SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen




                                                   1





    











Whitepaper


                    hyperguard
    Defining a dWAF to secure cloud applications

        By Alexander Meisel, CTO and Co-Founder



Whitepaper            
























































































   





                              



                      Safety in the Cloud(s): ‘Vaporizing’ the Web Application
                                 Firewall to Secure Cloud Computing
Cloud computing was not designed for security, although organizations such as Cloud Security Alliance (CSA)
and Open Web Application Security Project (OWASP) are making great strides in helping the industry solve the
myriad security problems confronting cloud computing. The benchmark guidelines established by the CSA in the
document, Guidance for Critical Areas of Focus in Cloud Computing, is a great first step. This white paper is
intended to pick up where the CSA guide left off in terms of defining what a distributed web application firewall
(dWAF) should look like in order to meet the standards set within the CSA document. It includes
recommendations and practical use-cases based on Art of Defence’s own patent-pending dWAF technology.

In order to accurately outline how a dWAF is possible while maintaining all the benefits of a completely
virtualized environment – reduced IT overhead, flexible footprint management, virtually unlimited scalability – a
brief overview of cloud technology is needed. Far more than simply maximizing current hardware resources to
benefit from unused CPU power, today there are three main technologies available in a cloud that provide the
backbone for real productivity gains and compelling business services for companies that don’t want to invest in
the hardware scaling burdens common today.

Software as a service (SaaS) offers users virtualized software through a thin-client, usually any standard web
browser. The benefit for users is access to software without any of the headaches of owning the programs –
scaling and resources are taking care of, and patching and upgrades are managed.

Platform as a service (PaaS) provides users with virtual databases, storage and programming languages with
which custom applications can be built. This service provides nearly unlimited resources behind the platform and
allows customers to scale throughout the lifetime of the application. It is an effective solution for companies
ranging from the very small to those serving millions of customers. The customer does not worry about the
infrastructure needed to run the services and is billed in per usage model.

Infrastructure as a service (IaaS) allows users access to virtually unlimited resources to build and manage their
own virtual network. Customers can commission and decommission virtual resources depending on their need.
The most obvious benefit is that there is no end-of-life for hardware anymore for the customers. The providers
move them according to their service level from hardware to hardware without any downtime.

The common user benefit of services available through a cloud is access to key resources via the Internet, which
provides an incredible degree of scaling without the need to invest in expensive hardware infrastructure.

Cloud Applications are Highly Exposed to Threats

Accessing cloud technologies requires a thin-client, and the world’s most commonly used thin-client for this
purpose is a web browser. This means the vast majority of all applications on the Internet have some kind of web
and / or application server on which the business logic is implemented. Currently, most of the money spent on
security goes into firewalls and antivirus solutions, but in the last 10 years the typical target for attacks has shifted
from the network layer to the application layer because the operating systems and services available to the general
public were cut down. As a result, it is now easier to target the application logic or framework of an application
than the actual server behind the hardened network perimeter. Applications are mostly developed by the
businesses themselves and not every developer considers security the highest priority, which leads to a wide
variety of problems.




                 hyperguard
–
Defining a dWAF to secure cloud applications
                                               2





Whitepaper           
























































































   





                             


The IBM X-Force® 2008 Annual Report highlights that web application vulnerabilities are the Achilles’ Heel
for corporate IT security. The impact of not being able to secure these vulnerabilities is far reaching.




Further, attack vectors increase exponentially in correlation with the mainstream adoption of cloud computing.
Their increase is dictated by hosting and delivering infrastructure, platform and software. Establishing a
comprehensive patch management system is the common solution offered by most in the industry, however, in
practice this approach has proved very difficult and costly. Typical web applications are built on open source
components, by third-parties, who rely on web frameworks. This approach has the obvious benefits of
interoperability and shortened development time, however, patching becomes exponentially more difficult. A
flaw in one piece of open source code must be patched for each instance it is used throughout each application in
which it is used. In a cloud setting, this becomes a very large issue.




                hyperguard
–
Defining a dWAF to secure cloud applications
                                               3





Whitepaper             
























































































   





                               





    Applications developed specifically for a cloud are often very complex, designed for access speed, scalability
    and flexibility for third-party development through an open API. For example, Salesforce.com, Google Docs,
    MySpace, Facebook and Twitter, are all prime examples. These ‘as a Service’ applications are developed two
    ways today: by moving on-premise applications to a cloud, and by developing and operating applications
    directly in a cloud.

