MESSAGING SECURITY USING GLASSFISH AND OPEN MESSAGE QUEUE



Similar documents
Architecture Rules Enforcement and Governance Using Aspects

CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS

Oracle WebLogic Server 11g Administration

JVA-122. Secure Java Web Development

GlassFish Security. open source community experience distilled. security measures. Secure your GlassFish installation, Web applications,

enterprise^ IBM WebSphere Application Server v7.0 Security "publishing Secure your WebSphere applications with Java EE and JAAS security standards

COM 440 Distributed Systems Project List Summary

FUSE-ESB4 An open-source OSGi based platform for EAI and SOA

Open Message Queue. Administration Guide Release 5.0

Oracle WebLogic Server 11g: Administration Essentials

Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus

Framework Adoption for Java Enterprise Application Development

Executive summary. Table of Contents. Benefits of an integration platform. Technical paper Infor Cloverleaf Integration Suite

Configuring Security Features of Session Recording

WebSphere Training Outline

Glassfish Architecture.

WebSphere Server Administration Course

This training is targeted at System Administrators and developers wanting to understand more about administering a WebLogic instance.

IBM WebSphere Server Administration

Basic TCP/IP networking knowledge of client/server concepts Basic Linux commands and desktop navigation (if don't know we will cover it )

Universal Event Monitor for SOA Reference Guide

SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions

JBS-102: Jboss Application Server Administration. Course Length: 4 days

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 5

Chapter 17. Transport-Level Security

FileCloud Security FAQ

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

IBM InfoSphere MDM Server v9.0. Version: Demo. Page <<1/11>>

5 Days Course on Oracle WebLogic Server 11g: Administration Essentials

Spoilt for Choice Which Integration Framework to choose? Mule ESB. Integration. Kai Wähner

WELCOME TO Open Source Enterprise Architecture

Oracle SOA Suite Then and Now:

BEA AquaLogic Service Bus and WebSphere MQ in Service-Oriented Architectures

Exam Name: IBM InfoSphere MDM Server v9.0

No.1 IT Online training institute from Hyderabad URL: sriramtechnologies.com

Introduction to Sun ONE Application Server 7

Learn Oracle WebLogic Server 12c Administration For Middleware Administrators

Develop HIPAA-Compliant Mobile Apps with Verivo Akula

Oracle WebLogic Foundation of Oracle Fusion Middleware. Lawrence Manickam Toyork Systems Inc

Sichere Software- Entwicklung für Java Entwickler

ERserver. iseries. Securing applications with SSL

Creating a Strong Security Infrastructure for Exposing JBoss Services

SECURITY COMPARISON BETWEEN IBM WEBSPHERE MQ 7.5 AND APACHE ACTIVEMQ 5.9

RED HAT JBOSS FUSE. An open source enterprise service bus

Using BroadSAFE TM Technology 07/18/05

Cloudbuz at Glance. How to take control of your File Transfers!

WebLogic Server 11g Administration Handbook

JBI and OpenESB. Introduction to Technology. Michael Czapski Advanced Solutions Architect, SOA/BI/Java CAPS Sun Microsystems, ANZ

LDAPCON Sébastien Bahloul

WEBSPHERE APPLICATION SERVER ADMIN V8.5 (on Linux and Windows) WITH REAL-TIME CONCEPTS & REAL-TIME PROJECT

Deploying to WebSphere Process Server and WebSphere Enterprise Service Bus

CERTIFIED MULESOFT DEVELOPER EXAM. Preparation Guide

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Open Message Queue. Technical Overview Release 5.0

Avio BPM Solutions and Frameworks

CloudCERT (Testbed framework to exercise critical infrastructure protection)

The future of middleware: enterprise application integration and Fuse

Xerox DocuShare Security Features. Security White Paper

PASS4TEST 専 門 IT 認 証 試 験 問 題 集 提 供 者

APAC WebLogic Suite Workshop Oracle Parcel Service Overview. Jeffrey West Application Grid Product Management

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Oracle Database Security and Audit

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

Centralized Oracle Database Authentication and Authorization in a Directory

Contents 1 Overview 2 Introduction to WLS Management Services iii

Security Policy Revision Date: 23 April 2009

Oracle Identity Analytics Architecture. An Oracle White Paper July 2010

A Pluggable Security Framework for Message Oriented Middleware

Building a Reliable Messaging Infrastructure with Apache ActiveMQ

GoodData Corporation Security White Paper

End to end security for WebSphere MQ

A Client Story: PCI Compliance with WebSphere MQ Advanced Message Security

TIBCO Spotfire Statistics Services Installation and Administration. Release 5.5 May 2013

Management. Oracle Fusion Middleware. 11 g Architecture and. Oracle Press ORACLE. Stephen Lee Gangadhar Konduri. Mc Grauu Hill.

