INTRODUCTION TO SOA GATEWAYS: BEST PRACTICES, BENEFITS & REQUIREMENTS



Similar documents
Fundamentals of SOA Security Testing

IBM WebSphere Data Power SOA Applicances V3.8.1 Solution IMP. Version: Demo. Page <<1/10>>

AquaLogic Service Bus

Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems

Accelerate your SOA Projects through Service Simulation

Law, Ka Yee (2009) CRM adoption and its impact on organisational performance. PhD thesis, University of Nottingham.

Enterprise Data Protection

Project Plan. 1.0 Introduction. 2.0 Roles and Responsibilities. 3.0 Project Development Model

Service Virtualization: Managing Change in a Service-Oriented Architecture

CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282

TEXAS BOARD OF NURSING a. EDUCATION GUIDELINE Approval Process for a New Dean/Director/Coordinator, or New Interim Dean/Director/Coordinator

WebSphere Integration Solutions. IBM Day Minsk Anton Litvinov WebSphere Connectivity Professional Central Eastern Europe

Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security

Guide to Intel Rapid Storage

SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions

IONA Security Platform

An Oracle White Paper Dec Oracle Access Management Security Token Service

Cisco AON Secure File Transfer Extension Module

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

BlackRidge Technology Transport Access Control: Overview

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

CISCO ACE XML GATEWAY TO FORUM SENTRY MIGRATION GUIDE

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

Easy CramBible Lab DEMO ONLY VERSION Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

PRIVACY, SECURITY AND THE VOLLY SERVICE

Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs

How to Implement Enterprise SAML SSO

Reducing SOA Identity Fatigue through Automated Identity Testing

Building A Secure Microsoft Exchange Continuity Appliance

How To Reduce Pci Dss Scope

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

Introduction to SAML

Securely Deliver Remote Monitoring and Service to Critical Systems. A White Paper from the Experts in Business-Critical Continuity TM

Complying with PCI Data Security

Sentinet for Windows Azure SENTINET

Creating a Strong Security Infrastructure for Exposing JBoss Services

API Management: Powered by SOA Software Dedicated Cloud

Sentinet for BizTalk Server SENTINET

Guidance End User Devices Security Guidance: Apple OS X 10.9

OPENIAM ACCESS MANAGER. Web Access Management made Easy

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

Presented by Philippe Bogaerts Senior Field Systems Engineer Securing application delivery in the cloud

White Paper: Managing Security on Mobile Phones

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Privacy 101. A Brief Guide

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

Healthcare Security and HIPAA Compliance with A10

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities.

HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Security Considerations for DirectAccess Deployments. Whitepaper

Protecting Point-of-Sale Environments Against Multi-Stage Attacks

Achieving PCI Compliance Using F5 Products

Reducing Application Cost and Risk through Centralized SOA Security

Setting Up an AS4 System

Did you know your security solution can help with PCI compliance too?

Managing SOA Security and Operations with SecureSpan

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Securely Managing and Exposing Web Services & Applications

Exploring ADSS Server Signing Services

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Building on a Foundation for Growth: Integrating DLP with Message Security Infrastructure

Sentinet for BizTalk Server SENTINET 3.1

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions

Guidance End User Devices Security Guidance: Apple ios 7

The GlobalCerts TM Secur Gateway TM

Managed Encryption Service

The Benefits of SSL Content Inspection ABSTRACT

Publishing Enterprise Mobile Services

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications VIDYO

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

How To Protect Your Cloud From Attack

Contents Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Workflow/Business Process Management

SECURING SAP NETWEAVER DEPLOYMENTS WITH SAFE-T RSACCESS

Evaluate the Usability of Security Audits in Electronic Commerce

Cloud Computing and the Federal Government: Maximizing Trust Supporting the Mission and Improving Assurance with Data-centric Information Security

CA Federation Manager

VDI Security for Better Protection and Performance

Security Technology: Firewalls and VPNs

Managing SSL Security in Multi-Server Environments

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Inspection of Encrypted HTTPS Traffic