    Applications that are forced out of the internal company network and into a cloud carry the risks of exposing
    protected software to web threats is was not designed to combat. Common security threats include injection
    attacks, cross site scripting or cross site request forgery.

    There are a variety of services available for developing in a cloud, such as MS Azure Services, Google App
    Engine or Amazon EC2. There are many security challenges involved in developing web applications in a cloud.
    For example parameter validation, session management and access control are 'hotspots' for attackers.
    Developers not trained in those three fields of application development will most definitely create / develop
    applications which have security problems.




                                                                                                                           curity

    problems.


                  hyperguard
–
Defining a dWAF to secure cloud applications
                                                         4





Whitepaper            
























































































   





                              


Why a Traditional Web Application Firewall Will not Work

In a cloud, the infrastructure and the services are shared between customers, meaning one set of hardware is used
by many business, organizations and even individuals. Each of these cloud operator customers adds a unique
layer of policy settings, use-cases and administrative enforcement requirements. For the cloud or service provider,
security quickly becomes very complex. The average provider may have 10,000 customers subscribing to its
service, each with varied policy settings for individual divisions within the company. The service provider now
has to manage an nth degree of application filter settings.

Currently, web application firewalls (WAF) and other security solutions are restricted to hardware appliances,
which creates a serious bottleneck for cloud service providers. Dedicated hardware boxes simply don't allow for
reasonably scalable levels of multiple administrators duties within a box’s singular security policy mechanism.
Ironically, in addition to the traditional network hardware, cloud service providers are forced to have a rack full of
dedicated WAF machines – one per customer – that take up space and eat up resources. Security becomes counter
to the efficiency promises of a fully virtualized environment. This cost is passed on to customers, increasing
adoption barriers to mainstream cloud computing.

In an ideal world, applications would be designed from the ground up to meet the rigors of a virtualized world,
integrating security measures directly into the applications and thus solving a core problem with current cloud
computing. Until the industry reaches this ideal), traditional web application firewall boxes are preventing the
industry from reaching the full potential of a cloud computing.

Defining the Distributed Web Application Firewall (dWAF) for Cloud Protection

Web application security in a cloud has to be scalable, flexible, virtual and easy to manage.

A WAF must escape hardware limitations and be able to dynamically scale across CPU, computer, server rack and
datacenter boundaries, customized to the demands of individual customers. Resource consumption of this new
distributed WAF must be minimal and remain tied to detection / prevention use instances rather than consuming
increasingly high levels of CPU resources. Clouds come in all sizes and shapes, so WAFs must as well.

The dWAF must be able to live in a wide variety of components to be effective without adding undue complexity
for cloud service providers. Today’s providers are using a variety of traditional and virtual technologies to operate
their clouds, so the ideal dWAF should accommodate this mixed environment and be available as a virtual
software appliance, a plug-in, SaaS or be able to integrate with existing hardware. Flexibility with minimal
disruption to the existing network is central.

A web-based user interface must allow customers to easily administrate their applications. Configuration should
be based on the applications under protection, not defined by a singular host, allowing far more granular settings
for each application. Ruleset configuration must be supported by setup wizards. Statistics, logging and reporting
has to be intuitive and easy to use and must also integrate seamlessly into other systems. Most importantly for a
dWAF, multi-administrator privileges must be made available and flexible enough to effectively manage widely
divergent policy enforcement schemes. Cloud providers should look for a set of core protections.

Detection and Protection
Foundational security using black, white and grey listings for application requests and responses must be possible.
To make sure pre-set policy enforcements are not activated or deactivated without approval from an administrator,
deployment and policy refinement through establishing rulesets must be possible in a shadow monitoring or
detection only mode. Once the shadow monitoring ruleset is stable, only then should it be allowed to deploy in an
enforcement mode on the dWAF. This allows complete transparency for the administrator into the real-world
effect of this ruleset, while at the same time allowing layered rulesets to be tested without compromising existing
policy enforcement. Avoiding false positives and relaxed established defenses are essential for a real-world,
usable dWAF in a cloud.

                hyperguard
–
Defining a dWAF to secure cloud applications
                                                5





Whitepaper           
























































































   





                             


Automated learning and ruleset suggestions based on intelligent algorithms or recommendations from a static
source code analyzer or web vulnerability scanner are also desirable from a manageability view. Again, this only
holds true if the administrator retains full control over activation / deactivation of each ruleset. Without this
control, wanted traffic may become blocked and policy settings would become compromised.