Oracle Exam 1z0-102 Oracle Weblogic Server 11g: System Administration I Version: 9.0 [ Total Questions: 111 ]

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Managed File Transfer

A Survey Study on Monitoring Service for Grid

Apigee Gateway Specifications

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

TIBCO Spotfire Statistics Services Installation and Administration Guide

1Z Oracle Weblogic Server 11g: System Administration I. Version: Demo. Page <<1/7>>

Network Security Essentials Chapter 5

Oracle Data Integrator 11g New Features & OBIEE Integration. Presented by: Arun K. Chaturvedi Business Intelligence Consultant/Architect

A Beginners Guide to Fusion Middleware

Tableau Online Security in the Cloud

Server-side OSGi with Apache Sling. Felix Meschberger Day Management AG 124

PRIVACY, SECURITY AND THE VOLLY SERVICE

Data Security and Governance with Enterprise Enabler

DRAFT Standard Statement Encryption

WebSphere Application Server - Introduction, Monitoring Tools, & Administration

SOA REFERENCE ARCHITECTURE: SERVICE TIER

Contents. Client-server and multi-tier architectures. The Java 2 Enterprise Edition (J2EE) platform

How To Secure Your Data Center From Hackers

Oracle public Database and Java Cloud for Trials

GlassFish v3. Building an ex tensible modular Java EE application server. Jerome Dochez and Ludovic Champenois Sun Microsystems, Inc.

Chapter 7 Transport-Level Security

Transcription:

MESSAGING SECURITY USING GLASSFISH AND OPEN MESSAGE QUEUE OWASP AppSec USA 2011 Conference (@appsecusa / hashtag: #appsecusa) Srini Penchikala (@srinip) 09.23.11

GOALS AND SCOPE Goals: Messaging security architecture & design considerations and best practices How to use NoSQL Databases for some messaging security use cases Is Not: Security vulnerabilities talk Is: Focus on application security in messaging: Authentication & authorization Message encryption Logging and monitoring Code examples on messaging security aspects (Java based) Target Audience: Architects, Application Developers, and Security Ops Format: 45 min presentation + 5 min Q&A Demo Application (Java) 2

ABOUT THE SPEAKER Security Architect Certified Scrum Master Author, Editor (InfoQ) IASA Austin Chapter Leader Detroit Java User Group Leader (past) Working with Java since 1996, JEE (2000), SOA (2006), Security (2007) & PPT since 03/2011 Current: Agile Security Architectures, NoSQL Security, Domain-Driven Security Design, Security Architecture Enforcement, Model Driven Development Future: Role of DSL in Architecture Enforcement, NoSQL Security Tools and Frameworks 3

BEFORE WE START How many are currently using messaging in their applications? How many are currently working in security architecture or development? Any regulatory compliance requirements (Federal, State, Local, or Finance related)? 4

BACKGROUND Financial services J2EE security model Agile software development Regulatory compliance and its impact on IT Software architecture 5

AGENDA Messaging and Security Authentication Authorization Message Security and Encryption Logging Monitoring Best Practices Conclusions 6

AGENDA Messaging and Security Authentication Authorization Message Security and Encryption Logging Monitoring Best Practices Conclusions 7

MESSAGING ARCHITECTURE Asynchronous Communication Message-Oriented Middleware (MOM) pattern Java Message Service (JMS) Architecture Components: Broker Connection Destination (Queue or Topic) Transactions Message Enterprise Integration Patterns* 8 *Source: http://www.eaipatterns.com/toc.html

MESSAGING SECURITY CONSIDERATIONS Current state: Not enough focus on the middleware Authentication Role Based Access Control Message Encryption Transport Layer Security Message Persistence Secure Logging and Auditing Secure Message Monitoring Standards based administration (JMX) Availability Broker clustering Automatic reconnect Connection event notification 9

TECHNOLOGIES GlassFish (v3.1) Java EE 6 compliant application server Open source and commercial versions Open Message Queue (v4.5) Implements JMS standard Stand-alone service or deployed in an application server Standard JMS Provider in GlassFish Server Supports messaging security at various levels Broker clusters (conventional and enhanced clusters) Spring Integration Framework Secure message channel (role based access) 10

SAMPLE DEMO APPLICATION Technologies: GlassFish 3.1 Application Server Open MessageQueue Neo4J (authentication and authorization) MongoDB (persistence and logging) Spring Data Framework Spring Integration Aspect-oriented Programming Tools: JDK 1.6 Eclipse 11

SAMPLE APPLICATION ARCHITECTURE JMX Client Client SOAP Client AuthN/ AuthZ OpenMQ Server Msg Persistence in DB Logging Mongo DB Neo4J DB Mongo DB 12

AGENDA Messaging and Security Authentication Authorization Message Security and Encryption Logging Monitoring Best Practices Conclusions 13

AUTHENTICATION Authentication Flat file repository LDAP authentication JAAS-based authentication Per broker repository NoSQL database for storing user profiles Graph databases (Neo4J) 14

JAAS AND MESSAGE QUEUE 15 Source: OpenMessage Queue 4.5 Administration Guide

AGENDA Messaging and Security Authentication Authorization Message Security and Encryption Logging Monitoring Best Practices Conclusions 16

