Advanced Protection for Web Services



Similar documents
Configuring Additional Active Directory Server Roles

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out

Security Functions and Purposes of Network Devices and Technologies (SY0-301) Firewalls. Audiobooks

(VCP-310)

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues

QUADRO tech. PST Flightdeck. Put your PST Migration on autopilot

FortiGuard Fortinet s Global Security Research and Protection

Skytron Asset Manager

Domain 1: Configuring Domain Name System (DNS) for Active Directory

June 3, Voice over IP

QUADRO tech. FSA Migrator 2.6. File Server Migrations - Made Easy

BaanERP. BaanERP Windows Client Installation Guide

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV)

How to use what you OWN to reduce what you OWE

Domain 1 Components of the Cisco Unified Communications Architecture

E-Plex Enterprise Access Control System

client communication

Engineering Data Management

Domain 1: Designing a SQL Server Instance and a Database Solution

FUEL / VEHICLE TRACKING UNIT GPS tracking and fuel monitoring solution providers

FPO. A global telecom s strategy. for Canada

RightFax Express. One solution. Multiple choices.

Radio Dispatch Systems

IT Support n n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user

Ethernet Option Board

Your organization has a Class B IP address of Before you implement subnetting, the Network ID and Host ID are divided as follows:

InventoryControl. The Complete Inventory Tracking Solution for Small Businesses

Firewall VPN Router. Quick Installation Guide M73-APO09-380

CCH Document Management

RELEASE GUIDE. VirusScan Enterprise VERSION 7.0

Document Control Solutions

iprox sensors iprox inductive sensors iprox programming tools ProxView programming software iprox the world s most versatile proximity sensor

Proxies. Chapter 4. Network & Security Gildas Avoine

Managing deliverability. Technical Documentation Adobe Campaign v6.1

3G Security VoIP Wi-Fi IP Telephony Routing/Switching Unified Communications. NetVanta. Business Networking Solutions

The future of global data management is here: modular, scalable and integrated. MasterCard smartdata.gen2

ODBC. Getting Started With Sage Timberline Office ODBC

Symantec AntiVirus for Network Attached Storage Integration Guide

Agency Relationship Optimizer

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Baan Service Master Data Management

>7011AUPS UNINTERRUPTIBLE P O W E R SUPPLIES

CCH Accountants Starter Pack

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Ensuring ing platform deliverability. Neolane v6.0

Introduction to Computer Security Benoit Donnet Academic Year

Securing your business

Ideate, Inc. Training Solutions to Give you the Leading Edge

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

OfficePACS. Digital Imaging

Alliance and Technology unit. White Paper. A Comparative Analysis of Application Integration Tools on Microsoft Azure Platform

Securing the Virtualized Data Center with Next-Generation Firewalls

SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management.

IntelliSOURCE Comverge s enterprise software platform provides the foundation for deploying integrated demand management programs.

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

Composable Tools For Network Discovery and Security Analysis

TruStore: The storage. system that grows with you. Machine Tools / Power Tools Laser Technology / Electronics Medical Technology

France caters to innovative companies and offers the best research tax credit in Europe

ContactPro Desktop for Multi-Media Contact Center

A Balanced Scorecard

SQL Server 2008 Implementation and Maintenance (70-432) LearnSmart Exam Manual

Intrusion Detection Systems (IDS)

Equalizer Installation and Administration Guide

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Multi-Homing Dual WAN Firewall Router

Firewall Firewall August, 2003

Things Your Next Firewall Must Do

Chapter 15. Firewalls, IDS and IPS

HP Asset Manager. Software version: Service Asset and Configuration Management

Secure Web Appliance. Reverse Proxy

NEFSIS DEDICATED SERVER

Architecture Overview

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Domain 1 - Describe Cisco VoIP Implementations

Mobile CE App Development

L5352 Ethernet Communications Interface

leasing Solutions We make your Business our Business

Basic & Advanced Administration for Citrix NetScaler 9.2

Verizon Wireless Broadband Network Connectivity and Data Transport Solutions. Verizon Wireless White Paper

Is Your Data Recovery Solution a Data Security Problem? How to Protect Your Critical Data When Working With a Data Recovery Vendor

Ranch Networks for Hosted Data Centers

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Transcription:

