Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks r.gibala@f5.com



Similar documents
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

F5 ASM i DB Monitoring w ofercie NASK

F5 Silverline Web Application Firewall Onboarding: Technical Note

Multi-Layer Security for Multi-Layer Attacks. Preston Hogue Dir, Cloud and Security Marketing Architectures

F5 Web Application Security. Radovan Gibala Senior Solutions Architect

F5 (Security) Web Fraud Detection. Keiron Shepherd Security Systems Engineer

Application Security Manager ASM. David Perodin F5 Engineer

FortiWeb 5.0, Web Application Firewall Course #251

Datacenter Transformation

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Secret Server Qualys Integration Guide

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Information Technology Policy

Application Security in the Cloud with BIG-IP ASM

Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

Where every interaction matters.

F5 Datacenter Virtualization & Application Security

The New PCI Requirement: Application Firewall vs. Code Review

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

FortiWeb for ISP. Web Application Firewall. Copyright Fortinet Inc. All rights reserved.

NSFOCUS Web Application Firewall

Prevent Malware attacks with F5 WebSafe and MobileSafe. Alfredo Vistola Security Solution Architect, EMEA

10 Things Every Web Application Firewall Should Provide Share this ebook

Imperva s Response to Information Supplement to PCI DSS Requirement Section 6.6

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Security F5 SECURITY SOLUTION GUIDE

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Application centric Datacenter Management. Ralf Brünig, F5 Networks GmbH Field Systems Engineer March 2014

Post-TMG: Securely Delivering Microsoft Applications

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

End-to-End Application Security from the Cloud

What is Web Security? Motivation

NSFOCUS Web Application Firewall White Paper

Networking for Caribbean Development

Barracuda Web Site Firewall Ensures PCI DSS Compliance

IJMIE Volume 2, Issue 9 ISSN:

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

How To Protect A Web Application From Attack From A Trusted Environment

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Basic & Advanced Administration for Citrix NetScaler 9.2

Durée 4 jours. Pré-requis

Web App Security Audit Services

Security 101: BIG-IP ASM and IPS Differences Defined

What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications

Business Case for a DDoS Consolidated Solution

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

Cutting the Cost of Application Security

Security Intelligenece: tracking obfuscated and unrecognized attacks Check Point Software Technologies Ltd.

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

2013 MONITORAPP Co., Ltd.

Modular Network Security. Tyler Carter, McAfee Network Security

How Web Application Security Can Prevent Malicious Attacks

How To Protect Your Web Applications From Attack From A Malicious Web Application From A Web Attack

White Paper A10 Thunder and AX Series Load Balancing Security Gateways

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

CS5008: Internet Computing

Load Balancing Security Gateways WHITE PAPER

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

IBM Protocol Analysis Module

From the Bottom to the Top: The Evolution of Application Monitoring

Web Application Vulnerability Testing with Nessus

Protect Your Business and Customers from Online Fraud

Barracuda Intrusion Detection and Prevention System

Application Security Testing

IndusGuard Web Application Firewall Test Drive User Registration

A Network Administrator s Guide to Web App Security

(WAPT) Web Application Penetration Testing

Web Application Vulnerabilities and Avoiding Application Exposure

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

Web Application Firewall

IT Security Conference Romandie - Barracuda Securely Publishing Web Application a field dedicated to expert only?

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS

Real-Time Database Protection and. Overview IBM Corporation

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

IBM Advanced Threat Protection Solution

Enterprise-Grade Security from the Cloud

Rational AppScan & Ounce Products

SANS Top 20 Critical Controls for Effective Cyber Defense

Applications and data are the main targets for modern attacks. Adoption of dedicated application and data security concepts, technologies and

F5 and Microsoft Exchange Security Solutions

IBM. Vulnerability scanning and best practices

Reducing Application Vulnerabilities by Security Engineering

Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar!

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

Vulnerability Management

F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: Mob.:

Web Application Firewall for Untrusted Web Environments > White Paper

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Transcription:

Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks r.gibala@f5.com

Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week DATA F5 Networks, Inc 2

Web Application Security! Non-compliant Information! Infrastructural Intelligence Buffer Overflow Cross-Site Scripting SQL/OS Injection Cookie Poisoning Hidden-Field Manipulation Parameter Tampering Perimeter Security Is Strong PORT 80 PORT 443 But Is Open to Web Traffic Forced! Access to Information Attacks Now Look To Exploit Application Vulnerabilities High Information Density = High Value Attack F5 Networks, Inc 3

Web Application Security

Who is responsible for application security? Web developers? Network Security? Engineering services? DBA? F5 Networks, Inc 5

Web Application Protection Strategy Only protects against known vulnerabilities Best Practice Design Methods Web Apps Automated & Targeted Testing Done periodically; only as good as the last test Difficult to enforce; especially with sub-contracted code Only checks for known vulnerabilities Only periodic updated; large exposure window Web Application Firewall Does it find everything? Real-time 24 x 7 protection Enforces Best Practice Methodology Allows immediate protection against new vulnerabilities F5 Networks, Inc 6

