IronBee Open Source Web Application Firewall

Similar documents
Web Application Firewalls: When Are They Useful? OWASP AppSec Europe May The OWASP Foundation

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

BlackRidge Technology Transport Access Control: Overview

Web Application Security How to Minimize Prevalent Risk of Attacks

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

F5 Silverline Web Application Firewall Onboarding: Technical Note

Radware s Attack Mitigation Solution On-line Business Protection

On-Premises DDoS Mitigation for the Enterprise

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

Web Intrusion Detection with ModSecurity. Ivan Ristic

NE T GENERATION CLOUD SECURITY PLATFORM

ModSecurity The Open Source Web Application Firewall

SSL Server Rating Guide

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Bringing Continuous Security to the Global Enterprise

NSFOCUS Web Application Firewall

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

NSFOCUS Web Application Firewall White Paper

Building A Secure Microsoft Exchange Continuity Appliance

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

The Web AppSec How-to: The Defenders Toolbox

Using QUalysgUard to Meet sox CoMplianCe & it Control objectives

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Host-based Protection for ATM's

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

NSFOCUS Web Vulnerability Scanning System

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

DMZ Gateways: Secret Weapons for Data Security

New Requirements for Security and Compliance Auditing in the Cloud

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

Owner of the content within this article is Written by Marc Grote

Second-generation (GenII) honeypots

WHITE PAPER. Enhancing Application Delivery and Load Balancing on Amazon Web Services with Brocade Virtual Traffic Manager

5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP

Current IBAT Endorsed Services

Automating Security Testing. Mark Fallon Senior Release Manager Oracle

Ovation Security Center Data Sheet

Web Application Firewall

BEST PRACTICES RESEARCH

F5 ASM i DB Monitoring w ofercie NASK

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Networking and High Availability

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Intrusion Defense Firewall

Imperva s Response to Information Supplement to PCI DSS Requirement Section 6.6

Avoiding the Top 5 Vulnerability Management Mistakes

Offline Scanner Appliance

API Management: Powered by SOA Software Dedicated Cloud

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

SourceFireNext-Generation IPS

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International.

How To Create An Intelligent Infrastructure Solution

Securely Connect, Network, Access, and Visualize Your Data

White Paper Secure Reverse Proxy Server and Web Application Firewall

A New Approach to IoT Security

Firewalls, Tunnels, and Network Intrusion Detection

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

Corporate Bill Analyzer

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

CTX OVERVIEW. Ucentrik CTX

SYMANTEC DATA CENTER SECURITY: SERVER ADVANCED 6.5

Securing Cloud using Third Party Threaded IDS

Cisco IPS Tuning Overview

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Delivering IT Security and Compliance as a Service

Network Services in the SDN Data Center

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

API Architecture. for the Data Interoperability at OSU initiative

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.

Passing PCI Compliance How to Address the Application Security Mandates

A Modern Framework for Network Security in the Federal Government

NetScreen s Approach to Scalable Policy-based Management

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015

Next Generation IPS and Reputation Services

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)

Sitefinity Security and Best Practices

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Solution Brief: Enterprise Security

Making Database Security an IT Security Priority

Transcription:

IronBee Open Source Web Application Firewall Building a universal web application firewall engine www.ironbee.com