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation

Managed File Transfer

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

Security Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -

The Application Delivery Controller Understanding Next-Generation Load Balancing Appliances

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Enterprise SOA Strategy, Planning and Operations with Agile Techniques, Virtualization and Cloud Computing

Transcription:

INTRODUCTION TO SOA GATEWAYS: BEST PRACTICES, BENEFITS & REQUIREMENTS Learn best practices and common deployment scenarios of SOA Gateways and why they are an essential component of a secure, robust and scalable SOA deployment. I. OVERVIEW Modern web services-based Service O riented Architecture (SO A) enables service consum ers and producers to exchange m essages over ubiquitous standards such as XML and SO AP. Typically, com panies em bark on SO A projects for system-to-system integration within their corporate dom ains as well as with external trading partners. The success of a SO A deploym ent is m easured by the level of reuse of producer services. A well thought out SO A is flexible, loosely coupled and nim ble and enables consum er applications to rapidly integrate with published producer services. The driving force of a successful SO A to reuse producer services is usually at odds with security. Integration flexibility and security typically pull in diam etrically opposite directions. Integration pulls corporations towards "opening up" internal system s for other system s to call into whereas security pulls a com pany towards "locking down" business inform ation through access control and data privacy. For a successful SOA deploym ent, ease-of-system integration without com prom ising security is param ount. O verly strict security m odels can elim inate the ease-of-integration advantage and an overly open SO A deploym ent with little or no consideration for security is a recipe for disaster, especially where sensitive and valuable corporate data is involved. SO A Gateway products such as Forum Sentry (a FIPS and DoD Certified hardware appliance) and Radware AppXML provide the necessary balance between rapid integration and security that results in a successful SOA deploym ent. A SO A Gateway is a core infrastructure com ponent of a SO A deploym ent with the ability to integrate services securely. Typically deployed as a hardware appliance, a SO A Gateway seam lessly controls access to services, protects inform ation through data-level encryption, ensures the integrity of a m essage through signatures, and controls corporate inform ation flow. This article covers SOA Gateway deploym ent best practices, benefits and requirem ents with a focus on service virtualization, m essage privacy and integrity, and m essage control and auditing. II. BEST PRACTICE: ENABLE SERVICE VIRTUALIZ ATION AND CO NTRO L Description: Service Virtualization - the m ost im portant best practice of a SO A - is the ability to create a virtual service from one or m ore Web Services Description Language (WSDL) files generated by producer applications such as application servers, RDBMS, CRM and ERP system s. As shown in Figure 1 below, service virtualization across m ultiple producer system s is accom plished through an interm ediary SO A Gateway that sits between the producer and the consum er. Instead of directly im porting services from a variety of producer applications, consum er applications can im port virtualized services from an interm ediary SOA Gateway that aggregates and consolidates m ultiple back-end producer services into a single WSDL and a single entry point. Service virtualization enables enterprises to expose only specific business services required by a consum er rather than exposing all services from producer applications. O n requesting a WSDL from the interm ediary SO A Gateway, the consum er is presented with a set of virtual services that it is allowed to access. In the sam ple deploym ent shown in Figure 1 below, the "Internal" consum er is authorized to use services A-C and D,E from the producer Application Server and Business Application respectively. However, the "External" consum er, perhaps a supplier, is only allowed to use services B and F. Thus, a SO A Gateway acts as a central point of control that cloaks and safeguards producer services through access control policies and through virtualization only shows the services available to a consum er. 1

