Protecting the Data that Drive Business
Download
Report
Transcript Protecting the Data that Drive Business
Protecting the Data that Drive Business
Chris Gale
Partner Director EMEA
[email protected]
Almost Twenty Years Ago Today...
Fleischmann & Pons
Tim Berners-Lee
‘Cold fusion’
‘Distributed hypertext system’
Today’s Business Application Data Flow
TRANSACTION INFO
TO ACQUIRING BANK
ONLINE STORE
POS TERMINALS
(CASH REGISTER)
HQ SERVER
STAGING SERVER
TRANSACTION
DATABASES
IN-STORE
SERVER
INTERNAL CORPORATE
SYSTEMS
DATABASES
CONFIDENTIAL - Imperva
CORPORATE HEADQUARTERS
PHYSICAL STORE
AUTHORIZATION FROM ACQUIRING BANK
Business Application Data Security Challenge
Thick Client
2 Tier App
Database systems are
often very complex,
combining the core
database with a collection
of applications…It is not
sufficient to protect the
database alone, all the
associated applications
need to be secured.
DBA
Thin Client
3 Tier App
Application
Interface
Data
Browser
SQL
Applications
Web/Web services
CONFIDENTIAL - Imperva
--SANS Top 20 Internet Security
Risks of 2007
Why Should You Care?
85% of organizations have
experienced a data breach
Theft, Abuse, Misuse & Leakage
Happen Even in Leading
Organizations
Sources: Privacy Rights Clearinghouse & Ponemon Institute Survey, “The Business Impact of Data Breach”
CONFIDENTIAL - Imperva
Why Should You Care?
Data governance is not optional
PCI – Required to process credit card transaction
SOX – Required to report financial results
EU DD Privacy – Required to process personal data
What do regulations require of you?
CONFIDENTIAL - Imperva
New Web 2.0 – Old Threats & New
92% of Web applications have vulnerabilities
93% of vulnerable sites are still vulnerable after code fixes!!
SQL Injection – still majority cause of data leakage
Ponemon estimates breaches cost on average $202 per
compromised record
April 08: automated SQL injection affects 500k IIS webpages
July 08: Asprox ‘infects’ reputable sites including NHS
Exploiting server’s trust in the client (versus XSS)
Cross Site Request Forgery (CSRF) & JS-Hijacking (AJAX)
Growing cause of web fraud
Worrying Threat Trends in 2008
Majority of malware now ‘cloaked’ in Web protocols
Both exploits and Command & Control
HTTP poorly monitored – traffic volume, SSL & difficult to block
Indirect attacks exploiting ‘trusted’ websites for malware
distribution
Implicitly trusted by the user – ‘Drive-by’ downloads
Sophos reported 1 webpage ‘infected’ every 5secs during 2008
‘Google Hacking’ & ‘Web worms’ – search-engine seeded
attacks & data breach discovery
Concept first analyzed in March 2004 ADC paper: “Web Application
Worms: Myth or Reality?”
Can Existing Controls Help?
Traditional firewalls only detect network attacks
Only inspect IP address, port/service number
IPS/IDS signatures only detect known threats
No application understanding
No user/session tracking
High rate of false positives/negatives
No protection of SSL traffic
Zero Day
Worm
XSS Attack
Hacker
Cookie
Injection
Data Center
INTERNET
Web Servers
Firewall
User
CONFIDENTIAL - Imperva
IPS or Deep
Inspection
firewall
Founded in 2002
CEO Shlomo Kramer – CEO of the Year, co-founder of Check Point
The leader in Data Security
Global company with over 40% international revenue
North American HQ in California; International HQ in Israel
Local presence in all major markets (EMEA, APAC, Japan)
Customers in 35+ countries
Over 700 customers and 4500+ organizations protected
CONFIDENTIAL - Imperva
Imperva Application Defence Centre
Business application Data Security experts
Research the latest threats and compliance best practices
Applications (SAP, Oracle EBS, PeopleSoft & others)
Databases (Oracle, DB2, SQL-Server & others)
Compliance mandates (SOX, PCI, HIPAA & others)
Deliver actionable, up-to-date content to Imperva customers
- CONFIDENTIAL -
SecureSphere Data Security Suite
Modular SecureSphere 7.0
Packaged for Specific Use Cases
Web Application Firewall
Security for Web Applications
Enforcement
Tracking
Audit / Monitor
Assessment
Discovery
SecureSphere
Management
SecureSphere Platform
12
Data Security Suite
Full Visibility and Control
- CONFIDENTIAL -
Database Firewall
Auditing & Protection for
Databases
Database Activity Monitoring
Visibility into Database Usage
Discovery and Assessment Server
Discovery and Assessment for
Databases
SecureSphere Architecture
Database
Monitor Agent
Management
Server (MX)
Database
ADC Insights
Database
Firewall
Web Application
Firewall
Web
Database Activity
Monitoring
Internet
Discovery & Assessment
Server
13
CONFIDENTIAL - Imperva
SecureSphere Universal User Tracking
Who Is Really Accessing Data?
End-to-end visibility of the real application user
‘Pooled’ application user accounts
No re-writing of application or database code
Web to DB User Tracking
[email protected] [email protected]
Webapp.company.com
End-to-end
No real
real
useruser
Knowledge
Knowledge
SQL Connection User Tracking
[email protected] [email protected]
Webapp.company.com
SELECT
SELECT …
… WHERE
WHERE
ID
ID == ‘[email protected]’
‘[email protected]’
Shared & dedicated DB user connections
CONFIDENTIAL - Imperva
End-to-end
Limited
real
userreal user
Knowledge
Knowledge
Best Practice Data Security Recommendations
1. Locate & classify sensitive data
2. Regularly test for vulnerabilities
Buy time, mitigate critical risks with WAF & DB firewalls
If possible, remediate by fixing the code
3. Protect critical web applications
Deploy WAF to prevent data breach
Audit access by actual application users – not ‘pooled’ accounts
4. Monitor sensitive data stores
Use DAM for visibility
Privileged users (DBAs)
Consider protecting access to most sensitive data with DB
firewalls
PCI DSS Compliance & SecureSphere
6.6 Application layer firewall or
external code review
SecureSphere WAF: Cost-effective,
non-intrusive threat mitigation
10 Track and monitor all access
to cardholder data
SecureSphere DAM: SQL auditing,
tamper-proof, separation of duty
3.4 Compensating controls for
protecting stored cardholder data
SecureSphere DB Firewall: Prevents
unauthorised access to card holder data
Imperva
The Leader in Data Security
Only complete solution for visibility
and control over business data
Veteran leadership with deep
industry expertise
• Dynamic Profiling & Universal User Tracking
• Industry veterans in security
• ADC - only research team dedicated to business
application data security
• Consistent industry recognition of technical
superiority
More application data security
deployments than any other vendor
• Over 700 direct customers
• 54 Fortune 1000
• 86 Global 2000
• Over 4500 protected organizations
CONFIDENTIAL - Imperva
Consistent growth fueled by
• Surge in data breaches
• Regulatory compliance
requirements
• Tightening Data
Security legislation
Thank You
www.imperva.com