Introduction Qualys is announcing the development of IronBee, a new open source project to build a universal web application security sensor. Our desire is not only to build the code and the rules, but also to focus on building a community around the project. In fact, we believe that building the community is the most important aspect of the project and the only way to ensure that it has a long life. The Need for Web Application Security Monitoring Why do we need to monitor our web applications and provide additional protection measures? Because software today is inherently insecure, and we need to manage the situation. Consider the following contributing factors: Software engineering is immature We still have a long way to go until we learn how to build robust software in a predictable and repeatable way. We are making good progress when it comes to best practices, but the average developer still struggles. Technology moves at a very fast pace Innovation drives companies forward, but features often come first, and security is an afterthought. We are playing catch-up all the time. Businesses must move quickly Security plays a relatively minor role in the success of a business, with many other factors having far greater influence. There s a fine balance between security, usability, and time to market. Businesses generally focus on reaching the market as soon as possible, adopting a we ll secure it if it succeeds attitude. Legacy applications Not only do we have a large backlog of existing applications, but because of the very fast pace of development, our new applications become old virtually as soon as we deploy them. But what does manage the situation mean? The answer depends on whom you ask. These are some of the common use cases for application security monitoring and defense: Compliance Virtual patching (usually for custom applications) Protection against known exploits (usually for well-known applications) Application hardening (raising the bar) Real-time application security monitoring (also known as situational awareness) Passive continuous vulnerability assessment Toward a Universal Web Application Security Sensor We are proposing that the security community design, build, and deploy a universal application security sensor. We envision a flexible framework that will be used as a foundational building block by all those concerned with application security monitoring. Standardization will bring the following advantages: 2

Higher quality and development cost savings Developing an application security monitoring sensor is not a trivial job. It requires substantial understanding of the key concepts, sustained development effort, and security knowledge, as well as years of making and fixing mistakes. It is an effort that requires extensive collaboration with everyone in the security community. It is a job that is too big to do more than once. Universal availability Organizations often incorporate diverse components into their infrastructures using different software products. They also outsource parts of their infrastructure to others. Having the same application security framework available across the board is the most efficient way for an organization to retain security control. Portability of security logic With universal availability of a common framework, we can approach the ideal of write once, use everywhere. For example, a rule that defends against a known problem in a popular web application can be deployed everywhere, no matter what platform the application is deployed on. Information exchange By being able to target a single platform and freely exchange information on application security attacks and defenses, we hope to create a thriving ecosystem for information exchange. It s All About the Community The success of IronBee depends on our ability to create the right conditions for the community to form and to inspire others to join it. If we succeed, IronBee will flourish. There are two key aspects to this success: Liberal open source license For a community to form and grow, everyone must be equal. Viral open source licenses often exclude those with commercial interests and create inequality (for example, when copyright assignment is required in order for some code to become part of the official distribution). IronBee uses the business-friendly Apache 2.0 software license and requires no copyright assignment. Sustainable community The license makes us community-ready, but we are also taking the next step toward making the project fully public and transparent, as a proper open source project should be. Furthermore, we are structuring the project to support a variety of challenges and implementation tasks designed to match the variety of interests and skills of the community providing opportunities for everyone. Key Technical Directions These are our key technical directions: Diversity of deployment modes There is no best way to deploy an application security sensor. Some people love the embedded sensor approach for its scalability; others accept only the reverse proxy approach because it provides full isolation. There are many reasons why different deployment modes exist some technical, some philosophical. The truth is that the real world is messy and that we must deal with it. IronBee will look at a variety of deployment modes: passive, embedded, reverse 3

proxy, command-line (for batch processing), and out-of-process (in which traffic is shipped for inspection outside the process or server of origin). Portability We use abstractions to make the bulk of the code independent from environmental variations. Porting IronBee to a new environment (e.g., web server or proxy) should require only the implementation of a very small interface layer that deals with data acquisition. Modularity Modularity is important for two reasons. First, new developers should be able to implement their ideas quickly, without having to understand how the project as a whole works. We will enable this ease of usage with good APIs and documentation. Second, deployment-time modularity allows end-users and packagers to customize the sensor to perform well in their own environments. Powerful functionality We are not forgetting the users. After all, the product must address the core user needs in order to be successful. We are going to do this by offering a range of features, each suitable for a particular requirement. We will equally address security and usability needs with an easy-to-use configuration language, advanced features for advanced users, and many time-saving features on a high level of abstraction. Technical quality At the end of the day, it is very important that the sensor is of high quality secure, robust, and efficient. Our source code is just that, with fully automated cross-platform builds and unit and regression testing. Key Functional Directions IronBee implements a robust framework for application security monitoring and defense. It provides a layered set of features at different levels of abstraction, enabling its users to choose the approach that works best for the work they need to accomplish. What follows is our vision of the operation of the framework, which we will use as a starting point for determining the exact features we will implement: 1. Flexible data acquisition options (i.e., deployment modes) 2. Personality-based data processing that matches the parsing quirks in the back-end 3. A persistent data model that mirrors real-life entities such as applications, sessions, users, and IP addresses and that allows both short-term and long-term activity tracking 4. Aggregation of historical data (from the internal data store) as well as the information from external data sources, such as: a. Geolocation information b. IP address reputation 5. User agent profiling 6. An efficient data retrieval and transformation engine that provides transparent optimization and rule prequalification, ensuring that no time is spent on needless or repetitive work 7. Multiple pattern matchers and support for streaming inspection 8. A choice of approaches to implement custom security logic: a. Flexible rule language suitable for 80% of all work 4

