IBM WebSphere DataPower



Similar documents
DataPower SOA Appliances Simplify, Secure, and Accelerate SOA

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

WebSphere Integration Solutions. IBM Day Minsk Anton Litvinov WebSphere Connectivity Professional Central Eastern Europe

DataPower SOA Appliances Product Family

Agenda. DataPower: A Brief History Application, DMZ, and ESB Trends What is Application Optimization (AO)? Summary

Redbook Overview Patterns: SOA Design with WebSphere Message Broker and WebSphere ESB

Intro to DataPower IBM WebSphere Connectivity and Integration Appliances

IBM WebSphere DataPower Integration Appliance XI52

Easy CramBible Lab DEMO ONLY VERSION Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0

Creating a Strong Security Infrastructure for Exposing JBoss Services

Securely Managing and Exposing Web Services & Applications

Discovering the value of IBM WebSphere DataPower SOA Appliances

Managing SOA Security and Operations with SecureSpan

IBM WebSphere Data Power SOA Applicances V3.8.1 Solution IMP. Version: Demo. Page <<1/10>>

AquaLogic Service Bus

Apigee Gateway Specifications

Security in integration and Enterprise Service Bus(ESB) Anton Panhelainen Principal Technology Consultant Tieto Oy

IBM DataPower SOA Appliances & MQ Interoperability

CISCO ACE XML GATEWAY TO FORUM SENTRY MIGRATION GUIDE

Placement of SOA Applicance in Enterprise Architecture for Middleware Services

CA SOA Security Manager

IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities.

Securing Web Services From Encryption to a Web Service Security Infrastructure

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Basic & Advanced Administration for Citrix NetScaler 9.2

CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282

WebSphere DataPower SOA Appliances

Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems

Securing your XML and Web service implementations Nattakan Pengphon Technical Specialist

The use of Accelerator Appliances on zenterprise

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE

IONA Security Platform

Exam Name: Test284,IBM WbS.DataPower SOA

IBM SOA Foundation products overview

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact

Intro to Firewalls. Summary

Cisco AON Secure File Transfer Extension Module

Achieving business agility and cost optimization by reducing IT complexity. The value of adding ESB enrichment to your existing messaging solution

Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus

SCA-based Enterprise Service Bus WebSphere ESB

SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions

<Insert Picture Here> Oracle Web Services Manager (WSM)

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Sentinet for BizTalk Server SENTINET

Contents. Overview 1 SENTINET

WEB SERVICES SECURITY

Redpaper. IBM WebSphere DataPower SOA Appliances. Part I: Overview and Getting Started. Front cover. ibm.com/redbooks

redcoal SMS for MS Outlook and Lotus Notes

New Features in Neuron ESB 2.6

Oracle SOA Suite: The Evaluation from 10g to 11g

AquaLogic ESB Design and Integration (3 Days)

Sentinet for BizTalk Server SENTINET 3.1

Increasing IT flexibility with IBM WebSphere ESB software.

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

_. Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0 IBM

Locking down a Hitachi ID Suite server

Secure the Web: OpenSSO

Oracle SOA Suite Then and Now:

API Management: Powered by SOA Software Dedicated Cloud

Oracle Service Bus Examples and Tutorials

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Reverse Proxy for Trusted Web Environments > White Paper

ORACLE MOBILE SUITE. Complete Mobile Development Solution. Cross Device Solution. Shared Services Infrastructure for Mobility

White Paper Secure Reverse Proxy Server and Web Application Firewall

Introduction to the EIS Guide

Integrated Systems & Solutions. Some Performance and Security Findings Relative to a SOA Ground Implementation. March 28, John Hohwald.

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.

Using Layer 7 s API Gateway for vcloud Architectures How to achieve abstraction, security and management of vcloud APIs.

Alliance Key Manager A Solution Brief for Technical Implementers

Research. A Competitive Review of SOA Appliances. Comparing SOA appliances from IBM, Layer 7 and Intel. Version 1.00 March 2010.

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.

