Cenzic/Barracuda/Ponemon Research Study
Download
Report
Transcript Cenzic/Barracuda/Ponemon Research Study
Web Application Security
Grant Murphy, CISSP
VP Enterprise Solutions
“The State of Web Application Security”
Cenzic/Barracuda/Ponemon
Research Study – February 2011
Ponenon Research – Key Findings
• 74% of the respondents said Web Application
Security is amongst their highest security priority.
All’s Good………… Right?
Ponenon Research – Key Findings
• 74% of the respondents said Web Application
Security is amongst their highest security priority.
• 69% said they use Network layer Firewalls to protect
their web applications
“We’ll leave a light on…” Tom Bodett
Ponenon Research – Key Findings
• 74% of the respondents said Web Application
Security is amongst their highest security priority.
• 69% said they use Network layer Firewalls to protect
their web applications
• When asked why they don’t test their web apps for
nearly 2/3rds said “No expertise or budget exists”,
yet the average prediction for loss due to a hacking
event is $255,000
Truer Words Cannot be Spoken
"We don't spend enough money on app security and we
spend way too much on antivirus software, which is
basically worthless"
Josh Corman, The 451 Group
Ponenon Research – Key Findings
• 74% of the respondents said Web Application
Security is amongst their highest security priority.
• 69% said they use Network layer Firewalls to protect
their web applications
• When asked why they don’t test their web apps for
nearly 2/3rds said No expertise or budget, yet the
average prediction for loss due to a hacking event is
$255,000
• Over half expect their Web Hosting provider to
provide security for their Web Applications.
How Many Do?
~
Other Ponemon Stats
•
•
•
•
68% of WAF users recognize that a fully functional
WAF is one that optimizes Performance as well as
Security
60% said they protect Web apps KNOWN to be
vulnerable to exploits with layer 4 technology
(Network Firewall or IDS/IPS)
88% said their Web App Security budget is less
than their coffee budget
62% cited data protection as their #1 concern about
Web application security
Why do I need a Web Application Firewall?
Compliance, Security, Performance
What is PCI DSS?
• Insurance
•
A consortium of Visa, MasterCard, DiscoverCard, American
Express, and JCB
•
PCI standards apply to ALL companies worldwide that process,
store, or transmit credit card information
•
4 levels of Credit Card processors dependent upon volume, which
also determines the level of audit scrutiny
•
1
>6M transactions/year
•
2
>1M and <6M transactions/year
•
3
>20,000 ecommerce transactions and <1M transactions per year
•
4
<20,000 ecommerce or >1M transactions/year
What word keeps 62% of the
security bosses up at night?
Breach
The other 38% have sleep apnea!
Security Market Overview
Fact 1: 98% of all Breaches are the result of organized crime
and/or unaffiliated parties1
Fact 2: Data Breach cost organizations an average of $202
per stolen record2
Fact 3: 24% of the records stolen during breaches were
from vulnerable Web applications exploitable by SQL injection1
Fact 4: SQL injection is 3x more efficient than the #1 method
employed to extract records
1) Source: Verizon and USSS Data Breach Investigation Report, 2010
2) Source: Ponemom Institute Study, 2009
15
Interesting excerpts: 2010 Verizon and USSS
Data Breach Investigation Report
•
Records lost was down from 144M to 4M, but the number of
breaches up 5-6x
•
89% of breach victims subject to PCI DSS were not in
compliance – if they had been there would have been no breach!
•
~1/2 of breaches were on systems managed by hosting
providers – “It’s more about giving up control of our
assets….than any technology specific to The Cloud.”
•
“Just because web applications dropped as an overall
percentage of attacks, don’t believe for an instant that they are
any less critical a vector than they were a year ago. …. Please
don’t let the bad guys catch your development and application
assessment teams napping.”
ATTACK
Custom Code
Billing
Directories
Acct:5424-9383-2039-4029
Acct:4128-0004-1234-0293
3. Application forwards attack to
the database in a SQL query
Web Server
Firewall
Hardened OS
Firewall
DB Table
"SELECT * FROM
Account Summary
Account:
accounts WHERE
SKU:
acct=‘’
OR 1=1-Acct:5424-6066-2134-4334
Acct:4128-7574-3921-0192
’"
1. Application presents a form to
the attacker
2. Attacker sends an attack in the
form data
App Server
Network Layer
Human Resrcs
Web Services
HTTP
SQL
response
query
HTTP
request
APPLICATION
Legacy Systems
Databases
Communication
Knowledge Mgmt
E-Commerce
Bus. Functions
Administration
Transactions
Accounts
Finance
Application Layer
SQL Injection – Illustrated
4. Database runs query containing
attack and sends encrypted results
back to application
5. Application decrypts data as
normal and sends results to the user
OWASP - 2010
Who Gets Attacked?