Figure 1: Enabling Service Virtualization through a SOA Gateway Benefits: Enabling Service Virtualization by using SOA Gateways has significant benefits including: Consistency: Virtualization enables service selection across m ultiple WSDLs and exposes only authorized services to clients as a coherent single WSDL. Security: The virtual WSDL can selectively expose som e of the services of the original WSDLs. The WSDL endpoints are cloaked with only the SO A Gateway endpoints being exposed. The SOA Gateway endpoints are protected through credential-based access control. Productivity: Service virtualization im proves productivity by enabling m ixing services across different producer services without having to copy and paste parts of the desired WSDLs into new WSDL files. It allows a custom er to be able generate a library of all the services supported by its organization and only expose the ones required for a particular custom er. Requirements: SO A Gateways require industry-hardened WSDL and schem a parsing to im port, aggregate and publish com plex WSDLs generated from a variety of application servers, RDBMs, and business applications. For enterprise-class service virtualization, a SO A Gateway is required to have the following essential features: Integration with existing Identity Management Systems: A SOA Gateway must have deep authentication and authorization-level integration with existing Identity Managem ent System s such as CA SiteMinder, Sun Access Manager, and HP Select Access for service access control. Identity Bridging: A SO A Gateway m ust have sophisticated identity token processing capabilities to intercept, process and convert credentials am ong a variety of protocol form ats (Basic Auth, SSL Mutual Auth) and content form ats (SAML, WS-Tokens, X.509 Tokens) for Authentication and Authorization decisions. Manage complex WSDLs: Ability to parse, m erge and adm inister m ultiple com pound WSDLs and schem as and avoid nam espace collisions while aggregating WSDLs from m ultiple system s. Deploying Service Virtualization with granular access control is crucial for a scalable SO A. The vices of free-for-all services can quickly set chaos within a SO A deploym ent. A SO A Gateway can control and m anage an increasingly com plex SO A deploym ent through service virtualization. Identity integration goes hand-in-hand with service virtualization. Leveraging existing identity infrastructure with 2

service-level access control is the m ost crucial best practice of a SO A deploym ent. The quality of a SO A Gateway integration with identity system s along with the gateway's perform ance optim ization features - such as intelligent credential caching - will determ ine the overall perform ance of a SOA deploym ent. III. BEST PRACTICE: ENFO RCE DATA-LEVEL PRIVACY AND INTEGRITY Description: Data-level privacy and integrity is the cornerstone of enterprise-class SO A. With SO AP/XML encryption and signature, confidentiality and integrity rem ain "always on" by being independent of transport protocols. With security now living within the SO AP/XML m essages, it does not m atter if the transport pipe HTTP, FTP, JMS between Web service consum ers, producers, or interm ediaries is SSL enabled. The protocol independent nature of SO AP/XML-based m essaging within a SO A decouples the m essages from protocol security such as SSL. In a SOA, messages traversing the enterprise may do so over non-secure protocols such as FTP and JMS. To ensure that a m essage retains its privacy and integrity, security has to live within the m essage through data-level encryption and signatures. By using WS-Security (an O ASIS security standard), m essages can be granularly encrypted/decrypted and signed/verified for ensuring privacy and integrity at the data level, independent of protocol security. Deploying a SO A Gateway to handle data-level encryption/decryption and signature/verification is a widely used industry best practice for ensuring strong privacy and integrity. Figure 2 below shows a typical SO A Gateway deploym ent for verifying and decrypting inbound m essages from a consum er that has first encrypted and then signed the m essage before sending it out to the producer services. The m essage is intercepted by the SO A Gateway that perform s a signature verification on the m essage to ensure that it has not been tam pered with and then decrypts the m essage before sending it to the back-end producer application. The SO A Gateway takes away the burden of signature verification and decryption from the producers and provides a central location for m aintaining security policies. Figure 2: Enabling Data-level message privacy and integrity. Benefits: Enabling Data-level privacy and integrity using SO A Gateways has significant benefits including: Consistency: By centralizing security policies and separating the security policies from the producer services, SO A Gateways provide a high-degree of policy consistency and control. Service im plem entations becom e independent of security policies that are centrally m anaged on the the 3