WebSphere MQ Managed File Transfer

AppDirector Load balancing IBM Websphere and AppXcel

The bridge to delivering digital applications across cloud, mobile and partner channels

Securing SOA and Web Services with Oracle Enterprise Gateway

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

An Oracle White Paper Dec Oracle Access Management Security Token Service

Fundamentals of SOA Security Testing

The Application Delivery Controller Understanding Next-Generation Load Balancing Appliances

IBM Tivoli Federated Identity Manager

Redpaper. IBM WebSphere DataPower SOA Appliances. Part II: Authentication and Authorization. Front cover. ibm.com/redbooks

GlobalSCAPE DMZ Gateway, v1. User Guide

SOA Software: Troubleshooting Guide for Policy Manager for DataPower

vordel Vordel XML Gateway

Setting Up an AS4 System

Configuration Guide BES12. Version 12.2

DataPower Architectural Design Patterns

Achieving PCI Compliance Using F5 Products

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

SonicWALL PCI 1.1 Implementation Guide

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Strategic Information Security. Attacking and Defending Web Services

SONIC ESB 7. KEY CAPABILITIES > Connects, mediates and controls. KEY BENEFITS > Creates new processes using

Transcription:

WebSphere DataPower Appliance The perfect XML/Web Services security gateway for SOA Service security, service-level management, mediation & policy enforcement Thomas KW Poon Advisory IT Specialist WebSphere 2009 IBM Corporation

IBM s acquisition of DataPower Software An SOA Appliance Creating customer value through extreme SOA performance and security Skills & Support Simplifies SOA with specialized devices Accelerates SOA with faster XML/WS throughput Helps secure SOA XML/WS implementations WebSphere DataPower SOA Appliances redefine the boundaries of middleware extending the SOA Foundation with specialized, consumable, dedicated SOA appliances that combine superior performance and hardened security for SOA implementations. 2

WebSphere DataPower SOA Appliance Product Line LLM Appliance XM70 High volume, low latency messaging Enhanced QoS and performance Simplified, configuration-driven approach to LLM Publish/subscribe messaging High Availability B2B Appliance XB60 B2B Messaging (AS1/AS2/AS3) Trading Partner Profile Management B2B Transaction Viewer Exceptional performance Simplified management and configuration XML Accelerator XA35 Offload XML processing No more hand-optimizing XML Lowers development costs Integration Appliance XI50 Hardware ESB Any-to-Any Conversion at wire-speed Bridges multiple protocols Integrated message-level security XML Security Gateway XS40 Enhanced Security Capabilities Centralized Policy Enforcement Fine-grained authorization Rich authentication 3

IBM SOA Appliance Product Line Specialized network devices simplify, help secure & accelerate SOA XML Security Gateway XS40 Help secure SOA with XML threat protection and access control Combines Web services security, routing and management functions Drop-in, centralized policy enforcement Easily integrates with exiting infrastructure and processes Integration Appliance XI50 Transforms messages (Binary to XML, Binary to Binary, XML to Binary) Bridges multiple protocols (e.g. MQ, HTTP, JMS) Routes messages based on content and policy Integrates message-level security and policy functions 4

WebSphere DataPower Deployment Patterns Internet DMZ Trusted Domain Application Suppliers Consumers 1 B2B Gateway 3 Low Latency Gateway Partners 2 Secure Gateway (Web Services, Web Applications) 4 Enterprise Service Bus 5 SOA Governance 6 Internal Security 7 Legacy Integration 8 XML Acceleration System z Application 5

Simplify, Integrate and Centralize Core Functions Centralize - Route, transform, and help secure multiple applications without code changes Simplify - Lower cost and complexity Integrate - Enable new business with unmatched performance Before SOA Appliances After SOA Appliances Authenticate Transform Encrypt/Decrypt Validate Route Update application servers individually Secure, route, transform all applications instantly No changes to applications 6

Why an Appliance for SOA Hardened, specialized hardware for helping to integrate, secure & accelerate SOA Many functions integrated into a single device: - Impact: connectivity will require service level management, routing, policy, transformation Higher levels of security assurance certifications require hardware: - Example: government FIPS Level 3 HSM, Common Criteria Higher performance with hardware acceleration: - Impact: ability to perform more security checks without slow downs Addresses the divergent needs of different groups: - Example: enterprise architects, network operations, security operations, identity management, web services developers Simplified deployment and ongoing management: - Impact: reduces need for in-house SOA skills & accelerates time to SOA benefits 7