Application Shielding
Pro-active security functions are highly recommended to reinforce any application in a cloud. Detection is simply
not enough for today’s web application security. Features like transparent secure session management, URL
encryption and form-field virtualization will provide strong deterrence to attack, while saving application
development and deployment time. These features are effective because session management, URL encryption
and form-field virtualization is done at the dWAF level and not in the application itself.

An authentication framework support that enables businesses to consolidate their applications under one
management schema is also desirable for a dWAF. This enables users to handle the authentication in front of their
applications rather than behind, which adds another perimeter of security. A consolidation of all applications with
dedicated rights-management ability is also a strong usability function that will make an administrator’s life
easier.

Integration with Existing Technology
Avoiding vendor-lock-in is a common best-practice for both networking and application security. Any technology
that is added to an infrastructure, platform or application itself must connect as seamlessly as possible with
existing technology. Security is all about layering technologies to create the best possible protection, so a dWAF
must communicate freely between a security incident and the event management system (SIEMs).

Art of Defence’s dWAF Solutions

hyperguard is a software-only dWAF designed with these best practices in mind. Due to its modular construction,
it can be deployed very easily in a cloud computing environment. The product consists of three parts:

The Enforcer
The Enforcer is a small plug-in which enables hyperguard to be plugged into any kind of device. A device can be
a web server or proxy (Apache, MS IIS), a network firewall (like MS ISA, GenuScreen) or software load balancer
(Zeus ZXTM). The Enforcer sends request and response data to a component called Decider and also modifies
requests and responses if needed. The Enforcer is an adapter for hyperguard to get the data it needs to enforce the
policy.

The Decider
The policy engine checks the data from the Enforcer module and decides what to do with the request/response.
The Decider’s unique architecture allows it to scale from one to many CPU cores and is also capable of running
on multiple machines simultaneously. The resource intensive computing part of hyperguard is the Decider
component and the workload on the Decider depends on the load of the web infrastructure behind it. The more
traffic generated by the end users, the more CPU resources are used in the Decider.

The Administration Interface
The administration system of hyperguard can be deployed decentralized or as a single server. In a cluster
installation every cluster node can be used to administrate applications and their policies. This decentralized
system is very robust against failing nodes and allows a huge number of web application security administrators
to work on their own application policies. In addition, it provides verbose central monitoring and alerting
functions.




                hyperguard
–
Defining a dWAF to secure cloud applications
                                               6





Whitepaper           
























































































   





                             





In a shared cloud (PaaS and SaaS) environment for example, many Enforcer plug-ins from load balancers and
web servers could communicate with a Decider service on separate virtual machines. If the first virtual machine
of this Decider service reaches 80 percent of the available CPU resources, a new virtual machine on a different
instance of a cloud will automatically be provisioned, started and added to the Decider cluster. If the cluster-wide
CPU usage of the Decider service drops below 40 percent, the Decider instances will automatically be removed
from the cluster in order to give the resources back to a cloud.




hyperguard can be deployed similarly on an IaaS in a cloud. The customer would get its own private instance of
all three modules of hyperguard, which are not shared between customers. The scaling can be done by clustering
many hyperguard instances together. This clustering process for additional resources may also be provided
automatically depending on the cloud service provider.




                hyperguard
–
Defining a dWAF to secure cloud applications
                                               7





Whitepaper           
























































































   





                             





About Art of Defence GmbH

Founded in 2005, Art of Defence GmbH is headquartered in Regensburg, Germany, and provides the U.S.,
European and Asian markets with comprehensive web application security technology on any scale. As cloud
computing and virtualization begin to change how companies approach security and push applications out of the
traditional network, security becomes a central challenge for the market. Traditional network technology
providers are seeking ways to accommodate this shifting market as well.

Art of Defence´s flagship solution hyperguard™, is a distributed web application firewall (dWAF). The offering is
the most flexible on the market toady, available as a SaaS, software plug-ins, virtual appliances, hardware
appliances or as standalone software solutions. Other offerings include hypersource™, a static source code
analysis tool, and hyperscan™, a web application vulnerability scan server. The company is the only European
provider in this space that covers the entire software development lifecycle (SDLC).

The company serves the financial services, eCommerce, technology, telecommunication and public sector
markets exclusively through OEM/technology and reseller channel partners. The company partners with leading
technology providers like Microsoft, Zeus, GeNUA, and Armorize.

For more information about Art of Defence, visit: www.artofdefence.com/en




                             hyperguard and art of defence are trademarks of art of defence GmbH.
                      Other company, product and service names be trademarks or service marks of others.

