From the Bottom to the Top: The Evolution of Application Monitoring



Similar documents
The Evolution of Application Monitoring

Bezpečnosť dát v HP Cloude

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Cloud Security:Threats & Mitgations

Passing PCI Compliance How to Address the Application Security Mandates

Where every interaction matters.

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Accelerating Software Security With HP. Rob Roy Federal CTO HP Software

Penta Security 3rd Generation Web Application Firewall No Signature Required.

Software EMEA Performance Tour Berlin, Germany June

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

How to complete the Secure Internet Site Declaration (SISD) form

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

End-user Security Analytics Strengthens Protection with ArcSight

HP NonStop Server Security and HP ArcSight SIEM

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Vulnerability Management

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

McAfee Network Security Platform

End-to-End Application Security from the Cloud

PCI DSS 3.0 Compliance

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

IBM QRadar Security Intelligence April 2013

HP Application Security Center

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Know your security in mission critical environments Petr Hněvkovský, Senior Security Consultant, HP Enterprise Security Products

HP CloudSystem Enterprise

IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING

Continuous Network Monitoring

IT Security & Compliance. On Time. On Budget. On Demand.

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

NSFOCUS Web Application Firewall White Paper

Solutions to Meet Your PCI Compliance Needs A whitepaper prepared by Coalfire Systems and HP

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Unified Security, ATP and more

Find the needle in the security haystack

College Training Program

TRENDS IN THE THREAT LANDSCAPE

Be Fast, but be Secure a New Approach to Application Security July 23, 2015

PCI Compliance for Cloud Applications

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

Bad Romance: Three Reasons Hackers <3 Your Web Apps & How to Break Them Up

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Learning objectives for today s session

Data Breaches and Web Servers: The Giant Sucking Sound

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

SAST, DAST and Vulnerability Assessments, = 4

HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA Enterprise Security

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Strategic Information Security. Attacking and Defending Web Services

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

The Web AppSec How-to: The Defenders Toolbox

Cenzic Product Guide. Cloud, Mobile and Web Application Security

Secure Cloud-Ready Data Centers Juniper Networks

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

From Rivals to BFF: WAF & VA Unite OWASP The OWASP Foundation

Secure Cloud Computing

10 Things Every Web Application Firewall Should Provide Share this ebook

PCI Compliance Updates

Swordfish

How To Protect A Web Application From Attack From A Trusted Environment

Adobe Systems Incorporated

Web Hacking Incidents Revealed: Trends, Stats and How to Defend. Ryan Barnett Senior Security Researcher SpiderLabs Research

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Решения HP по информационной безопасности

HP Fortify application security

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Applying a Holistic Defense-in- Depth Approach to The Cloud (with a dash of application security thrown in)

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

How To Ensure That Your Computer System Is Safe

Magento Security and Vulnerabilities. Roman Stepanov

Akamai to Incapsula Migration Guide

Speed Up Incident Response with Actionable Forensic Analytics

The Hillstone and Trend Micro Joint Solution

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

SANS Top 20 Critical Controls for Effective Cyber Defense

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

How To Protect Your Cloud From Attack

Getting Started with Web Application Security

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Production Security and the SDLC. Mark Kraynak Sr. Dir. Strategic Marketing Imperva

Netzwerkvirtualisierung? Aber mit Sicherheit!

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Dynamic Security for the Hybrid Cloud

HP ESP 2013 Solution Roadmap

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

Enterprise-Grade Security from the Cloud

Application Security Best Practices. Wally LEE Principal Consultant

Transcription:

From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification: HP Enterprise Intermediate Security

Your Headline Here (in Title Caps) Your talking point bullet text here Your next talking point bullet text here Third talking point, etc. Bullet can be indented by pressing the Tab key Third-level bullet created by pressing Tab key again Reverse indents with Shift + Tab keys 2

Application Security Business Problem 3

Application Security A Real Challenge! Companies focused on speed of doing business and ease-of-access Developers focused on application functionality more than security Web protocol (HTTP) is inherently not secure security is bolted on IT Infrastructure security measures not enough to secure applications Cost of lost business due to breach can range from $1M to $52M per year per company. Median cost - $3.8 million/year. (source: Ponemon Report 2010) 4

Application Vulnerabilities Easily Exploited OWASP Top-10 A1 SQL Injection A2 Cross-Site Scripting (XSS) A3 Broken Authen. And Session Mgmt. A4 Insecure Direct Object References A5 Cross-Site Registry Forgery A6 Security Misconfiguration A7 Insecure Cryptographic Storage A8 Failure to Restrict URL Access A9 Insufficient Transport Layer Protection A10 Unvalidated Redirects and Forwards 5

Focus shifts to User & Application Access With Cloud Adoption and Consumerization of IT User IaaS PaaS SaaS Increasing security responsibilities at the information, application & user layers Reducing visibility into O/S, Network, and Physical layers Application Information O/S Application Information O/S image Application PaaS SaaS Network IaaS Physical Consumer responsible Provider responsible 6

Best Practices for Application Security Adopt Secure software development life cycle (SDLC) Follow secure coding practices and conduct security code reviews Perform static code analysis and dynamic web scanning tests Build-in application level logging Embed security logging capability within applications Capture security and application transactional information in the logs Correlate application events with SIEM Correlate in real-time across network, system, and applications More accurately identify business risks closer to application transactions 7

