Securing Web Applications...at the Network Layer



Similar documents
Securing Web Applications at the Network Layer v.1.5

Network/Cyber Security

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Chapter 9 Firewalls and Intrusion Prevention Systems

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

CMPT 471 Networking II

ENTERPRISE IT SECURITY ARCHITECTURE SECURITY ZONES: NETWORK SECURITY ZONE STANDARDS. Version 2.0

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Firewall Environments. Name

Firewall Security. Presented by: Daminda Perera

Network Security Topologies. Chapter 11

Overview. Firewall Security. Perimeter Security Devices. Routers

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Chapter 15. Firewalls, IDS and IPS

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Building A Secure Microsoft Exchange Continuity Appliance

Firewalls, IDS and IPS

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Chapter 20 Firewalls. Cryptography and Network Security Chapter 22. What is a Firewall? Introduction 4/19/2010

Secure networks are crucial for IT systems and their

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

INTRUSION DETECTION SYSTEMS and Network Security

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

8. Firewall Design & Implementation

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

INTRODUCTION TO FIREWALL SECURITY

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Recommended IP Telephony Architecture

74% 96 Action Items. Compliance

How To Protect A Network From Attack From A Hacker (Hbss)

FIREWALLS & CBAC. philip.heimer@hh.se

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

One-Man Shop. How to build a functional security program with limited resources DEF CON 22

Attacks from the Inside

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Architecture Overview

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Chapter 11 Cloud Application Development

Firewalls. Chapter 3

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

SANS Top 20 Critical Controls for Effective Cyber Defense

Firewalls Overview and Best Practices. White Paper

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Computer Security DD2395

Honeypot as the Intruder Detection System

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Network Security Administrator

Guideline on Firewall

Achieving PCI Compliance Using F5 Products

Securing E-Commerce. Agenda. The Security Problem IC Security: Key Elements Designing and Implementing _06_2000_c1_sec3

Deploying Firewalls Throughout Your Organization

Mitigating Information Security Risks of Virtualization Technologies

Top-Down Network Design

Network Instruments white paper

Security Technology: Firewalls and VPNs

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

13 Ways Through A Firewall

How To Protect Your Network From Attack

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

H.I.P.A.A. Compliance Made Easy Products and Services

SANE: A Protection Architecture For Enterprise Networks

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Locking down a Hitachi ID Suite server

Networking Topology For Your System

Computer Security: Principles and Practice

Netzwerkvirtualisierung? Aber mit Sicherheit!

A Network Design Primer

Firewall Architecture Guide

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

Unified Threat Management, Managed Security, and the Cloud Services Model

Sygate Secure Enterprise and Alcatel

Internet Security for Small to Medium Sized Businesses

Payment Card Industry (PCI) Data Security Standard

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

SECURING SAP NETWEAVER DEPLOYMENTS WITH SAFE-T RSACCESS

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Firewalls CSCI 454/554

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Testing Network Security Using OPNET

Security Awareness. Wireless Network Security

Firewalls, Tunnels, and Network Intrusion Detection

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Global Partner Management Notice

Secure Network Design: Designing a DMZ & VPN

Developing Network Security Strategies

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE Computer Network Analysis and Design Slide 1

Protecting Your Organisation from Targeted Cyber Intrusion

Networking: EC Council Network Security Administrator NSA

Transcription:

Securing Web Applications......at the Network Layer OWASP Spain Chapter Meeting 16 th June, 2006 Barcelona (ES) Carlos Fragoso Mariscal Chief Technical Director carlos@jessland.net Securing Web Applications at the Network Layer - 2006 Jessland Security Services Goals Consider network security as a defense-in-depth approach for web application security Learn how security architecture could provide a robust topology to enforce security in web services environments Have fun with our case-based scenario Securing Web Applications at the Network Layer - 22006 Jessland Security Services 1

Agenda Web Applications Security Architecture Case Study Conclusions References Securing Web Applications at the Network Layer - 32006 Jessland Security Services Agenda Web Applications Security Architecture Case Study Conclusions References Securing Web Applications at the Network Layer - 42006 Jessland Security Services 2

Web Applications Interface Web application clients mainly use HTTP protocol as their interface to the application Users (B2C) and hosts (B2B) reside on external or business partners networks Securing Web Applications at the Network Layer - 52006 Jessland Security Services Web Application s layered model Interface Application Data Some web applications are not able to separate interface and application layers so they are just one Data layer is commonly a filesystem or a database Securing Web Applications at the Network Layer - 62006 Jessland Security Services 3

Web Application Layers segmentation Interface Application Data First operational and security approach is to separate the EVERY layers on DIFFERENT hosts Securing Web Applications at the Network Layer - 72006 Jessland Security Services Agenda Web Applications Security Architecture Case Study Conclusions References Securing Web Applications at the Network Layer - 82006 Jessland Security Services 4