Target of
Every
Opportunity
industryor
is Target
a target!
of Choice?
Source: Based on data provided by OSF DataLoss DB
Can’t We Just Go Fix the unsecure Code?
Every 1,000 lines of code averages 15 critical security defects.
- U.S. Dept. of Defense
The average security defect takes 75 min to diagnose and 6 hrs to
fix.
- 5 year Pentagon Study
The average business application has 150,000-250,000 lines of
code.
- Software Magazine
An average web application vulnerability persists between 30 – 90
days after discovery
- Forrester Research
The MATH …
It would take 70 to 562 weeks to fix the code Not to
mention the newer defects that will get introduced.
Code reviews: Start at $2000 for a small application
75% of Attacks Focused Here
(Gartner)
Database Servers
Customized Web Applications
Customized Packaged Apps
Internal and 3rd Party Code
Network
Firewall
IDS
IPS
Web
Servers
Application
Servers
Database
Servers
Operating
Systems
Operating
Systems
Operating
Systems
Network
Customer
Info
Business
Data
Transactio
n Info
Confid
ential
Malvertising
USAToday.com ad network
compromised
Visitors served malicious javascript
bundled with ad for Roxio Creator
Automatically directed users to
Rogue AV site through malicious
traffic distribution system – users
did not even have to click the link
Compromised Legitimate Sites
PBS.org – and subdomain for
Curious George site
compromised
Yielded javascript that served
exploits from a malicious
domain
Targeted a variety of software
vulnerabilities, including
Acrobat Reader, Applie
QuickTime, etc.
A WAF must provide Security…..
As well as Performance Optimization
Internet
Load Balancing
Caching
Compression
Only available
Via a Layer 7
Reverse Proxy!
Application Health Monitoring
ensures optimal Load Balancing
TCP Pooling - Multiple requests use same
connection
Improved Performance
SSL
Offloading/Acceleration,
Backend Encryption
High Availability minimizes
downtime of critical business Apps
User Access
Control
LDAP etc
Top 5 Myths of Web Application Security
“We use SSL”
• SSL ensures that no “man-in-the-middle” can tap into communications
• Hackers are can still send application attacks through SSL
“We have a Network Firewall”
• 75%-90% of attacks today are against applications, not networks
“Our Web Hosting provider is secure”
• Web Hosters - at best - provide Network Firewalls
Hactivism on the Rise – Again?
“…worked with the website hosting
company, Boca Raton-based Verio, and
initially they were able to fix it. But the
images returned over the weekend.
And Monday was a holiday, so nothing
could be done.
But with just a cursory glance of the
website, Heid claimed to have
pinpointed its weaknesses -- a decadeold web applications and a system that
needs ``sanitizing.''
The Miami Herald 1/18/11
“…hackers sidestepped ineffective firewalls”
Top 5 Myths of Web Application Security
“We use SSL”
• SSL ensures that no “man-in-the-middle” can tap into communications
• Hackers are can still send application attacks through SSL
“We have a Network Firewall”
• 75%-90% of attacks today are against applications, not networks
“Our Web Hosting provider is secure”
• Web Hosters - at best - provide Network Firewalls
“Only large banks get hacked, not us”
• Hacking is an equal opportunity business
“Too Expensive/Too Complicated”
• Not anymore with Barracuda’s Web Application Firewall
When it comes to protecting the valuable
data on which Web Applications are
dependent, the best use of a budgeted
security
$ € £ ¥
is spent on a Web Applications Firewall
Technology.
28
What Do I Need in a WAF?
Barracuda Networks
Web application hosters provide reliable application access,
Not Compliance or Secure Web Applications
PCI and security
drive inbound user
content scanning
Outbound inspection to
protect against
customer data leakage
Barracuda Web Application Firewall
• PCI standards exist for a reason!
• “Assumed” Security doesn’t exist!