RealSetry TM SSL overview Advaced Protectio for Web Services SSL Accelerator Itrusio Detectio System Reverse Proxy Applicatio-Firewall

Web services deploymet The pricipal reasos which delay the deploymet of web techologies Techology with a poor level of security Isufficiet XML kowledge Immaturity of stadards Not i adequatio with compay s eeds No vedor leader clearly idetified Not eough tools Youg ad ustable techology 24,4 % 22,2 % 31,9 % 31,1 % 30,4 % 37,8 % 43 % This survey was carried out i ovember 2001 with 135 frech compaies (Source: 01 Iformatique)

How to protect Web Servers today? Vulerability Scaer (ASP service) NIDS WEB Servers DMZ NIDS Iteret FIREWALL with IDS aget Today, the best solutio uses three compoets : Firewall : To forward oly HTTP(S) packets to Web servers Network-based Itrusio Detectio System (NIDS) : To prevet from malicious packets Vulerability scaer : To detect kow vulerabilities o systems

Vulerabilities : A worryig progressio 3000 2500 2000 Vulerabilities reported Source : CERT Coordiatio Ceter 2437 + 123% 1500 1000 500 0 1090 + 161% 262 417 + 59 % 1998 1999 2000 2001 i Code Red : 2,6 billio US dollars of damage Nimda : 590 millio US dollars of damage

Why are Firewalls isufficiet? Security Policy based oly o type of protocols (ot o cotet) Uable to aalyse ecrypted etwork traffic like HTTPS Uable to process a fier-graied aalysis of the applicatio activities Usually protects oly from exteral etwork Network device maaged by a security admiistrator (i oppositio with a Web server maaged by a webmaster)

Why are NIDS isufficiet? Protect oly agaist kow vulerabilities (patter matchig) Caot sca cotet if etwork traffic is ecrypted Difficult to deploy o switched etworks Caot hadle high-speed etworks Critical setup : Bad cofiguratio geerates may false alarms Uable to process a fier-graied aalysis of the applicatio activities

A ew approach agaist HTTP attacks Real-time virus detectio Real-time HTTP traffic cotrol Firewall Corporate Firewall Corporate Iteret Iteret X Virus Ati-virus X RealSetry Attack Web server The Ativirus detects ad blocks viruses RealSetry detects ad protects agaist kow or ukow vulerabilities

RealSetry cocept 4 User 1 2 3 SSL Full HTTP Ispectio TM 7 Egie 6 Techology 5 Web Server (1) HTTP request sed by a user (2) Hardware (RealSetry SSL) or software (RealSetry) decryptio (3) Check HTTP packet with Full Http Ispectio tm Techology (4) If validated by security policy, safe HTTP packet is forwarded to Web Server (5) Check HTTP packet with Full Http Ispectio tm Techology (6) Hardware (RealSetry SSL) or software (RealSetry) ecryptio (7) HTTP aswer is set back to the user

RealSetry provides the ultimate protectio More tha 200 ew vulerabilities each moth More tha 20 ew vulerabilities each moth No vulerability ca reach your Web Server FTP DNS Hacker HTTP HTTPS SMTP ICMP Firewall HTTP HTTPS RealSetry SSL HTTP Web Servers Full coectivity Restricted coectivity High Secure coectivity

Four techologies i a sigle box Reverse Proxy Like reverse Proxy : RealSetry breaks direct coectio betwee browser ad Web server. But ulike Reverse Proxy : RealSetry icludes filter capabilty to exclude malicious HTTP packets. RealSetry keeps origial IP address whe operates i stealth mode. NIDS Like IDS Probe : RealSetry is a etwork-based protectio ad rus i stealth mode. But ulike IDS Probe : RealSetry protects agaist ukow vulerabilities. RealSetry protectio is effective eve o ecrypted packets (HTTPS). Applicatio Firewall Like Applicatio Firewall : RealSetry allows to implemet a security Policy to accept or dey packets. But ulike Applicatio Firewall : RealSetry performs a detailed protocol aalysis to prevet agaist malicious HTTP requests. SSL Accelerator Like SSL Accelerator : RealSetry hadles decryptio ad ecryptio tasks for SSL trasactios. But ulike SSL Accelerator : RealSetry icorporates built-i security mechaism to protect your web site from fraudulet activities.