                                                   Copyright 2005-2009 art of defence GmbH


                hyperguard
–
Defining a dWAF to secure cloud applications
                                               8



Weitere ähnliche Inhalte

Was ist angesagt?

Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
fanc1985
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
Idan Hershkovich
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
TT L
 
Citrix cloud services_total_economic_benefits_assessment_guide
Citrix cloud services_total_economic_benefits_assessment_guideCitrix cloud services_total_economic_benefits_assessment_guide
Citrix cloud services_total_economic_benefits_assessment_guide
Alejandro Daricz
 

Was ist angesagt? (20)

Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
 
Cloud security and adoption
Cloud security and adoptionCloud security and adoption
Cloud security and adoption
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS Reality
 
Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2Cloud Security Best Practices - Part 2
Cloud Security Best Practices - Part 2
 
NSX on VMware Data Center
NSX on VMware Data CenterNSX on VMware Data Center
NSX on VMware Data Center
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
 
Cloud Whitepaper - Telco sp Cloud Market - Challenges
Cloud Whitepaper - Telco sp Cloud Market - ChallengesCloud Whitepaper - Telco sp Cloud Market - Challenges
Cloud Whitepaper - Telco sp Cloud Market - Challenges
 
A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...
 
Cloud Security Top 10 Risk Mitigation Techniques for 2019
Cloud Security Top 10 Risk Mitigation Techniques for 2019Cloud Security Top 10 Risk Mitigation Techniques for 2019
Cloud Security Top 10 Risk Mitigation Techniques for 2019
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public Cloud
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
 
Citrix cloud services_total_economic_benefits_assessment_guide
Citrix cloud services_total_economic_benefits_assessment_guideCitrix cloud services_total_economic_benefits_assessment_guide
Citrix cloud services_total_economic_benefits_assessment_guide
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technology
 
Security in a Virtualised Computing
Security in a Virtualised ComputingSecurity in a Virtualised Computing
Security in a Virtualised Computing
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 

Ähnlich wie Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure Cloud Computing

SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
acijjournal
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
Abhijit Kundu
 
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125
Gabor Bokor
 
Security of the Data Secure the Data SASE, CNAPP and CSMA functions
Security of the Data Secure the Data SASE, CNAPP and CSMA functionsSecurity of the Data Secure the Data SASE, CNAPP and CSMA functions
Security of the Data Secure the Data SASE, CNAPP and CSMA functions
Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
ijtsrd
 

Ähnlich wie Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure Cloud Computing (20)

A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
A Review on Data Protection of Cloud Computing Security, Benefits, Risks and ...
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
Riverbed Securing Cloud Applications with a Distributed Web Application Firewall
Riverbed Securing Cloud Applications with a Distributed Web Application FirewallRiverbed Securing Cloud Applications with a Distributed Web Application Firewall
Riverbed Securing Cloud Applications with a Distributed Web Application Firewall
 
Literature Review: Security on cloud computing
Literature Review: Security on cloud computingLiterature Review: Security on cloud computing
Literature Review: Security on cloud computing
 
SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125
 
Security of the Data Secure the Data SASE, CNAPP and CSMA functions
Security of the Data Secure the Data SASE, CNAPP and CSMA functionsSecurity of the Data Secure the Data SASE, CNAPP and CSMA functions
Security of the Data Secure the Data SASE, CNAPP and CSMA functions
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
 
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudDetailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
 
The why of a cloud ppt
The why of a cloud pptThe why of a cloud ppt
The why of a cloud ppt
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
 
INTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGINTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTING
 
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
 

Mehr von white paper

Secure Computing With Java
Secure Computing With JavaSecure Computing With Java
Secure Computing With Java
white paper
 
Java Security Overview
Java Security OverviewJava Security Overview
Java Security Overview
white paper
 
Platform Migration Guide
Platform Migration GuidePlatform Migration Guide
Platform Migration Guide
white paper
 
Java Standard Edition 5 Performance
Java Standard Edition 5 PerformanceJava Standard Edition 5 Performance
Java Standard Edition 5 Performance
white paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
white paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
white paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
white paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
white paper
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
white paper
 
Memory Management in the Java HotSpot Virtual Machine
Memory Management in the Java HotSpot Virtual MachineMemory Management in the Java HotSpot Virtual Machine
Memory Management in the Java HotSpot Virtual Machine
white paper
 
