NIST s Guide to Secure Web Services



Similar documents
Guide to Secure Web Services

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

WEB SERVICES SECURITY

Run-time Service Oriented Architecture (SOA) V 0.1

The Use of Service Oriented Architecture In Tax and Revenue

Web Services Security: What s Required To Secure A Service-Oriented Architecture. An Oracle White Paper January 2008

A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

Web Service Security Vulnerabilities and Threats in the Context of WS-Security

This Working Paper provides an introduction to the web services security standards.

Using WS-Federation and WS-Security for Identity Management in Virtual Organisations

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Software Requirement Specification Web Services Security

Service Oriented Architecture

Authentication and Authorization Systems in Cloud Environments

Trusting XBRL: Using the Liberty Web Services Framework to Secure and Authenticate XBRL Documents

Introduction to Service Oriented Architectures (SOA)

A Service Oriented Security Reference Architecture

Federated Identity Management Solutions

Chapter 12 GRID SECURITY ARCHITECTURE: Requirements,fundamentals, standards, and models

Web Services and Service Oriented Architectures. Thomas Soddemann, RZG

An Open Policy Framework for Cross-vendor Integrated Governance

Service Virtualization: Managing Change in a Service-Oriented Architecture

Securely Managing and Exposing Web Services & Applications

The Global Justice Reference Architecture (JRA) Web Services Service Interaction Profile

Redbook Overview Patterns: SOA Design with WebSphere Message Broker and WebSphere ESB

Quality Model for Web Services

AquaLogic Service Bus

Szolgáltatásorientált rendszerintegráció. WS-* standards

CS 356 Lecture 28 Internet Authentication. Spring 2013

CHAPTER - 3 WEB APPLICATION AND SECURITY

Network Security. Chapter 10. Application Layer Security: Web Services. Part I: Introduction to Web Services

Federated Service Oriented Architecture for Effects-Based Operations

Web Services Standards: obix in the wider XML Web Services context

Federated Identity and Trust Management

Securing Web Services From Encryption to a Web Service Security Infrastructure

Service-Oriented Computing and Service-Oriented Architecture

Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems

Digital Signature Web Service Interface

Research on the Model of Enterprise Application Integration with Web Services

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Service-Oriented Architecture and its Implications for Software Life Cycle Activities

The Role of Identity Enabled Web Services in Cloud Computing

Table of Contents. 1 Executive Summary SOA Overview Technology Processes and Governance... 8

Biometric Single Sign-on using SAML Architecture & Design Strategies

Identity Federation Broker for Service Cloud

An Oracle White Paper Dec Oracle Access Management Security Token Service

1 What Are Web Services?

1 What Are Web Services?

Service-Oriented Architectures

Secure Semantic Web Service Using SAML

APIs The Next Hacker Target Or a Business and Security Opportunity?

An Oracle White Paper November Oracle Primavera P6 EPPM Integrations with Web Services and Events

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

Creating Web Services in NetBeans

Business Rule Standards -- Interoperability and Portability

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

David Pilling Director of Applications and Development

Managing SOA Security and Operations with SecureSpan

Strategic Information Security. Attacking and Defending Web Services

Java Security Web Services Security (Overview) Lecture 9

Getting Started with Service- Oriented Architecture (SOA) Terminology

SOA Fundamentals For Java Developers. Alexander Ulanov, System Architect Odessa, 30 September 2008

Presentation Outline. Key Business Imperatives Service Oriented Architecture Defined Oracle SOA Platform SOA Maturity/Adoption Model Demo Q&A

Securing Web Services with WS-Security

Interoperable Provisioning in a Distributed World

Leveraging Service Oriented Architecture (SOA) to integrate Oracle Applications with SalesForce.com

Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus

CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282

Server based signature service. Overview

XML Signatures in an Enterprise Service Bus Environment

Flexible Identity Federation

Secure Identity in Cloud Computing

Security in the PEPPOL

Architectural Requirements for an SOA Based on Web Services. Jim Bole VP, Engineering Infravio, Inc. April 23, 2003

