SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
IBM Software                                                                                        Technical White Paper
Rational




                                                  Designing a strategy for
                                                  comprehensive web
                                                  protection

                                                  Executive summary
               Contents                           In 2000, the United States had nearly 135 million Internet users.1 As
                                                  dramatic as that number seemed 10 years ago, the number of Internet
               1 Executive summary                users has grown exponentially: as of June 30, 2010, roughly two billion
                                                  people are using the web.2 This adoption rate is even more striking
               2 Big opportunities, big risks
                                                  given the penetration of Internet use in Australia, Europe and
               2 Web application security risks   North America, where some 61 percent, 58 percent and 77 percent of
                 are multiplying                  the population is connected, respectively.3 Even other sections of the
                                                  world that have a lower percentage of web users are rapidly making
               4 Prevention is critical
                                                  up ground, with Africa and the Middle East experiencing increases of
               5 Existing point security solu-    more than 2,300 percent and 1,800 percent, respectively, in the last
                 tions leave gaps                 10 years.4

               5 Layers in a comprehensive
                                                  This rise and rush to connect has a variety of causes, including the
                 web protection strategy
                                                  shrinking costs of Internet-capable equipment, the pervasive availabil-
               7 Achieve comprehensive web        ity of higher speed wireless connectivity, the integration of cellular
                 protection                       voice and data communication devices, and the continuing increase in
                                                  the value and diversity of services available through the Internet.

                                                  As systems and the environments in which they operate become sim-
                                                  pler to develop, deploy and use, the world is getting smaller, and peo-
                                                  ple are interacting more than ever. The location of the server or the
                                                  client is no longer obvious or necessary; we exist in a relatively flat
                                                  universe, and the barriers are lowering to global communication and
                                                  global business. We have virtually unprecedented access to information
                                                  and tools for collaboration.
IBM Software                                                                                                   Technical White Paper
Rational




Web applications power much of this new communication                 Few innovations have proven as flexible and valuable as web
and deliver much of the new and interesting content that              applications, and while they are extremely powerful, they
attracts this generational wave of new users. Unlike the web          can also be very vulnerable. The rise in popularity of web
pages that first appeared in the mid-1990s, each of which was          applications has led to similarly rapid growth in the demand
mainly static and only mildly interactive, today’s web-enabled        for developers to create them. Dozens of new products,
applications are powered by new languages such as Java™               platforms and frameworks simplify web application develop-
technology, JavaScript, the Adobe® Flash player, XML and              ment to the point where almost anyone can write one.
Hypertext Preprocessor (PHP). These web-enabled applica-              Unfortunately, the capability to create a secure application, or
tions have rich, interesting content and can be dynamically           the capability to review an application for security problems,
altered based on the identity, type or interests of the users         is not as simple or common. In addition to this skill gap,
who interact with them.                                               there are real time-to-market pressures on web application
                                                                      development teams; all too often, applications are rushed to
Big opportunities, big risks                                          the marketplace without enough focus on security.
This new form of interactivity means real advancement in
service and data availability. In the current generation of web       The risks of this lack of rigor and concern are enormous
interactivity, a user with only a web browser can easily access       because an organization is only as secure as the applications
systems and resources, typically without downloading any              that support it. This white paper discusses the many risks
new software. Almost any kind of application or service can           surrounding web applications and their development and
be driven from connected devices—such as desktops and                 reviews the four layers of security an organization should
smart phones. Users are opening their web browsers in                 establish to implement a comprehensive web application
increasing numbers to run applications at work, receive and           protection strategy.
pay bills at home, prepare and file taxes, and manage all kinds
of sensitive data, from life savings statements to medical            Web application security risks are
records. In short, new web applications are transforming our          multiplying
experience with the web and the world.                                Web applications present a number of unique security chal-
                                                                      lenges. One is exposure—because web applications reach mil-
The rise of the Internet and web applications has created             lions of users, they also reach millions of potential hackers.
whole industries and altered or displaced others. Physical            Web applications stretch across multiple infrastructure tiers
location is losing importance, and disintermediation is creat-        and incorporate many process layers, elements that expose
ing more direct and substantial relationships for customers           them to a wide range of prospective attackers.
and product or service providers. Relationships are much
more intimate because customers and business partners can             As web applications get more complex, so do their vulnerabil-
access data and conduct transactions that not long ago were           ities; as they become more useful and pervasive, they become
restricted to only employees. As a result, companies can take         higher value targets. And cybercriminals are taking note.
advantage of new opportunities to collaborate; improve
efficiency; and simplify orders, payments, status checking
and support.




                                                                  2
IBM Software                                                                                                                               Technical White Paper
Rational




                                                          Damage/impact to life and property
               Motive
                                                                                                              Cyber warriors
                            The national security agenda is rising
       National security
                            in importance within the context of
                            the cybersecurity discussion                       Organized crime, competitors
                                                                                                              Advanced persistent threat
    Industrial espionage
                                                                        Hackers, crackers
         Monetary gain                                                                 Sophisticated tools, expertise and substantial resources
                                                             Insiders

               Revenge                                                  Inside information


      Prestige and thrill    Script kiddies         Substantial time, tools and social engineering


               Curiosity             Scripts, tools, web-based how-tos
                                                                                                                                                  Adversary



Figure 1: The important information and services accessible through a web-facing application have attracted a new and far more sophisticated adversary.
And the motivation for these attacks is changing and maturing from curiosity to financial gain to real espionage. The techniques that hackers employ are
also advancing, making them harder to prevent and detect. The arrow represents a rapid rise in the likely overall damage and impact of attacks on applica-
tions as a whole.



Public data breaches through web applications are frequent                                   ●   JavaScript Object Notation (JSON) hijacking—This
and can result in serious consequences, including lost revenue                                   kind of attack exploits a subset of the JavaScript program-
and business opportunities, revelation of highly confidential                                     ming language. Security concerns about JSON center on
or damaging information, brand and reputation erosion,                                           the use of a JavaScript interpreter to dynamically execute
adverse media attention, unwanted scrutiny from consumer                                         JSON text as JavaScript, thus exposing a program to an
advocates, and growing costs to support litigation and                                           errant or malicious script that an attacker may insert in
compliance.                                                                                      query text. This is a chief concern when dealing with data
                                                                                                 retrieved from the Internet.
Consider a few selections in the rich variety of attacks that                                ●   HTTP response splitting—This is a form of web applica-
are available to hackers:                                                                        tion vulnerability that results from the failure of the appli-
                                                                                                 cation or its environment to properly sanitize input values.
●   Cross-site request forgery (CSRF or XSRF)—Also                                               Hackers can use HTTP response splitting to perform
    known as one-click attack or session riding, this is a type of                               cross-site scripting, cross-user defacement, web cache
    malicious exploitation of a website where a hacker transmits                                 poisoning and similar attacks.
    unauthorized commands from a user whom the website
    trusts. Unlike cross-site scripting, which abuses a user’s
    trust for a particular site, CSRF capitalizes on the trust that
    a site has in a user’s browser.