J2 Se 5.0 Name And Version Change
J2 Se 5.0 Name And Version ChangeJ2 Se 5.0 Name And Version Change
J2 Se 5.0 Name And Version Change
white paper
 
Java Tuning White Paper
Java Tuning White PaperJava Tuning White Paper
Java Tuning White Paper
white paper
 
Java Apis For Imaging Enterprise-Scale, Distributed 2d Applications
Java Apis For Imaging Enterprise-Scale, Distributed 2d ApplicationsJava Apis For Imaging Enterprise-Scale, Distributed 2d Applications
Java Apis For Imaging Enterprise-Scale, Distributed 2d Applications
white paper
 
Introduction to the Java(TM) Advanced Imaging API
Introduction to the Java(TM) Advanced Imaging APIIntroduction to the Java(TM) Advanced Imaging API
Introduction to the Java(TM) Advanced Imaging API
white paper
 
* Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
     * Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...     * Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
* Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
white paper
 
Java 2D API: Enhanced Graphics and Imaging for the Java Platform
Java 2D API: Enhanced Graphics and Imaging for the Java PlatformJava 2D API: Enhanced Graphics and Imaging for the Java Platform
Java 2D API: Enhanced Graphics and Imaging for the Java Platform
white paper
 
Concurrency Utilities Overview
Concurrency Utilities OverviewConcurrency Utilities Overview
Concurrency Utilities Overview
white paper
 
Defining a Summative Usability Test for Voting Systems
Defining a Summative Usability Test for Voting SystemsDefining a Summative Usability Test for Voting Systems
Defining a Summative Usability Test for Voting Systems
white paper
 
Usability Performance Benchmarks
Usability Performance BenchmarksUsability Performance Benchmarks
Usability Performance Benchmarks
white paper
 

Mehr von white paper (20)

Secure Computing With Java
Secure Computing With JavaSecure Computing With Java
Secure Computing With Java
 
Java Security Overview
Java Security OverviewJava Security Overview
Java Security Overview
 
Platform Migration Guide
Platform Migration GuidePlatform Migration Guide
Platform Migration Guide
 
Java Standard Edition 5 Performance
Java Standard Edition 5 PerformanceJava Standard Edition 5 Performance
Java Standard Edition 5 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Java Standard Edition 6 Performance
Java Standard Edition 6 PerformanceJava Standard Edition 6 Performance
Java Standard Edition 6 Performance
 
Memory Management in the Java HotSpot Virtual Machine
Memory Management in the Java HotSpot Virtual MachineMemory Management in the Java HotSpot Virtual Machine
Memory Management in the Java HotSpot Virtual Machine
 
J2 Se 5.0 Name And Version Change
J2 Se 5.0 Name And Version ChangeJ2 Se 5.0 Name And Version Change
J2 Se 5.0 Name And Version Change
 
Java Web Start
Java Web StartJava Web Start
Java Web Start
 
Java Tuning White Paper
Java Tuning White PaperJava Tuning White Paper
Java Tuning White Paper
 
Java Apis For Imaging Enterprise-Scale, Distributed 2d Applications
Java Apis For Imaging Enterprise-Scale, Distributed 2d ApplicationsJava Apis For Imaging Enterprise-Scale, Distributed 2d Applications
Java Apis For Imaging Enterprise-Scale, Distributed 2d Applications
 
Introduction to the Java(TM) Advanced Imaging API
Introduction to the Java(TM) Advanced Imaging APIIntroduction to the Java(TM) Advanced Imaging API
Introduction to the Java(TM) Advanced Imaging API
 
* Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
     * Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...     * Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
* Evaluation of Java Advanced Imaging (1.0.2) as a Basis for Image Proce...
 
Java 2D API: Enhanced Graphics and Imaging for the Java Platform
Java 2D API: Enhanced Graphics and Imaging for the Java PlatformJava 2D API: Enhanced Graphics and Imaging for the Java Platform
Java 2D API: Enhanced Graphics and Imaging for the Java Platform
 
Concurrency Utilities Overview
Concurrency Utilities OverviewConcurrency Utilities Overview
Concurrency Utilities Overview
 
Defining a Summative Usability Test for Voting Systems
Defining a Summative Usability Test for Voting SystemsDefining a Summative Usability Test for Voting Systems
Defining a Summative Usability Test for Voting Systems
 
Usability Performance Benchmarks
Usability Performance BenchmarksUsability Performance Benchmarks
Usability Performance Benchmarks
 

Kürzlich hochgeladen

unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 

Kürzlich hochgeladen (20)

Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Phases of negotiation .pptx
 Phases of negotiation .pptx Phases of negotiation .pptx
Phases of negotiation .pptx
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 

Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure Cloud Computing

  • 1. 
 