AUTHORIZATION Users and groups Pre-defined groups admin user anonymous Access control events Connecting to a broker Creating a message producer or consumer Auto-creating or browsing a queue destination Configuration based accesscontrol.properties 17

AUTHENTICATION AND AUTHORIZATION 18 Source: OpenMessage Queue 4.5 Administration Guide

AGENDA Messaging and Security Authentication Authorization Message Security and Encryption Logging Monitoring Best Practices Conclusions 19

MESSAGING SECURITY Broker Level (Connection) Destination Level Message Level 20

ENCRYPTION Encrypted client-broker communication SSL based connection service Connection service types ssljmsservice (TCP/IP) httpsjms (HTTPS Tunnel Servlet with HTTP protocol) ssladmin (TCP/IP) Cluster connection service JMX connector (RMI over TCP) 21

ENCRYPTION BEST PRACTICES Symmetric Key Algorithms: AES with minimum 128 bit key length Hash Functions: SHA-256 Always use a salt value (salted SHA, SSHA) especially for passwords to defend against rainbow table attacks Asymmetric or Public Key Algorithms: rdsa with 1024 bit minimum key length Data Integrity: Data Integrity/Data Signature or Message Authentication Code HMAC (hash function-based message authentication code) Use any underlying hashing algorithm since HMACs are substantially less affected by the potential for collisions that the related hashing functions alone Secure Network Communication: SSLv3 or TLS to ensure the encrypted transmission of data between systems Security Standards Java API: OWASP s ESAPI libraries 22

MESSAGE PERSISTENCE Configurable persistence File or JDBC-based data store Securing a JDBC persistence store NoSQL DB for persistence (MongoDB) 23

PERSISTENCE OPTIONS 24 Source: OpenMessage Queue 4.5 Administration Guide

AGENDA Messaging and Security Authentication Authorization Message Security and Encryption Logging Monitoring Best Practices Conclusions 25

SECURITY LOGGING AND AUDITING Event management (SIEM) and forensics Critical for regulatory compliance (SOX, HIPAA, PCI, FISMA) Log events Startup, shutdown, restart, and removal of broker User authentication and authorization Reset of a persistent store Creation, purge, and destruction of destinations Administrative destruction of durable subscribers Message Queue audit logging JAAS based audit logging Performance: MongoDB Logger 26

SECURITY LOGGING CONSIDERATIONS What data needs to be logged for security analytics purposes? What should be the log format for business v. security logs? Do we need to store the security logs in a different file (a new log4j appender) so only authorized users (admin) will have access to it? How would the logs work with SIEM tool (if applicable)? 27

AGENDA Messaging and Security Authentication Authorization Message Security and Encryption Logging Monitoring Best Practices Conclusions 28

MONITORING Standards: JMX Remote JMX Secure JMX Tools: JConsole/VisualVM 29

MONITORING MESSAGING COMPONENTS Messaging components Broker Connections Destinations Producers Consumers Messages Monitoring Tools: VisualVM Open MQ Administration Console Any standards based monitoring tool (e.g. JMX for Java) 30

MONITORING SERVICES 31 Source: OpenMessage Queue 4.5 Administration Guide

DEMO 32

AGENDA Messaging and Security Authentication Authorization Message Security and Encryption Logging Monitoring Best Practices Conclusions 33

BEST PRACTICES Separation of messaging logic from application & business logic Messaging code should be agnostic to MQ container Declarative v. Programmatic message security Emerging trends in messaging architecture Light-weight and Agile message brokers Embedded brokers (for unit testing) Built-in security, monitoring and clustering Build in security logging and monitoring capabilities into the product as a feature Involve Dev & Ops from early phases of project lifecycle 34

AGENDA Messaging and Security Authentication Authorization Message Security and Encryption Logging Monitoring Best Practices Conclusions 35

CONCLUSIONS Messaging security is critical Message at rest, in transit and in use Messaging security considerations Authentication, Role Based Access, Encryption Logging and Monitoring Messaging security support in Open MQ container Role of NoSQL DBs in messaging security use cases One Size Fits All fits nothing 36

RESOURCES Messaging Patterns Java Message Service (JMS) Open Message Queue Java Management Extensions (JMX) Technology Open Message Queue 4.5 Administration Guide Glassfish Samples GlassFish Server Open Source Edition 3.1 Security Guide GlassFish Server Open Source Edition 3.1 Administration Guide 37

THANK YOU Thank you Contact Information http://www.infoq.com/author/srini-penchikala srinipenchikala@gmail.com @srinip http://srinip2007.blogspot.com Questions? 38

BONUS SLIDES

SECURITY IMPLEMENTATION AND ENFORCEMENT USING AOP Implement messaging security using Aspects Architecture: Separate security event logic from application and business logic Tools & Technologies: ActiveMQ MongoDB Esper AspectJ and SpringAOP Demo 40

INTEGRATING SOAP AND MESSAGEQUEUE 41