                                                                                      3
IBM Software                                                                                                           Technical White Paper
Rational




●   SQL injection—This code injection technique manipulates              Prevention is critical
    a security vulnerability that occurs in an application’s data-       Companies that delay efforts to protect web applications can
    base layer. The vulnerability is present when user input is          face substantial consequences. In 2009, the average cost of a
    insufficiently filtered for characters that can cause actual          data breach in the United States was US$6.75 million,5 and
    execution of SQL commands from input fields such as login             the probability of a hacker exploiting any given web applica-
    prompts or when user input is not classified in such a way            tion can be expected to continue to increase as automated
    to prevent inappropriate types of information from being             attacks and bots multiply. Recent studies by the IBM X-Force
    passed on to an application and unexpectedly executed.               team reveal that in the first half of 2010, web applications
    This more general class of vulnerabilities can occur when            accounted for 55 percent of all vulnerability disclosures.6
    one programming or scripting language is embedded inside
    another.                                                             Instead of reaching out to users with malicious code, hackers
●   Lightweight Directory Access Protocol (LDAP)                         can now inject it into popular websites and let users come to
    injection—This type of attack exploits LDAP, an applica-             them. Automated scanners help attackers identify which sites
    tion protocol used to query and modify directory services            are vulnerable and can be easily infected. Browser plug-ins
    running over TCP/IP, and can execute arbitrary commands              are particularly susceptible targets of these attacks. According
    such as granting permission to unauthorized queries.                 to a recent IBM X-Force team report, in the first half of
●   XML Path Language (XPath) injection—This is similar                  2010, plug-ins accounted for 88 percent of disclosed vulnera-
    to SQL injection but manipulates XPath, a language for               bilities related to web applications.7
    selecting nodes from an XML document. XPath is also used
    to compute values (strings, numbers or Boolean values)
    from the content of an XML document.
●   Shell command injection—This attack inserts malicious
                                                                           Percentage of vulnerability disclosures
    code into the shell, or command language interpreter, that
                                                                              that affect web applications and
    executes commands read from a keyboard.
●   Server-side include (SSI) injection—This inserts                     web application platforms and their plug-ins
    malicious code into SSI, a simple server-side scripting lan-
    guage that’s used almost exclusively for the web. As its
    name implies, SSI’s primary use is to dynamically include
    the contents of one file into another when the latter is

●
    served by a web server.
    Cross-site scripting (XSS)—This type of computer secu-                       45%                 55      %          12%
                                                                                                                      PLATFORMS
    rity vulnerability is typically found in web applications that              OTHERS                WEB
    allow code injection by malicious web users into the web
    pages viewed by other users.
                                                                                                  APPLICATIONS
                                                                                                                        88%
                                                                                                                       PLUG-INS
●   Directory traversal (or path traversal)—This exploits
    insufficient security validation or sanitization of user-                                                          Cross-site scripting and
                                                                                                                       SQL injection vulnerabilities
    supplied input file names. In this instance, characters that                                                        continue to dominate
    cause the application to execute within other, unexpected
    areas of the file system are passed through to the file appli-
    cation programming interfaces (APIs).
                                                                         Figure 2: Attacks on web applications are multiplying, making a compre-
                                                                         hensive web protection strategy even more critical for businesses that
                                                                         interact with customers online.8




                                                                     4
IBM Software                                                                                                     Technical White Paper
Rational




Moreover, if hackers gain access to sensitive information,              security, enterprises need comprehensive web protection that
organizations run the risk of being noncompliant with a host            fits within a framework of security governance, risk manage-
of legislated mandates and other requirements, including the            ment and compliance.
Payment Card Industry Data Security Standard (PCI DSS),
which has specific application security requirements.                    IBM provides a wide-ranging security framework across key
Noncompliance can cost companies monthly fines of hun-                   domains that ties back to Control Objectives for Information
dreds of thousands of dollars.                                          and related Technology (COBIT) standards. IBM can also
                                                                        deliver and unite professional services, managed services, and
Existing point security solutions leave                                 hardware and software solutions for each domain. Let’s
gaps                                                                    explore the requirements of comprehensive web protection
Web applications are the new attack vector for hackers to               and understand why IBM is in a leadership position to help
exploit. Just like with other IT threats, the initial reaction to       your company determine and implement a web application
combat risk is to introduce a point solution for every threat.          security solution that addresses your unique needs.
But existing point security solutions have design limitations:
                                                                        Layers in a comprehensive web
●   Traditional vulnerability scanners scan web servers but not         protection strategy
    web applications.                                                   Maximizing web protection involves four layers of security—
●   Manual penetration testing is effective but is neither scala-       developing new, security-enabled applications while protect-
    ble nor focused on remediation.                                     ing existing applications; preventing site intrusions with
●   Traditional network firewalls offer basic web application            real-time protection; shielding service-oriented architecture
    protection but don’t address the needs of custom web                (SOA) deployments and XML or other web service traffic;
    applications.                                                       and controlling access to web applications.
●   Web application firewalls are expensive to purchase and
    manage; they can be effective but are challenging and time-         To simplify each layer of protection, IBM integrates industry-
    intensive to properly deploy and tune.                              leading solutions that facilitate comprehensive web protection
●   Most web applications are customized, and it is difficult for       and that are designed to reduce the risks in web-enabled
    web application firewalls to interpret their behavior as             transactions, websites and web traffic. Let’s take a closer look
    either good or bad.                                                 at each of the needed layers.

Each of these limitations results in security gaps. The prob-           Develop security-rich, new applications while
lem is that point solutions weren’t designed with web applica-          protecting existing applications
tion security requirements in mind.                                     A key first step in enhancing web protection is to identify
                                                                        vulnerabilities in your existing web applications. One of the
Security organizations in today’s companies demand an inte-             most cost-efficient ways to do this is to automate the testing
grated solution from a trusted vendor that provides a holistic          process. You need a means to automatically scan applications,
and cost-effective approach to IT security. For thorough web            identify vulnerabilities and generate reports with intelligent
                                                                        fix recommendations.