Design Parameters Defense-in-depth Technology balance Least privilege principle Simplicity Biodiversity Access control Operational/Risk balance Escalability Redundancy Securing Web Applications at the Network Layer - 92006 Jessland Security Services What does Perimeter mean? Securing Web Applications at the Network Layer - 10 2006 Jessland Security Services 5

Security Areas Extranets Business partner or remote sites DMZ s s Users network Protected network Securing Web Applications at the Network Layer - 11 2006 Jessland Security Services Devices Firewalls Routers Switches Intrusion Detection/Prevention Systems Honeypots and Honeynets Security Event Managers Desktop and mobile end-user systems Wireless Access Points Hybrids Securing Web Applications at the Network Layer - 12 2006 Jessland Security Services 6

Network Design step-by-step Security policy Security levels classification Deploy network devices Segmentation with firewalls Deploy additional security devices IDS/IPS Content inspection VPNs Securing Web Applications at the Network Layer - 13 2006 Jessland Security Services Network Firewalls Interconnects different security level networks providing traffic access control Technology: Stateless: each packet handled individually Stateful: keeps state of network flows Stateful Inspection: understand application layer protocols Value-added features: Load balancing, failover, address translation, VPNs, packet normalization, content inspection, etc. Ruleset: Firewall lockdown No logging Log denied Sneaky rule Securing Web Applications at the Network Layer - 14 2006 Jessland Security Services 7

DMZ ext R ext DMZ int M ext 1 DMZ Protegida 2 R R int Red Protegida M M int Securing Web Applications at the Network Layer - 15 2006 Jessland Security Services Network Intrusion/Prevention Systems Their job is to provide network audit features and intrusion detection/prevention over the network Types: network, node (IDS) and in-line (IDS, IPS) Traffic capture: taps, hubs, span ports, balancing... Advantages: Easy to deploy Effective Good scalability Disadvantages False positives False negatives Non-textual alarms High-volume of data Ciphered traffic An IPS is not a firewall!!! Securing Web Applications at the Network Layer - 16 2006 Jessland Security Services 8

Services ID Network IDS Log Management / SEM & Analysis Securing Web Applications at the Network Layer - 17 2006 Jessland Security Services Tips n hints Critical information must be placed FAR AWAY from possible risky areas Network security does NOT patch your hosts for you! Some critical services have a low rate of possible vulnerabilities because they have been heavily tested Sometimes information must be replicated to give a limited-scope view Securing Web Applications at the Network Layer - 18 2006 Jessland Security Services 9

Prevention Detection Reaction! Securing Web Applications at the Network Layer - 19 2006 Jessland Security Services Agenda Web Applications Security Architecture Case Study Conclusions References Securing Web Applications at the Network Layer - 20 2006 Jessland Security Services 10

Security Architecture Case Study Hackobo vs Armando 3l33t to deceived hacker Clueless to smart admin Securing Web Applications at the Network Layer - 21 2006 Jessland Security Services Armando s Network Overview Corporate network grew WITHOUT a security-minded approach Several security INCIDENTS lead to a security architecture redesign Let s help Armando about how to face common issues on his way to a new architecture deployment Securing Web Applications at the Network Layer - 22 2006 Jessland Security Services 11

Identify how systems talk to each other users access external servers Some external servers (web, app, dns, smtp) need to access internal server Workstation users manage servers and have access Securing Web Applications at the Network Layer - 23 2006 Jessland Security Services Identifying security areas server contains corporate JEWELS OF THE CROWN Workstation users manage corporate infrastructure servers provide services to the outside is a public, least-secure, network Securing Web Applications at the Network Layer - 24 2006 Jessland Security Services 12

Step 0: Plain Network Oh my god! LACK of firewalling DIFFERENT security areas in the SAME network Securing Web Applications at the Network Layer - 25 2006 Jessland Security Services Step 0: Plain Network t00 e9sy f0r m3! 1. Reconaissance and exploit launch to compromise external web server 2. reconaissance attack trying to compromise internal workstations or servers Securing Web Applications at the Network Layer - 26 2006 Jessland Security Services 13

Step 1: DMZ deployment DMZ Sharing the DMZ between critical services (dns, smtp) and the web server Still a lot to do! Securing Web Applications at the Network Layer - 27 2006 Jessland Security Services Step 1: DMZ deployment DMZ P1nch3 9dm1n! 1. Reconaissance and exploit launch to compromise Armando s external web server 2. Firewall allows web server to download hacking tools 3. Local layer-3 compromise or DoS attack against DNS and SMTP external servers Securing Web Applications at the Network Layer - 28 2006 Jessland Security Services 14

