BLOG

Revolutionizing API Security – 42Crunch + Digital Anarchist

42Crunch CEO, Jacques Declas, sat down with Alan Shimel of Digital Anarchist at this year’s RSA APJ show to discuss new trends in API Security, DevSecOps, and what tools you need to keep up!

 

[Alan Shimel] Hey everyone, itā€™s Alan Shimel for DevOps.com Security Boulevard. Weā€™re here in Singapore at RSA APJ. Weā€™re right on the edge of the show floor interviewing speakers, attendees, vendors ā€“ just getting the temperature and feel for this year’s RSA APJ. It always gets me excited when I can find a new DevSecOps company, and just walking around the floor earlier I came across a company that had DevSecOps all over their stuff and I was like ā€“ I never heard of these guys. So I walked over and introduced myself and I met this gentleman here Jacques Declas. Heā€™s the CEO of a company called 42Crunch. Ok, so 42Crunch, what is it ā€“ it’s DevSecOps ā€“ but what do you guys do? What are you about?

[Jacques Declas] Well, weā€™re trying to change the way security has been done for 15 years by putting security in the code of applications. You’re going to hear us talk a lot about security as code ā€“ like Kubernetes did for the infrastructure ā€“ we’re trying to do the same for security. We feel security hasnā€™t been done the right way, and itā€™s been a bit of a failure trying to secure applications from the edge of a network ā€“ which is disappearing really fast. We created a cloud platform for the customers to use and to put enforcement on security anywhere in the network. And we followed the developers, so we’re putting security into the developersā€™ hands.

[Alan Shimel] Sounds like DevSecOps to me! A couple of things we’ll jump into. First of all, I got into DevSecOps six/seven years ago for exactly the same reason. I felt that DevOps and the whole shift-left and security as code gave us a chance to right some wrongs that we’ve seen in the past. What I’ve seen over the last six/seven years though is we still have security for what’s called SecOps. We have security through the Ops people. What we’re seeing as part of that shift-left security for developers ā€“ let’s call that DevSec. So you have DevSec and SecOps ā€“ DevSecOps. And they’re not necessarily mutually exclusive, but that’s just how it’s done. So you’re clearly going for the DevSec element.

[Jacques Declas] Yes, but we also have a good story for the operations people who with DevOps these days ā€“ all the Ops have been decimated because it’s kind of done by the developers. Things like Kubernetes, your developers write five lines of code and thatā€™s it ā€“ Kubernetes is a mini datacenter on its own taking most of the complex network configuration away from operations.

[Alan Shimel] Kubernetes is shacking the whole DevOps space up ā€“ from chef to puppet toā€¦

[Jacques Declas] It’s a revolution

[Alan Shimel] Yeah, it’s changed things.

[Jacques Declas] Through my experience of being in security for a long time ā€“ and especially seeing the exponential proliferation of APIs ā€“ those thin interfaces that connect everything to anything these days ā€“ we saw some real old traditional ways of trying to secure those applications becoming more and more painful ā€“ and the more APIs talk to other APIs, outside my data center, out to partners, data I own, data I donā€™t. It’s just becoming really difficult ā€“ more or less impossible. That’s when we had the idea to really try to shift left and put security in the hands of developers ā€“ because they build the applications so they know exactly what data in coming in and out, how sensitive a particular data is and so on. So they know and therefore security doesnā€™t need to guess anymore what the application does.

[Alan Shimel] You got to start it there because if you’re waiting for it to be hereā€¦

[Jacques Declas] And that’s why people talk about artificial intelligence. I think it’s great, but what it means ā€“ it means we’re still trying to understand what the developers did because we still don’t know. So what we’re doing is going back to them and say we’re not asking you to do security as such in your code, weā€™re asking you to define properly what you do. Let security help you to put the right things in place for the whole DevOps cycles and CI/CD ā€“ because what we found is those API through agile development and competition and bringing those mobile app in the last 10 years as fast as possible ā€“ those APIs were changing weekly. Before you contacted security to secure it, there was a new version coming out, so it never happened. So we’re putting it in the code, it goes to the CI/CD, weā€™re integrating with all the Jenkins and pipelines and GitHub and GitLab.