SOA Gateway. Security: Data-level security provides "data-at-rest" security over protocol-level security (SSL). Highly sensitive data within a m essage can be secured using strong cryptography whereas public data can be left as clear text. Data-level security is always-on, even when the m essage is at rest where it is m ost vulnerable. SO A Gateways provide protection of m essages in-flight through protocol security as well as security for messages at rest through granular data-level security. Productivity: By centralizing security policies to a SO A Gateway, developers building producer services need not worry about writing code for security policies. For exam ple, as shown in Figure 2, developers can focus on building core functionality rather than writing code that verifies and decrypts m essages - functionality that is handled by the SO A Gateway. With no coding required for such centralized security functions, the overall productivity of the SO A project increases significantly. Requirements: SO A Gateways have to be secure, robust, perform ant and highly interoperable in an enterprise-class environment where many internal and external systems are exchanging messages. For deploying privacy and integrity, a SO A Gateway m ust m eet the following requirem ents: Extensive Standards Support: A m essage encrypted has to be eventually decrypted. Sim ilarly, when an application signs a message, at some point, this message has to be verified to check for its integrity. WS-Security provides extensive standards support to ensure that when a system perform s a security operation, the inverse operation can be perform ed by the receiving entity. A SO A Gateway intercepts secured m essages from a variety of consum ers and has to perform inverse security functions on the m essages. Without an extensive standards-based im plem entation, the SO A Gateway would fail to process m essages from a broad array of consum ers. Robust PKI Management: Encryption/Decryption and Signature/Verification are based on Public Key Infrastructure (PKI). A SO A Gateway is required to support Key Life-cycle Managem ent such as Public-Private Key Generation, Enrollm ent and Revocation. For hardened security, SO A Gateways also use Hardware Security Modules (HSMs) to protect private keys used for m essage signature and decryption. Solid PKI Managem ent coupled with HSMs is a requirem ent for SO A Gateways deployed at the edge in a corporate DMZ. In highly senstive SO A deploym ents within, for exam ple, the Federal Governm ent and Financial institutions, only SO A Gateways that have been independently certified by non-com m ercial agencies should be considered. Hardware appliance-level FIPS and DoD/PKI are two certifications that are strongly recom m ended. Performance Acceleration: Cryptographic operations necessary for encryption/decryption and signature/verification are com putationally intensive operations and cannot scale with general purpose processors, specialized cryptographic processors are necessary. With a SO A Gateway m anaging such operations for m any service producers and consum ers, using hardware accelerators is required for a scalable architecture that does not add latency to m essage processing. Requiring developers to intertwine security policy code with their services is a failing long-term strategy. It puts trem endous m aintenance burdens on the service im plem entation and exposes SO A to security risks as well as interoperability pitfalls. Separating security policies from a service im plem entation and centralizing such policies using an interm ediary SOA Gateway ensures that the security holes are not inadvertently introduced by developers and the SO A deploym ent can be built up rapidly by decoupling security processing tasks from the producer services. IV. BEST PRACTICE: CONTROL AND AUDIT INFORMATION FLOW Description: In a well-built SO A, business inform ation flows effortlessly between applications. The applications are not only internal applications - one of the key benefits of SO A is that external partner applications can also be readily integrated with internal corporate systems for process automation. This ease of inform ation flow facilitated by a SOA puts significant m essage control and audit requirements on the infrastructure including message filtering and message archiving requirements. Message filtering ensures that nothing malicious enters a corporation through SOAP/XML channels. 4

Message filtering also prevents "inform ation leak" by ensuring that classified corporate inform ation such as financial and custom er inform ation or top secret m ilitary/defense inform ation is not stolen or inadvertently sent over outbound SO AP/XML m essages. In addition to m essage filtering, corporations are m andated by regulatory requirem ents to archive and store business transactions for auditing purposes. Regardless of regulatory m andates, it is a widely instituted best practice to control inbound and outbound m essages through filtering as well as archiving selected m essages for auditing purposes. As shown in Figure 3 below, a SO A Gateway provides filtering and archiving functionality by intercepting SO AP/XML m essages sent between consum ers and producers. The SO A Gateway intercepts and filters messages by performing deep-content inspection of the SOAP/XML messages. Selected messages can then be archived to an external RDBMS as a complete message or by extracting parts of the messages. Figure 3: Enabling information control through filtering and archiving. Benefits: Enabling inform ation control through a SOA Gateways has significant benefits including: Consistency: By centralizing m essage filtering and archiving policies, a consistent set of rules can be enforced across a SOA deploym ent for allowing or denying m essages in and out of a corporate network based on m essage payload. Messages can also be archived consistently based on business data within a m essage. Security: SOA Gateways act as SO AP/XML Firewalls that inspect inbound m essages for m alware and only let clean m essages through. Through deep content inspection, SO A Gateways provide security by ensuring that m alicious content is kept out and sensitive inform ation is prevented from leaving corporate dom ains. Productivity: Deploying a SO A Gateway rem oves the burden of building filtering and archiving functionality into consum er and producer applications. With sim ple, code-free policy authoring for m essage control and archiving, SOA Gateway adm inistrators can rapidly author policies freeing developers to focus on building business functionality. Requirements: SOA Gateways have to filter, control and archive m essages between consum ers and producers seam lessly for m essages traversing a SO A. For deploying filtering and archiving, a SOA Gateway m ust m eet the following requirem ents: Bi-directional Message Control: Both inbound and outbound SO AP/XML m essages have to be 5

