Application Security Manager ASM. David Perodin F5 Engineer



Similar documents
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Presented by Philippe Bogaerts Senior Field Systems Engineer Securing application delivery in the cloud

Dynamic Attack Protection and Access Control

F5 NETWORKS, INC. Secure Your Applications, Simplify Authentication, and Optimize Critical System

Overview of F5 Networks. Fatih Bilger Senior Systems Engineer, Prolink.

Cutting the Cost of Application Security

F5 Silverline Web Application Firewall Onboarding: Technical Note

Datacenter Transformation

FortiWeb 5.0, Web Application Firewall Course #251

F5 Networks Overview Maximizing the Performance and Delivery of Your Mission Critical Enterprise Applications

Application Security in the Cloud with BIG-IP ASM

End-to-End Application Security from the Cloud

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5

Post-TMG: Securely Delivering Microsoft Applications

Getting More Performance and Efficiency in the Application Delivery Network

Vulnerability Management

Document version: 1.3 What's inside: Products and versions tested Important:

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

F5 and Oracle Database Solution Guide. Solutions to optimize the network for database operations, replication, scalability, and security

The Hillstone and Trend Micro Joint Solution

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH MICROSOFT INTERNET INFORMATION SERVICES (IIS) 7.0

F5 BIG DDoS Umbrella. Configuration Guide

F5 White Paper. The F5 Powered Cloud

10 Things Every Web Application Firewall Should Provide Share this ebook

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010

Business Case for a DDoS Consolidated Solution

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007

High-Performance DNS Services in BIG-IP Version 11

DEPLOYMENT GUIDE. Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0

F5 Datacenter Virtualization & Application Security

Security F5 SECURITY SOLUTION GUIDE

Durée 4 jours. Pré-requis

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Multi-Layer Security for Multi-Layer Attacks. Preston Hogue Dir, Cloud and Security Marketing Architectures

IBM Security Intelligence Strategy

NASCIO 2015 State IT Recognition Awards

Deploying the BIG-IP System v10 with SAP NetWeaver and Enterprise SOA: ERP Central Component (ECC)

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

How To Protect A Web Application From Attack From A Trusted Environment

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

DEPLOYMENT GUIDE Version 1.0. Deploying F5 with the Oracle Fusion Middleware SOA Suite 11gR1

Deploying the BIG-IP System v10 with Oracle Application Server 10g R2

Akamai Security Products

F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: Mob.:

BeyondInsight Version 5.6 New and Updated Features

Enterprise-Grade Security from the Cloud

White paper. Keys to SAP application acceleration: advances in delivery systems.

Cisco Advanced Services for Network Security

How To Buy Nitro Security

Business Case for Data Center Network Consolidation

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Deploying the BIG-IP System v11 with SAP NetWeaver and Enterprise SOA: ECC

Security 101: BIG-IP ASM and IPS Differences Defined

F5 provides a secure, agile, and optimized platform for Microsoft Exchange Server 2007 deployments

F5 (Security) Web Fraud Detection. Keiron Shepherd Security Systems Engineer

Deploying the BIG-IP LTM with. Citrix XenApp. Deployment Guide Version 1.2. What s inside: 2 Prerequisites and configuration notes

Optimize Application Delivery Across Your Globally Distributed Data Centers

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Fusion Middleware Identity Management 11gR1

Configuring Security for FTP Traffic

Integrating F5 Application Delivery Solutions with VMware View 4.5

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

The F5 Intelligent DNS Scale Reference Architecture.

DEPLOYMENT GUIDE DEPLOYING F5 WITH MICROSOFT WINDOWS SERVER 2008

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Threat-Centric Security for Service Providers

What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

IT Security Conference Romandie - Barracuda Securely Publishing Web Application a field dedicated to expert only?