• Protection against malicious users
Servers
Most Apps are Web Apps Today
• Microsoft
– Sharepoint
– Office
– Exchange
• Oracle
– Peoplesoft
– Financials
– Oracle Business
• SAP
• Custom Applications
– Partner/Sales Portals
– Order Entry Systems
– HR Systems
• Open Source
– PHP Bulletin Board
– Bugzilla
Secure Multiple Web Applications
Level of Security Customization
High
Medium
Low
Profiled applications
Utilizing template security
Default security policy
Reporting – Ensuring Compliance
One Arm Proxy
Easier, less secure, performance gains
Management
172.10.10.5
Mgmt
VIP1: 192.168.9.110
VIP2: 192.168.9.120
VIP3: 192.168.9.130
Internal DNS changes to redirect traffic
Servers
WAN
Internet
192.168.9.1
Subnet
192.168.9.0/24
Pros:
•
Limited changes to networking scheme
•
Virus scanning, Data Loss Prevention
•
Full performance optimization features
available (LB, SSL Acceleration, HA etc)
Subnet
10.10.10.0/24
10.10.10.10
10.10.10.30
10.10.10.20
Cons:
•
Backend servers are still exposed since they
have native IPs
•
In High end web sites performance is limited
since a single Ethernet nic is used for
inbound/outbound traffic
Reverse Proxy
Optimized Security, Optimized Performance
Management
172.10.10.5
DNS resolves to the WAF
Mgmt
VIP1: 192.168.9.110
VIP2: 192.168.9.120
VIP3: 192.168.9.130
Servers
WAN
LAN
10.10.10.1
192.168.9.1
Subnet
192.168.9.0/24
Subnet
10.10.10.0/24
10.10.10.10
10.10.10.30
10.10.10.20
Server IPs reside in the LAN subnet
Pros:
•
Most Secure Deployment Scheme since
backend servers are completely isolated
•
Headers can be rewritten
•
Virus scanning, Data Loss Prevention
•
Full performance optimization features
available (LB, SSL Acceleration, HA etc)
Cons:
•
Much more security and performance at the
expense of deployment simplicity
•
Applications requiring protection must be
moved behind reverse proxy during a
maintenance window
Bridge Mode - Operates as Layer 2 Bridge
Management
172.10.10.5
VIP1: 10.182.12.20
VIP2: 10.182.12.21
VIP3: 10.182.12.22
Mgmt
Virtual IP are same as
Server IP addresses
Servers
WAN
Internet
10.182.12.1
LAN
All incoming traffic is
bridged. Security
policies are applied to
defined services
Pros:
•
No Back end/Front end networking
changes
•
Ease of installation
•
Ethernet Hard Bypass Mode
10.182.12.20
10.182.12.21
Cons:
•
No Header rewrite
•
No Load Balancing
•
No TCP Pooling
10.182.12.22
The Barracuda WAF
Barracuda Networks
Load
Balancing
SSL
Accelerators
SSL Acceleration
Pipelining
Caching
Compression
Load Balancing
Remote
Users
Teleworkers
Barracuda Web
Application
Firewalls
Access
Control
OWASP protection
Malware scanning
Caching
Data leakage
Cloaking
XML Firewall
Security
IDP, IPS
Servers
Scalable Performance To Meet Applications Needs
WAF 960
WAF 860
WAF 660
WAF 460
WAF 360
Virtualized
Web Applications
Remote
Users
Teleworkers
Barracuda Web
Application
Firewalls
Servers
Evolution of the Web Application Environment
Remote
Users
Teleworkers
Virtualized
Web Applications
Infrastructure
Scalable Performance To Meet Applications Needs
WAF 960
WAF 860
WAF 660
WAF 460
WAF 360
Barracuda Control Center
Centralized Multi-Appliance Administration
–
–
–
Consistent Web interface
Status Monitoring
Distributed Configuration mgt.