 1
 











Whitepaper
 
 hyperguard Defining a dWAF to secure cloud applications By Alexander Meisel, CTO and Co-Founder
  • 2. 
 
Whitepaper 
























































































 



 
 Safety in the Cloud(s): ‘Vaporizing’ the Web Application Firewall to Secure Cloud Computing Cloud computing was not designed for security, although organizations such as Cloud Security Alliance (CSA) and Open Web Application Security Project (OWASP) are making great strides in helping the industry solve the myriad security problems confronting cloud computing. The benchmark guidelines established by the CSA in the document, Guidance for Critical Areas of Focus in Cloud Computing, is a great first step. This white paper is intended to pick up where the CSA guide left off in terms of defining what a distributed web application firewall (dWAF) should look like in order to meet the standards set within the CSA document. It includes recommendations and practical use-cases based on Art of Defence’s own patent-pending dWAF technology. In order to accurately outline how a dWAF is possible while maintaining all the benefits of a completely virtualized environment – reduced IT overhead, flexible footprint management, virtually unlimited scalability – a brief overview of cloud technology is needed. Far more than simply maximizing current hardware resources to benefit from unused CPU power, today there are three main technologies available in a cloud that provide the backbone for real productivity gains and compelling business services for companies that don’t want to invest in the hardware scaling burdens common today. Software as a service (SaaS) offers users virtualized software through a thin-client, usually any standard web browser. The benefit for users is access to software without any of the headaches of owning the programs – scaling and resources are taking care of, and patching and upgrades are managed. Platform as a service (PaaS) provides users with virtual databases, storage and programming languages with which custom applications can be built. This service provides nearly unlimited resources behind the platform and allows customers to scale throughout the lifetime of the application. It is an effective solution for companies ranging from the very small to those serving millions of customers. The customer does not worry about the infrastructure needed to run the services and is billed in per usage model. Infrastructure as a service (IaaS) allows users access to virtually unlimited resources to build and manage their own virtual network. Customers can commission and decommission virtual resources depending on their need. The most obvious benefit is that there is no end-of-life for hardware anymore for the customers. The providers move them according to their service level from hardware to hardware without any downtime. The common user benefit of services available through a cloud is access to key resources via the Internet, which provides an incredible degree of scaling without the need to invest in expensive hardware infrastructure. Cloud Applications are Highly Exposed to Threats Accessing cloud technologies requires a thin-client, and the world’s most commonly used thin-client for this purpose is a web browser. This means the vast majority of all applications on the Internet have some kind of web and / or application server on which the business logic is implemented. Currently, most of the money spent on security goes into firewalls and antivirus solutions, but in the last 10 years the typical target for attacks has shifted from the network layer to the application layer because the operating systems and services available to the general public were cut down. As a result, it is now easier to target the application logic or framework of an application than the actual server behind the hardened network perimeter. Applications are mostly developed by the businesses themselves and not every developer considers security the highest priority, which leads to a wide variety of problems. hyperguard
–
Defining a dWAF to secure cloud applications
 2 

  • 3. 
 
Whitepaper 
























































































 



 
 The IBM X-Force® 2008 Annual Report highlights that web application vulnerabilities are the Achilles’ Heel for corporate IT security. The impact of not being able to secure these vulnerabilities is far reaching. Further, attack vectors increase exponentially in correlation with the mainstream adoption of cloud computing. Their increase is dictated by hosting and delivering infrastructure, platform and software. Establishing a comprehensive patch management system is the common solution offered by most in the industry, however, in practice this approach has proved very difficult and costly. Typical web applications are built on open source components, by third-parties, who rely on web frameworks. This approach has the obvious benefits of interoperability and shortened development time, however, patching becomes exponentially more difficult. A flaw in one piece of open source code must be patched for each instance it is used throughout each application in which it is used. In a cloud setting, this becomes a very large issue. hyperguard
–
Defining a dWAF to secure cloud applications
 3 

  • 4. 
 