XML Security Gateway XS40 Easy to Use Appliance Purpose-Built for SOA Security XML/SOAP Firewall: - Filter on any content, metadata or network variables Data Validation: - Approve incoming/outgoing XML and SOAP at wirespeed Field Level Security: - WS-Security, encrypt & sign individual fields, non-repudiation XML Web Services Access Control/AAA: - SAML, LDAP, RADIUS, etc. MultiStep: - Sophisticated multi-stage pipeline Web Services Management: - Service Level Management, Service Virtualization, Policy Management Transport Layer Flexibility: - HTTP, HTTPS, SSL Web Application Firewall Capabilities: - Additional security proxy, threat mediation & content processing services for other URL encoded HTTP-based applications Easy Configuration & Management: - WebGUI, CLI, IDE and Eclipse Configuration to address broad organizational needs (Architects, Developers, Network Operations, Security) 8

Integration Appliance XI50 DataGlue Any-to-Any Transformation Engine Content-based Message Routing: - Message Enrichment Protocol Bridging (HTTP, MQ, JMS, FTP, etc.): - Request-response and sync-async matching Direct to Database: - Communicate directly with remote Database instances XML/SOAP Firewall: - Filter on any content, medata or network variables Data Validation: - Approve incoming/outgoing XML and SOAP at wirespeed Field Level Security: - WS-Security, encrypt & sign individual fields, non-repudiation XML Web Services Access Control/AAA: - SAML, LDAP, RADIUS, etc. MultiStep: - Sophisticated multi-stage pipeline Middleware Appliance Purpose-Built for Application Integration Web Services Management: - Centralized Service Level Management, Service Virtualization, Policy Management Easy Configuration & Management: - WebGUI, CLI, IDE and Eclipse configuration to address broad organizational needs (Architects, Developers, Network Operations, Security) 9

Hardware Device for Improved Security Sealed network-resident device: - Optimized hardware, firmware, embedded OS - Single signed/encrypted firmware upgrade only, not arbitrary software - High assurance, default off locked-down configuration - Security vulnerabilities minimized (few 3 party components) - Hardware storage of encryption keys, locked audit log - No drives/usb ports, tamper-proof case Third party certification: - FIPS 140-2 level 3 HSM (option) - Under evaluation by Common Criteria EAL4 Large financial and government customers The DataPower [XS40]... is the most hardened... it looks and feels like a datacenter appliance, with no extra ports or buttons exposed and no rotating media. " - InfoWorld 10

XML Threat Protection ( Built-in supported by DP ) XML Entity Expansion and Recursion Attacks XML Document Size Attacks XML Document Width Attacks XML Document Depth Attacks XML Wellformedness-based Parser Attacks Jumbo Payloads Recursive Elements MegaTags aka Jumbo Tag Names Public Key DoS XML Flood Resource Hijack Dictionary Attack Message Tampering Data Tampering Message Snooping XPath Injection SQL injection WSDL Enumeration Routing Detour Schema Poisoning Malicious Morphing Malicious Include also called XML External Entity (XXE) Attack Memory Space Breach XML Encapsulation XML Virus Falsified Message Replay Attack 11

Performance Cost of XML Policy Processing Performance is key to security & mediation Processing Steps* Parsing Schema Validation XPath Filtering Time XML Decryption Signature Verification Parsing Schema Validation XML Transformation XML Signing XML Encryption 1 3 5 8 8 1 3 10 6 8 Software only Software w/ DataPower* Crypto Acceleration Each security function requires XML processing Must implement all services without any compromise Need ability to scale as content and user base grows 12 * Representative of software-based systems. For demonstration only. Actual processing time varies depending on application.