–
–
–
Information aggregation
Role based Administration
Delegated Administration
Cloud Service, Hardware and VM based Appliance
44
Barracuda Networks Confidential
Barracuda Web Application Firewall Overview
SECURE
WEB
APPLICATIONS
COMPREHENSIVE
YET
AFFORDABLE
GAIN VISIBIILITY
VIA LOGS
AND REPORTS
SCALE AND
SPEED
APPLICATION
DELIVERY
ACHIEVE
COMPLIANCE
About Barracuda Networks
Security Principals (CIA)
Centralized Management
Availability
Confidentiality Integrity
Barracuda Message Archiver
Barracuda SSL VPN
Barracuda Load Balancer
Barracuda Link Balancer
Barracuda Spam & Virus Firewall
Barracuda Web Filter
Barracuda Web Application Firewall
Barracuda IM Firewall
Yosemite
Yosemite
Server
Desktop/Laptop
Barracuda Next-Generation Firewall
NETWORKING
PERFORMANCE
CONNECTIVITY
SECURITY
PROTECTION
SERVERS
STORAGE
PEACE OF MIND
DATA
47
Superior Technology
Proven, Field Tested
135,000+ Customers Worldwide
Innovative Technology
Diverse IP Assets
Predictive Sender Profiling
Real-time Protection
Reputation Service
Data De-duplication
Multi-tenant Cloud
Centralized management
Barracuda Labs
Global Research
Thought Leadership
Security Intelligence
Cool Vendor in Security SaaS
Top Emerging Vendor - Storage
Top 10 “Most Innovative”
Purewire Web Security Service - DEMOgod
Top 10 IT Security Companies to Watch
Barracuda Networks Confidential
Top 10 Security Stories
Questions??
Grant Murphy
[email protected]
49
Supplemental Slides
50
Who Need Application Firewalls?
Hacked!
1. Compliance Audit (PCI, HIPAA, GLBA)
•
•
Anybody who works with confidential data
i.e. Credit Cards, SSN, Patient records, Client Records
2. Security Requirements
•
Internal and external threats. Business partners.
3. Secure “Load Balancer” for Web Applications
•
For the price of competitor’s Load Balancer, you can buy a WAF
Other Hacker Money Makers: Server Botnets
Botnet-as-a-Service
Distributed Denial of Service attacks (DDoS)
Brute-force hacking of bank accounts
Attackers rent bots for extortion or attacks against legitimate sites
Rental starts at $8.94/hr and averages approximately $67.02/day1
Affects All Industries
Web Application Server are especially viable bots due to high
bandwidth and processor capabilities
Your Web servers can be hijacked to be a zombie in a botnet
Malware relay point
1. VeriSign May, 2010 cybersecurity study
Barracuda Web Application
Technology
Mature Solutions Trusted by Financial Institutions Worldwide
Why Do Hackers Hack?
Amount is in USD Per Record on the Black Market
Reverse Proxy WAF Advantages…
•
•
•
•
•
•
•
Application Performance Optimization
Cookie encryption / signing
Client fingerprinting
Response control
Cross Site Request Forgery (CSRF) protection
Cloaking
Rate control
Capabilities fully implemented only in reverse proxy WAF such as Barracuda’s WAF
A WAF Should Provide
•
•
•
•
URL Decoding
Code Injection
SQL Injection
Cross Site Scripting
(XSS)
• HTML Form Validation
• XML Validation
Capabilities that a good WAF solution should provide
A Complete WAF Solution Requires
• Load Balancing
– Layer 4
– Layer 7
• Caching
• Compression
• Content Routing
• SSL Offloading
• FTP security
• Anti Virus
• Authentication &
Authorization
– Two factor authentication
• Client certificates
• RSA SecurID
• Single sign on
• CA SiteMinder
Capabilities not present in other WAF Vendors
Malicious Activity Rankings by Country
Overall
Attack
Origin
Bots
Malicious
Code
Spam
Zombie
Brazil
3
6
3
5
1
Argentina
17
19
12
46
12
Mexico
18
15
25
7
17
• Increased Adoption of Broadband and Internet leads to
growth in malicious activity
– Latin America has IP-traffic annual growth rate of 51% over next 5 years
• Web Application Security is often an after thought
Web Application Security will be increasingly important in Latin America!
Network Firewalls Only Secure Port/Protocol
Hacker
BUT
NOW
Firewalls
allowhackers are using
validtraffic
traffictotopass
exploit
vulnerabilities
only
found
in the applications
deployed
through
specific
on the
Web servers.
network
ports
Traffic is allowed
to pass through
port 80/443.
