A Call for Drastic Action. A Survey of Web Application Firewalls



Similar documents
Penta Security 3rd Generation Web Application Firewall No Signature Required.

Where every interaction matters.

Reducing Application Vulnerabilities by Security Engineering

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

05.0 Application Development

Pentests more than just using the proper tools

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Pentests more than just using the proper tools

Table of Contents. Page 2/13

Overview of the Penetration Test Implementation and Service. Peter Kanters

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Passing PCI Compliance How to Address the Application Security Mandates

Magento Security and Vulnerabilities. Roman Stepanov

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

How To Fix A Web Application Security Vulnerability

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

The Top Web Application Attacks: Are you vulnerable?

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Web Application Vulnerability Testing with Nessus

Hardening Moodle. Concept and Realization of a Security Component in Moodle. a project by

Web Application Security Assessment and Vulnerability Mitigation Tests

Cloud Security:Threats & Mitgations

Web Application Report

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

How to complete the Secure Internet Site Declaration (SISD) form

Security Assessment through Google Tools -Focusing on the Korea University Website

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Adobe Systems Incorporated

Intrusion detection for web applications

From the Bottom to the Top: The Evolution of Application Monitoring

Using Free Tools To Test Web Application Security

Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure

Are you fighting new threats with old weapons? Secure your Web applications with Web Application Firewalls.

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

Web Application Attacks And WAF Evasion

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

Web Application Security 101

SQuAD: Application Security Testing

Rational AppScan & Ounce Products

OWASP Top Ten Tools and Tactics

Guidelines for Web applications protection with dedicated Web Application Firewall

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Web Application Firewall on SonicWALL SSL VPN

Integrating Security into the Application Development Process. Jerod Brennen, CISSP CTO & Principal Security Consultant, Jacadis

Web Engineering Web Application Security Issues

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

How To Protect A Web Application From Attack From A Trusted Environment

Hack Proof Your Webapps

2013 MONITORAPP Co., Ltd.

DISA's Application Security and Development STIG: How OWASP Can Help You. AppSec DC November 12, The OWASP Foundation

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

F5 and Microsoft Exchange Security Solutions

PCI DSS 3.0 Compliance

ASL IT SECURITY BEGINNERS WEB HACKING AND EXPLOITATION

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Network Test Labs (NTL) Software Testing Services for igaming

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

OWASP AND APPLICATION SECURITY

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Cloud Security Framework (CSF): Gap Analysis & Roadmap

NSFOCUS Web Application Firewall White Paper

Testing the OWASP Top 10 Security Issues

FortiWeb Web Application Firewall. Ensuring Compliance for PCI DSS requirement 6.6 SOLUTION GUIDE

SAST, DAST and Vulnerability Assessments, = 4

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Implementation of Web Application Firewall

Protecting Your Organisation from Targeted Cyber Intrusion

The Electronic Arms Race of Cyber Security 4.2 Lecture 7

Web Application Firewall (WAF) Guide. Web Application Firewall を 理 解 するための 手 引 き A Handbook to Understand Web Application Firewall

College Training Program

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Barracuda Web Site Firewall Ensures PCI DSS Compliance

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

Web Application Penetration Testing

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Web application security

Thick Client Application Security

(WAPT) Web Application Penetration Testing

SERENA SOFTWARE Serena Service Manager Security

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

The Hillstone and Trend Micro Joint Solution

Web App Security Audit Services

Importance of Web Application Firewall Technology for Protecting Web-based Resources

Transcription:

A Call for Drastic Action A Survey of Web Application Firewalls

About Me Jaeson Yoo, Head of Global Business Responsible for Penta s international business interests, for all regions/countries outside of Korea and Japan Management Consulting and Investment Banking background, with experience in IT security industry

AGENDA Penta Security Systems Inc. Web Application Firewalls: An Overview Why Aren t WAFs More Prevalent? The Traditional Signature-Based Approach is Failing What WAF Solution is Needed?

Penta Security Systems Inc.

Penta Security Systems Inc. Founded CEO/Founder July 1997 Seokwoo Gregory Lee Leading technology provider of Web Application Firewalls, DBMS Encryption Systems, and PKI Solutions. Headquarters Revenues Employees Seoul, Korea US$ 18.4M (2012) 120+ Our appliance based WAF holds 70%+ market share in the growing Korean WAF market, and we hold 60% of the Korean market share in the DBMS encryption market. Overseas Products Penta Security Systems, K.K.,Tokyo, Japan (subsidiary) Thailand, Singapore, Australia, Malaysia, Indonesia (distributors) WAPPLES (Web Application Firewall) D Amo (DB Encryption Solution) ISSAC (PKI Solution) ISign Plus (SSO Solution) Over 2,000 clients including: government, small and medium businesses, enterprise, academic organizations, and financial organizations (including banks, securities, insurance, and credit card companies). 5