                                                                    5
IBM Software                                                                                                     Technical White Paper
Rational




To stay ahead of hackers and enable a more secure design, the          Compliance is critical, and an automated scanning solution
solution should test not only live web applications but also           should streamline the compliance process. Rational AppScan
those in development—throughout their development life                 solutions include more than 40 standard security compliance
cycle. The solution needs to scan and test for common web              reports, such as for PCI DSS, ISO 17799 and ISO 27001,
application vulnerabilities, including those identified by the          the Health Insurance Portability and Accountability Act
Web Application Security Consortium (WASC) threat                      (HIPAA), the Gramm-Leach-Bliley Act (GLBA), and Basel II
classification.                                                         recommendations.

To address these requirements, IBM developed                           After your solution finds application vulnerabilities, your
IBM Rational® AppScan® Source Edition and IBM Rational                 organization needs time to fix them. Your second layer in a
AppScan Standard Edition solutions. Rational AppScan                   comprehensive web protection strategy should be a shield to
Source Edition software analyzes the source code used to               protect against attacks.
build applications, reviews code for issues and errors prior to
deployment, and can save you considerable time and money               Prevent site intrusions with real-time protection
on quality assurance (QA) issues identified later in the cycle.         Good intrusion prevention needs to be web application
Rational AppScan Source Edition and Standard Edition solu-             aware. IBM Proventia® web application security is included
tions also share core features that provide application scan-          in every Proventia intrusion prevention solution. These
ning coverage for both new and old web-facing technologies.            marketplace-leading solutions for blocking attacks at the
Rational AppScan tools can assess the following:                       network perimeter and server levels now include the protec-
                                                                       tion of a web application firewall. Because of the increasing
●   The parsing and execution of JavaScript and Adobe Flash            importance of web applications, IBM delivers the core pro-
    applications                                                       tection engine of Proventia web application security across its
●   Asynchronous JavaScript and XML (AJAX) and Adobe Flex              entire Proventia product line.
    technology-related protocols such as JSON, Action
    Message Format (AMF) and Simple Object Access                      Four key requirements have guided the IBM Proventia solu-
    Protocol (SOAP)                                                    tion design:
●   Elaborate SOA environments
●   Custom configuration and reporting capabilities for                 ●   Proactive prevention—Instead of auditing attacks and
    mashup- and process-driven applications                                reacting to them, like many web protection solutions do,
                                                                           Proventia web application security helps address and limit
Because attacks keep evolving, a scanning solution needs                   primary attack sources.
constant updates. To help enable Rational AppScan solutions            ●   Simplified configuration to enhance security—You can
to keep up with and test for the latest exploits and vulnerabil-           save time with Proventia web application security because it
ities, IBM research and IBM development teams provide                      is configured out of the box with IBM X-Force recom-
automatic software updates. And because identifying vulnera-               mended policies, which are updated automatically. Using a
bilities alone does not make web applications more secure,                 wizard feature, you can more easily build additional security
Rational AppScan software also includes intelligent fix                     policies that help protect custom web applications.
recommendations.




                                                                   6
IBM Software                                                                                                     Technical White Paper
Rational




●   Enhanced compliance—Proventia web application                     for SOA deployments and XML and web services transac-
    security addresses PCI requirements for web application           tions, including encryption, firewall filtering, digital
    protection.                                                       signatures, schema validation, Web Services Security
●   Comprehensive protection of a web application                     (WS-Security), Web Services Policy (WS-Policy) Framework,
    firewall—The firewall is deployed by combining                      Web Services Security Policy Language (WS-SecurityPolicy),
    IBM Security Network Intrusion Prevention System                  XML access control and XPath.
    (formerly IBM Proventia Network Intrusion Prevention
    System) with a Secure Sockets Layer (SSL) offloader.              Control access to web applications
                                                                      To help ensure that only authorized users gain appropriate
IBM offers Proventia solutions in three form factors to               access to web applications, your authentication and authoriza-
address different deployment requirements. The Security               tion solution should have the following features:
Network Intrusion Prevention System solution provides
high-bandwidth web protection for large enterprises with web          ●   Centralized authentication, access and audit policies,
server farms. The IBM Proventia Network Multi-Function                    enabling them to be easily defined and managed
Security solution offers all-in-one remote office or branch           ●   An established audit and reporting service that collects audit
office protection with virtual private network (VPN) support.             data from multiple enforcement points and across platforms
Small offices without a network intrusion prevention                      and security applications
system or VPN can use the IBM Proventia Server Intrusion              ●   Simplified single sign-on (SSO) options
Prevention System solution to decrypt and inspect                     ●   Security codes that are separate from application codes
SSL-encrypted traffic.                                                ●   Fine-grained entitlement and data-level access control

Protect SOA deployments and XML and web                               To address these requirements, IBM offers IBM Tivoli®
services traffic                                                      Access Manager and IBM Tivoli Security Policy Manager
The third layer in a comprehensive web security strategy is to        software. By integrating rigorous access control and identity
protect SOA deployments and XML and web services traffic,             management capabilities, the Tivoli family of solutions
which are often key components of web applications. Yet safe-         enables appropriate controls for application security, monitor-
guarding these components requires a different kind of real-          ing and management.
time protection than that which would typically suffice to
protect web applications. Web services generate high-speed,           Achieve comprehensive web protection
high-volume traffic; inspecting this type of traffic can easily       Cost-efficient web protection does not limit opportunity on
degrade application performance.                                      the web; it is an enabler. It can help your business reduce risk,
                                                                      enhance compliance, protect brand reputation, gain flexibility
The IBM WebSphere® DataPower® family of appliances                    and reduce long-term security costs by building security into
features purpose-built, specialized hardware with high-speed,         application development.
high-volume security inspection capabilities. WebSphere
DataPower appliances serve as a security enforcement point




                                                                  7
Leveraging its broad and deep security experience and
offerings, IBM can provide a comprehensive strategy to help
your business effectively manage web application security. As
one of the world’s most prolific creators of software and as a
security consultant and strategic resource to large, global
organizations, IBM informs its solutions with the realities of              © Copyright IBM Corporation 2010

budgets, schedules and competing priorities. IBM’s drive to                 IBM Corporation
help clients create web applications that are security rich by              Software Group
                                                                            Route 100
design is based on all of these insights and reinforces IBM’s               Somers, NY 10589
position as a valuable adviser and contributor to any security-             U.S.A.
rich application development effort.
                                                                            Produced in the United States of America
                                                                            December 2010
For more information                                                        All Rights Reserved

