Presentation to Chapter, F5 Networks, 20 Sep 2013

Report
WEB APPLICATION FIREWALL
9-20-13
Tony Ganzer
F5 SE
Who Is Responsible for Application Security?
Clients
Network
Infrastructure
Applications
Engineering
services
Developers
Storage
DBA
How Does It Work?
Security at application, protocol and network level
Request made
Security policy
checked
Content scrubbing
Application cloaking
Enforcement
Response
delivered
Server
response
Security policy
applied
Actions:
Log, block, allow
BIG-IP enabled us to improve security instead of having to
invest time and money to develop a new, more secure application.
Start by checking RFC
compliance
2
Then check for various length
limits in the HTTP
3
Then we can enforce valid
types for the application
4
Then we can enforce a list of
valid URLs
5
Then we can check for a list of
valid parameters
6
Then for each parameter we will
check
will
check
for max
for max
value
value
length
length
7
Then scan each parameter, the
URI, the headers
GET /search.php?name=Acme’s&admin=1 HTTP/1.1
Host: 172.29.44.44\r\n
Connection: keep-alive\r\n
User-Agent: Mozilla/5.0 (Windows NT 6.1)\r\n
Accept:text/html,application/xhtml+xml,application/xml;q=0.9\r\n
Referer: http://172.29.44.44/search.php?q=data\r\n
Accept-Encoding: gzip,deflate,sdch\r\n
Accept-Language: en-GB,en-US;q=0.8,en;q=0.6\r\n
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3\r\n
Cookie: SESSION=0af2ec985d6ed5354918a339ffef9226; \r\n
Scope of Problem
• Website Proliferation
• Vulnerabilities introduced
• Automated attacks
• Changing the attack patterns
• Risk of brand, $ and IP losses high
How long to resolve a vulnerability?
Website Security Statistics Report
Unknown Vulnerabilities in Web Apps
•
•
•
•
Customers want……
• Reduce Window of Exposure
• Reduce Operational Cost
• Assured Security real-time assessments & patching
• Integrated with SDLC processes
8
Recent Application and Network Attacks
• And the hits keep coming:
Source: http://spectrum.ieee.org/static/hacker-matrix
Concept– Simple as your ABCs
Assess
Block
Correct
(VA Partner)
(F5)
• Persistent Assessment
vs 1/yr.
• Mission Critical+
• All External
• All Internal
• 80% of Vulns
• Remediate all
Technical Vulns
(Customer, SI or
VAR)
•
•
•
•
20% Vluns fix
Fix via iRules
Code correction
WAS Lifecycle Mgnt.
Traditional Security Devices vs. WAF
Network
Firewall
Known Web Worms
Unknown Web Worms
Known Web Vulnerabilities
Unknown Web Vulnerabilities
Illegal Access to Web-server files
Limited
IPS

X
Limited
Limited
Partial
X
Limited
Limited
X
X
X
X
Limited
Buffer Overflow
Limited
Limited
Cross-Site Scripting
Limited
Limited
Limited
Brute Force Login Attacks
X
X
X
X
X
X
App. Security and Acceleration
X
X
Forceful Browsing
Look into the SSL traffic
SQL/OS Injection
Cookie Poisoning
Hidden-Field Manipulation
Parameter Tampering
Layer 7 DoS Attacks
X
X
X
X
X
WAF-ASM
















