web application security - netwell ltd moscow web-a… · © 2014 imperva, inc. all rights...

45
© 2014 Imperva, Inc. All rights reserved. Web Application Security What really matters Confidential 1 Thomas Drews SE Manager Central & Eastern Europe

Upload: trandung

Post on 21-Apr-2018

222 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Web Application Security

What really matters

Confidential 1

Thomas Drews

SE Manager Central & Eastern Europe

Page 2: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Agenda

Confidential 2

What is happening out there?

Are we prepared?

SecureSphere WAF

Incapsula

How does it all come together?

Page 3: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

What is happening out there?

Confidential 3

Why is Application Protection needed

Page 4: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Industrialization of Hacking

Fraud

Hacktivism

DDoS

Page 5: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved. Confidential 5

Hacktivism

Page 6: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

What is Hacktivism?

CONFIDENTIAL 6

Hacktivism is the combination of

hacking and activism, often powered

by the use of social media

Drivers: usually political or ethical

Target: Any organization

58% of stolen records in 2011 were due to hacktivism1

1 Verizon Data Breach Investigation Report

Page 7: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Eyewitness Account of a 25-Day Attack

PHASE I

PHASE III

PHASE II

Scanners such as Nikto

Havij SQL injection tool

LOIC application

Business Logic Attack

Technical Attack

Technical Attack

© Copyright 2012 Imperva, Inc. All rights reserved. 7

Page 8: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved. Confidential 8

Industrialization

Page 9: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Industrialization of Hacking and Automation

9

Researching Vulnerabilities

Developing Exploits

Growing Botnets

Exploiting Targets

Consuming

Direct Value – i.e. IP, PII, CCN

Command & Control

Malware Distribution

Phishing & spam

DDoS

Growing Botnets and Exploiting Vulnerabilities

Selecting Targets via Search Engines

Templates & Kits

Centralized Management

Service Model

Roles Optimization Automation

Page 10: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

More than Half of Web Visitors are Automated

CONFIDENTIAL 10

Page 11: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Hacker Forum Statistics: Hackers Share Strategies

CONFIDENTIAL 11

DoS/DDoS 19%

SQL Injection 19%

Shell code 16%

Spam 14%

XSS 12%

Brute force 11%

HTML Injection 9%

dos/ddos

SQL Injection

shell code

spam

XSS

brute-force

HTML Injection

Page 12: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Automation is Prevailing

In one hacker forum, it was boasted that one hacker had found 5012

websites vulnerable to SQLi through automation tools.

Note:

•Due to automation, hackers

can be effective in small

groups – i.e. Lulzsec.

• Automation also means that

attacks are equal opportunity

offenders. They don’t

discriminate between well-

known and unknown sites.

Page 13: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved. Confidential 13

DDoS

Page 14: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

DDoS Attacks Fall into Two Major Categories

Confidential 14

Network Layer DDoS Attacks

• Consume all available upload and

download bandwidth to prevent access

to Web sites

Application Layer DDoS Attacks

• Application requests overwhelm the

Web server or database causing it to

crash

• The Website then becomes unavailable

Legit Traffic

Web

Requests

Web Server

Page 15: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Distributed Denial of Service (DDoS) Threats

DDoS Attack Tool

DDoS Statistics

• 74% of organizations received a

DDoS attack in past year1

• 31% of attacked organizations

suffered service disruption1

Most DDoS attacks are launched by

botnets, because of scale

• Toolkits automate DDoS attacks

• Botnets for rent from $50 - $2K

1 ”The Trends and Changing Landscape of DDoS Threats and Protection,” Forrester Research

Page 16: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Commercialized DDoS

DDoS as a Service

CONFIDENTIAL 16

Page 17: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Commercialized DDoS

Customer satisfaction guaranteed!

CONFIDENTIAL 17

Page 18: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved. Confidential 18

Page 19: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Web Fraud Costs Businesses Millions

Fraudulent payment transactions

• Chargeback fees

New account fraud

• Chargeback fees due to ID theft

• Bots email or post spam

Account login fraud

• Logins with stolen credentials

erodes brand

Man-in-the-Browser attacks

CONFIDENTIAL 19

Page 20: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Fraud Malware

CONFIDENTIAL 20

111,111 Number of unique strains of malware deployed per day

50% Percent of malware designed to compromise credentials

10,000 Malicious new domains deployed per day

Source: Aite Group

Page 21: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Are we prepared?

Confidential 21

Are we safe?

Page 22: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

• Router ACLs

• Network Firewalls

• IDS and IPS

• VPNs

• Anti-Virus

What helped get us

secure…

• SQL Injection

• (XSS) Cross-site Scripting

• Remote File Inclusion

• Cross-site Request Forgery

• Business Logic Attacks

• Fraud Malware

isn’t keeping

us secure

Traditional Security Doesn’t Stop Today’s Threats

Page 23: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

0%

20%

40%

60%

80%

100%

Why Haven’t We Solved This Problem?

1 2012 Data Breach Investigations Report (Verizon RISK Team in conjunction with the US Secret Service & Dutch High Tech Crime Unit) 2 Worldwide Security Products 2011-2014 Forecast (IDC - February 2011)

23

In 2012, 94% of all

data breached was

from servers such

as Web and

database servers1

Threat Spend

Yet well over 95% of the $27 billion spent on security products that do not directly address data security2

Page 24: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

What does Gartner say?

Confidential 24

“IPS and NGFW were not designed to protect against

Web Application Attacks.