For more information on how you can take advantage of                       IBM, the IBM logo, ibm.com, and Rational are trademarks of
proven IBM solutions to help safeguard your company’s                       International Business Machines Corp., registered in many jurisdictions
                                                                            worldwide. Other product and service names might be trademarks of
web-based applications, contact your IBM representative                     IBM or other companies. A current list of IBM trademarks is available
or IBM Business Partner, or visit:                                          on the web at “Copyright and trademark information” at
ibm.com/security/application-process.html                                   ibm.com/legal/copytrade.shtml

                                                                            Adobe is either a registered trademark or trademark of Adobe Systems
Additionally, financing solutions from IBM Global                            Incorporated in the United States, and/or other countries.
Financing can enable effective cash management, protection                  Java and all Java-based trademarks and logos are trademarks of Sun
from technology obsolescence, improved total cost of                        Microsystems, Inc. in the United States, other countries, or both.
ownership and return on investment. Also, our Global Asset                  References in this publication to IBM products or services do not imply
Recovery Services help address environmental concerns with                  that IBM intends to make them available in all countries in which
                                                                            IBM operates.
new, more energy-efficient solutions. For more information
on IBM Global Financing, visit: ibm.com/financing                            The information contained in this documentation is provided for
                                                                            informational purposes only. While efforts were made to verify the
                                                                            completeness and accuracy of the information contained in this
                                                                            documentation, it is provided “as is” without warranty of any kind,
                                                                            express or implied. In addition, this information is based on IBM’s
                                                                            current product plans and strategy, which are subject to change by
                                                                            IBM without notice. IBM shall not be responsible for any damages
                                                                            arising out of the use of, or otherwise related to, this documentation or
                                                                            any other documentation. Nothing contained in this documentation is
                                                                            intended to, nor shall have the effect of, creating any warranties or
                                                                            representations from IBM (or its suppliers or licensors), or altering the
                                                                            terms and conditions of the applicable license agreement governing
 1
     Computer Industry Almanac, http://www.c-i-a.com/
                                                                            the use of IBM software.
     internetusersexec.htm
                                                                            Each IBM customer is responsible for ensuring its own compliance
       Internet World Stats, “Internet Usage Statistics, The Internet Big
 2, 3, 4
                                                                            with legal requirements. It is the customer’s sole responsibility to
     Picture,” http://www.internetworldstats.com/stats.htm
                                                                            obtain advice of competent legal counsel as to the identification and
 5
     Ponemon Institute, 2009 Annual Study: Cost of a Data Breach,           interpretation of any relevant laws and regulatory requirements that may
     January 2010.                                                          affect the customer’s business and any actions the customer may need to
                                                                            take to comply with such laws. IBM does not provide legal advice or
       IBM, IBM X-Force 2010 Mid-Year Trend and Risk Report,
 6, 7, 8
                                                                            represent or warrant that its services or products will ensure that the
     August 2010.                                                           customer is in compliance with any law.


                                                                                     Please Recycle




                                                                                                                               RAW14246-USEN-00

Weitere ähnliche Inhalte

Andere mochten auch

Social Brand Footprint - wrzesien 2013
Social Brand Footprint - wrzesien 2013Social Brand Footprint - wrzesien 2013
Social Brand Footprint - wrzesien 2013NapoleonCat.com
 
Lab 1: Generating document-style reports
Lab 1: Generating document-style reportsLab 1: Generating document-style reports
Lab 1: Generating document-style reportsIBM Rational software
 
Product Overview Hex New Jenny
Product Overview Hex New JennyProduct Overview Hex New Jenny
Product Overview Hex New Jennyjaguilar1018
 
Golden opportunity to invest 2011
Golden opportunity to invest 2011Golden opportunity to invest 2011
Golden opportunity to invest 2011Fausto Cuzco
 
Facebook Month-To-Month – April 2014
Facebook Month-To-Month – April 2014Facebook Month-To-Month – April 2014
Facebook Month-To-Month – April 2014NapoleonCat.com
 
Tech 2003
Tech 2003Tech 2003
Tech 2003jkava
 
Co nas kręci na YouTube
Co nas kręci na YouTubeCo nas kręci na YouTube
Co nas kręci na YouTubeNapoleonCat.com
 
La Jornada Única. CEIP Florida
La Jornada Única. CEIP FloridaLa Jornada Única. CEIP Florida
La Jornada Única. CEIP FloridaMónica Romero
 
Plug development
Plug developmentPlug development
Plug developmentmitchello44
 
Swamid, WAYF, Kalmar2 & eduGAIN
Swamid, WAYF, Kalmar2 & eduGAINSwamid, WAYF, Kalmar2 & eduGAIN
Swamid, WAYF, Kalmar2 & eduGAINJacob-Steen Madsen
 
Ativ. de classe ivanesia
Ativ. de classe ivanesiaAtiv. de classe ivanesia
Ativ. de classe ivanesiaWildete Silva
 
Napoleon - your brand management cat EN
Napoleon -  your brand management cat ENNapoleon -  your brand management cat EN
Napoleon - your brand management cat ENNapoleonCat.com
 
Ingenieria del software 7ma. ed. ian sommerville
Ingenieria del software 7ma. ed.   ian sommervilleIngenieria del software 7ma. ed.   ian sommerville
Ingenieria del software 7ma. ed. ian sommervilleFrancisco Mora
 
Social Brand Footprint - lipiec 2013
Social Brand Footprint - lipiec 2013Social Brand Footprint - lipiec 2013
Social Brand Footprint - lipiec 2013NapoleonCat.com
 

Andere mochten auch (17)

Social Brand Footprint - wrzesien 2013
Social Brand Footprint - wrzesien 2013Social Brand Footprint - wrzesien 2013
Social Brand Footprint - wrzesien 2013
 
Lab 1: Generating document-style reports
Lab 1: Generating document-style reportsLab 1: Generating document-style reports
Lab 1: Generating document-style reports
 
Product Overview Hex New Jenny
Product Overview Hex New JennyProduct Overview Hex New Jenny
Product Overview Hex New Jenny
 