[Alan Shimel] Jenkins is another thing being disrupted by Kubernetes. In talking to some of your team I stopped by the booth and I watched ā€“ and youā€™re really focusing on the APIs that are being used here.

[Jacques Declas] That’s right. There’s a particular reason for that. First, I’ve been involved in the API before they were called API ā€“ they were SOAP, before that XML and EDI. I could tell they were going to really take over the world. I don’t know if you saw it, there was a research published by Akamai, The State of the Internet in 2018, and it said that JSON API traffic in 2010 was 2% of web traffic, and it went up to 83% last year! I mean it’s just everywhere. So for us, API security is quickly replacing the web application security, itā€™s just everywhere.

[Alan Shimel] So CA Technologies, right, since the acquisition they’re a little bit different ā€“ but before the acquisition they really had it, right? They said we live ā€“ I remember interviewing their CEO ā€“ who said we’re living in an API driven economy ā€“ itā€™s the APIs that are driving it. Yes there’s great applications, but every single application we use ā€“ well first of all it’s 85% open source components, right, and then behind the scenes all these applications a lot of what they do is make API calls out to dependencies or they’re dependent on these other apps and functions and so forth. I’m reminded of a company I knew in Boulder Colorado, SendGrid, I donā€™t know if you ever heard of them. This company went for a couple of billion dollars, they got sold, but all they were was the Ā e-mail piece that went into your app when you had to fire an email off, so everyone used that, but in the background what was really happening isā€¦

[Jacques Declas] ā€¦the API made a visit. I mean I’ll give you another example. If you look at Netflix, they were really the first one to say hey we’ve got this streaming media type of technology ā€“ how are we going to become a media company? They just wrote a really nice API, really well documented, and said it’s opening up ā€“ everybody can use it ā€“ come on in, and they had thousands. And suddenly through their API program they took over the world.

[Alan Shimel] Slack is another one. Otherwise Slack is just AOL instant messenger without the API to integrate all these things.

[Jacques Declas] Exactly, but the problem is an API calls another API that calls 5 other APIs ā€“ it starts to become too complex to handleā€¦

[Alan Shimel] and insecure!

[Jacques Declas] ā€¦which data is coming in from where, authentication, authorization, what’s it allowed to do, how do you filter all this traffic and make sure the right API talks to the right API and more importantly than the API is not compromise.

[Alan Shimel] Thereā€™s another piece to it too Jacques, and thatā€™s this: As a developer you want to get your stuff done. You want it to work and want to get it done. Youā€™ve got an API for me that means I don’t have to reinvent the wheel. Hey man give it to me. Great. But I donā€™t check it. How do I know that API is secure? How do I know ā€“ the same way when I bring an open source component into my app ā€“ how do I know that componentā€™s not a vulnerable edition or version of that. It’s the same thing with this APIā€¦

[Jacques Declas] …What kind of library is calling in the back, who’s done it, and who’s maintainingā€¦

[Alan Shimel] But I think ā€“ you know developers want to get stuff done, and they don’t necessarily check that. Is that part of what you guys are doing?

[Jacques Declas] Yes. What we do is weā€™ve got an out of the box static analysis of the API, sort of a SAST. The good news between API and web application is that in the API world you have a contract. That’s where we concentrate. It’s a standard where you can define your data. We help developers define it properly in the contract. So you can’t just say this is a string. We say ā€œwell, hang on a minute, I can put all kinds of garbage in a stringā€. Tell me if it’s an integer if it’s a credit card ā€“ what is it? Email address? We really give them the tool to have a correct description of the contract and then we automatically apply about 250 rules statically on this. We give them an automatic report and help them by giving code snippets. They don’t even need to come to our platform ā€“ we integrate with VS Code ā€“ so they stay in their environment. It’s free because they don’t like to spend any money ā€“ the developers. So thatā€™s how we are helping them to scan and go all the way to effectively producing firewall functionality across their API and connection.

