10 Things Every Web Application Firewall Should Provide Share this ebook



Similar documents
The Future of Web Security: 10 Things Every Web Application Firewall Should Provide

10 Things Every Web Application Firewall Should Provide Introduction

What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications

Applications and data are the main targets for modern attacks. Adoption of dedicated application and data security concepts, technologies and

5 Lines of Defense You Need to Secure Your SharePoint Environment SharePoint Security Resource Kit

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Cutting the Cost of Application Security

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

The New PCI Requirement: Application Firewall vs. Code Review

End-to-End Application Security from the Cloud

We Secure What Matters Most: The Data Center. In physical, virtual, and cloud environments

Four Steps to Defeat a DDoS Attack

Enterprise-Grade Security from the Cloud

The Hillstone and Trend Micro Joint Solution

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

SharePoint Governance & Security: Where to Start

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Four Steps to Defeat a DDoS Attack

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Powered by. Incapsula Cloud WAF

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Four Steps to Defeat a DDoS Attack

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

How to Secure Your SharePoint Deployment

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Akamai to Incapsula Migration Guide

IAAS REFERENCE ARCHITECTURES: FOR AWS

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Where every interaction matters.

IBM Advanced Threat Protection Solution

Protect Your Business and Customers from Online Fraud

NSFOCUS Web Application Firewall White Paper

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

How To Protect Your Web Applications From Attack From A Malicious Web Application From A Web Attack

Analytics, Big Data, & Threat Intelligence: How Security is Transforming

Breaking down silos of protection: An integrated approach to managing application security

Guidelines for Web applications protection with dedicated Web Application Firewall

Bridging the gap between COTS tool alerting and raw data analysis

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

White Paper. What Auditors Want Database Auditing. 5 Key Questions Auditors Ask During a Database Compliance Audit

SANS Top 20 Critical Controls for Effective Cyber Defense

Information Technology Policy

The Business Case for Security Information Management

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

White Paper. Managing Risk to Sensitive Data with SecureSphere

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

Introduction: 1. Daily 360 Website Scanning for Malware

Introducing IBM s Advanced Threat Protection Platform

SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Protecting Against Application DDoS Attacks with BIG-IP ASM: A Three-Step Solution

A Network Administrator s Guide to Web App Security

WHITE PAPER Moving Beyond the FFIEC Guidelines

End-user Security Analytics Strengthens Protection with ArcSight

Risk-based solutions for managing application security

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks

10 Building Blocks for Securing File Data

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

How Web Application Security Can Prevent Malicious Attacks

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Imperva s Response to Information Supplement to PCI DSS Requirement Section 6.6

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

On-Premises DDoS Mitigation for the Enterprise

Networking and High Availability

Global Web Application Firewall Market

Protecting Your Organisation from Targeted Cyber Intrusion

Five Ways Imperva Surpasses the Competition for Web Application Security WHITEPAPER

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Unified Security, ATP and more

Application Security in the Cloud with BIG-IP ASM

Sygate Secure Enterprise and Alcatel

IndusGuard Web Application Firewall Test Drive User Registration

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Closing the Biggest Security Hole in Web Application Delivery

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

Protecting the Infrastructure: Symantec Web Gateway

The Cloud App Visibility Blindspot

Getting Ahead of Malware

Transcription:

The Future of Web Security 10 Things Every Web Application Firewall Should Provide

Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security Fails SECTION 3: Why Web Application Firewalls Succeed SECTION 4: 10 Things Every Web Application Firewall Should Provide SECTION 5: Additional Resources SECTION 6: About Imperva

The Future of Web Security OVER 50% of organizations experienced a Web application breach in the past year. Many of these incidents led to severe financial losses. - Infosecurity Magazine, citing Forrester Consulting

The Future of Web Security Securing Web applications against cybercriminals, hacktivists, and state-sponsored attackers is a never-ending effort. Why? HACKERS EVADE TRADITIONAL NETWORK SECURITY DEFENSES TO TAKE DOWN WEBSITES AND TO STEAL DATA MALICIOUS USERS PROBE WEBSITES AROUND-THE-CLOCK LOOKING FOR VULNERABILITIES AUTOMATION TOOLS SUCH AS OFF-THE-SHELF ATTACK TOOLKITS AND BOTNETS MAKE IT EASY TO EXECUTE LARGE-SCALE ATTACKS Time and again, organizations that rely solely on network security solutions to protect their applications have seen their Websites breached.

The Future of Web Security Web application firewalls have become the central platform for protecting applications against all online threats. TECHNICAL WEB ATTACKS SQL INJECTION CROSS-SITE SCRIPTING REMOTE FILE INCLUSION BUSINESS LOGIC ATTACKS DISTRIBUTED DENIAL-OF-SERVICE SITE SCRAPING BRUTE-FORCE ATTACKS COMMENT SPAMMING ONLINE FRAUD ATTACKS MALWARE IDENTITY THEFT ACCOUNT TAKEOVER

Why Traditional Network Security Fails TRADITIONAL NETWORK SECURITY SOLUTIONS CANNOT block attacks that exploit custom Web application vulnerabilities CANNOT detect cookie, session, or parameter tampering attacks CANNOT stop fraudulent devices or business logic attacks

Why Web Application Firewalls Succeed WEB APPLICATION FIREWALLS CAN block attacks that exploit custom Web application vulnerabilities CAN detect cookie, session, or parameter tampering attacks CAN stop fraudulent devices or business logic attacks