Golden opportunity to invest 2011
Golden opportunity to invest 2011Golden opportunity to invest 2011
Golden opportunity to invest 2011
 
Facebook Month-To-Month – April 2014
Facebook Month-To-Month – April 2014Facebook Month-To-Month – April 2014
Facebook Month-To-Month – April 2014
 
360º leadership
360º leadership360º leadership
360º leadership
 
USO DE POWER POINT2007
USO DE POWER POINT2007USO DE POWER POINT2007
USO DE POWER POINT2007
 
Tech 2003
Tech 2003Tech 2003
Tech 2003
 
Co nas kręci na YouTube
Co nas kręci na YouTubeCo nas kręci na YouTube
Co nas kręci na YouTube
 
La Jornada Única. CEIP Florida
La Jornada Única. CEIP FloridaLa Jornada Única. CEIP Florida
La Jornada Única. CEIP Florida
 
Plug development
Plug developmentPlug development
Plug development
 
Components lab
Components labComponents lab
Components lab
 
Swamid, WAYF, Kalmar2 & eduGAIN
Swamid, WAYF, Kalmar2 & eduGAINSwamid, WAYF, Kalmar2 & eduGAIN
Swamid, WAYF, Kalmar2 & eduGAIN
 
Ativ. de classe ivanesia
Ativ. de classe ivanesiaAtiv. de classe ivanesia
Ativ. de classe ivanesia
 
Napoleon - your brand management cat EN
Napoleon -  your brand management cat ENNapoleon -  your brand management cat EN
Napoleon - your brand management cat EN
 
Ingenieria del software 7ma. ed. ian sommerville
Ingenieria del software 7ma. ed.   ian sommervilleIngenieria del software 7ma. ed.   ian sommerville
Ingenieria del software 7ma. ed. ian sommerville
 
Social Brand Footprint - lipiec 2013
Social Brand Footprint - lipiec 2013Social Brand Footprint - lipiec 2013
Social Brand Footprint - lipiec 2013
 

Mehr von IBM Rational software

DMT-2467 Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
DMT-2467	Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...DMT-2467	Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
DMT-2467 Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...IBM Rational software
 
Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...
Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...
Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...IBM Rational software
 
Steer at the Team Level with Rational Team Concert
Steer at the Team Level with Rational Team ConcertSteer at the Team Level with Rational Team Concert
Steer at the Team Level with Rational Team ConcertIBM Rational software
 
UrbanCode Deploy course and product overview slides
UrbanCode Deploy course and product overview slidesUrbanCode Deploy course and product overview slides
UrbanCode Deploy course and product overview slidesIBM Rational software
 
IBM InterConnect Speaker Proposal Tips
IBM InterConnect Speaker Proposal TipsIBM InterConnect Speaker Proposal Tips
IBM InterConnect Speaker Proposal TipsIBM Rational software
 
Factors to consider when starting a brand-new requirements management project...
Factors to consider when starting a brand-new requirements management project...Factors to consider when starting a brand-new requirements management project...
Factors to consider when starting a brand-new requirements management project...IBM Rational software
 
IBM DevOps Announcements - June 2014
IBM DevOps Announcements - June 2014IBM DevOps Announcements - June 2014
IBM DevOps Announcements - June 2014IBM Rational software
 
IBM Rational Developer for System z Quick Start Sales Presentation
IBM Rational Developer for System z Quick Start Sales PresentationIBM Rational Developer for System z Quick Start Sales Presentation
IBM Rational Developer for System z Quick Start Sales PresentationIBM Rational software
 
Rational consulting café to go menu
Rational consulting café to go menuRational consulting café to go menu
Rational consulting café to go menuIBM Rational software
 

Mehr von IBM Rational software (20)

DMT-2467 Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
DMT-2467	Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...DMT-2467	Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
DMT-2467 Like the Features in Rational DOORS 9? Come Check Them Out in DOORS...
 
Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...
Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...
Dmt 5899 workshop - Learn to Collaborate, Trace, Review and Reuse Your Requir...
 
Deployment module slides
Deployment module slidesDeployment module slides
Deployment module slides
 
Security
SecuritySecurity
Security
 
Steer at the Team Level with Rational Team Concert
Steer at the Team Level with Rational Team ConcertSteer at the Team Level with Rational Team Concert
Steer at the Team Level with Rational Team Concert
 
Applications lab
Applications lab Applications lab
Applications lab
 
Application slides
Application slidesApplication slides
Application slides
 
UCD components
UCD components UCD components
UCD components
 
Resource lab
Resource labResource lab
Resource lab
 
Resources slides
Resources slidesResources slides
Resources slides
 
UrbanCode Deploy course and product overview slides
UrbanCode Deploy course and product overview slidesUrbanCode Deploy course and product overview slides
UrbanCode Deploy course and product overview slides
 
IBM InterConnect Speaker Proposal Tips
IBM InterConnect Speaker Proposal TipsIBM InterConnect Speaker Proposal Tips
IBM InterConnect Speaker Proposal Tips
 
Factors to consider when starting a brand-new requirements management project...
Factors to consider when starting a brand-new requirements management project...Factors to consider when starting a brand-new requirements management project...
Factors to consider when starting a brand-new requirements management project...
 
IBM DevOps Announcements - June 2014
IBM DevOps Announcements - June 2014IBM DevOps Announcements - June 2014
IBM DevOps Announcements - June 2014
 
IBM Rational Developer for System z Quick Start Sales Presentation
IBM Rational Developer for System z Quick Start Sales PresentationIBM Rational Developer for System z Quick Start Sales Presentation
IBM Rational Developer for System z Quick Start Sales Presentation
 
Rational consulting café to go menu
Rational consulting café to go menuRational consulting café to go menu
Rational consulting café to go menu
 
Lab3 RTC Source Control
Lab3 RTC Source ControlLab3 RTC Source Control
Lab3 RTC Source Control
 
Lab2 RTC Work Items
Lab2 RTC Work ItemsLab2 RTC Work Items
Lab2 RTC Work Items
 
Lab4 RTC Builds
Lab4 RTC BuildsLab4 RTC Builds
Lab4 RTC Builds
 
Lab1 RTC Overview
Lab1 RTC OverviewLab1 RTC Overview
Lab1 RTC Overview
 

Kürzlich hochgeladen

8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandSharisaBethune
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 

Kürzlich hochgeladen (20)

8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal Brand
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 