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Extreme Networks Security Analytics G2 Vulnerability Manager

Firewall Testing Methodology W H I T E P A P E R

How To Create Situational Awareness

IBM Security IBM Corporation IBM Corporation

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Reference Architecture: Enterprise Security For The Cloud

A Layperson s Guide To DoS Attacks

Aplikacija novi vladar poslovanja. Dino Novak F5 Networks

PCI DSS Reporting WHITEPAPER

Application Security in the Software Development Lifecycle

F5 ASM i DB Monitoring w ofercie NASK

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

Deploying the BIG-IP System v10 with VMware Virtual Desktop Infrastructure (VDI)

Deploying the BIG-IP System with Microsoft IIS

Secret Server Qualys Integration Guide

bbc Adobe LiveCycle Data Services Using the F5 BIG-IP LTM Introduction APPLIES TO CONTENTS

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

TMOS Secure Development and Implementation

1 Introduction Product Description Strengths and Challenges Copyright... 5

Application centric Datacenter Management. Ralf Brünig, F5 Networks GmbH Field Systems Engineer March 2014

Transcription:

Application Security Manager ASM David Perodin F5 Engineer

3 Overview BIG-IP Application Security Manager (ASM) a type of Web application firewall ASM s advanced application visibility, reporting and analytics Vulnerability assessment and mitigation with well-known third-party partners (WhiteHat Sentinel, Oracle, Splunk)

4 Organizations Worldwide Trust F5 F5 Customer highlights 43 of the Fortune 50 companies 1 15 of the top 15 US commercial banks 1 6 of the 6 top US airlines 1 10 of the top 10 US insurance companies - property and casualty 1 5 of the top 6 healthcare: pharmacy and other services 1 14 of the 15 executive branch departments of the US federal government 2 10 of the top 10 fixed AND mobile global service providers 3 9 of the top 10 US online video brands 4 4 of the top 5 US Internet search providers 5 17 of 20 cloud infrastructure and Web hosting companies 6 Sources: 1 Fortune 2010; 2 USA.gov Web site listing 3 Q310 Ovum Market share, by revenue, global; 4 Nielson NetRatings September 2010; 5 Comscore November 2010; 6 Gartner Magic Quadrant Cloud Infrastructure as a Service and Web Hosting (On Demand, December 2010)

5 F5 Application Delivery Networking

6 Attacks are Moving Up the Stack Network Threats Application Threats 90% of security investment focused here 75% of attacks focused here Source: Gartner

7 Mobile Apps are consuming more of Web

8 Almost every web application is vulnerable! 97% of websites at immediate risk of being hacked due to vulnerabilities! 69% of vulnerabilities are client side-attacks 8 out of 10 websites vulnerable to attack - Web Application Security Consortium - WhiteHat security report 75 percent of hacks happen at the application. - Gartner Security at the Application Level 64 percent of developers are not confident in their ability to write secure applications. - Microsoft Developer Research

9 How long to resolve a vulnerability? Website Security Statistics Report

10 BIG-IP Application Security Manager Powerful Adaptable Solution Provides comprehensive protection for all web application vulnerabilities, including (D)DoS Logs and reports all application traffic and attacks Educates admin. on attack type definitions and examples Enables L2->L7 protection Unifies security, access control and application delivery Sees application level performance Provides On-Demand scaling

11 Anonymous Attack Anonymous targeted customer with bots Traffic attack melted legacy systems Solution: Implement BIG-IP BIG-IP Attack Protection: Greater connection management LTM to mitigate network DDoS ASM to mitigate application DDoS irules for agility and extensibility

12 Quickly Resolve Application Vulnerabilities Request made BIG-IP ASM security policy checked Server response Enforcement Secure response delivered BIG-IP ASM applies security policy Vulnerable application Maintain security at application, protocol, and network levels Launch secure applications protected from vulnerabilities

13 Automatic DOS Attack Detection and Protection Accurate detection technique based on latency 3 different mitigation techniques escalated serially Focus on higher value productivity while automatic controls intervene Detect a DOS condition Identify potential attackers Drop only the attackers

