InfoSphere Guardium Tech Talk Data privacy and dynamic masking for web applications: InfoSphere Guardium for Applications



Similar documents
IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

The Top Web Application Attacks: Are you vulnerable?

Real-Time Database Protection and. Overview IBM Corporation

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

WEB 2.0 AND SECURITY

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Where every interaction matters.

From the Bottom to the Top: The Evolution of Application Monitoring

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Breaking down silos of protection: An integrated approach to managing application security

IBM Security QRadar Vulnerability Manager

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

05.0 Application Development

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

IT Security Conference Romandie - Barracuda Securely Publishing Web Application a field dedicated to expert only?

SANS Dshield Webhoneypot Project. OWASP November 13th, The OWASP Foundation Jason Lam

PCI Solution for Retail: Addressing Compliance and Security Best Practices

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Hack Proof Your Webapps

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

McAfee Database Security. Dan Sarel, VP Database Security Products

8 Steps to Holistic Database Security

Risk-based solutions for managing application security

IBM Software InfoSphere Guardium. Planning a data security and auditing deployment for Hadoop

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Check list for web developers

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Bridging the gap between COTS tool alerting and raw data analysis

10 Things Every Web Application Firewall Should Provide Share this ebook

Security Intelligence

Cloud Security Who do you trust?

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

White Paper. What Auditors Want Database Auditing. 5 Key Questions Auditors Ask During a Database Compliance Audit

Data-Centric Security vs. Database-Level Security

Application Monitoring for SAP

Encryption is Fundamental: A Technical Overview of Guardium Data Encryption October 2014

White Paper Secure Reverse Proxy Server and Web Application Firewall

elearning for Secure Application Development

Rational AppScan & Ounce Products

Safeguarding the cloud with IBM Dynamic Cloud Security

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Security of Cloud Computing for the Power Grid

IT Architecture Review. ISACA Conference Fall 2003

Attack Vector Detail Report Atlassian

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

How To Protect Your Web Applications From Attack From A Malicious Web Application From A Web Attack

IBM Exam M IBM Security Sales Mastery Test v4 Version: 7.0 [ Total Questions: 62 ]

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Guidelines for Web applications protection with dedicated Web Application Firewall

IBM Software Five steps to successful application consolidation and retirement

IBM Advanced Threat Protection Solution

An Oracle White Paper January Oracle Database Firewall

Practical Advice for Cloud Data Protection

IBM Security Strategy

Introducing IBM s Advanced Threat Protection Platform

Reference Architecture: Enterprise Security For The Cloud

How DataSunrise Helps to Comply with SOX, PCI DSS and HIPAA Requirements

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

CONTENTS. PCI DSS Compliance Guide

mission critical applications mission critical security Internal Auditor Primer: Oracle E-Business Suite Security Risks Primer

Evaluation of Web Security Mechanisms Using Inline Scenario & Online Scenario

2015 Vulnerability Statistics Report

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Performance Analytics with TDSz and TCR

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Web Application Security

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Web attacks and security: SQL injection and cross-site scripting (XSS)

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS. Junos WebApp Secure Junos Spotlight Secure

An Oracle White Paper January Oracle Database Firewall

Web Engineering Web Application Security Issues

Complete Database Security. Thomas Kyte

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

Auditing the Security of an SAP HANA Implementation

The Evolution of Enterprise Application Security. Why enterprises need runtime application self-protection

SAST, DAST and Vulnerability Assessments, = 4

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

IBM Security Intelligence Strategy

THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY

Extreme Networks Security Analytics G2 Vulnerability Manager

ECG-1615A. How to Integrate IBM Enterprise Content Management Solutions With Microsoft SharePoint and IBM Connections. elinar.com

Strategic Information Security. Attacking and Defending Web Services

Transcription:

InfoSphere Guardium Tech Talk Data privacy and dynamic masking for web applications: InfoSphere Guardium for Applications Nick Briers, WW Product Manager Ariel Farkash, Lead Developer