Designing a strategy for comprehensive web protection

  • 1. IBM Software Technical White Paper Rational Designing a strategy for comprehensive web protection Executive summary Contents In 2000, the United States had nearly 135 million Internet users.1 As dramatic as that number seemed 10 years ago, the number of Internet 1 Executive summary users has grown exponentially: as of June 30, 2010, roughly two billion people are using the web.2 This adoption rate is even more striking 2 Big opportunities, big risks given the penetration of Internet use in Australia, Europe and 2 Web application security risks North America, where some 61 percent, 58 percent and 77 percent of are multiplying the population is connected, respectively.3 Even other sections of the world that have a lower percentage of web users are rapidly making 4 Prevention is critical up ground, with Africa and the Middle East experiencing increases of 5 Existing point security solu- more than 2,300 percent and 1,800 percent, respectively, in the last tions leave gaps 10 years.4 5 Layers in a comprehensive This rise and rush to connect has a variety of causes, including the web protection strategy shrinking costs of Internet-capable equipment, the pervasive availabil- 7 Achieve comprehensive web ity of higher speed wireless connectivity, the integration of cellular protection voice and data communication devices, and the continuing increase in the value and diversity of services available through the Internet. As systems and the environments in which they operate become sim- pler to develop, deploy and use, the world is getting smaller, and peo- ple are interacting more than ever. The location of the server or the client is no longer obvious or necessary; we exist in a relatively flat universe, and the barriers are lowering to global communication and global business. We have virtually unprecedented access to information and tools for collaboration.
  • 2. IBM Software Technical White Paper Rational Web applications power much of this new communication Few innovations have proven as flexible and valuable as web and deliver much of the new and interesting content that applications, and while they are extremely powerful, they attracts this generational wave of new users. Unlike the web can also be very vulnerable. The rise in popularity of web pages that first appeared in the mid-1990s, each of which was applications has led to similarly rapid growth in the demand mainly static and only mildly interactive, today’s web-enabled for developers to create them. Dozens of new products, applications are powered by new languages such as Java™ platforms and frameworks simplify web application develop- technology, JavaScript, the Adobe® Flash player, XML and ment to the point where almost anyone can write one. Hypertext Preprocessor (PHP). These web-enabled applica- Unfortunately, the capability to create a secure application, or tions have rich, interesting content and can be dynamically the capability to review an application for security problems, altered based on the identity, type or interests of the users is not as simple or common. In addition to this skill gap, who interact with them. there are real time-to-market pressures on web application development teams; all too often, applications are rushed to Big opportunities, big risks the marketplace without enough focus on security. This new form of interactivity means real advancement in service and data availability. In the current generation of web The risks of this lack of rigor and concern are enormous interactivity, a user with only a web browser can easily access because an organization is only as secure as the applications systems and resources, typically without downloading any that support it. This white paper discusses the many risks new software. Almost any kind of application or service can surrounding web applications and their development and be driven from connected devices—such as desktops and reviews the four layers of security an organization should smart phones. Users are opening their web browsers in establish to implement a comprehensive web application increasing numbers to run applications at work, receive and protection strategy. pay bills at home, prepare and file taxes, and manage all kinds of sensitive data, from life savings statements to medical Web application security risks are records. In short, new web applications are transforming our multiplying experience with the web and the world. Web applications present a number of unique security chal- lenges. One is exposure—because web applications reach mil- The rise of the Internet and web applications has created lions of users, they also reach millions of potential hackers. whole industries and altered or displaced others. Physical Web applications stretch across multiple infrastructure tiers location is losing importance, and disintermediation is creat- and incorporate many process layers, elements that expose ing more direct and substantial relationships for customers them to a wide range of prospective attackers. and product or service providers. Relationships are much more intimate because customers and business partners can As web applications get more complex, so do their vulnerabil- access data and conduct transactions that not long ago were ities; as they become more useful and pervasive, they become restricted to only employees. As a result, companies can take higher value targets. And cybercriminals are taking note. advantage of new opportunities to collaborate; improve efficiency; and simplify orders, payments, status checking and support. 2
  • 3. IBM Software Technical White Paper Rational Damage/impact to life and property Motive Cyber warriors The national security agenda is rising National security in importance within the context of the cybersecurity discussion Organized crime, competitors Advanced persistent threat Industrial espionage Hackers, crackers Monetary gain Sophisticated tools, expertise and substantial resources Insiders Revenge Inside information Prestige and thrill Script kiddies Substantial time, tools and social engineering Curiosity Scripts, tools, web-based how-tos Adversary Figure 1: The important information and services accessible through a web-facing application have attracted a new and far more sophisticated adversary. And the motivation for these attacks is changing and maturing from curiosity to financial gain to real espionage. The techniques that hackers employ are also advancing, making them harder to prevent and detect. The arrow represents a rapid rise in the likely overall damage and impact of attacks on applica- tions as a whole. Public data breaches through web applications are frequent ● JavaScript Object Notation (JSON) hijacking—This and can result in serious consequences, including lost revenue kind of attack exploits a subset of the JavaScript program- and business opportunities, revelation of highly confidential ming language. Security concerns about JSON center on or damaging information, brand and reputation erosion, the use of a JavaScript interpreter to dynamically execute adverse media attention, unwanted scrutiny from consumer JSON text as JavaScript, thus exposing a program to an advocates, and growing costs to support litigation and errant or malicious script that an attacker may insert in compliance. query text. This is a chief concern when dealing with data retrieved from the Internet. Consider a few selections in the rich variety of attacks that ● HTTP response splitting—This is a form of web applica- are available to hackers: tion vulnerability that results from the failure of the appli- cation or its environment to properly sanitize input values. ● Cross-site request forgery (CSRF or XSRF)—Also Hackers can use HTTP response splitting to perform known as one-click attack or session riding, this is a type of cross-site scripting, cross-user defacement, web cache malicious exploitation of a website where a hacker transmits poisoning and similar attacks. unauthorized commands from a user whom the website trusts. Unlike cross-site scripting, which abuses a user’s trust for a particular site, CSRF capitalizes on the trust that a site has in a user’s browser. 3