RealSetry Techology u Black List Detectio (IDS techology) Cocept» Sigature-based method» Requires regular updates» Protects oly agaist kow vulerabilities RealSetry Implemetatio» Automatic updates» Multiple rules to prevet IDS evasio» Very easy to setup : Protect your Web server i a few miutes RealSetry Beefits» Detects more tha 600 HTTP vulerabilities» Effective protectio icludig o ecrypted traffic (HTTPS)» No eed to moitor vulerabilities or patch your Web server» Plug ad Protect solutio

RealSetry Techology u White List Filterig (Exclusive Axiliace techology) Cocept» All HTTP requests that are ot expressly authorized are prohibited» No sigature-based method» Protectio agaist kow or ukow vulerabilities RealSetry Implemetatio» Security Policy defie by URL groups, directories or sigle URL» Security Policy icludes sytax, URL legth, Variables, cookies,» Setup assistats with learig, trackig ad protectig modes RealSetry Beefits» Idetify ad prevet both kow ad ukow vulerabilities» Effective protectio icludig o ecrypted traffic (HTTPS)» Represets the most secure solutio for Web services curretly available i the world

Normal Life Cycle of a vulerability Security Level Vedor reactivity Customer reactivity Time Vulerabilty discovered Exploit publicatio Hotfix provided by vedor Hotfix applied Miimum delay geerally observed : 10-15 days

RealSetry with oly Black List Protectio Security Level Vedor reactivity Customer reactivity Time Update attack sigature Vulerabilty discovered Exploit publicatio Hotfix provided by vedor Hotfix applied Maximum delay geerally observed : 24 hours

RealSetry with White List Protectio Security Level Vedor reactivity Customer reactivity Time Isesitive to ew vulerabilities Update attack sigature Vulerabilty discovered Exploit publicatio Hotfix provided by vedor Hotfix applied

The 4 solutios to prevet vulerabilities Maual Vulerability Assessmet (Vulerability scaer used maually) Automated Vulerability Assessmet (Vulerability scaer used automatically) RealSetry (miimum secure cofiguratio) (RealSetry i o- stealth mode with oly Black List Protectio) RealSetry (full secure cofiguratio) (RealSetry i stealth mode with itegral White List Protectio)

Black List Mode RFC coformity check KO (HTTP Header Fields) OK HTTP IDS (Black List Protectio) KO Reject + Logs SNMP SMTP SMS OK

Couter measures with HTTP IDS Buffer overflow Black List Requête HTTP coteat u patter réputé vulérable Toute requête (pour compatibilité aciee versio) Cross Site Scriptig Remote Commad SQL ijectio Path Trasversal Meta Caracters Null Bytes Predefied Patter

White List + Black List Cliet RFC coformity check KO OK HTTP Headers Maagemet OK OK HTTP Firewall HTTP Firewall (Partial White List) (Full White List) OK OK KO Reject + Alerts Logs SNMP SMTP SMS HTTP IDS (Black List Protectio) KO OK Web Server

Couter measures with IDS et FW HTTP Black List White List Requête dyamique avec politique de sécurité Requête HTTP coteat u patter réputé vulérable Toute requête (pour compatibilité aciee versio) Applicatio vulerabilities Brute Force Buffer overflow Cross Site Scriptig Remote Commad SQL ijectio Path Trasversal Meta Caracters Null Bytes Predefied Patter

RealSetry Security Level High RealSetry with a maximum security policy Security Level RealSetry with a strog security policy White List Filterig (URL sytax, variables ad cookies supervised by security policies) RealSetry with a miimum security policy Protectio agaist ukow attacks or vulerabilities Low Default Security Policy (RFC coformity, URL Legth, Authorized char, ) Easy Black List Protectio (patter matchig) Setup ad maagemet Difficult Protectio agaist kow attacks or vulerabilities

High Availability : Normal operatio NORMAL OPERATION Out-of-badmoitorig with RS-MONITOR & RS-FAILOVER usafe HTTP(S) safe HTTP Master Electroic bypass Slave Electroic bypass Master : Active Moitorig HTTP(S) Traffic Slave : Passive - Moitorig Master activities

