Evaluation - Arrow ECS

advertisement
1
Web Application Security
with the Application
Security Manager (ASM)
Piotr Oleszkiewicz
Zbigniew Skurczynski
zbig@f5.com
1
2
Agenda
Web Security – What are the problems?
Vulnerabilities and protection strategies
Websecurity with a Web Application Firewall
(WAF)
Security Policy Setups
About us
2
3
Application Security: Trends and
Drivers
“Webification” of applications
Intelligent browsers and applications
Public awareness of data security
Increasing regulatory requirements
The next attackable frontier
Targeted attacks
3
4
The weakest link
“64% of the 10
million security
incidents tracked
targeted port 80.”
DATA
(Information Week
magazine)
4
5
Why Are Web Applications Vulnerable?
Security officers not involved in software developement,
while developers are not security conscious
New code written to best-practice methodology, but not
tested properly
New type of attack not protected by current methodology
New code written in a hurry due to business pressures
Code written by third parties; badly documented, poorly
tested – third party not available
Flaws in third party infrastructure elements
Session-less web applications written with client-server
mentality
5
6
Most web application are vulnerable!
70% of websites at immediate risk of being hacked!
- Accunetix – Jan 2007 http://www.acunetix.com/news/security-audit-results.htm
“8 out of 10 websites vulnerable to attack”
- WhiteHat “security report – Nov 2006”
https://whitehatsec.market2lead.com/go/whitehatsec/webappstats1106
“75 percent of hacks happen at the application.”
- Gartner “Security at the Application Level”
“64 percent of developers are not confident in their
ability to write secure applications.”
- Microsoft Developer Research
The battle between hackers and security
professionals has moved from the network layer to
the Web applications themselves.
- Network World
6
7
www.owasp.org
Top Ten Project
A1 – Cross Site Scripting
(XSS)
XSS flaws occur whenever an application takes user supplied data and sends it to a web browser without
first validating or encoding that content. XSS allows attackers to execute script in the victim’s
browser which can hijack user sessions, deface web sites, etc.
A2 – Injection Flaws
Injection flaws, particularly SQL injection, are common in web applications. Injection occurs when usersupplied data is sent to an interpreter as part of a command or query. The attacker’s hostile data
tricks the interpreter into executing unintended commands or changing data.
A3 – Insecure Remote File
Include
Code vulnerable to remote file inclusion allows attackers to include hostile code and data, resulting in
devastating attacks, such as total server compromise.
A4 – Insecure Direct Object
Reference
A direct object reference occurs when a developer exposes a reference to an internal implementation
object, such as a file, directory, database record, or key, as a URL or form parameter. Attackers
can manipulate those references to access other objects without authorization.
A5 – Cross Site Request
Forgery (CSRF)
A CSRF attack forces a logged-on victim’s browser to send a pre-authenticated request to a vulnerable
web application, which then forces the victim’s browser to perform a hostile action to the benefit of
the attacker.
A6 – Information Leakage
and Improper Error
Handling
Applications can unintentionally leak information about their configuration, internal workings, or violate
privacy through a variety of application problems. Attackers use this weakness to violate privacy,
or conduct further attacks.
A7 – Broken Authentication
and Session
Management
Account credentials and session tokens are often not properly protected. Attackers compromise
passwords, keys, or authentication tokens to assume other users’ identities.
A8 – Insecure Cryptographic
Storage
Web applications rarely use cryptographic functions properly to protect data and credentials. Attackers
use weakly protected data to conduct identity theft and other crimes, such as credit card fraud.
A9 – Insecure
Communications
Applications frequently fail to encrypt network traffic when it is necessary to protect sensitive
communications.
A10 – Failure to Restrict URL
Access
Frequently, the only protection for sensitive areas of an application is links or URLs are not presented to
unauthorized users. Attackers can use this weakness to access and perform unauthorized
7
operations.
8
Problems are growing
Yesterday:
Today:
• Tens working hours of the
best security specialists
•Automatic and semiautomatic
tools that are user friendly
• Preparing a successful
attack on the web application
was very expensive, but it
still could bring profit if the
target was interesting
enough
•Fuzzers (more than 20 Open
Source tools alone)
•Newest trend: evolutionary
programming
•Bottom line – The cost of
preparing a successful attack
has fallen dramaticaly!!
8
9
Most web application are vulnerable!
Practical demonstration:
- Google
- Weak application logic
- web browser is the only tool
we need
9
10
Not enough time!