  • 4. IBM Software Technical White Paper Rational ● SQL injection—This code injection technique manipulates Prevention is critical a security vulnerability that occurs in an application’s data- Companies that delay efforts to protect web applications can base layer. The vulnerability is present when user input is face substantial consequences. In 2009, the average cost of a insufficiently filtered for characters that can cause actual data breach in the United States was US$6.75 million,5 and execution of SQL commands from input fields such as login the probability of a hacker exploiting any given web applica- prompts or when user input is not classified in such a way tion can be expected to continue to increase as automated to prevent inappropriate types of information from being attacks and bots multiply. Recent studies by the IBM X-Force passed on to an application and unexpectedly executed. team reveal that in the first half of 2010, web applications This more general class of vulnerabilities can occur when accounted for 55 percent of all vulnerability disclosures.6 one programming or scripting language is embedded inside another. Instead of reaching out to users with malicious code, hackers ● Lightweight Directory Access Protocol (LDAP) can now inject it into popular websites and let users come to injection—This type of attack exploits LDAP, an applica- them. Automated scanners help attackers identify which sites tion protocol used to query and modify directory services are vulnerable and can be easily infected. Browser plug-ins running over TCP/IP, and can execute arbitrary commands are particularly susceptible targets of these attacks. According such as granting permission to unauthorized queries. to a recent IBM X-Force team report, in the first half of ● XML Path Language (XPath) injection—This is similar 2010, plug-ins accounted for 88 percent of disclosed vulnera- to SQL injection but manipulates XPath, a language for bilities related to web applications.7 selecting nodes from an XML document. XPath is also used to compute values (strings, numbers or Boolean values) from the content of an XML document. ● Shell command injection—This attack inserts malicious Percentage of vulnerability disclosures code into the shell, or command language interpreter, that that affect web applications and executes commands read from a keyboard. ● Server-side include (SSI) injection—This inserts web application platforms and their plug-ins malicious code into SSI, a simple server-side scripting lan- guage that’s used almost exclusively for the web. As its name implies, SSI’s primary use is to dynamically include the contents of one file into another when the latter is ● served by a web server. Cross-site scripting (XSS)—This type of computer secu- 45% 55 % 12% PLATFORMS rity vulnerability is typically found in web applications that OTHERS WEB allow code injection by malicious web users into the web pages viewed by other users. APPLICATIONS 88% PLUG-INS ● Directory traversal (or path traversal)—This exploits insufficient security validation or sanitization of user- Cross-site scripting and SQL injection vulnerabilities supplied input file names. In this instance, characters that continue to dominate cause the application to execute within other, unexpected areas of the file system are passed through to the file appli- cation programming interfaces (APIs). Figure 2: Attacks on web applications are multiplying, making a compre- hensive web protection strategy even more critical for businesses that interact with customers online.8 4
  • 5. IBM Software Technical White Paper Rational Moreover, if hackers gain access to sensitive information, security, enterprises need comprehensive web protection that organizations run the risk of being noncompliant with a host fits within a framework of security governance, risk manage- of legislated mandates and other requirements, including the ment and compliance. Payment Card Industry Data Security Standard (PCI DSS), which has specific application security requirements. IBM provides a wide-ranging security framework across key Noncompliance can cost companies monthly fines of hun- domains that ties back to Control Objectives for Information dreds of thousands of dollars. and related Technology (COBIT) standards. IBM can also deliver and unite professional services, managed services, and Existing point security solutions leave hardware and software solutions for each domain. Let’s gaps explore the requirements of comprehensive web protection Web applications are the new attack vector for hackers to and understand why IBM is in a leadership position to help exploit. Just like with other IT threats, the initial reaction to your company determine and implement a web application combat risk is to introduce a point solution for every threat. security solution that addresses your unique needs. But existing point security solutions have design limitations: Layers in a comprehensive web ● Traditional vulnerability scanners scan web servers but not protection strategy web applications. Maximizing web protection involves four layers of security— ● Manual penetration testing is effective but is neither scala- developing new, security-enabled applications while protect- ble nor focused on remediation. ing existing applications; preventing site intrusions with ● Traditional network firewalls offer basic web application real-time protection; shielding service-oriented architecture protection but don’t address the needs of custom web (SOA) deployments and XML or other web service traffic; applications. and controlling access to web applications. ● Web application firewalls are expensive to purchase and manage; they can be effective but are challenging and time- To simplify each layer of protection, IBM integrates industry- intensive to properly deploy and tune. leading solutions that facilitate comprehensive web protection ● Most web applications are customized, and it is difficult for and that are designed to reduce the risks in web-enabled web application firewalls to interpret their behavior as transactions, websites and web traffic. Let’s take a closer look either good or bad. at each of the needed layers. Each of these limitations results in security gaps. The prob- Develop security-rich, new applications while lem is that point solutions weren’t designed with web applica- protecting existing applications tion security requirements in mind. A key first step in enhancing web protection is to identify vulnerabilities in your existing web applications. One of the Security organizations in today’s companies demand an inte- most cost-efficient ways to do this is to automate the testing grated solution from a trusted vendor that provides a holistic process. You need a means to automatically scan applications, and cost-effective approach to IT security. For thorough web identify vulnerabilities and generate reports with intelligent fix recommendations. 5
  • 6. IBM Software Technical White Paper Rational To stay ahead of hackers and enable a more secure design, the Compliance is critical, and an automated scanning solution solution should test not only live web applications but also should streamline the compliance process. Rational AppScan those in development—throughout their development life solutions include more than 40 standard security compliance cycle. The solution needs to scan and test for common web reports, such as for PCI DSS, ISO 17799 and ISO 27001, application vulnerabilities, including those identified by the the Health Insurance Portability and Accountability Act Web Application Security Consortium (WASC) threat (HIPAA), the Gramm-Leach-Bliley Act (GLBA), and Basel II classification. recommendations. To address these requirements, IBM developed After your solution finds application vulnerabilities, your IBM Rational® AppScan® Source Edition and IBM Rational organization needs time to fix them. Your second layer in a AppScan Standard Edition solutions. Rational AppScan comprehensive web protection strategy should be a shield to Source Edition software analyzes the source code used to protect against attacks. build applications, reviews code for issues and errors prior to deployment, and can save you considerable time and money Prevent site intrusions with real-time protection on quality assurance (QA) issues identified later in the cycle. Good intrusion prevention needs to be web application Rational AppScan Source Edition and Standard Edition solu- aware. IBM Proventia® web application security is included tions also share core features that provide application scan- in every Proventia intrusion prevention solution. These ning coverage for both new and old web-facing technologies. marketplace-leading solutions for blocking attacks at the Rational AppScan tools can