Web Application Firewall

Common attacks on web applications BIG-IP ASM delivers comprehensive protection against critical web attacks CSRF Cookie manipulation OWASP top 10 Brute force attacks Forceful browsing Buffer overflows Web scraping Parameter tampering SQL injections information leakage Field manipulation Session high jacking Cross-site scripting Zero-day attacks Command injection ClickJacking Bots Business logic flaws F5 Networks, Inc 8

Traditional Security Devices vs. WAF Known Web Worms Unknown Web Worms Known Web Vulnerabilities Unknown Web Vulnerabilities Illegal Access to Web-server files Forceful Browsing File/Directory Enumerations Buffer Overflow Cross-Site Scripting SQL/OS Injection Cookie Poisoning Hidden-Field Manipulation Parameter Tampering Layer 7 DoS Attacks Brute Force Login Attacks App. Security and Acceleration Network Firewall Limited Limited Limited Limited Limited IPS Limited Partial Limited Limited Limited Limited Limited WAF F5 Networks, Inc 9

Full Proxy Security

Full-proxy architecture WAF WAF Slowloris attack SS HTTP irule irule HTTP Data leakage SSL renegotiation SSL irule irule SSL SYN flood ICMP flood TCP irule irule TCP Network Firewall F5 Networks, Inc 11

F5 provides comprehensive application security Virtual Patching Network DDoS Protection Web Application Firewall Network Access DNS DDoS Protection Application Access Network Firewall SSL DDoS Protection Application DDoS Protection Fraud Protection F5 Networks, Inc 12

Application Security Manager

BIG-IP Application Security Manager Provides transparent protection from ever changing threats Ensure application availability while under attack Deployed as a full proxy or transparent full proxy (bridge mode) Minimal impact on application performance Turn-on with license key or standalone Caching, compression and SSL acceleration included in standalone BIG-IP BIG-IP ASM security ASM security policy checked policy checked Server response generated Request made Secure response delivered Dynamic Multi-Layered Security BIG-IP ASM applies security policy Response Drop, block inspection or forward for errors request and leakage of sensitive Application information attack filtering & inspection SSL, TCP, HTTP DoS mitigation Vulnerable application BIG-IP Local Traffic Manager BIG-IP Application Security Manager F5 Networks, Inc 14

BIG-IP Application Security Manager BIG-IP ASM protects the applications your business relies on most and scales to meet changing demands. Comprehensive protections Protection web app vulnerabilities including L7 DDoS Advanced anti-bot mitigation Integrated ML firewall Multiple deployment options Standalone or ADC add-on Appliance or Virtual edition Manual or automatic policy building 3rd party DAST integration Visibility and analysis Visibility and analysis High speed customizable syslog Granular attack details Expert attack tracking and profiling Policy & compliance reporting Integrates with SIEM software Full HTTP/S request logging F5 Networks, Inc 15

ASM Comprehensive Protection

Comprehensive Protections BIG-IP ASM extends protection to more than application vulnerabilities L7 DDOS ML Firewall Web Scraping Geolocation blocking ASM Web bot identification ICAP anti-virus Integration ML filtering, validation & mitigation F5 Networks, Inc 17

Site Visit Site Log In User Navigation Transactions Transaction Execution Fraud Protection Device Fingerprinting Geo-location Brute Force Detection Behavioral Analysis Behavioral and Click Analysis Abnormal Money Movement Analysis Customer Fraud Alerts Phishing Threats Credential Grabbing Malware Injections PII and CC Grabbing Automatic Transactions F5 Networks, Inc 18

Building The Security Policy

Different ways to build a policy Security policy checked Security policy applied DYNAMIC POLICY BUILDER INTEGRATION WITH APP SCANNERS PRE-BUILT POLICIES Automatic No knowledge of the app required Adjusts policies if app changes Manual Advanced configuration for custom policies Virtual patching with continuous application scanning Out-of-the-box Pre-configure and validated For mission-critical apps including: Microsoft, Oracle, PeopleSoft F5 Networks, Inc 20

Identify, virtually patch, mitigate vulnerabilities Scan application with a web application security scanner: Import vulnerabilities into BIG-IP ASM Mitigate web app attacks Hacker Generic Scanner Qualys IBM WhiteHat Cenzic HP WI Clients F5 Networks, Inc 21

Reporting

Detailed logging with actionable reports At-a-glance PCI compliance reports Drill-down for information on security posture F5 Networks, Inc 23

Enhanced visibility and analysis Statistics collected URLs Server/client latency Throughput Response codes Methods Client IPs and geos User agents User sessions Views Virtual server Pool member Response codes URLs and HTTP methods Application analytics for assured availability ASM logs provide deeper intelligence grouped by application and user Rules can be applied based on user behavior Latency monitoring provides: Business intelligence/capacity planning Troubleshooting and performance tuning Anomalous behavior detection F5 Networks, Inc 24