The time from findin the
vulnerability to launching
an attack is falling.
Are the applications
prepared for ZERO-DAY
attacks?
Are your applications
prepared for ZERO-DAY
attacks?
10
11
Web Application Security
!
Noncompliant
Information
Perimeter Security
Is Strong
Buffer Overflow
Cross-Site Scripting
SQL/OS Injection
Cookie Poisoning
Hidden-Field Manipulation
Parameter Tampering
!
Infrastructural
Intelligence
Attacks Now Look To
Exploit Application
Vulnerabilities
PORT 80
PORT 443
But Is Open
to Web Traffic
!
Forced
Access to
Information
High
Information
Density
=
High Value
Attack
11
12
Web Application Security with ASM
!
Unauthorised
Access
Browser
!
Stops bad
requests /
responses
ASM allows
legitimate requests
Unauthorised
Access
!
Noncompliant
Information
!
Infrastructural
Intelligence
12
13
Traditional Security Devices vs.
Web Application Firewall (ASM)
Known Web Worms
Unknown Web Worms
Known Web Vulnerabilities
Unknown Web Vulnerabilities
Illegal Access to Web-server files
Forceful Browsing
File/Directory Enumerations
Network
Firewall
IPS
ASM
Limited

X
Limited
Limited
Partial













X
Limited
X
X
Limited
X
X
Limited
Buffer Overflow
Limited
Limited
Cross-Site Scripting
Limited
Limited
SQL/OS Injection
Cookie Poisoning
Hidden-Field Manipulation
Parameter Tampering
X
X
X
X
Limited
X
X
X
13
14
Security Policy in ASM
Security Policy
Content Scrubbing
Application Cloaking
Enforcement
Browser
Definition of Good
and Bad Behaviour
14
15
Security Policy in ASM
Security Policy
Enforcement
Browser
Content Scrubbing
Application Cloaking
Can be generated automatically or manually
Highly granular on configuration and blocking
Easy to understand and manage
Bi-directional:
–
–
Inbound:
Outbound:
protection from generalised & targeted attacks
content scrubbing & application cloaking
Application content & context aware
15
16
Positive Security - Example
16
17
Positive Security - Example
<script>
Actions not known
to be legal can now
be blocked
- Wrong page order
- Invalid parameter
- Invalid value
- etc.
17
18
Negative vs. Positive Security
18
19
Protection for Dynamic Values or
Hidden Field Manipulation
19
20
Selective Application Flow
Enforcement
!
ALLOWED
Username
Password
?
!
From Acc.
$ Amount
To Acc.
Transfer
!
VIOLATION
VIOLATION
• Should this be a violation?
• The user may have
bookmarked the page!
• Unnecessarily enforcing flow
can lead to false positives.
This part of the site is a
financial transaction that
requires authentication; we
should enforce strict flow
and parameter validation
20
21
Flexible Policy Granularity
Generic Policies - Policy per object type
–
–
–
–
Low number of policies
Quick to implement
Requires little change management
Can’t take application flow into account
Optimum policy is often a hybrid
Specific Policies – Policy per object
–
–
–
–
–
–
High number of policies
More time to implement
Requires change management policy
Can enforce application flow
Tightest possible security
Protects dynamic values
21
22
Flexible Deployment Options
Tighter
Security
Posture
POLICY
TIGHTENING
SUGGESTIONS
OBJECT FLOWS
PARAMETER VALUES
PARAMETER NAMES
Typical
‘standard’
starting point
OBJECT NAMES
Policy-Building Tools
• “Trusted IP” Learning
•
•
•
•
Live Traffic Learning
Crawler
Negative RegEx
Template
OBJECT TYPES
22
23
F5 is the Global Leader in
Application Delivery Networking
Users
Data Centre
At Home
In the Office
On the Road
Application
Delivery
Network
Oracle
Siebel
SAP
Business goal: Achieve these objectives in the most
operationally efficient manner
23
24
F5’s Comprehensive Single Solution
Users
The F5 Solution
Applications
Application Delivery Network
CRM
Mobile Phone
Database
Siebel
BEA
PDA
Legacy
.NET
SAP
Laptop
PeopleSoft
IBM
ERP
Desktop
TMOS
SFA
Custom
Co-location
24
25
The F5 Products & Modules
Microsoft
SAP
Oracle
IBM
BEA
International
Data Center
TMOS
BIG-IP
Global
Traffic
Manager
BIG-IP
Link
Controller
WANJet