Why best practices are NOT followed? Adopt secure software development life cycle (SDLC) Slow Adoption: It takes years to train developers/testers to build in security 3 rd Party Code: Cannot impose SDLC practices on 3 rd parties and SAAS providers Build-in application level logging Developers accustomed to logging functional use-cases not abuse-cases Developers collect too little information in logs not usable to assess business risk Correlate application events with SIEM Many sophisticated attacks cannot be detected by monitoring individual applications Need to correlate across multiple applications, firewalls, IPS/IDS and other sources 8

HP Enterprise Security Strategy for Applications 9

Security Intelligence Platform Security Intelligence Platform Information Establish complete Visibility across all applications and systems Analyze vulnerabilities in applications and operations to understand risk Operations Applications Respond adaptively to build defenses against the exploitation of vulnerabilities Measure security effectiveness and risk across people, process, and technology to improve over time Intelligence integration of security and IT operations technologies 1 0 Security Services HP Enterprise Security 10

Business Risk Management Strategy Using Security Intelligence Platform Business Risk management & compliance (1) Unify the security layers Security Users Applications Data Systems Networks (3) Rollup to security intelligence (2) Integrate Security & IT management IT Users Applications Data Systems Networks Mobile Virtual Cloud 1 1 11

(1) Unify the security layers Provides Situational Awareness Traditional Security Monitoring Hybrid Security Monitoring 12

User and Application Risk Monitoring Top Blocked Departments Top URLs Accessed Top Blocked Identities Top Users Accessing Applications Top Bandwidth by Identity Top Blocked Sites Top Apps Attacked Top Application Attack Types 1 3 13

(2) Integrate Security and IT Management Remove Blind Spots between Operations Silos IT Operations Center Security Operations Center Operations Bridge Event Consolidation SLM Service Health Reporting Dashboards Application Performance Management System Management Network Management BSM Foundation Run Time Service Model 3rd Party Adapters Shared Services Security events /alerts Operational events /alerts Security Views Compliance Packs Threats Fraud Identity Dashboards Reports Log Aggregation Threat Response Manager Log/Event Collectors Event Correlation Cloud Applications Servers Database Network 1 4 HP Enterprise Security

(3) Pro-Active Business Risk Management Are We Secure? at Risk? Business Risk Management IT Ops Security Ops Assets Policy Risks VM Business Risk Centric Views: Heat maps - real-time analysis Long-term trending 15

HP Enterprise Security Solutions for Applications 16

HP Application Security Solutions Application Security Monitor Operations Adaptive WAF Security Devices Network Devices Email/Web Gateways Design Code Test Staging Applications Run time SIEM Platform Identity Mgmt. Systems Secure Software Development Static Code Analyzer Databases Endpoints Servers Physical Access End to End Visibility 17

HP Fortify Static Code Analyzer (SCA) Securing your application code in development Applications Features: Automate static application security testing to identify security vulnerabilities in application source code during development Pinpoint the root cause of vulnerabilities with line of code details and remediation guidance Prioritize all application vulnerabilities by severity and importance Benefits: Problem it solves: Identifies all risks in the source code for applications in development Reduces the cost of identifying and fixing vulnerabilities Reduces risk that a vulnerability will slip by and cause a problem later Saves valuable development time and effort 18

HP Adaptive Web Application Firewall (WAF) TippingPoint IPS and WebInspect Operations Application Problem it solves: HP WebInspect Scan 1 Protects web-application with residual vulnerabilities using IPS signatures customized from results of penetration testing web-applications Internet 5 3 What it is: Advanced web application scanning to uncover vulnerabilities combined with adaptive IPS response SSL 4 WebInspect information passed to WebAppDV to generate IPS filters for virtual vulnerability patch IPS Benefits: Protection for custom and commercial web applications Inspection of encrypted and non-encrypted traffic (ideal for web commerce apps) Elimination of tuning required by legacy WAFs 2 Vulnerability Report Vulnerability Page and Parameter 19 HP Enterprise Security

HP ArcSight Application Security Monitor (AppSM) Leverages Fortify-Runtime to Gain Visibility to Application Security Threats Information What it is? Problem it Solves: Monitors multiple applications without Identifies security threats in applications that pose additional instrumentation business risk and impact compliance during run-time Detects standard security threats from inside the applications during run-time Identifies those application threats that pose overall business risk Applications Benefits: Rapid time to deploy no custom coding of applications required to collect logs Prioritized business risks with real time correlation across network, system and applications Streamlines regulatory compliance needs (e.g. PCI- DSS req. 6) for maintaining security of applications Data Capture Log Management Application Security Monitor 20

HP ArcSight Application Security Monitor (AppSM) AppSM Runtime: AppSM rules pre-configured to detect standard security threats, security related session data, and forward them to ArcSight ESM AppSM Content: ArcSight ESM Correlation Rules, Dashboard and Reports for viewing standard threats in applications Web-App #1 AppSM Runtime Fortify Runtime Target API AppSM Rule- Pack ArcSight Syslog Connector AppSM Content ArcSight ESM Web-App #2 AppSM Runtime 21

HP ArcSight AppSM Dashboard Moving Avg. of Application Attacks Top Applications Attacked Attacks from Internal Systems Attacks from External Systems Top Application Attack Types Attacks detected from other sources Top 20 Attacks ordered by Priority 22

How to Apply What You Have Learned Today Long Term: Adopt secure software development life cycle Train software developers/testers to build in security during SDLC Use tools to identify security risks early during software development Medium Term: Build-in application level logging Embed security and app. transactional information in the logs as far as possible Use tools that automatically detect app. level threats without modifying applications Short Term: Deploy applications with counter measures to handle residual risks! Correlate application threats with enterprise wide activity using SIEM Proactively adapt your IPS to handle application level threats 23

Visit HP Enterprise Security booth #1717 to see our application security solutions in action Thank You 24