handled by the SO A Gateway. Typically, inbound m essages are checked for m alware, validated and then archived to an off-board RDBMS. O utbound m essages are usually checked for sensitive inform ation before they are perm itted out of the corporate dom ain. Granular Message Capture: SOA Gateways should have the ability to capture full m essages and store them in an external database and also have the ability to select any elem ent-level information from a SOAP/XML message and store this information in the database as well. Flexible Configuration: SOA Gateways should provide a high degree of flexibility in configuring policies for filtering and archiving m essages. Message should be selected for filtering and archiving on any criteria driven from m essage content. SO A Gateways should be able to archive m essages on arrival, at any stage of processing such as encryption, signature or m essage enrichm ent and then archive processed m essages again so that m ultiple snapshots along the message processing may be captured for auditing and analysis. One common best practice is to sign and store all inbound and outbound m essages for preserving a detailed m essage trail. SO AP/XML m essages can contain com plex content including binary attachm ents that should be scanned before allowing the m essages to reach corporate back office system s that handle essential business transactions. Sim ilar to em ail system s that check for m essage size and content, SO A Gateways should be deployed in a network to ensure that only good m essages are perm itted in and that sensitive inform ation that is not authorized to leave a corporation are prevented from leaking out of corporate boundaries. Messages should be signed and stored through a robust archiving process for ongoing auditing and data analysis. V. CONCLUSIONS A SO A Gateway is a core infrastructure com ponent of a SO A with the ability to integrate services securely. Typically deployed as a hardware appliance, a SO A Gateway seam lessly controls access to services, protects inform ation through data-level encryption, ensures the integrity of a m essage through signatures, and controls corporate inform ation flow. A SO A Gateway enables SO AP/XML m essaging across a variety of transport protocol such as HTTP, MQ Series, FTP, or JMS with protocolm ixing am ongst the protocols. In m ost deploym ents, SO A professionals choose to use SO A Gateways as hardware-based network appliances prim arily for the following reasons: Ease of Deployment: SOA Gateways are easy to install in a network as a snap-on appliance. Appliance-based SO A Gateways elim inate the need to install software packages and operating system patches and enable technologist to focus on configuring business policies. Centralized Policy Management: SOA Gateways provide centralize policy m anagem ent rem oving the burden of security policies from service developers. Keeping such policies separate from developers, enables better on-going policy m anagem ent, security and developer efficiency. Superior Performance: Hardware-based SO A Gateways process SO AP/XML m essages faster than software based solutions. For resource-intensive processing such as m essage encryptiondecryption, signature-verification, filtering, transform ation and access control, hardware-based SO A Gateways provide exceptional m essage throughput for enterprise-class scalability. SO A Gateways add significant productivity to project team s by providing code-free configuration of policies and by freeing up developm ent team s to focus on building core business functionality instead of developing code for security policies, m essage control and service aggregation. Enterprises serious about cutting costs and increasing revenue through service reuse and rapid system-to-system integration must deploy a robust, secure and flexible SOA Gateway for efficient message processing. 6