Egen brannmur for web trafikk?
Transcription
Egen brannmur for web trafikk?
Egen brannmur for web trafikk? Jon Bjørnland [email protected] Per Bøe [email protected] 2 F5 er den globale leder innen Application Delivery Networking Users Data Centre At Home In the Office On the Road Application Delivery Network SAP Microsoft Oracle Business goal: Achieve these objectives in the most operationally efficient manner 3 F5 dominerer markedet for Application Delivery Controllers Magic Quadrant for Application Delivery Controllers, 2009 F5 Networks - Strengths • F5 Networks has a broad and comprehensive vision with industry-leading understanding of the needs of application development, deployment and management. • The vendor has a comprehensive feature set with a full range of extensibility delivered through iRules and iControl, and integration with popular integrated development environments (IDEs), such as Eclipse and .NET/Visual Basic. • F5 has developed a very large community of committed users (using F5's DevCentral portal) that helps fuel the use of iRules to solve unique data center application challenges, creating a loyal and engaged user base. • F5 has a solid financial position and continued market-leading position. SOURCE: Gartner, Inc. 4 F5 i Data Senteret Link 3 DC 2: U.K. Link 1 Link 2 Web Server Web Server Web Server Link 3 App. Server App. Server App. Server File Storage Virtualization Remote - WAN Link 2 Application Server Virtualization PC - Home Link 1 Web Server Virtualization Mobile Data Center & Link Virtualization DC 1: U.S. NetApp EMC Windows file storage PC - LAN WLAN BIG-IP GTM & LC Web Server BIG-IP LTM, WA, ASM Windows file storage App. Server BIG-IP LTM, APM F5 ARX 5 F5 – mellom nettverk og applikasjoner Data Center Solutions Application Layer Application Layer Network Layer Rate Shaping Content Acceleration DoS Protection ROUTERS SSL Acceleration Load Balancing SWITCHES Application Security Traffic Compression Caching Connection Optimization FIREWALLS Intelligent Clients 6 F5 – mellom nettverk og applikasjoner Data Center Solutions Application Layer Network Layer INTELLIGENT APPLICATIONS iControl iRules ROUTERS Functions TM/OS SWITCHES FIREWALLS Intelligent Clients 7 Intelligens, fleksibilitet og ytelse iRules Programmable Application Network Programmable Network Language GUI-Based Application Profiles Repeatable Policies Unified Application Infrastructure Services Security Optimisation Delivery Targeted and Adaptable Functions New Service Universal Inspection Engine (UIE) Complete Visibility and Control of Application Flows TM/OS Fast Application Proxy Client Side Compression TCP Offloading Load Balancing Server Side 8 BIG-IP Hardware Line-up VIPRION BIG-IP 8900 4 x 4 10/100/1000 (PB200 blade) 4 x 8 10Gb SFP+ (PB200 blade) 4 x 16 GB memory (PB200 blade) 4 x 18 Gbps Traffic (PB200 blade) BIG-IP 6900 BIG-IP 3900 BIG-IP 3600 BIG-IP 1600 8 x 10/100/1000 2 x 1Gb SFP 4 GB memory 2 Gbps Traffic 4 x 10/100/1000 2 x 1GB SFP 4 GB memory 1 Gbps Traffic 8 x 10/100/1000 4 x 1Gb SFP 8 GB memory 4 Gbps Traffic 16 x 10/100/1000 8 x 1Gb SFP 8 GB memory 6 Gbps Traffic 16 x 10/100/1000 8 x 1Gb SFP 2 x 10Gb SFP+ 16 GB memory 12 Gbps Traffic 72 Gbps Traffic in total 9 Web applikasjoner er utsatt • New SANS report – Focused on patching Operating Systems – 80% of vulnerabilities are in web apps – 60% of the attack vectors are web based 10 Nesten alle web applikasjoner er sårbare • “97% of websites at immediate risk of being hacked due to vulnerabilites! 69% of vulnerabilities are client side-attacks” - Web Application Security Consortium http://www.webappsec.org/projects/statistics/ • “8 out of 10 websites vulnerable to attack” - WhiteHat “security report ” http://www.whitehatsec.com/home/assets/WPstats0808.pdf • “75 percent of hacks happen at the application.” - Gartner “Security at the Application Level” • “64 percent of developers are not confident in their ability to write secure applications.” - Microsoft Developer Research 11 WhiteHat Website Security Statistics 10/2009 http://www.whitehatsec.com • Data collected from January 1, 2006 to October 1, 2009 • 1.364 websites 12 Hva koster det å fikse sårbarhetene? • • The average custom business application has 150k to 250k lines of code -- Software Magazine Every 1k lines of code averages 15 critical security defects -- U.S. Department of Defense • That means there are an average of 2.25k security defects in every business application • The average security defect takes 75 minutes to diagnose and 6 hours to fix -- 5-year Pentagon Study • That’s 2.8k hours to diagnose the defects and 13.5k hours to fix them • Average worldwide cost of programmer = $40 per hour • That’s a cost of $112k to diagnose the defects and $540k to fix the defects k=1,000 -- F5 Networks 13 Hvor lang tid tar det å fikse sårbarhetene? Spring 2009 Website Security Statistics Report 14 Utviklere blir bedt om å gjøre det umulige…. Application Security? Application Patching Application Development Application Scalability Application Performance 15 Hvem er ansvarlig for applikasjons sikkerhet? Web developers? Network Security? Engineering services? DBA? 16 Tradisjonelle brannmurer 17 Kryptering gjør den tradisjonelle brannmuren “blind” 18 Perimeter Security er ikke tilstrekkelig 19 WAF: Web Application Firewall Intelligent Client Buffer Overflow Cross-Site Scripting SQL/OS Injection Cookie Poisoning Hidden-Field Manipulation L7 Application DoS Brute Force Logins Network Plumbing Traffic Mgt Firewall IDS-IDP Anti-Virus Application Error Messages Non-compliant Content Credit Card / SSN data Server Fingerprints HTTP/S Traffic User • • • • • Application Infrastructure App Firewall App Xcel Application Delivery Security Logs and reports all HTTP traffic Secures Applications Application content & context aware Bi-directional; request