Access Control Enforce Who can access Which Web service & When Deploy as a high-speed access policy enforcement point Modular authentication/authorization architecture: - x = extract-identity() - z = extract-resource() - zm = map-resource(z) - y = authenticate(x); if (y = null) reject - ym = map-credentials-attributes(y) - allowed = authorize(ym, zm); if (!allowed) reject - audit-and-post-processing(); Identity examples include: - WS-Security user/pass token - SSL client certificate - SAML assertion - HTTP basic-auth - IP Address - Proprietary SSO cookie/token Resource examples: - URL - SOAP method 13

Access Control (2) Leading Standards and Third-party Integration Support Access control policy: - On-board: certs, XML file [can start simple] - Off-board: external access control servers Standards-based integration: - LDAP (for CRL, authentication, authorization) - RADIUS (authentication) - XKMS (for CRL, authentication) - SAML (consume, authentication, authorization, produce) - WS-Security, WS-Trust, WS-*, XACML - Outbound SOAP or HTTP call Integration with access management solutions: - Tivoli Access Manager - Tivoli Federated Identity Manager - RSA ClearTrust - Microsoft Active Directory - Sun Identity Server - Netegrity SiteMinder - CA etrust - others including custom integration with any customer environment 14

Access Control (3) AAA Framework Diagram - Authenticate, Authorize, Audit DataPower AAA Framework Extract Resource Map Resource SAML assertion Non-repudiation Monitoring SOAP/ XML Message Web Service URI SOAP op name Transfer amount Authorize Audit & Accounting SOAP/ XML Message Extract Identity Authenticate Map Credentials SAML WS-Security SSL client cert HTTP Basic-Auth External Access Control Server or On-Board Policy 15

MultiStep & XML Routing Flexible Drag & Drop Message Processing and Policy Creation Basic routing capability similar to XML Filtering Arbitrary steps of message processing: - Encrypt, Decrypt, Sign, Verify - Access control, Filter, Validate - Route (e.g., route-set https://soapfoobar.com:321), T-Route, Rewrite, (e.g. headerrewrite X-foo (.*) now) - Call out or Fetch artifacts such as XSLT,XSD,XML, WSDL, etc - Custom error handling create policies to respond to processing errors - Callable rules - Transform (XML or legacy data) - Logging log individual transactions (including message) for analysis and archiving - Service Level Management shape and monitor traffic and/or send alerts based on transactional data and context - XPath extract (e.g. extract INPUT three //games/url var://local/urls) Full variables and state: - Scope: context / session / multistep-scope - Accessible both in config and from within XPath 16

Packet Level Security vs. Application Level Security end-to-end WS-Security Security XML DSig XML Encryption XML Access Control SOAP Sender HTTPS HTTPS Receiver point-to-point Intermediary point-to-point SSL is not enough XML-level threats and XML-aware security securing stored or spooled messages multi-party transactions, multi-hop networks 17

Web Services Management Service Level Management WSM Configure and install in minutes Hierarchical Service Level at WSDL, service, port, operational level Flexible actions when reaching a threshold: notify/alert, shape, throttle Threshold for both overall requests and failures Graphical display 18

Web Services Management (2) Service Level Management WSM Configure Policies: - Based on any parameter: WSDL; Service Endpoint; Operation; Credential - Based on Rate (TPS) or Count by Time (Outlook like Calendar) - Based on Request; Response; Fault; XPath - Support for enforcement across a pool of devices - Action: Notify (Alert); Shape (Slow Down); Throttle (Reject) - Notify other applications such as billing, audit, etc. SLM is a verb in the policy pipeline Support for WSDM, Web services management standards, Allow subscription to SLM for alerts, logging, etc. 19

IBM Tivoli Composite Application Manager Simplify Web Services Management and SOA Deployment Composite view of both Web services and IT infrastructure ITCAM for SOA Event Correlation Branch Office Central Office SOA Appliance Client Monitor Services Mediate Trace Transactions Policy Control Deployment Example IBM Tivoli Composite Application Manager 20

Event Correlation ITCAM for SOA Dashboard 21

Content-based Routing Features Dynamically route based on context (e.g. originating URL, protocol headers and attributes, etc.) and message content (both legacy and XML): - XPath-based routing against any part of the message content or context - XPath statements can point to dynamically set URLs and/or message queues (MQ, JMS) - Routing may be one way (a response from the service may not be necessary) XI50 can be configured to accept a routing table where routing parameters are supplied using XML: - A table results in extremely fast turnaround of routing changes, including transport protocol conversions XI50 can dynamically retrieve routing information from other systems: - Databases, web servers, file servers, etc. Routing Policy IBM SOA Appliance Unclassified Requests Service Providers 22