Whitepaper 
























































































 



 
 Applications developed specifically for a cloud are often very complex, designed for access speed, scalability and flexibility for third-party development through an open API. For example, Salesforce.com, Google Docs, MySpace, Facebook and Twitter, are all prime examples. These ‘as a Service’ applications are developed two ways today: by moving on-premise applications to a cloud, and by developing and operating applications directly in a cloud. Applications that are forced out of the internal company network and into a cloud carry the risks of exposing protected software to web threats is was not designed to combat. Common security threats include injection attacks, cross site scripting or cross site request forgery. There are a variety of services available for developing in a cloud, such as MS Azure Services, Google App Engine or Amazon EC2. There are many security challenges involved in developing web applications in a cloud. For example parameter validation, session management and access control are 'hotspots' for attackers. Developers not trained in those three fields of application development will most definitely create / develop applications which have security problems. curity
 problems.

 hyperguard
–
Defining a dWAF to secure cloud applications
 4 

  • 5. 
 
Whitepaper 
























































































 



 
 Why a Traditional Web Application Firewall Will not Work In a cloud, the infrastructure and the services are shared between customers, meaning one set of hardware is used by many business, organizations and even individuals. Each of these cloud operator customers adds a unique layer of policy settings, use-cases and administrative enforcement requirements. For the cloud or service provider, security quickly becomes very complex. The average provider may have 10,000 customers subscribing to its service, each with varied policy settings for individual divisions within the company. The service provider now has to manage an nth degree of application filter settings. Currently, web application firewalls (WAF) and other security solutions are restricted to hardware appliances, which creates a serious bottleneck for cloud service providers. Dedicated hardware boxes simply don't allow for reasonably scalable levels of multiple administrators duties within a box’s singular security policy mechanism. Ironically, in addition to the traditional network hardware, cloud service providers are forced to have a rack full of dedicated WAF machines – one per customer – that take up space and eat up resources. Security becomes counter to the efficiency promises of a fully virtualized environment. This cost is passed on to customers, increasing adoption barriers to mainstream cloud computing. In an ideal world, applications would be designed from the ground up to meet the rigors of a virtualized world, integrating security measures directly into the applications and thus solving a core problem with current cloud computing. Until the industry reaches this ideal), traditional web application firewall boxes are preventing the industry from reaching the full potential of a cloud computing. Defining the Distributed Web Application Firewall (dWAF) for Cloud Protection Web application security in a cloud has to be scalable, flexible, virtual and easy to manage. A WAF must escape hardware limitations and be able to dynamically scale across CPU, computer, server rack and datacenter boundaries, customized to the demands of individual customers. Resource consumption of this new distributed WAF must be minimal and remain tied to detection / prevention use instances rather than consuming increasingly high levels of CPU resources. Clouds come in all sizes and shapes, so WAFs must as well. The dWAF must be able to live in a wide variety of components to be effective without adding undue complexity for cloud service providers. Today’s providers are using a variety of traditional and virtual technologies to operate their clouds, so the ideal dWAF should accommodate this mixed environment and be available as a virtual software appliance, a plug-in, SaaS or be able to integrate with existing hardware. Flexibility with minimal disruption to the existing network is central. A web-based user interface must allow customers to easily administrate their applications. Configuration should be based on the applications under protection, not defined by a singular host, allowing far more granular settings for each application. Ruleset configuration must be supported by setup wizards. Statistics, logging and reporting has to be intuitive and easy to use and must also integrate seamlessly into other systems. Most importantly for a dWAF, multi-administrator privileges must be made available and flexible enough to effectively manage widely divergent policy enforcement schemes. Cloud providers should look for a set of core protections. Detection and Protection Foundational security using black, white and grey listings for application requests and responses must be possible. To make sure pre-set policy enforcements are not activated or deactivated without approval from an administrator, deployment and policy refinement through establishing rulesets must be possible in a shadow monitoring or detection only mode. Once the shadow monitoring ruleset is stable, only then should it be allowed to deploy in an enforcement mode on the dWAF. This allows complete transparency for the administrator into the real-world effect of this ruleset, while at the same time allowing layered rulesets to be tested without compromising existing policy enforcement. Avoiding false positives and relaxed established defenses are essential for a real-world, usable dWAF in a cloud. hyperguard
–
Defining a dWAF to secure cloud applications
 5 

  • 6. 
 