Company History 2008 ~ Present 1997 ~ 2007 2012 2011 01. WAPPLES granted Japanese patent for its algorithm- based, application-layer attack detection engine. 12. Joined the VMware TAP program and became a VMware Solution Provider 12. Launched KT WAF service with WAPPLES V-Series 12. D Amo granted US patent for its query processing system and method for DB query encryption transformation 08. D Amo received v2.3 SAP Certification SAP in Germany 06 Became an OWASP sponsor 02. Received the Competitive Power Software Company award from KISA 03. Green-Biz Authorized 2007 2006 2005 04. WAPPLES received GS (Good Software) certification 03. DB Encryption Established in the Ministry of Foreign Affairs and Trade 10. D Amo for SQL Server was introduced 07. Local office in Japan was established 06. Selected as an Innovative Business (INNO-BIZ) 03. SCP, PKI-based Security Library, was introduced 01. D Amo received GS (Good Software) Certification 05. WAPPLES, Web Application Firewall, was introduced 2010 07. Received the International Security Leadership Achievements (ISLA) Leadership Award 02. Received the Competitive Power Software Company award from KISA 2004 12. Initiated sales of D Amo in Japan 03. D Amo, DB Database Security Solution, was introduced 2009 2008 12. Acquired certification of PCI-DSS conformance for WAPPLES 11. Received the 2009 award for Deployment of Innovative Technology 04. Received the New Software Grand Award for WAPPLES 01. Penta Security Systems K.K.(Japan) was established 11. WAPPLES received the Intelligence Award 10. GS Caltex, SSO and DB security system built 07. CIS-CC received Validation Certification from NIS 07. D Amo for DB2 was introduced 06. WAPPLES received Security Compatibility Certification 05. D Amo SG was introduced 04. QUEST in Japan, became a contract agent of WAPPLES 01. WAPPLES became CC (Common Criteria) Certified 2003 2002 2001 2000 1999 08. CIS received encryption certification from NIST 01. Received an award from the Korean government for realizing the e-government project 09. Established GPKI system with the Korean government 09. ISign EAM Solution was introduced 06. Received the Grand Award in the Information field of Venture business 07. Established the first DB security business in Korea 1998 09. Penta Security Lab was founded 08. Siren, Intrusion Detection System, was introduced 01. ISSAC, PKI Solution, was introduced 2010 ISLA Award 2009 New Software Grand Award 2009 Intelligence Award 2007 GS Certi fication 1997 08. Information Security Technical cooperation with POSTECH 07. Penta Security Systems was founded 4

Penta Security Products Intelligent Web Application Firewall, WAPPLES Leading WAF product in Korea with 70%+ market share Unique Logic Based Detection Engine Near-zero false positive detection rate, and immunity to unknown attacks Security Compatibility Certification from the Korean National Intelligence Service PCI-DSS Certificate of Conformity PKI Security Solution, ISSAC The first PKI product in Korean meeting international technology standards User authentication is provided through the NPKI and GPKI systems Supports web session encryption and user authentication PKI Development Toolkit, SCP Cryptographic Module, CIS Cryptographic function and security service development tool Supports embedded environment Able to support from PC to Mainframe Integrated DB Security, D Amo No.1 Database Encryption Software in Korea since 2004 with 500+ customers of all sectors Runs on Oracle (Enterprise/Standard), MS SQL Server, DB2, and MySQL Supports various security configurationsthrough D Amo SG and D Amo SCP Enables realization of strong, comprehensive DB security SSO & EAM Solution, Isign Plus The first SSO solution in Korea Single Sign On (SSO) solution for enterprise security since 2001 Extranet Access Management based on RBAC (Role Based Access Control) MySQL Encryption, MyDiamo The world s first advanced encryption & access control solution for MySQL Open-source Software Offered as freeware to individuals with non-commercial interests, educational institutions One column of free encryption for all other users

Select List of Clients International Industrya Online Shopping Data Center Department Store Finance Finance Service Provider Service Provider Outsourcing Education Government Korea Industry Manufacturing Banking Insurance Service Manufacturing Electronics IT Insurance Manufacturing Distribution Customer AEON Mall DSR Shibuya109 Net Shop Nissay Asset Management Visa Credit Card Japan Sanwa Comtech ST-NET TECSEED Compass Inc Tokyo University of Agriculture Malaysia Ministry of Finance Customer BMW Korea HSBC Korea ING Life JW Marriott Seoul Honda Korea LG Electronics Inc. Samsung SDS MetLife Korea NIKE Sportswear Korea LG International Corp.