Protocol Bridging First-class support for message and transport protocol bridging Protocol mediation with simple configuration: - HTTP MQ WebSphere JMS FTP Tibco EMS Request-response and sync-async matching Able to configure to preserve fully guaranteed, once-and-only-once delivery WAS JMS ODBC DB2 Oracle Sybase FTP JMS FTP/ FTP over SSL/Streaming XML 3 rd -party JMS MQ HTTP/HTTPS XI50 3 rd -Party App Server MQ MQ Web 23

Award-Winning WebGUI: Ease of Use WSDL-based policy creation Hierarchical policies applied at WSDL, service, port, operation level Drag & drop policy creation screen allows flexible chaining of operations Configure and install in minutes Ease of Use Example Graphical User Interface providing drag and drop services, in order desired, for XML filtering, signing, verification, schema validation, encryption, decryption, transformation, routing, access control, service level monitoring, and advanced operations 24

Configuration & Administration Fits Into Existing Environments Depth of functionality to scale to full operational complexity Web-based GUI: - 100% of config exposed in both GUI & CLI ITCAM SE for DataPower Multi-box Management IDE integration: - Eclipse/Rational Application Developer - Altova XML Spy CLI familiar to network operators XPath / XML config files SNMP SOAP management interface: - Easy integration into home-grown mgmt systems or top products - Programmatic access to all status and config Integration For Management strategy: - Industry leading integration support across IBM and 3 rd party application, security, identity management and networking infrastructure ` Eclipse XI50 ITCAM SE for DataPower Other integration & interops 3 rd Party IDEs Command Line Interface SNMP SOAP Interface Other Integration / Interops Data Management Store 25

Hardware Reliability Dual swappable power supplies: - Separate power cords, designed for high availability Careful thermal design: - Multiple fans & high air flow capacity No hard disks or rotating media for higher reliability: Integrated failover or Active-Active self-balancing option: - VRRP-like failover ensures systems defaults to redundant appliance without service interruption Works seamlessly with existing load balancers, firewalls, routers and other network infrastructure No spooled application messages on device: - Prevents stored message loss in the unlikely event of device failure Internal self-monitoring & self-healing features Extensive utilization monitoring & alerts (see Configuration & Logging) 26

Security Selling Domain Topics: Physical Device Security With Server Appliance products, which are based general purpose computing platforms, physical device security is always a major Achilles Heel - All bets are off when I can walk up to the device and boot a CDROM or USB drive - Boot CDROM, peruse filesystem, install trojans, blah, blah, blah, Yippee! DataPower is a fully secure platform, including physical security - No CDROM - No USB Ports - No way to boot external media - All firmware is encrypted and digitally signed with the DataPower root certificate - There is no way to make a DataPower device run anything other than legal DataPower firmware from IBM No way to run compromised, altered, or 3 rd party firmware Critical when locking the device in a room isn t possible Critical when you don t trust those who do have physical access to the device There isn t a single DataPower competitor that has anything close our level of physical device security they are all based on commodity HW 27

Security Selling Domain Topics: Resilience to Network Attack Primary customer concern is the ability (or preferably inability) of the device to be compromised through a network-based attack Network-based attacks come in multiple forms - Attempts to compromise security services themselves through exploits - Attempt to gain login access and eventually root access to the device - Denial of Service Attacks Because DataPower is not a general purpose computing platform running a general purpose operating system, it is not vulnerable to traditional networkbased attacks - All network services created by IBM and hardened against network-based attacks - No command shells or user accounts - Network services do not run in Processes, so there is nothing to exploit/hijack - Denial-of-Service attacks thwarted at multiple layers (network, service, etc.) - Device threat protection prevent malformed (intentionally or unintentionally) attack data from getting through to your backend host services 28

Summary IBM SOA Appliances Hardened, specialized product for helping integrate, secure & accelerate SOA Many functions integrated into a single device Broad integration with both non-ibm and IBM software Higher levels of security assurance certifications require hardware Higher performance with hardware acceleration Simplified deployment and ongoing management http://www.ibm.com/software/integration/datapower/ SOA Appliances: Creating customer value through extreme SOA performance and security Simplifies SOA with specialized devices Accelerates SOA with faster XML throughput Helps secure SOA XML implementations 29

Thank You 30