Whitepaper 
























































































 



 
 Automated learning and ruleset suggestions based on intelligent algorithms or recommendations from a static source code analyzer or web vulnerability scanner are also desirable from a manageability view. Again, this only holds true if the administrator retains full control over activation / deactivation of each ruleset. Without this control, wanted traffic may become blocked and policy settings would become compromised. Application Shielding Pro-active security functions are highly recommended to reinforce any application in a cloud. Detection is simply not enough for today’s web application security. Features like transparent secure session management, URL encryption and form-field virtualization will provide strong deterrence to attack, while saving application development and deployment time. These features are effective because session management, URL encryption and form-field virtualization is done at the dWAF level and not in the application itself. An authentication framework support that enables businesses to consolidate their applications under one management schema is also desirable for a dWAF. This enables users to handle the authentication in front of their applications rather than behind, which adds another perimeter of security. A consolidation of all applications with dedicated rights-management ability is also a strong usability function that will make an administrator’s life easier. Integration with Existing Technology Avoiding vendor-lock-in is a common best-practice for both networking and application security. Any technology that is added to an infrastructure, platform or application itself must connect as seamlessly as possible with existing technology. Security is all about layering technologies to create the best possible protection, so a dWAF must communicate freely between a security incident and the event management system (SIEMs). Art of Defence’s dWAF Solutions hyperguard is a software-only dWAF designed with these best practices in mind. Due to its modular construction, it can be deployed very easily in a cloud computing environment. The product consists of three parts: The Enforcer The Enforcer is a small plug-in which enables hyperguard to be plugged into any kind of device. A device can be a web server or proxy (Apache, MS IIS), a network firewall (like MS ISA, GenuScreen) or software load balancer (Zeus ZXTM). The Enforcer sends request and response data to a component called Decider and also modifies requests and responses if needed. The Enforcer is an adapter for hyperguard to get the data it needs to enforce the policy. The Decider The policy engine checks the data from the Enforcer module and decides what to do with the request/response. The Decider’s unique architecture allows it to scale from one to many CPU cores and is also capable of running on multiple machines simultaneously. The resource intensive computing part of hyperguard is the Decider component and the workload on the Decider depends on the load of the web infrastructure behind it. The more traffic generated by the end users, the more CPU resources are used in the Decider. The Administration Interface The administration system of hyperguard can be deployed decentralized or as a single server. In a cluster installation every cluster node can be used to administrate applications and their policies. This decentralized system is very robust against failing nodes and allows a huge number of web application security administrators to work on their own application policies. In addition, it provides verbose central monitoring and alerting functions. hyperguard
–
Defining a dWAF to secure cloud applications
 6 

  • 7. 
 
Whitepaper 
























































































 



 
 In a shared cloud (PaaS and SaaS) environment for example, many Enforcer plug-ins from load balancers and web servers could communicate with a Decider service on separate virtual machines. If the first virtual machine of this Decider service reaches 80 percent of the available CPU resources, a new virtual machine on a different instance of a cloud will automatically be provisioned, started and added to the Decider cluster. If the cluster-wide CPU usage of the Decider service drops below 40 percent, the Decider instances will automatically be removed from the cluster in order to give the resources back to a cloud. hyperguard can be deployed similarly on an IaaS in a cloud. The customer would get its own private instance of all three modules of hyperguard, which are not shared between customers. The scaling can be done by clustering many hyperguard instances together. This clustering process for additional resources may also be provided automatically depending on the cloud service provider. hyperguard
–
Defining a dWAF to secure cloud applications
 7 

  • 8. 
 
Whitepaper 
























































































 



 
 About Art of Defence GmbH Founded in 2005, Art of Defence GmbH is headquartered in Regensburg, Germany, and provides the U.S., European and Asian markets with comprehensive web application security technology on any scale. As cloud computing and virtualization begin to change how companies approach security and push applications out of the traditional network, security becomes a central challenge for the market. Traditional network technology providers are seeking ways to accommodate this shifting market as well. Art of Defence´s flagship solution hyperguard™, is a distributed web application firewall (dWAF). The offering is the most flexible on the market toady, available as a SaaS, software plug-ins, virtual appliances, hardware appliances or as standalone software solutions. Other offerings include hypersource™, a static source code analysis tool, and hyperscan™, a web application vulnerability scan server. The company is the only European provider in this space that covers the entire software development lifecycle (SDLC). The company serves the financial services, eCommerce, technology, telecommunication and public sector markets exclusively through OEM/technology and reseller channel partners. The company partners with leading technology providers like Microsoft, Zeus, GeNUA, and Armorize. For more information about Art of Defence, visit: www.artofdefence.com/en hyperguard and art of defence are trademarks of art of defence GmbH. Other company, product and service names be trademarks or service marks of others. Copyright 2005-2009 art of defence GmbH hyperguard
–
Defining a dWAF to secure cloud applications
 8