Web Application Firewalls: An Overview

Web Application Firewalls A web application firewall (WAF) secures web applications! What is a WAF? Web Application Firewall It executes a security analysis of the OSI 7 layer between all messages of the web server and the web client. It protects against attacks aimed at web applications. Roles It protects web servers from external attacks (service in) It protects against leakage of important information from the web server (service out)

Web Application Firewalls Protects against web attacks Prevents leakage of personal, confidential, and/or proprietary information Enables regulatory compliance

Regulatory Compliance

Network Firewalls, IDS/IPS, or Web Application Firewalls? Network Firewalls and IDS/IPS cannot protect web applications against the OWASP Top 10 Threats, but a Web Application Firewall (WAF) can! OWASP Top 10 (2010) Network Firewall IDS / IPS WAF A1: SQL Injection X A2: Cross Site Scripting (XSS) X A3: Broken Authentication and Session Management X A4: Insecure Direct Object References X X A5: Cross Site Request Forgery (CSRF) X X A6: Security Misconfiguration X X A7: Failure to Restrict URL Access X X A8: Insecure Cryptographic Storage X X A9: Insufficient Transport Layer Protection X A10: Unvalidated Redirects and Forwards X X

Network Firewalls, IDS/IPS, or Web Application Firewalls? Comparing Network Firewalls, IDS/IPS, and WAFs: Network Firewalls IDS/IPS Web Application Firewall Network Firewalls cannot detect or analyze attacks targeting web applications. Network Firewalls generally cannot protect Port 80. Cannot typically analyze application layer attacks. Easy for attackers to bypass Can inspect all traffic between the Web client and Web server Can inspect protocol Can inspect encrypted traffic

Why Aren t WAFs More Prevalent? A Survey of Web Application Firewalls

First-Generation WAFs The threats to web applications are clear. So why have so many large businesses been reluctant to Install web application firewalls? The first generation web application firewalls was based on a patternmatching detection mechanism. First Generation WAFs: Adoption of the Black List The administrator added a known attack pattern (black list) to block malicious traffic. First generation WAFs compared web traffic to the updated pattern by analyzing them at the application level. No detection system for new or modified attacks against the web application layer.

First-Generation WAFs The First Generation WAF was not particularly successful in the IT security market. Not only did it place a significant burden on system administrators, they were not seen as particularly effective. Heavy Workload & HR Requirements WAF Manufacturer/Distributor Administrators needed to update known attack patterns on the black list Attempts to add new conceivable patterns meant a heavy workload for the WAF administrative team Black List The high costs of manpower were significant, especially for smaller companies or IT security providers with limited budgets 1G WAF

First-Generation WAFs Vulnerabilities with Poor System Performance No protection against new or modified attacks Significant increase in false positives Attempts to add patterns for all conceivable attacks led to a deterioration in web application performance New Attacks False Positives WAF Modified Attacks Decrease in Web Application Performance

Second-Generation WAFs The second generation WAF attempted to remedy the flaws and limitations of its predecessor. Second-Generation WAFs: The Advent of the automated policy By analyzing the web application(s) protected by the WAF, the second-generation WAF was able to automate the establishment of white lists for security policies. Combined with a black list containing known and conceivable attacks against the application layer, the second generation WAF could figure out what was permissible traffic, and what was not permissible.

Second-Generation WAFs Unfortunately, the second generation WAF did little to increase application layer security, or alleviate manpower requirements. Heavier Workload! The automatically established policies, or the white lists, could take up to two weeks to identify and implement. WAF Manufacturer/Distributor White List Additionally, while the policies were established automatically, they still required manual configuration by an administrator, thereby increasing (not reducing) the administrative burden The security administrator still has to maintain the black list of known web attacks Black List 2G WAF

Second-Generation WAFs Unfortunately, the second generation WAF did little to increase application layer security, or alleviate manpower requirements. Still Vulnerable with Poor System Performance Still a pattern-matching solution Still an inability to protect against unknown attacks Still a tendency to produce false positives Still promoted slow system performance False Positives New Attacks Modified Attacks WAF Decrease in Web Application Performance

The Traditional Signature-Based Approach is Failing

Signature-Based Solutions "There is widespread agreement that advanced attacks are bypassing our traditional signature-based security controls and persisting undetected on our systems for extended periods of time. The threat is real. You are compromised; you just don t know it. Source: Gartner, 2012

SQL Injection Signatures Example of misdetection with a Signature-Based Engine In the case that a WAF has the below signatures: Example of SQL Injection Signature - Below part means substring-searching target. rgxp means a regular expression. - After finding a string of part, rgxp is applied. Signature part="or 'a' = 'a" Signature Name SQL Injection WHERE Statement Manipulation part="or 'a'= 'a" SQL Injection WHERE Statement Manipulation 1 part="or 'a'= 'a" SQL Injection WHERE Statement Manipulation 2 part="or 'a'='a" SQL Injection WHERE Statement Manipulation 3 part="or 'a' ='a" SQL Injection WHERE Statement Manipulation 4 part="or 'a'='a" SQL Injection WHERE Statement Manipulation 5 part="or 'a' ='a" SQL Injection WHERE Statement Manipulation 6 part="or a=a" SQL Injection WHERE Statement Override part="or 1=1" SQL Injection WHERE Statement Override 1 If a SQL Injection source is modified from a = a to b = b, the regular expression cannot detect the modified SQL Injection attack.

SQL Injection Signatures

WebShell Hacking

What Solution is Needed?

What WAF Solution is Needed?

Thank You.