[Alan Shimel] Because then there’s that real time element you have as well.

[Jacques Declas] So, because we try to integrate our firewall technology and our protection into the CI/CD pipeline. If a developer use GitHub for example, they push a new version of the API into GitHub we’ll pick it up automatically through our integration, and then we’ll launch our scan, our security audit assessment, recheck the policies and tell the developer ā€œoh hang on a minute you score has gone down to 55 because of this ā€“ fix itā€ and then everything gets deployed in the developer pipeline including the generation of our firewall rules. It’s truly real time with what they do ā€“ because otherwise if you do it somewhere else it’s not integrated, it’s too late, it’s too difficult ā€“ and some of our customers have thousands of APIs. It’s incredible.

[Alan Shimel] I know we were talking at your booth, you know the average enterprise, from the surveys I saw, is running somewhere between 1,000 and 1500 internally developed applications, and I don’t mean commercial cards off the shelf. Each one of those is integrating with multiple APIs. You can see real quick how it goes to 5,000 to 10,000.

[Jacques Declas] Yeah, and that’s why we think the old model of web application firewalls needs to do east/west traffic and any to any traffic. That’s why you need to be everywhere. We’re putting our micro-firewall right next to the API, so in a Kubernetes world right into the same pod which contain the API itself so that you can get as close to the API as you can.

[Alan Shimel] How can people get more information?

[Jacques Declas] Just come to 42crunch.com or visit our community APIsecurity.io. There is a free API audit tool that everyone can try out ā€“ no information necessary.

 

Try our security audit for free. If you want to see the whole platform in action, request a demo now!

For news on all things API – visit APIsecurity.io and sign up for the weekly newsletter.

Latest Resources

WEBINAR

Mitigate OWASP API risks through security-by-design

Learn best practices and mitigation steps for some of the OWASP API vulnerabilities through this 42Crunch API security best practice webinar

NEWS

VicOne Partners with 42Crunch to Deliver Uniquely Comprehensive Security Across SDV and Connected-Vehicle Ecosystem

By Newsdesk | May 29, 2024

Collaboration pairs leaders in API and automotive cybersecurity to enable broad protectionĀ as attacks on automotive APIs climb within and among vehicle, cloud and mobileĀ  DALLAS and TOKYO, May 29, 2024ā€”VicOne, an automotive cybersecurity solutions leader, today announced a partnership with 42Crunch Ā to enhance the security of application programming […]

DataSheet

APIs are the core building block of every enterpriseā€™s digital strategy, yet they are also the number one attack surface for hackers. 42Crunch makes developersā€™ and security practitioners' lives easier by protecting APIs, with a platform that automates security into the API development pipeline and gives full oversight of security policy enforcement at every stage of the API lifecycle.

WEBINAR

Mitigate OWASP API risks through security-by-design

Learn best practices and mitigation steps for some of the OWASP API vulnerabilities through this 42Crunch API security best practice webinar

NEWS

VicOne Partners with 42Crunch to Deliver Uniquely Comprehensive Security Across SDV and Connected-Vehicle Ecosystem

By Newsdesk | May 29, 2024

Collaboration pairs leaders in API and automotive cybersecurity to enable broad protectionĀ as attacks on automotive APIs climb within and among vehicle, cloud and mobileĀ  DALLAS and TOKYO, May 29, 2024ā€”VicOne, an automotive cybersecurity solutions leader, today announced a partnership with 42Crunch Ā to enhance the security of application programming […]

DataSheet

Datasheet Cover Images P1-02

Product Datasheet Addressing API Security Challenges

APIs are the core building block of every enterpriseā€™s digital strategy, yet they are also the number one attack surface for hackers. 42Crunch makes developersā€™ and security practitioners' lives easier by protecting APIs, with a platform that automates security into the API development pipeline and gives full oversight of security policy enforcement at every stage of the API lifecycle.

Ready to Learn More?

Developer-first solution for delivering API security as code.