If a developer use GitHub for example, they push a new version of the API into GitHub we’ll pick it up automatically through our integration, and then we’ll launch our scan, our security audit assessment, recheck the policies and tell the developer āoh hang on a minute you score has gone down to 55 because of this ā fix itā and then everything gets deployed in the developer pipeline including the generation of our firewall rules. It’s truly real time with what they do ā because otherwise if you do it somewhere else it’s not integrated, it’s too late, it’s too difficult ā and some of our customers have thousands of APIs. It’s incredible.
[Alan Shimel] I know we were talking at your booth, you know the average enterprise, from the surveys I saw, is running somewhere between 1,000 and 1500 internally developed applications, and I don’t mean commercial cards off the shelf. Each one of those is integrating with multiple APIs. You can see real quick how it goes to 5,000 to 10,000.
[Jacques Declas] Yeah, and that’s why we think the old model of web application firewalls needs to do east/west traffic and any to any traffic. That’s why you need to be everywhere. We’re putting our micro-firewall right next to the API, so in a Kubernetes world right into the same pod which contain the API itself so that you can get as close to the API as you can.
[Alan Shimel] How can people get more information?
[Jacques Declas] Just come to 42crunch.com or visit our community APIsecurity.io. There is a free API audit tool that everyone can try out ā no information necessary.
Try our security audit for free. If you want to see the whole platform in action, request a demo now!
For news on all things API – visit APIsecurity.io and sign up for the weekly newsletter.