Biometric Single Sign-on using SAML

SECURITY ARCHITECTURES. Service Oriented Security Architecture. Gunnar Peterson

REST and SOAP Services with Apache CXF

Transcription:

NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95: Guide to Secure Web Services. Aug 2007. Ingham, D., et al. Constructing Dependable Web Services. IEEE Internet Computing, Jan/Feb 2000. Moser, L., et al. Making Web Services Dependable. 2006 International Conference on Availability, Reliability, and Security (ARES 06). 1

Goals Give a broad overview of field (secure and dependable web services) Provide challenges and open problems in research Outline Introduction to Web Services Web Security Dimensions Attacks to Web Services Web Service Security Functions Challenge and Open Problems 2

Introduction to Web Services WS: Software system designed to support interoperable machine to machine interaction over a network [W3C] Ex: Web APIs accessed over a network and executed remotely Introduction to Web Services Make a collection of software services accessible via standardized protocols whose functionality can be automatically discovered and integrated into applications (loosely coupled) Allows WS to dynamically bind to other WS at run-time, depending on needs of user or app Allows data and apps to interact (no human intervention) through dynamic and ad hoc connections 3

A Few More Acronyms to Your Vocabulary OWL-S: Ontology Web Language for Services SOA: Service Oriented Architecture SOAP: Service Oriented Architecture Protocol SAML: Security Assertion Markup Language UDDI: Universal Description, Discovery and Integration WSDL: Web Services Description Language XACML: extensible Access Control Markup Language Introduction to Web Services Components of a SOA application Discovery UDDI / WSDL Messaging Portals Roles Coordination 4

Introduction to Web Services Components of a SOA application Discovery Messaging SOAP (XML) Portals Roles Coordination Introduction to Web Services Components of a SOA application Discovery Messaging Portals Roles Coordination 5

Introduction to Web Services Components of a SOA application Discovery Messaging Portals Roles Requester Intermediary Provider Coordination Introduction to Web Services Components of a SOA application Discovery Messaging Portals Roles Coordination Orchestration Choreography 6

Introduction to Web Services Components of a SOA application Discovery Messaging Portals Roles Coordination Orchestration Choreography Outline Introduction to Web Services Web Security Dimensions Attacks to Web Services Web Service Security Functions Challenge and Open Problems 7

WS Security Dimensions Secure Messaging SOAP was not designed with security in mind Possible approaches: HTTP over SSL, XML Encryption and XML Signature, WS-Security Protecting Resources WS are intended to be accessible only to authorized requesters Protection involves more than just access control (disruption, mitm, eavesdropping, impersonating) WS Security Dimensions Negotiation of Contracts WS should automatically negotiate and agree upon contracts (ebxml, WSDL) No standards that support enforcement of implicit contracts (WSDL) QoP: Only some support for negotiating security requirements Area of research: Semantic Web Services Architecture (SWSA) 8

WS Security Dimensions Trust Relationships Currently limited to trust of the service identity Architecture models: Pairwise trust Each WS is provided the sec info of all other WS Brokered trust Uses TTP, WS should be designed with this in mind Federated trust WS from different organizations can interact Perimeter defense XML gateways placed between providers and requesters WS Security Dimensions Protection Some Pitfalls XML Encryption / XML Signature: no std for informing recipients how were applied to message of Contracts Management 9

Web Services Security Standards Web Services Example 10

Attacks to Web Services Reconnaissance Attacks Code Templates Forceful Browsing Attack Directory Traversal Attack WSDL Scanning Registry Disclosure Attack Privilege Escalation Attack Dictionary Attack Attacks to Web Services 11