b. A high-performing scripting platform (based on Lua) for the next 19% c. Support for compiled modules for the 1% of cases in which performance is of the highest importance 9. Inbound and outbound traffic analysis of: a. Protocol compliance (blacklisting and whitelisting) b. Common attack techniques c. Evasion techniques (on the protocol and application levels) d. Known exploits e. Protection for vulnerabilities in popular applications (via whitelisting) f. Virtual patching (via whitelisting) g. Information leakage h. Error message detection 10. Higher-level security modules: a. Behavioral monitoring of IP addresses, sessions, and users b. Brute force detection c. DoS and DDoS detection d. Cookie encryption and signing e. Content security policy enforcement f. Passive vulnerabilty scanning g. User experience monitoring h. XML parsing and validation 11. Policy decisions 12. Tailored defense 13. Interaction with external security systems (e.g., firewalls) and data exchange Rules Having a good framework is great, but it is important to couple the framework with an effective rule set that brings value to users across a broad spectrum: Complete security coverage Rules should provide reasonably complete coverage of application security issues. Effectiveness Rules should achieve their targets of detecting and preventing attacks, making it impossible (in some cases) or substantially more difficult (in others) for attackers to succeed. Low rate of false positives There should be a minimal and tolerable number of false positives to handle. Ease of use Choosing what rules to run, how to respond to events, and how to create exceptions should not be a burden on administrators. 5

Documentation All rules should be well documented, with their purpose, coverage, and side effects clearly explained. Traceability Every rule must be traced back to a need, which will allow users to make an informed decision about whether that rule is needed in their environment. Whenever possible, we will aim to remain compatible with existing solutions. Status and Next Steps At this time, we are looking for early adopters and those who wish to participate in shaping the project: Developers to work on the IronBee core and on the security modules Application defenders to tell us what they need and to provide feedback on our proposed solutions (e.g., configuration language, signature language) Application security researchers to exchange attack information, to write signatures and rules, and to design new detection and protection techniques Web server and proxy developers to help us make IronBee work in their environments Distribution maintainers to package IronBee to run on their systems Infrastructure and cloud providers to help make IronBee effective for embedding into their infrastructures We are very excited to have this opportunity to work on a critical piece of security infrastructure in partnership with other members of the security community. We hope that you will share our enthusiasm and join us. Schedule Our development roadmap is located in the IronBee wiki. We are not assigning deadlines to milestones, but, roughly, we are working toward a goal is to have a robust version ready by the mid-2012. About Qualys Qualys, Inc. (www.qualys.com) is the leading provider of on-demand IT security risk and compliance management solutions delivered as a service. Qualys s Software-as-a-Service solutions are deployed in a matter of hours anywhere in the world, providing customers with an immediate and continuous view of their security and compliance postures. The QualysGuard service is used today by more than 3,500 organizations in 85 countries, including 40 of the Fortune Global 100; QualysGuard performs more than 200 million IP audits per year. Qualys has the largest vulnerability management deployment in the world at a Fortune Global 50 company. Qualys has established strategic agreements with leading managed service providers and consulting organizations, including BT, Etisalat, Fujitsu, IBM, I(TS)2, LAC, SecureWorks, Symantec, Tata Communications, TELUS, and VeriSign. Copyright 2011-2012 Qualys, Inc. All rights reserved. 6