10 Things Every Web Application Firewall Should Do #1 Requirement: Detect Unusual Requests #2 Requirement: Stay in Front of Hackers #3 Requirement: Thwart Evasion Techniques #4 Requirement: Prevent Automated Attacks and Shut Down Bots #5 Requirement: Recognize Known Malicious Sources #6 Requirement: Virtually Patch Vulnerabilities #7 Requirement: Stop Fraud Malware #8 Requirement: Stop Fraudulent Transactions #9 Requirement: Support On Premise and Cloud Deployments #10 Requirement: Streamline and Scale Operations

CHALLENGE #1 Advanced, custom Web attacks outpace signatures. YOUR WAF MUST Detect Unusual Requests - Understand the protected application including URLs, parameters, and cookies - Inspect parameter values for special characters and recognize when these characters are expected or indicative of an attack - Learn application changes without manual intervention Input validation is the single best defense against injection and XSS vulnerabilities. BRENT HUSTON, State of Security

CHALLENGE #2 Threats to online applications continue to evolve. YOUR WAF MUST Stay in Front of Hackers - Leverage live attack, reputation, and fraud data to identify active attacks and the attackers - Provide automatic updates to security signatures, policies, reputation data, and fraud intelligence A WAF should automatically receive and apply dynamic signature updates from a vendor or other source. Recommended WAF capability in the PCI DSS Information Supplement: Application Reviews and Web Application Firewalls Clarified

CHALLENGE #3 Stop Web attacks without blocking legitimate traffic. YOUR WAF MUST thwart Evasion Techniques - Examine multiple attack indicators with an analytics engine and block attacks without false positives - Compare requests over time to detect repetitive attacks, such as brute-force login or DDoS attacks Web application firewalls must deliver more sophisticated control at the application layer through a variety of contextual rule sets and behavioral analysis. SANDRA KAY MILLER, Core of the Matter, Information Security Magazine

CHALLENGE #4 Protect applications from automated attacks. YOUR WAF MUST Prevent Automated Attacks and Shut Down Bots - Analyze browser capabilities to distinguish bots from legitimate Web browsers - Detect an excessive number of Web requests in a short period of time

CHALLENGE #5 Identify malicious users or illicit sites before the damage is done. YOUR WAF MUST Recognize Known Malicious Sources - Detect access from anonymous proxies and Tor networks - Restrict access by location to eliminate unwanted traffic and to thwart DDoS attacks originating from a specific country - Recognize users referred from a phishing site - Link to a cloud-based community defense that shares accurate, live information about hackers, bots, and fraudsters

CHALLENGE #6 Patch vulnerabilities that could leave applications exposed for days or months. YOUR WAF MUST Virtually Patch Vulnerabilities - Prevent attempts to exploit application vulnerabilities - Provide input validation, HTTP protocol validation, and attack signatures that can block most vulnerability exploits out-of-the-box - Integrate with application scanners and build custom policies to ensure strict security measures are applied to known application vulnerabilities Web Application Firewalls genuinely raise the bar on application security they virtually patch the application faster than code fixes can be implemented. ADRIAN LANE, Securosis

CHALLENGE #7 Detect users infected with malware. YOUR WAF MUST Stop Fraud Malware - Analyze end user attributes and Web traffic patterns for the tell-tale signs of malware infection and then block malware-infected devices - Monitor a suspect user for a specified period of time, generate an alert, or integrate with a fraud management solution to open an investigation case

CHALLENGE #8 Fortify applications against fraudulent transactions. YOUR WAF MUST Stop Fraudulent Transactions - Mitigate payment and new account fraud without requiring application changes - Integrate with cloud-based fraud security solutions to extract and analyze a number of user and transaction attributes including browser irregularities, known fraudulent devices, and suspicious payment information - Correlate fraud risk data with Web attack and user information to accurately identify and stop fraud A layered fraud prevention approach provides defense in depth, and it is the best policy for preventing and containing losses that result from today s and tomorrow s threats. AVIVAH LITAN, Gartner

CHALLENGE #9 Support diverse application architectures. YOUR WAF MUST Support On Premise and Cloud Deployments - Maintain flexible, inline and non-inline configuration options that support unique on premise requirements - Support virtual appliance solutions for private clouds and cloud-based security services Cloud-based security services offer an easy and effective way to make websites faster and protect websites against hackers and bots. LAWRENCE PINGREE, Gartner

CHALLENGE #10 Manage multiple Web application firewalls. YOUR WAF MUST Streamline and Scale Operations - Incorporate point-and-click security policies - Provide centralized management for synchronized policies and application profiles across all Web application firewalls, even those in separate locations - Deliver detailed, actionable security event information

Additional Resources DOWNLOAD THE FUTURE OF WEB SECURITY WHITE PAPER VIEW WEB APPLICATION SECURITY DEMO

About Imperva Imperva is a pioneer and leader of a new category of business security solutions for critical applications and high-value data in the data center. Imperva s award-winning solutions protect against data theft, insider abuse, and fraud while streamlining regulatory compliance by monitoring and controlling data usage and business transactions across the data center, from storage in a database or on a file server to consumption through applications. LEARN MORE Find Us on the Web Contact Us Direct Read our Blog Imperva Headquarters 3400 Bridge Parkway, Suite 200 Redwood Shores, CA 94065 Tel: +1-650-345-9000 Fax: +1-650-345-9004 Toll Free (U.S. only): +1-866-926-4678 www.imperva.com Copyright 2013 Imperva, Inc. All rights reserved. Imperva, the Imperva logo and SecureSphere are trademarks of Imperva, Inc. All other brand or product names are trademarks or registered trademarks of their respective holders.