Users
Web Application
Web Application Security Comparison
IPS/IDS
Barracuda WAF
Injection attack protection (XSS, SQLi etc)
No
Yes
Session tampering protection
No
Yes
Cookie hijacking protection
No
Yes
Data Theft protection
No
Yes
Brute-force protection
No
Yes
Web Services Projection
No
Yes
Anti Virus and Malware upload protection
Yes
Yes
Authentication/Authorization
No
Yes
XML Firewall
No
Yes
Denial of Service Attacks
Yes
Yes
Standard Installation Methods
• Bridge Mode
– Initial installation for existing applications
• One Armed Proxy Mode
– Excellent for product evaluation
• Reverse Proxy Mode
– Highest inherent security
Infected IP Addresses
Source: The Economist, July, 2010
Existing Network/Application Data Flow
The Barracuda Web Application Firewall is inserted between the Network firewall and the switch to
the backend.
Application 1
223.216.5.9
Clients
Internet
Switch / Router
N/w Firewall
Switch
Application 2
223.216.5.10
Bridge Mode - Operates as Layer 2 Bridge
Management
172.10.10.5
VIP1: 10.182.12.20
VIP2: 10.182.12.21
VIP3: 10.182.12.22
Mgmt
Virtual IP are same as
Server IP addresses
Servers
WAN
Internet
10.182.12.1
LAN
All incoming traffic is
bridged. Security
policies are applied to
defined services
Pros:
•
No Back end/Front end networking
changes
•
Ease of installation
•
Ethernet Hard Bypass Mode
10.182.12.20
10.182.12.21
10.182.12.22
Cons:
•
Some performance compromises
•
No Load Balancing
•
No TCP Pooling
One Arm Proxy
Management
172.10.10.5
Mgmt
VIP1: 192.168.9.110
VIP2: 192.168.9.120
VIP3: 192.168.9.130
Only WAN Port used
Servers
WAN
Internet
192.168.9.1
Subnet
192.168.9.0/24
Pros:
•
Easier Deployment compared to Reverse
Proxy, network infrastructure, partitioning
does not need to be changed
Subnet
10.10.10.0/24
10.10.10.10
10.10.10.30
10.10.10.20
Cons:
•
Requires DNS/IP changes as in Reverse Proxy
•
Lower throughput since only one port (WAN) is
used
One-Armed Configuration For Evaluation
VIP
10.10.10.202:80
Clients
Client Traffic
Test Traffic
Server 1
10.10.10.101:80
Internet
Testing VIP
IP : 223.216.5.18 Cache
Switch / Router
Load Balancer
IP : 223.216.5.9
Advertised IP for Web Site
No changes
Testers can use the internally published VIP
to access the Application. Existing client
traffic remains unaffected and traverses via
the Load Balancer
Server 2
10.10.10.102:80
Once the evaluation of the Barracuda is complete, it can be
moved inline into production, either coexisting with the Load
Balancer or replacing it
Reverse Proxy
VIPs belong in the WAN subnet
Management
172.10.10.5
Mgmt
VIP1: 192.168.9.110
VIP2: 192.168.9.120
VIP3: 192.168.9.130
Server IPs reside in the LAN subnet
Servers
WAN
LAN
10.10.10.1
192.168.9.1
Subnet
192.168.9.0/24
Pros:
•
Full feature availability including Load
Balancing and Instant SSL
•
Most Secure Deployment Scheme since
backend servers are completely isolated
•
Fast HA Failover
Subnet
10.10.10.0/24
10.10.10.10
10.10.10.30
10.10.10.20
Cons:
•
Network changes required such as Server IP
addresses and DNS mappings
•
Backing out requires undo of all the changes
•
Deployment requires cutover of live services
Barracuda Web Application Firewall
• Mature Solution with over 10 years of R&D
• WAF Customers in America Latina
•
•
•
•
•
•
•
•
•
•
Colombia – Efecty - Financiero
Colombia - Alianza Fiduciaria - Financiero
Mexico - Punto Clave – PCI Certified – ISP
Mexico - Metropolitana – Aseguradora
Mexico - Escuela de Trafico Aereo – Educacional
Mexico - Escuela Naval Militar – Educacional
Chile - Banco Central - Financiero
Chile - Banco de Credito – Financiero
Bolivia – Banco Mercantil – Financiero
Paraguay – Bancard – Fianciero
Competition from ADCs
• Dedicated Security Device
•
•
•
•
Malware scanning for Uploaded content
Energize updates – near real-time updates for security issues via
Barracuda Labs
Positive/Negative Security models
Rule set customization and iRules
• Capacity and performance
• Nickel and diming of Add-ons
• License simplification