BIG-IP
BIG-IP Local
Web
Traffic
Accelerator
Manager
FirePass
BIG-IP
Application
Security
Manager
iControl & iRules
Enterprise
Manager
HTTP /HTML, SIP, RTP,
SRTP, RTCP, SMTP,
FTP, SFTP, RTSP, SQL,
CIFS, MAPI, IIOP, SOAP,
XML etc…
25
26
TCP Express
OneConnect
Compression
Server
Side
3rd Party
Web Accel
TCP Proxy
Client
Side
XML
Caching
SSL
TCP Express
Client
Rate Shaping
Microkernel
ASM /TrafficShield
Unique TMOS Architecture
Server
iRules
High Performance HW
iControl API
TMOS Traffic Plug-ins
High-Performance Networking Microkernel
Powerful Application Protocol Support
iControl – External Monitoring and Control
iRules – Network Programming Language
26
27
BIG-IP Software Add-On Modules
Quickly Adapt to Changing Application & Business Challenges
Compression Module
Fast Cache Module
Increase performance
Offload servers
Rate Shaping Module
Reserve bandwidth
27
28
BIG-IP Security Add-On Modules
Application Security Module
SSL Acceleration
Protect applications and data
Protect data over the Internet
Advanced Client
Authentication Module
Protect against
unauthorised access
28
29
ASM Platform Availability
Standalone ASM on TMOS
– 4100
Available as a module with BIG-IP LTM
– 6400/6800
– 8400/8800
29
30
Analyst Leadership Position
Challengers
Leaders
Magic Quadrant for Application
Delivery Products, 2007
Ability to Execute
F5 Networks
F5 Strengths
• Offers the most feature-rich AP ADC,
combined with excellent performance
and programmability via iRules and a
broad product line.
Citrix Systems
Cisco Systems
Akamai Technologies
Foundry Networks
Nortel Networks
Juniper
Cresendo
Radware
• Strong balance sheet and cohesive
management team with a solid track
record for delivering the right
products at the right time.
Zeus
• Strong underlying platform allows
easy extensibility to add features.
Coyote Point
NetContinuum
Array Networks
Niche Players
Visionaries
Completeness of Vision
Source: Gartner, January 2007
• Strong focus on applications,
including long-term relationships with
major application vendors, including
Microsoft, Oracle and SAP.
• Support of an increasingly loyal and
large group of active developers
tuning their applications
environments specifically with F5
infrastructure.
30
31
F5 Customers in EMEA (1 of 2)
Banking,
Financial
Insurance,
Investments
Telco, Service
Providers, Mobile
31
32
F5 Customers in EMEA (2 of 2)
Transport,
Travel
Media, Technology,
Online
Manufact.,
Energy
Governm.,
Other
Health,
Consumer
32
33
Summary
Protecting web application is a challenge within many organizations
but attacks against web applications are the hackers favorites
ASM provides easy and very granular configuration options to protect
web applications and to eliminate false positives
ASM combines positive and negative security models to achieve the
optimum security
ASM is an integrated solution and can run as a module on BIG-IP or
standalone
ASM is used to provide compliance with various standards
ASM provides hidden parameter protection and selective flow control
enforcement
ASM provides an additional security layer or can be used as central
point for web application security enforcement
33
34
Evaluation
The best way to see how it will perform in Your
environment with Your applications
Soft-Tronik can provide you with evaluation
hardware and engineers to help in deployment
34
35
35
36
Back up Sliedes
36
37
Company Snapshot
Facts
Position
References
37
38
F5’s Continued Success
Over 1100 Employees
NASDAQ: FFIV
100,1
94,1
88,1
80,6
73,1
67,7
60,0
50,2
44,2
40,6
36,1
31,6
29.2
Over 10,000 customers and
30,000 systems installed
28.0
Founded 1996 / Public 1999
$ Millions
F5 Ensures Applications Running
Over the Network Are Always
Secure, Fast, and Available
120,0
120
110
100
90
80
70
60
50
40
30
20
27,1
Headquartered in Seattle, WA
111,7
Revenue
03 03 03 03 04 04 04 04 05 05 05 05 06 06 06 06 07
Q
1 2Q 3Q 4Q 1Q 2Q 3Q 4Q 1Q 2Q 3Q 4Q 1Q 2Q 3Q 4Q 1Q
38
Download