filtering & application cloaking App 20 Positiv vs Negativ Sikkerhet 21 Tradisjonelle sikkerhetsprodukter vs. WAF Known Web Worms Unknown Web Worms Known Web Vulnerabilities Unknown Web Vulnerabilities Illegal Access to Web-server files Forceful Browsing File/Directory Enumerations Network Firewall IPS WAF Limited X Limited Limited Partial X Limited X X Limited X X Limited Buffer Overflow Limited Limited Cross-Site Scripting Limited Limited Brute Force Login Attacks X X X X X X App. Security and Acceleration X SQL/OS Injection Cookie Poisoning Hidden-Field Manipulation Parameter Tampering Layer 7 DoS Attacks Limited X X X X X X 22 Web Application Protection Options • Only protects against known vulnerabilities • Difficult to enforce; especially with subcontracted code • Only periodic updated; large exposure window • • • • Best Practice Design Methods Automated & Targeted Testing Web Apps • Done periodically; only as good as the last test • Only checks for known vulnerabilities • Does it find everything? Web Application Firewall ASM Real-time 24 x 7 protection Layered security Allows immediate protection against new vulnerabilities Central point of enforcement for website security 23 Web Application Protection Options • Only protects against known vulnerabilities • Difficult to enforce; especially with subcontracted code • Only periodic updated; large exposure window • • • • Best Practice Design Methods Automated & Targeted Testing Web Apps Web Application Firewall ASM • Done periodically; only as good as the last test • Only checks for known vulnerabilities • Does it find everything? BIG-IP Application Security Manager Real-time 24 x 7 protection Layered security Allows immediate protection against new vulnerabilities Central point of enforcement for website security 24 BIG-IP Application Security Manager Powerful Adaptable Solution • Provides comprehensive protection for all web application vulnerabilities • Delivers out of the box security • Sees Application level performance • Logs and reports all application traffic and attacks • Educates admin. on attack type definitions and examples • Enables L2->L7 protection • Unifies security and acceleration services • Provides On-Demand scaling 25 Secure the applications and data Network and Protocol Attack Protection Selective Encryption Resource Cloaking and Content Security Application Security Manager (add-on module) Security at Application, Protocol and Network Level • Meet compliance requirements (PCI, HIPAA, etc.) • Strong protection without interrupting legitimate traffic “BIG-IP enabled us to improve security instead of having to invest time and money to develop a new more secure application” TechValidate 0C0-126-2FB Application Manager Global 5000 Media and Entertainment Company 26 Security Policy with Multiple security layers • RFC enforcement • Various HTTP limits enforcement • Profiling of good traffic: – Defined list of allowed file types, URI’s, parameters • Each parameter is evaluated separately for: – – – – Pre defined value Length Character set Attack patterns • looking for Pattern Matching Signatures • Responses are checked as well 27 Deployment without False positives • Predefined Policy Templates – Pre-configured security policies – Rapid deployment policy • Learning mode – Automatic or manual • Gradual deployment – Transparent / semi-transparent / full blocking 28 Layer 7 DoS/DDoS and Brute Force prevention Unique Attack Detection and Protection • Unwanted clients are remediated and desired clients are serviced • Improved application availability • Focus on higher value productivity while automatic controls intervene 29 Airline Inventory Vulnerable to Web Scraping • Ryanair – Stolen data, litigation costs, decreasing revenue – Wins injunction against Vtours GmBH – Forbids screen-scraping as commercial use* – Ryanair sent cease and desist letters to 300 sites • easyJet warns Expedia: 'Hands off our flights‘ 30 Protection from Web Scraping Remote users Dublin Datacenter Legitimate users see inventory while scrapers are remediated Frankfurt Datacenter IT Staff IT Staff Automated scraper Web Web Detect requests and determine web site is being scraped Domino Network Domino Network BIG-IP 8900 BIG-IP 6900 LTM/ASM LTM/ASM Solution Protects valuable intellectual property Prices are controlled and users see airline approved inventory Integrated scrape reporting for PCI compliance Avoid litigation drastically reducing legal costs Comprehensive reporting on scraping attacks 31 Attack Expert System in ASM v10.1 1. Click on info tooltip 32 Attack Type Details 2. Click on attack type 33 Reporting Features Executive View HTTP Response Splitting Command Execution Detection Evasion Parameter Tampering SQL –Injection Cross Site Scripting (XSS) XML Parser 34 GeoIP-location based reports 35 Improved PCI Compliance Reporting New PCI reporting: • Details security measures required by PCI DSS 1.2 • Compliancy state • Steps required to become compliant 36 Staging • ASM allows updated policies to be transparent for testing • No need to reduce current protection levels until ready • Staging allows policy testing in a live environment without committing to implement a new policy • Easy to stage policies with attack signatures, file types, URLs and parameters 37 ASM Platforms • Available as a module with BIG-IP LTM – 3600/3900/6400/6800/6900 also FIPS – 8400/8800/8900 – VIPRION • Standalone ASM on TMOS – 3600, 3900, 6900 and 8900 38 Oppsummering • L7 attacks are hackers favorites • Protecting web applications is a challenge within many organizations • ASM protects Web applications and provides easy configuration options • ASM provides PCI compliance reporting • ASM provides deep application visibility & reporting • ASM and WA secure and accelerate applications while achieving consolidation