assess the following: network perimeter and server levels now include the protec- tion of a web application firewall. Because of the increasing ● The parsing and execution of JavaScript and Adobe Flash importance of web applications, IBM delivers the core pro- applications tection engine of Proventia web application security across its ● Asynchronous JavaScript and XML (AJAX) and Adobe Flex entire Proventia product line. technology-related protocols such as JSON, Action Message Format (AMF) and Simple Object Access Four key requirements have guided the IBM Proventia solu- Protocol (SOAP) tion design: ● Elaborate SOA environments ● Custom configuration and reporting capabilities for ● Proactive prevention—Instead of auditing attacks and mashup- and process-driven applications reacting to them, like many web protection solutions do, Proventia web application security helps address and limit Because attacks keep evolving, a scanning solution needs primary attack sources. constant updates. To help enable Rational AppScan solutions ● Simplified configuration to enhance security—You can to keep up with and test for the latest exploits and vulnerabil- save time with Proventia web application security because it ities, IBM research and IBM development teams provide is configured out of the box with IBM X-Force recom- automatic software updates. And because identifying vulnera- mended policies, which are updated automatically. Using a bilities alone does not make web applications more secure, wizard feature, you can more easily build additional security Rational AppScan software also includes intelligent fix policies that help protect custom web applications. recommendations. 6
  • 7. IBM Software Technical White Paper Rational ● Enhanced compliance—Proventia web application for SOA deployments and XML and web services transac- security addresses PCI requirements for web application tions, including encryption, firewall filtering, digital protection. signatures, schema validation, Web Services Security ● Comprehensive protection of a web application (WS-Security), Web Services Policy (WS-Policy) Framework, firewall—The firewall is deployed by combining Web Services Security Policy Language (WS-SecurityPolicy), IBM Security Network Intrusion Prevention System XML access control and XPath. (formerly IBM Proventia Network Intrusion Prevention System) with a Secure Sockets Layer (SSL) offloader. Control access to web applications To help ensure that only authorized users gain appropriate IBM offers Proventia solutions in three form factors to access to web applications, your authentication and authoriza- address different deployment requirements. The Security tion solution should have the following features: Network Intrusion Prevention System solution provides high-bandwidth web protection for large enterprises with web ● Centralized authentication, access and audit policies, server farms. The IBM Proventia Network Multi-Function enabling them to be easily defined and managed Security solution offers all-in-one remote office or branch ● An established audit and reporting service that collects audit office protection with virtual private network (VPN) support. data from multiple enforcement points and across platforms Small offices without a network intrusion prevention and security applications system or VPN can use the IBM Proventia Server Intrusion ● Simplified single sign-on (SSO) options Prevention System solution to decrypt and inspect ● Security codes that are separate from application codes SSL-encrypted traffic. ● Fine-grained entitlement and data-level access control Protect SOA deployments and XML and web To address these requirements, IBM offers IBM Tivoli® services traffic Access Manager and IBM Tivoli Security Policy Manager The third layer in a comprehensive web security strategy is to software. By integrating rigorous access control and identity protect SOA deployments and XML and web services traffic, management capabilities, the Tivoli family of solutions which are often key components of web applications. Yet safe- enables appropriate controls for application security, monitor- guarding these components requires a different kind of real- ing and management. time protection than that which would typically suffice to protect web applications. Web services generate high-speed, Achieve comprehensive web protection high-volume traffic; inspecting this type of traffic can easily Cost-efficient web protection does not limit opportunity on degrade application performance. the web; it is an enabler. It can help your business reduce risk, enhance compliance, protect brand reputation, gain flexibility The IBM WebSphere® DataPower® family of appliances and reduce long-term security costs by building security into features purpose-built, specialized hardware with high-speed, application development. high-volume security inspection capabilities. WebSphere DataPower appliances serve as a security enforcement point 7
  • 8. Leveraging its broad and deep security experience and offerings, IBM can provide a comprehensive strategy to help your business effectively manage web application security. As one of the world’s most prolific creators of software and as a security consultant and strategic resource to large, global organizations, IBM informs its solutions with the realities of © Copyright IBM Corporation 2010 budgets, schedules and competing priorities. IBM’s drive to IBM Corporation help clients create web applications that are security rich by Software Group Route 100 design is based on all of these insights and reinforces IBM’s Somers, NY 10589 position as a valuable adviser and contributor to any security- U.S.A. rich application development effort. Produced in the United States of America December 2010 For more information All Rights Reserved For more information on how you can take advantage of IBM, the IBM logo, ibm.com, and Rational are trademarks of proven IBM solutions to help safeguard your company’s International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of web-based applications, contact your IBM representative IBM or other companies. A current list of IBM trademarks is available or IBM Business Partner, or visit: on the web at “Copyright and trademark information” at ibm.com/security/application-process.html ibm.com/legal/copytrade.shtml Adobe is either a registered trademark or trademark of Adobe Systems Additionally, financing solutions from IBM Global Incorporated in the United States, and/or other countries. Financing can enable effective cash management, protection Java and all Java-based trademarks and logos are trademarks of Sun from technology obsolescence, improved total cost of Microsystems, Inc. in the United States, other countries, or both. ownership and return on investment. Also, our Global Asset References in this publication to IBM products or services do not imply Recovery Services help address environmental concerns with that IBM intends to make them available in all countries in which IBM operates. new, more energy-efficient solutions. For more information on IBM Global Financing, visit: ibm.com/financing The information contained in this documentation is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this documentation, it is provided “as is” without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this documentation or any other documentation. Nothing contained in this documentation is intended to, nor shall have the effect of, creating any warranties or representations from IBM (or its suppliers or licensors), or altering the terms and conditions of the applicable license agreement governing 1 Computer Industry Almanac, http://www.c-i-a.com/ the use of IBM software. internetusersexec.htm Each IBM customer is responsible for ensuring its own compliance Internet World Stats, “Internet Usage Statistics, The Internet Big 2, 3, 4 with legal requirements. It is the customer’s sole responsibility to Picture,” http://www.internetworldstats.com/stats.htm obtain advice of competent legal counsel as to the identification and 5 Ponemon Institute, 2009 Annual Study: Cost of a Data Breach, interpretation of any relevant laws and regulatory requirements that may January 2010. affect the customer’s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or IBM, IBM X-Force 2010 Mid-Year Trend and Risk Report, 6, 7, 8 represent or warrant that its services or products will ensure that the August 2010. customer is in compliance with any law. Please Recycle RAW14246-USEN-00