Logistics This tech talk is being recorded. If you object, please hang up and leave the webcast now. We ll post a copy of slides and link to recording on the Guardium community tech talk wiki page: http://ibm.co/wh9x0o You can listen to the tech talk using audiocast and ask questions in the chat to the Q and A group. We ll try to answer questions in the chat or address them at speaker s discretion. If we cannot answer your question, please do include your email so we can get back to you. When speaker pauses for questions: We ll go through existing questions in the chat 2 2

Reminder: Next InfoSphere Guardium Tech Talk Next tech talk: Look for an upcoming tech talk in January, 2015!! Link to more information about this and upcoming tech talks can be found on the InfoSphere Guardium developerworks community: http://ibm.co/wh9x0o Please submit a comment on this page for ideas for tech talk topics. 3

Meet fellow Guardium users Next InfoSphere Guardium user group meeting will be held in Foster City, California on Wednesday, January 28 th Guarantee your spot and register today! 4

Agenda Introduction and overview Use cases Live demo 5

What is InfoSphere Guardium for Applications? Provides real-time masking of web application data No changes to application or database required Works for legacy and packaged applications Helps meet compliance to security and privacy requirements Data Center Name: SSN: Balance: John Smith 111-11-1111 $127.50 Guardium Application Dynamic Data Masking Name: SSN: Balance: John Smith * 35* * -**-1111 $127.50 Outsourced Call Center 6

Introduction Why companies need it? Preventing exposure of sensitive or private data by their web applications to people who should not be able or allowed to see that data Meeting their compliance and legal requirements and avoiding penalties Making the best use of existing applications in new business environments whilst still maintaining control of sensitive and private data Keeping the company assets and data under control even when they do not own the data base or application code 7

Introduction Who needs it? Line of business stake holders as they need to be able to move quickly to make the best business decisions Outsourcing managers as they are looking to utilise off shore resources effectively CISO who will be aware of the compliance and security concerns 8

Advantages of InfoSphere Guardium for Applications Simple to deploy and use Policy-driven approach using tried and trusted Guardium architecture and technology Testing is easy with preview capabilities No application code changes required Wide application coverage Real-time masking done at the protocol level on the glass independent of the application, or the data source enable consolidating your application security policies Following security best practices Promotes separation of duties by moving security and compliance decisions out of the app code Privacy setting and policy management done outside of the application 9

Data is the key target for security breaches WHY? most breaches exploit application vulnerability more breached records are extracted from databases Applications are more exposed. 80% of breaches come through the applications Applications present high value data, potential for leakage and risk Applications have direct access to the back-end databases Database are considered the holy grail when it comes to data breaches. Why? High volumes Organized nicely (structured) Easy to extract data 2012 Data Breach Report from Verizon Business RISK Team http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf Go where the money is and go there often. - Willie Sutton 10

The application security threat Web Application Vulnerabilities?????????????????????? XSS and SQL Injection Exploitations Web Application Vulnerabilities 33%of vulnerability disclosers are web application vulnerabilities Source: IBM X-Force Threat Intelligence Quarterly, 1Q 2014 XSS and SQL injection exploits are continuing in high numbers Source: IBM X-Force Threat Intelligence Quarterly, 1Q 2014 Many application are not built with security in mind IT often underestimates the risk applications introduce IT often overlook application weaknesses Applications had became the weakest link that attackers exploit to carry out a data breach, and gain access to the back-end data repositories Most application security policies today focus on application vulnerabilities Protection of application data is the key threat and risk to applications 11

Application security spending Where are your security risks versus your spend? 35% - Security Risk 30% - Spending Spend Risk 25% 20% 15% 10% 5% - Application Layer Data Layer Network Layer Human Layer Host Layer Physical Layer Many clients do not prioritize application security in their environments Source: The State of Risk-Based Security Management, Research Study by Ponemon Institute, 2013 12

