Protecting Against SQLi in Real-Time



Similar documents
Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Software that provides secure access to technology, everywhere.

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Analyzing Logs For Security Information Event Management Whitepaper

The Evolution of Enterprise Application Security. Why enterprises need runtime application self-protection

Windows Server 2003 End of Support. What does it mean? What are my options?

2012 North American Managed Security Service Providers Growth Leadership Award

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

2012 Data Breach Investigations Report

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Secret Server Qualys Integration Guide

Protecting Your Organisation from Targeted Cyber Intrusion

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

SANS Top 20 Critical Controls for Effective Cyber Defense

Oracle Information Security Visioni

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Securing SharePoint 101. Rob Rachwald Imperva

Analyzing Logs For Security Information Event Management Whitepaper

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Some Notes on Web Application Firewalls

Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

An Oracle White Paper January Oracle Database Firewall

Analyzing Logs For Security Information Event Management

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

Information Technology Policy

David Rook. The Principles of Secure Development. OWASP Ireland Conference, Dublin

Passing PCI Compliance How to Address the Application Security Mandates

Effective Software Security Management

The Business Case for Security Information Management

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions

B database Security - A Case Study

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

WEB ATTACKS AND COUNTERMEASURES

Oracle Database Security

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Privilege Gone Wild: The State of Privileged Account Management in 2015

IT Security Strategy and Priorities. Stefan Lager CTO Services

Improving your Secure SDLC ( SSDLC ) with Prevoty. How adding real-time application security dramatically decreases vulnerabilities

Scalability in Log Management

The Evolution of Application Monitoring

PCI DSS Overview and Solutions. Anwar McEntee

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

McAfee Network Security Platform

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Overcoming PCI Compliance Challenges

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

A Case for Managed Security

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Auditing the Security of an SAP HANA Implementation

Application Monitoring for SAP

The Top Web Application Attacks: Are you vulnerable?

ICTN Enterprise Database Security Issues and Solutions

Enterprise Cybersecurity: Building an Effective Defense

Real-Time Database Protection and. Overview IBM Corporation

Privilege Gone Wild: The State of Privileged Account Management in 2015

Secure Development Lifecycle. Eoin Keary & Jim Manico

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

CorreLog: Mature SIEM Solution on Day One Paul Gozaloff, CISSP. Presentation for SC Congress esymposium CorreLog, Inc. Tuesday, August 5, 2014

Attack and Penetration Testing 101

Application Security in the Software Development Lifecycle

IBM QRadar Security Intelligence April 2013

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows

From the Bottom to the Top: The Evolution of Application Monitoring

PCI Requirements Coverage Summary Table

Web Application Security

Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations

Data Sheet: Vigilant Web Application Firewall. Where every interaction matters. Security-as-a-Service. Fully Managed Solution

Detecting Unknown Malware: Security Analytics & Memory Forensics. Fahad Ehsan. Cyber Security #RSAC

Continuous Network Monitoring

Compliance Guide: PCI DSS

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

HP NonStop Server Security and HP ArcSight SIEM

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Transcription:

The OWASP Foundation http://www.owasp.org Protecting Against SQLi in Real-Time Stuart Hancock stuart.hancock@dbnetworks.com bob.dewolfe@dbnetworks.com

AGENDA SQL injection attacks primary database security focus SQL injection detection/prevention current technologies don t work SQL threat assessment technology a new approach

Overview Web-based attacks: vast majority of data loss Verizon Business report: 900+ breaches, >900M records lost Threat is primarily from the outside PCI compliance is no panacea Attacks follow money Financial, Hospitality, Retail

Overview Majority of losses to Web-based attacks 2004-2009: 900+ breaches, >900M records lost

Outside Threats are Primary 70% of attacks are external 21% of victims were PCI-compliant Attacks follow money: Financial 33% Hospitality 23% Retail 15% The rest vast majority unreported

High Profile Targets Get Attacked High profile targets become hacking trophies ² Stratfor ² NSA ² Oklahoma DOC ² Symantec ² US Census Bureau ² United Nations

SQL Injection Attacks Database attacks result in: Leakage of sensitive information Destruction of important information Defacement of websites Distribution of malicious code SQL Injection remains the preferred method of attack

SQL Injection Scenario

Can we get valuable data? Username injected with NO password Entire Database Dumped

State of the Industry Current offerings (multi-tiered model): Code Review/Scanning Pattern Recognition (WL/BL) SQL Statement by Statement Training Problems: Good luck with writing perfect code Chasing the horse that left the barn Very long learning cycle, high false positives

CODE REVIEW Software will always have bugs and by extension, security vulnerabilities. A practical goal for a secure software development lifecycle (SDLC) should be to reduce, not necessarily eliminate, the number of vulnerabilities introduced and the severity of those that remain. - Michael Howard, Microsoft, Senior Security Program Manager

Whitelist/Blacklist, Statement by Statement Learning Not effective horse already left the barn Not possible to predict new/unique attacks Application and Web Servers are SQL generators - Not possible to learn all generated SQL - High false positive rate as a result

What s needed: Adaptive Database Firewall Requires full understanding application/database tiers Profiles Web-based applications Deep semantic/parametric analysis, all SQL statements High sensitivity but low false positive rate Lexically new statements assessed for structural attacks Short training period Continuously refined profiles adapt to application changes

Time to safety Compared to non-adaptive white-list/black-list technology Applications are protected sooner much sooner Less resources consumed to achieve protection Application changes less likely during learning cycle Protects against new/unique attacks not previously seen Capable of monitoring future attack vectors SQL Threat Adaptive Assessment Technology Protection Level White-List Black-List Technology Time At Risk

Rapid Learning Long tail arrival of new statements Short learning cycles Reduce deployment costs keep pace with rapid application changes

Classic SQL Unique Statement Trend

When an Attack is Detected, one should Alert Create alerts via email, syslog (SIEM), and SNMP Audit logs identify breach - secure, signed logs Inform Analytics provide nature and scope of attack Analytics provided to provide efficient review Integration with third party audit/compliance facilities Block if desired Database session kill capability terminates attack Web tier integration provides session blocking Blocking presents challenges

Evolution of Database Security Time

Current Approaches: Continue as is, no DB protection Development phase code analysis/improvement Ø Applicable to new code development when possible Ø Too many vulnerabilities, expensive, time-consuming Ø Extensive required testing expensive, delays releases Post-breach: Forensics assess scope of damage applicable to determine liability, accountability.or..

Real-Time Production Phase Protection Genuine Protection in Real-Time Short learning cycle Multi-environment adaptable Profiling of each application s database activity Drop-in, transparent install Passive monitoring Multiple heterogeneous databases simultaneously Web-tier attack vector correlation

THANK YOU! Questions? Stuart Hancock stuart.hancock@dbnetworks.com 301-788-3192 Bob DeWolfe bob.dewolfe@dbnetworks.com 978-317-8197