Step 2: VLAN-based DMZ deployment DMZ VLAN 2 VLAN 3VLAN VLAN 4 Logical isolation (VLAN) on the same physical switch could encourage the hacker to perform L2 DoS or VLAN hopping attacks Same software vendor could ease multilayer compromise Looks better! Securing Web Applications at the Network Layer - 29 2006 Jessland Security Services Step 2: VLAN-based DMZ deployment DMZ VLAN 2 VLAN 3VLAN VLAN 4 h3h3, n1c3 try! a) Compromise webserver and perform layer-2 vlan hopping in order to try to breach the other servers b) Launch exploit against smtp or dns server and relaunch it again to get internal access (nicer if possible) Securing Web Applications at the Network Layer - 30 2006 Jessland Security Services 15

Step 3: Dual public DMZ DMZ-1 VLAN 3 VLAN 4 DMZ-2 I m doing my best! Vulnerability over the single firewall could allow direct communication to intranet Malware injection could compromise workstations Securing Web Applications at the Network Layer - 31 2006 Jessland Security Services Step 3: Dual public DMZ DMZ-1 Br3ak d9 p3r1m1t3r VLAN 3 VLAN 4 DMZ-2 a) Specially crafted packets are sent so that filtering is overcomed and sent directly to internal server b) Malware is injected through a URL (malware site) on fake email Securing Web Applications at the Network Layer - 32 2006 Jessland Security Services 16

Step 4: Multilayered service-leg-based double DMZ DMZ-1 Web Proxy DMZ-2 App VLAN 3 VLAN 4 Vulnerabilities such as SQLInjection on App or database could compromise the boxes and probably disclose sensitive information Database Paranoia is your friend Securing Web Applications at the Network Layer - 33 2006 Jessland Security Services Step 4: Multilayered service-leg-based double DMZ DMZ-1 Web Proxy DMZ-2 App VLAN 3 VLAN 4 W0w, th9t s n0t 39sy Database 1. Reconaissance against web/app server to identify database internal server 2. Perform SQL Injection in order to get sensitive data back to the hacker Securing Web Applications at the Network Layer - 34 2006 Jessland Security Services 17

Step 5: Protected Network with Data Replication DMZ-1 Web Proxy DMZ-2 App VLAN 3 VLAN 4 Database Protected Network Database replication of necessary data Database Yiiiiiihaaaaaa!!! Securing Web Applications at the Network Layer - 35 2006 Jessland Security Services Remarkable Security Issues Lack of multilayer firewalling Sharing of different network security areas Outbound traffic control on DMZ areas Relaxed server patching policy Shared resource used for critical information Logical vs physical isolation OS, Software and hardware biodiversity Sensitive data access Securing Web Applications at the Network Layer - 36 2006 Jessland Security Services 18

Long life to Armando s network DMZ-1 DMZ-2 Web Proxy VLAN VLAN 3 3 4 4 App Database Protected Network Database Bad old days Impressive Securing Web Applications at the Network Layer - 37 2006 Jessland Security Services Agenda Web Applications Security Architecture Case Study Conclusions References Securing Web Applications at the Network Layer - 38 2006 Jessland Security Services 19

Conclusion Security architecture definitively helps to improve the global state of security for web services It is highly recommended to separate interface, application and data layers Knowing your environment is half-the-battle in order to choose a good topology approach Place hosts according to their data security level, sometimes splitting or replicating the information is necessary What has been described makes thing MORE difficult to the hacker but NOT impossible! Securing Web Applications at the Network Layer - 39 2006 Jessland Security Services Agenda Web Applications Security Architecture Case Study Conclusions References Securing Web Applications at the Network Layer - 40 2006 Jessland Security Services 20

References Inside Network Perimeter Security, S.Northcutt ISBN: 0735712328 The Tao of Network Security Monitoring, R.Beijlitch ISBN: 0321246772 Jessland Information Security Knowledgebase (JISK) URL: http:///jisk.php Protecting your IP network infrastructure, Securite.og URL: http://www.securite.org/presentations/secip/ Network Intrusion Detection, S.Northcutt & Judy Novak ISBN: 0735710082 Warriors of the Net URL: http://www.warriorsofthenet.com Securing Web Applications at the Network Layer - 41 2006 Jessland Security Services Take care of your perimeter!!! carlos@jessland.net More information at: http:// E3B5 8908 57CA 5B67 83DD 9400 085A 29FF D539 69A3 Securing Web Applications at the Network Layer - 42 2006 Jessland Security Services 21

Thank you!!! http://carlos.fragoso.es carlos@fragoso.es E3B5 8908 57CA 5B67 83DD 9400 085A 29FF D539 69A3 Securing Web Applications at the Network Layer - 43 2006 Jessland Security Services 22