High Availability : Fault operatio DEFAULT OPERATION usafe HTTP usafe HTTPS X Electroic bypass Master Slave Electroic bypass safe HTTP Master : Fail Etheret IN/OUT i Bypass mode Slave : Active Moitorig HTTP(S) Traffic

RealSetry SSL v1.0 Features APPLIANCE Itegrated solutio (hard ad soft) SSL ACCELERATION Boosted ad secure ecrypted traffic INTRUSION DETECTION Exclusive techology from Axiliace STEALTH MODE «Plug ad Protect» solutio FAULT TOLERANCE High availability - 24/7

Competitive Comparisos Compay Product Kavado Iterdo No No Yes Yes Sactum Ic AppShield No Yes compliat Optio with 3rd party Dey-All Rweb No No compliat No with 3rd party Ubize dmz/shield No No compliat Optio with 3rd party Stratum 8 APS No No No Yes Axiliace RealSetry Yes Yes No Yes Axiliace RealSetry SSL Yes Yes Yes Yes

RealSetry : Setup ad maagemet Full out-of-bad maagemet by serial or etheret iterface SSH TELNET Etheret Serial Restricted Shell HTTP Packets Ispectio modules APACHE Reverse Proxy Stealth Modules Database Cofiguratio Security policies Logs Admiistratio Web Etheret HTTPS LINUX Kerel

RealSetry : Setup ad maagemet ADMIN or Webmaster DMZ Iteret Firewall HTTPS u Network Istallatio First setup by serial cosole Access restricted to a special accout (ADMIN) Serial cosole WEB Servers u Maagemet of services ad security policies Network Iterface card dedicated to maagemet operatios Ituitive ad secure Web-basedadmiistratio (HTTPS) Commad lie based admiistratio via restricted ad secure shell Service creatio is oly allowed to a admiistrator accout (ADMIN) Each service is associated to oe or several Webmaster Services Maagemet is oly allowed to the Webmaster

Black List Mode Iitial Setup RS232 Cosole Create Services HTTPS via dedicated iterface Coect to etwork Web servers protected

White List Mode Iitial Setup RS232 Cosole Create Services HTTPS via dedicated iterface Bypass Mode Ope etwork trafic Learig Mode Geerate White List Trackig Mode Check White List Protected Mode Web servers are protected

Case Studies u Case Study 1 : RealSetry SSL protects Itraet Web Servers u Case Study 2 : RealSetry dedicated for hostig i ISP architecture u Case Study 3 : RealSetry mutualized for hostig i ISP architecture u Case Study 4 : DMZ Protectio with o trasparet mode u Case Study 5 : DMZ Protectio with stealth mode u Case Study 6 : Multiple DMZ Protectio with o trasparet mode u Case Study 7 : Multiple DMZ Protectio with stealth mode

CS1 : Itraet Web Servers Protectio Before Critical web-based itraet applicatios After Stealth mode Firewall mode Full White List SSL acceleratio Critical web-based itraet applicatios Private Network RealSetry Private Network u Customer beefits : Forward oly HTTP(S) packets to Web Server (Firewall mode) Protect Web server agaist kow or ukow HTTP Attacks No restrictive SSL usage without eed to upgrade server hardware Istallatio without ay etwork modificatio Native simple fault tolerace by electroic bypass

CS2 : RealSetry dedicated for ISP Secure Web Server Web Servers Iteret RealSetry DMZ

CS3 : RealSetry mutualized for ISP Secure Web Servers Web Servers Iteret RealSetry DMZ

CS4 : No Trasparet Mode Secure Web Servers Iteret RealSetry DMZ

CS5 : Stealth Mode Secure Web Servers DMZ Iteret RealSetry

CS6 : Multiple DMZs No Trasparet Secure Web Servers DMZ 1 Iteret RealSetry Secure Web Servers DMZ 2

CS7 : Multiple DMZs Stealth Mode Secure Web Servers DMZ 1 Iteret RealSetry Secure Web Servers DMZ 2

Thak you for your attetio Boris MOTYLEWSKI e-mail : bm@axiliace.com AXILIANCE S.A. Société Aoyme au capital de 120 000 Euros Siège social : Motpellier - FRANCE TEL : +33 (0)4 67 79 79 31 FAX : +33 (0)4 67 79 79 32 WEB : http://www.axiliace.com MAIL : ifo@axiliace.com