Solid Architectural Foundation- Guardium Two different environments, same data monitoring architecture Application Dynamic Data Masking Application Security Application Owners Dynamic Data Masking for Apps Data Privacy Database Activity Monitoring Database Security Database Administrators Activity Monitoring Data Integrity and Privacy Application/ Web Server Database Servers STAP Collector Aggregator Database Activity Monitoring and Database Protection 13 Guardium Web Proxy Dynamic Data masking for Applications

InfoSphere Guardium for Applications USE CASES 14

USE CASE Browser Masking: Shield sensitive application data from unauthorized users Authorized User Facilitates outsourcing securely and with privacy 15 Easily share only the right type of data, even with mobile devices Un-authorized User

Application Dynamic Data Masking Sample Use Case: Call Center Outsourcing Health insurance company outsources its call center Customer Service Representatives (CSRs) access company applications remotely InfoSphere Guardium is installed in the middle to guarantee that application screens undergo masking process CSRs utilize the application as usual Sensitive information unessential for CSR operation is masked out Data Center Balance: $127.50 16 Name: John Smith SSN: *35* * -**-1111 Name: John Smith SSN: 111-11-1111 Guardium Application Dynamic Data Masking Outsourced Call Center Balance: $127.50

Application Dynamic Data Masking Sample Use Call Center Outsourcing Health insurance company outsources its call center Customer Service Representatives (CSRs) access company applications remotely InfoSphere Guardium is installed in the middle to guarantee that application screens undergo masking process CSRs utilize the application as usual Sensitive information unessential for CSR operation is tokenized (SSN) CSR updates customer record (tokenized SSN is used as the key to apply the changed data) Form Data Center Name: John Smith SSN: 111-11-1111 Balance: $127.50 Guardium Application Dynamic Data Masking Updated balance written back 17 Name: John Smith SSN: 35 123-45-6789 Balance: $127.50 Outsourced Call Center Form Name: John Smith SSN: 123-45-6789 Balance: $115.50 Balance Updated

Application Dynamic Data Masking Sample Use Case Application Training Customer needs to provide quick training on a new application to various external users and non-privileged internal users Application Test Customer has a need to provide quick verification of application changes, where the application takes as input from many databases types, files (batch processes) and live feeds (e-commerce bridges to external partners). Guardium for Applications provides a simple and easy way to meet these requirements without application change Examining and masking the output of the application after retrieval and processing of data by the application no matter where it came from Can handle HTTP traffic containing HTML, XML or JSON objects Can mask based on content or context Rules engine based on Guardium policy editor and engine No application changes needed Reduce training/ testing costs no need to create a specific test environment 18

Application Dynamic Data Masking Sample Use Case: Compliance and Privacy Customer is offering application services to its customers and now wants to meet PCI requirements for its customers. Options are Rewrite application suite to provide the necessary controls assuming you have access to application code and/ or database Use a technology like Guardium for applications to prevent the viewing of sensitive and private information including card numbers, etc. in line with the requirements of PCI. Guardium for Applications allows the PCI privacy and sensitivity controls To be developed separately from the application in accordance with security best practices To be easily changed as PCI develops without the cost of application changes 19

Learn more Web site: http://www-03.ibm.com/software/products/en/infosphere-guardium-for-applications YouTube demo (PeopleSoft example) http://youtu.be/yh0xnr1crmk developerworks wiki page https://www.ibm.com/developerworks/community/wikis/home?lang=en#!/wiki/wf32fc3a2c8cb_4b9c_8 3e4_09b3c6f60e46/page/InfoSphere%20Guardium%20for%20Applications 20

TECHNICAL ARCHITECTURE 21

High Level Architecture Rules DB User Interface Admin Security officer Runtime Interception point App user Browser 22 App Server

More detailed architecture Rules DB masking rules Author masking rules (policies) proxy icap Masking icap service Parsing and logging Masking runtime library Browser Guardium for Applications components Request App Server 23 Response

DEMO 24