14 Creating an ASM Policy

15 BIG-IP ASM Configuration Policy Configuration Step 1

16 BIG-IP ASM Configuration Policy Configuration Step 2

17 BIG-IP ASM Configuration Policy Configuration Step 3

18 BIG-IP ASM Configuration Policy Configuration Step 4

19 BIG-IP ASM Configuration Policy Enforcement Mode

20 BIG-IP ASM Configuration Policy Blocking Settings

21 BIG-IP ASM Configuration File Type Configuration

22 BIG-IP ASM Configuration URL Configuration

23 BIG-IP ASM Configuration Content Profile Configuration

24 BIG-IP ASM Configuration Parameter Configuration

25 BIG-IP ASM Configuration Parameter Configuration JSON Parser

26 BIG-IP ASM Configuration AJAX Response Page

27 ASM and the Software Development Lifecycle Policy Tuning Pen tests Performance Tests WAF offload features: Cookies Brute Force DDOS Web Scraping SSL, Caching, Compression Final Policy Tuning Pen Tests Incorporate vulnerability assessment into the SDLC Use business logic to address known vulnerabilities Allow resources to create value

28 Reporting

29 Application visibility and reporting Monitor URIs for server latency Troubleshoot server code that causes latency

30 See the BIG Picture: From Violations to An Incident Automatically correlate multiple violations which share a common denominator into a single incident Correlation is based Source IP, and URL/ Parameter

31 Attack Expert System in ASM 1. Click on info tooltip

32 Centralized Advanced Reporting with Splunk Centralized reporting with Splunk s large-scale, high-speed indexing and search solution Packaged 15 different ASM specific reports Provide visibility into attack trends and traffic trends Identify unanticipated threats before exposure occurs http://www.f5.com/solutions/technol ogy-alliances/security/splunk.html

33 Application Analytics Stats grouped by application and user Provides Business Intelligence ROI Reporting Capacity Planning Troubleshooting Performance Stats Collected URLs Server Latency Client-Side Latency Throughput Response Codes Methods Client IPs Client Geographic User Agent User Sessions Views Virtual Server Pool Member Response Codes URL HTTP Methods

34 Automation and Integration

35 The Real Problem Attacks have been operationalized but mitigation has not Attacks are persistent Discovery of Vulnerabilities and attacks are easily automated Operational gap between discovery and mitigation

36 The Result Organizations are consistently vulnerable An organizations web application presence is, on average, free from vulnerabilities for only 30 days during the year. 4 Years and 4 Thousand Websites Worth of Vulnerability Assessments: What Have We Learned? (WhiteHat Security)

37 The Result Organizations are highly vulnerable Simple vulnerabilities have a significant percentage chance of resulting in a breach

The Solution Operationalize web application security 38 Automatically close the gap between discovery and mitigation

Persistent Threat Management Applying the 80-20 rule to web application security 39 80% 20% 80% of attacks can be prevented by applying common, standardized mitigation rules Immediately reduces window of opportunity for exploitation 20% of vulnerabilities require developer or vendor attention Leverage programmability in the network to temporarily mitigate

40 Persistent Threat Management Leveraging automation and integration to operationalize security

41 Persistent Threat Management The New Security Operational Model

42 Protection from Vulnerabilities Enhanced Integration: BIG-IP ASM and WhiteHat Sentinel Customer Website Finds a vulnerability Virtual-patching with one-click on BIG-IP ASM White Hat Sentinel Vulnerability checking, detection and remediation Complete website protection BIG-IP Application Security Manager Verify, assess, resolve and retest in one UI Automatic or manual creation of policies Discovery and remediation in minutes

43 Configuration

44 Configuration

45 Importing Vulnerabilities

46 Service Options F5 BIG-IP ASM Vulnerability Mitigation Assessment Scan finding data collected Findings imported into ASM Report Creation Deliverables Vulnerability Mitigation Roadmap F5 BIG-IP ASM Vulnerability Mitigation Subscription Performed periodically and remotely Findings imported into ASM Report Creation Deliverables Vulnerability Mitigation Report 4 hours tuning ASM to remediate findings AVAILABLE AUGUST 2012

Jon Teunis and David Perodin 2011 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG-IP, ARX, FirePass, icontrol, irules, TMOS, and VIPRION are registered trademarks of F5 Networks, Inc. in the U.S. and in certain other countries