Outline Introduction to Web Services Web Security Dimensions Attacks to Web Services Web Service Security Functions Challenge and Open Problems Web Service Security Functions Service-to-Service Authentication Identity Management Establishing Trust between Services Describing Web Services Policies (WS- Policy) Distributed Authorization and Access Management Confidentiality and Integrity of Service to Service Interchanges Accountability End-to-end throughout a Service Chain Availability of WS Securing the Discovery Service 12

Identity Management An Identity Management System (IDMS) is responsible for Verifying identities of entities Registering them Issuing them digital identifiers Identity Management Three major identity architectures for WS Isolated identity management Credential and identity providers are merged Service must know for all requesters (scalability issue) Federated identity management Group of providers agrees to recognize user ids from one another More feasible in a single enterprise-wide SOA Centralized identity management Rely on single TTP to provide credentials/identifiers Single point of failure 13

Establishing Trust between Services Trust relationships need to be established between remote WSs for SAML or WS-Security to be useful on a large scale Trust models like Kerberos have worked well for a single organization Pairwise trust circle Each entity that is authorized to communicate with another must share its key information (unscalable) Brokered trust model TTP is used to exchange key information between services to communicate Community trust model Relies on an external PKI for establishing trust Establishing Trust between Services Practical approaches for federation of trust Liberty Alliance Provides both Web app and WS federation using SAML to perform trust brokering Suitable for businesses and governments WS-Federation Allows different security realms to federate by defining trust brokers, who will validate security tokens used between WS using WS-Trust (tokens) 14

Describing Web Services Policies (WS-Policy) Extension to WSDL, allows to express capabilities, requirements and characteristics of WS WSDL is limited to describing what is included in the message itself WS-Policy requirement types On the wire (WS-Sec encryption, signature) Abstract (QoS, privacy) WS-Policy expression contains a set of policy alternatives encompassing sets of assertions Policy expressions are external to metadata stored in UDDI and WSDL, need distribution mechanism WS-MetadataExchange or WS-PolicyAttachment Describing Web Services Policies (WS-Policy) Specifications defining WS-Policy assertions WS-SecurityPolicy defines assertions to specify integrity, confidentiality, and information about security tokens WS-RM Policy defines assertions that can be used to specify how a WS uses WS-Reliable Messaging WS-Addressing WSDL Binding defines elements that can be used within a WSDL descriptor to specify the use of WS-Addressing 15

Describing Web Services Policies (WS-Policy) Describing Web Services Policies (WS-Policy) 16

Availability of WS Availability is intended to ensure that QoS and reliability are maintained even under intentional attempts to compromise the WS operation (DoS) Recognize and react to DoS patterns Constrain and isolate the DoS attack Recover and resume secure operation after DoS Necessary to include redundancy, error handling capabilities and defensive techniques Most common accidental threats Service recursion Service deadlock Availability of WS Failover UDDI supports listing multiple URIs for each WS Makes the UDDI registry the point of failure UDDI supports replication QoS Expected level of performance Most WS do not provide guarantees for QoS In distributed deadlock, a WS may lead entire choreography stalling 17

Outline Introduction to Web Services Web Security Dimensions Attacks to Web Services Web Service Security Functions Challenge and Open Problems Challenge and Open Problems Security remains a major challenge, in the presence of dynamic composition and heterogeneity in large, autonomous and untrusted environments Shift from old paradigm of Alice and Bob Alice Bob 18

Challenge and Open Problems Service description, automatic service discovery, and QoS Make WS simpler? Feasible? Secure issuance of credentials Repudiation of transactions Few logging implementations that can be used across an entire SOA Relationship between contracts and federated identity management Challenge and Open Problems DoS attacks Protection from DoS attacks that exploit vulnerabilities unique to WS (discovery service) Spread of malware Compromised services Functional integrity of WS that requires the establishment of trust between services on transaction-by-transaction basis Confidentiality and integrity of data transmitted via WS protocols in service-to-service transaction Exploitation of covert channels 19

NIST s Guide to Secure Web Services Thanks! Happy Halloween 20