Identify, Virtually Patch, and Mitigate Vulnerabilities
• Scan applications with:
–
–
–
–
WhiteHat Sentinel (F5 Free Scan Partner)
Cenzic Hailstorm (F5 Free Scan Partner)
QualysGuard Web App. Scanning
IBM Rational AppScan
• Configure vulnerability policy in BIG-IP ASM
• Mitigate web app. attacks
Data Center
Protection from Vulnerabilities
Enhanced Integration: BIG-IP ASM and DAST
Customer Website
White Hat Sentinel
• Finds a vulnerability
• Virtual-patching with one-click on
BIG-IP ASM
• Vulnerability checking, detection and
remediation
• Complete website
protection
BIG-IP Application Security Manager
• Verify, assess, resolve and retest in one UI
• Automatic or manual creation of policies
• Discovery and remediation in minutes
Benefits of Assessments with WAF
• Narrows window of exposure and reduces operational costs:
– Real-time assessments and virtual patching
– Operationalizes admin. and simplifies mitigation
• Assures app security, availability and compliance:
– Assurance no matter vulnerabilities or policies built
– OWASP protection, compliance, geo blocking
• Improves app performance:
– Availability improves cost effectiveness
• Low risk of false positives:
– Laser focused rules are generated automatically
• Easily integrates with SDLC practices:
– Ongoing website security program
WAF and the Software Development Lifecycle
• Policy Tuning
• Pen tests
• Performance Tests
•
•
•
•
•
•
WAF “offload” features:
Cookies
Brute Force
DDOS
Web Scraping
SSL, Caching, Compression
• Final Policy Tuning
• Pen Tests
• Incorporate vulnerability assessment into the SDLC
• Use business logic to address known vulnerabilities
• Allow resources to create value
Multiple Security Layers
RFC enforcement
• Various HTTP limits enforcement
Profiling of good traffic
• Defined list of allowed file types, URIs, parameters
Each parameter is evaluated separately for:
•
•
•
•
Predefined value
Length
Character set
Attack patterns
•
Looking for pattern matching signatures
Responses are checked as well
Three Ways to Build a Policy
Security policy
checked
Security policy
applied
Dynamic policy builder
Automatic –
• No knowledge of the app required
• Adjusts policies if app changes
Integration with app scanners
Manual –
• Advanced configuration for custom
policies
•
Virtual patching with continuous
application scanning
Detailed Logging with Actionable Reports
At-a-glance PCI compliance reports
Drill-down for information on security posture
DDoS MITIGATION
Increasing difficulty of attack detection
Physical (1)
Data Link (2)
Network (3)
Transport (4)
F5 mitigation technologies
Network attacks
Session (5)
Presentation (6)
Session attacks
Application (7)
Application attacks
SYN Flood, Connection Flood, UDP Flood, Push and ACK Floods,
Teardrop, ICMP Floods, Ping Floods and Smurf Attacks
DNS UDP Floods, DNS Query Floods,
DNS NXDOMAIN Floods, SSL Floods,
SSL Renegotiation
OWASP Top 10 (SQL
Injection, XSS, CSRF, etc.),
Slowloris, Slow Post,
HashDos, GET Floods
BIG-IP AFM
SynCheck, default-deny posture, high-capacity connection table, fullproxy traffic visibility, rate-limiting, strict TCP forwarding.
BIG-IP LTM and GTM
High-scale performance, DNS Express,
SSL termination, iRules, SSL
renegotiation validation
BIG-IP ASM
Positive and negative policy
reinforcement, iRules, full
proxy for HTTP, server
performance anomaly
detection
Packet Velocity Accelerator (PVA) is a purpose-built, customized
hardware solution that increases scale by an order of magnitude above
software-only solutions.
OSI stack
F5 mitigation technologies
OSI stack
RAPID VIRTUAL PATCHING SOFTWARE DEV. LIFECYCLE (SDLC)
Project planning
Requirements
definition
Installation
& acceptance
• Incorporate vulnerability
assessment into the
SDLC
• Use business logic to
address known
vulnerabilities
Integration
& test
Design
Development
•
Decouple security
from the SDLC
•
Address new
vulnerabilities
immediately
•
Ensure PCI
compliance
• Allow resources to
create value
Conjecture of relative breach impact is based on publicly disclosed information regarding leaked records and financial losses
2011 Sampling of Security Incidents
by attack type, time and impact
178.com
Size of circle estimates relative impact of
breach in terms of cost to business
Bethesda
Software
Epson
Korea
Nortrop
Grunman
IMF
Fox News
X-Factor
Attack type
Finnish
Government
Sites
PCS
Consulting
Duowan
Norway
MSN
Italy
PM Site
Italian
Ministry
Hemmelig.com
Citigroup
SQL injection
CSDN
Spanish
Nat Police
URL tampering
Sega
Diginotar
Mitsubishi
Heavy Industries
Valve
Steam
Trion
Epsilon
Gmail
Accounts
Spear phishing
PBS
Third-party
software
HB Gary
DDoS
Sony
PBS
Booz
Allen
Hamilton
Nexon
Vanguard
Defense
SOCA
7K7K.com
TGKK
Monsanto
Malaysian
Gov Site Peru
Special
Police
SecureID
Trojan software
Lockheed
Martin
RSA
Brazil
Gov
L3 Communications
Sony BMG
Greece
SK Communications
Korea
Turkish
Government
Stratfor
Adidas
United
Nations
NetNames
DNS Service
Nintendo
Unknown
Sony
Hong Kong
Stock Exchange
US Law
Enforcement
Israeli and
Palestinian Sites
AZ Police
Tian.ya
NetNames
DNS Service
US Senate
NATO
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Figure 1: 2011 Sampling of Security Incidents by Attack Type, Time and Impact
Source: IBM X-Force 2011 Trend and Risk Report March 2012
Thank You!
www.F5.com

similar documents