To prevent web application attacks, organizations need

a solution dedicated to that task …”

Download Link: https://www.imperva.com/lg/lgw.asp?pid=505

Page 25: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

SecureSphere WAF

Confidential 25

Best in Class on-premise protection for Web

Applications

Page 26: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Production Operation of a WAF

Management

Tuning

• On-boarding Apps

• Mitigating Attacks

• Troubleshooting

• OPEX Costs

Confidential 26

Page 27: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Web Application

Firewall

Management Server (MX)

Users

Web Servers

Web Servers

Web Application

Firewall

Web Servers

Web Application

Firewall

Deployment Flexibility

© Copyright 2012 Imperva, Inc. All rights reserved. 27 - CONFIDENTIAL - 27

Page 28: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

SecureSphere for AWS

28

Capabilities

Full SecureSphere WAF

Native support for AWS environment

• Cloud-formation deployment

• Elasticity via auto-scaling

Benefits

Reduced time-to-deploy

Reduced network complexity

Customers pay on as needed basis

(Shift of CapEx to OpEx)

Amazon

ELB

Amazon

ELB

Web

servers

Amazon

ELB

Web

servers

Scaling Group

Availability Zone 1

Availability Zone 2

Page 29: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

By analyzing traffic, SecureSphere automatically learns…

Directories

URLs

Parameters Expected user

input

So it can alert on or block abnormal requests

Dynamic Profiling

© Copyright 2012 Imperva, Inc. All rights reserved. 29

Page 30: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

1. Globally tracks attack sources

ThreatRadar Servers

Phishing Sites

Anonymous Proxy & TOR

Web Servers

Malicious IPs

3. Blocks malicious sources

2. Distributes feeds to WAF

ThreatRadar Reputation Services

- CONFIDENTIAL - 30

Page 31: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

ThreatRadar Fraud Prevention Services

Confidential 31

Policy Based Fraud

Verification

Page 32: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

ThreatRadar Community Defenses

Confidential 32

ThreatRadar Community Defense

Gathers live attack data from

SecureSphere WAFs around the world

Distributes attack patterns and

reputation data in near-real time

Page 33: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

SecureSphere can import scan results and

instantly create mitigation policies

Eliminated payment processors’ emergency fix

and test cycles

Customer Site

Scanner finds vulnerabilities

SecureSphere imports scan results

Web applications are protected

Virtual Patching Through Scanner Integration

© Copyright 2012 Imperva, Inc. All rights reserved. 33

Page 34: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Incapsula

Confidential 34

Best in Class cloud based Protection for Web

Applications

Page 35: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Imperva Incapsula Overview

Confidential 35

By routing Website traffic through Incapsula, bad traffic is removed and

good traffic is accelerated

Page 36: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Imperva Incapsula Overview

Confidential 36

Incapsula is a cloud-based CDN solution which helps Website owners…

Load Balance Sites and Servers

Page 37: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Incapsula’s Global Content Delivery Network

Confidential 37

Datacenters

• Currently 17 PoPs, 3 Scrubbing Centers – 630Gbps+ capacity

USA 9 (Ashville NC, Ashburn VA, Los Angeles, San Jose CA, Chicago, New York, Miami, Seattle, Dallas), London, Singapore, Tel Aviv, Amsterdam, Tokyo, Frankfurt, Sydney, Paris

• Plans for many additional PoP and scrubbing centers

Toronto, San Francisco, Denver, Hong Kong, Sao Paulo, New Zealand and Milan

Data Across Borders

• Customer data can be locked into (or out of) specific countries

Page 38: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

DDOS 3rd Party Review Imperva Incapsula #1 2013/14

Confidential 38

Source: http://ddos-protection-services-review.toptenreviews.com/

Page 39: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Web Security & Performance Service 3rd Party Review

Confidential 39

Source: http://website-security-and-performance-review.toptenreviews.com/

Page 40: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

New: Fully Featured Load-Balancing Option

Failover to Standby site (DR Scenarios)

• Active/Passive Topology

• Choice of failover decision (e.g. min servers)

• Site failure may be determined by multiple POPs

Layer 7 Load Balancing

• Granular Server LB within a site (e.g. least requests)

• Connection Stickiness option

• Granular server monitoring and alerting

• Support for multiple ISP within a site

• Support for port address translation to preserve IP addressing

Global Server Load Balancing (GSLB)

• Active/Active Topology

• Site failure determined as per DR choices

• Global LB choice (e.g. by area, by fastest response)

• L7 monitoring (e.g. check URL response time and content)

Page 41: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

How does it all come together?

Confidential 41

The BIG Picture

Page 42: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

SecureSphere Appliance • App DDoS protection

• Incapsula available on demand as

needed

DDoS Attack Protection (Cloud + Premis)

Confidential

ISP

ISP

ISP

ISP

Incapsula Service • Always on for cloud users

• Volumetric & application attacks mitigated

• SOC team available for attack analysis & mitigation

42

Page 43: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

SecureSphere WAF

Management Server (MX)

Web

Servers

Web

Servers

SecureSphere WAF

Web

Servers

SecureSphere WAF

Web App Security where You need it!

Confidential 43

SecureSphere WAF

Internet

Page 44: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Known Attackers

Bots

Web Attacks

Undesirable Countries

Web Fraud

App DDoS

Scrapers

Phishing Sites

Comment Spammers

Vulnerabilities

Web Apps

SecureSphere

Complete Protection Against Web Threats

© Copyright 2012 Imperva, Inc. All rights reserved. 44

Page 45: Web Application Security - Netwell Ltd Moscow Web-A… · © 2014 Imperva, Inc. All rights reserved. Agenda 2 Confidential What is happening out there? Are we prepared? SecureSphere

© 2014 Imperva, Inc. All rights reserved.

Questions?

45 Confidential