SlideShare a Scribd company logo
Web Application & Web Services Security integrated in Global Application Offering 
- Problems? No, no problems at all. - Yes. We're using WAF too. 
3.11.2011 Thomas Malmberg
11.9.2014 
(C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 
2 
Agenda 
•Security and its many faces 
•Drivers and issues for choosing an application firewall 
•Minutes to learn, a lifetime to master 
”Questions may be asked at any given time” 
Web Application & Web Services Security integrated in Global Application Offering
11.9.2014 
(C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 
3 
Security and its many faces 
•Security has to be applied on many levels in an organization 
–Processes 
–User management 
–Firewalls 
–Keycards 
–Doors 
–SSL 
–Penetration testing 
–Training 
–... 
•Can security be enforced by applying Magnum Force?
11.9.2014 
(C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 
4 
Security and its many faces 
•Carrot and stick – approach 
–Give some and get some 
–Design and enforce policies, not "magnum force" 
–Involve the right people – You need to "sell your agenda" 
–Make sure you "enable business" (but what does that really mean?) 
–In certain cases, deploying a new technology is the right solution
11.9.2014 
(C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 
5 
Drivers and issues for choosing an application firewall 
..but wait - let's recap what REALLY happened 
(or what should have happened) 
The Stick 
PCI-DSS 
The Carrot 
Cut costs on expensive application re-testing and re-coding and re- inventing and re- everything
11.9.2014 
(C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 
6 
Drivers and issues for choosing an application firewall 
•PCI-DSS was "the drop that spilled the cup" 
•Before PCI-DSS we had at least this: 
–National Legislation 
–Financial Supervisory Authority Directives 
–EU Legislation & Directives 
–Finanssivalvonta, Finansinspektionen 
–Common Sense 
•Then we woke up and realized that... 
–Security had many faces 
–Security cannot be bought (but neat firewalls can!) 
–Security is a mindset 
–Security is a way of life 
Financial Supervisory Authority: 
• Finanssivalvonta (FI) 
• Finansinspektionen (SE)
11.9.2014 
(C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 
7 
Drivers and issues for choosing an application firewall 
•Today we understand that 
–Credit-card numbers are not everything 
–There are a lot of different input sources to definitive compliancy 
–It is not wise to pursue different directives or legislations separately 
–Everything we do in this field increases the overall security
11.9.2014 
(C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 
8 
Drivers and issues for choosing an application firewall
11.9.2014 
(C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 
9 
Case HBGary 
•HBGary and HBGary Federal position themselves as experts in computer security. The companies offer both software and services to both the public and private sectors. 
•HBGary Federal CEO Aaron Barr thought he had unmasked the hacker hordes of Anonymous and was preparing to name and shame those responsible for co-ordinating the group's actions, including the denial-of-service attacks that hit MasterCard, Visa, and other perceived enemies of WikiLeaks late last year 
•Anonymous is a diverse bunch: though they tend to be younger rather than older, their age group spans decades. Some may still be in school, but many others are gainfully employed office-workers, software developers, or IT support technicians, among other things. 
•Source: http://arstechnica.com/tech- policy/news/2011/02/anonymous-speaks-the-inside- story-of-the-hbgary-hack.ars/
11.9.2014 
(C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 
10 
Case HBGary 
1.The CMS-system had an SQL-injection vulnerability 
2.Usernames were stolen from the user-database 
3.Passwords were hashed using simple MD5 w/o salting 
4.Passwords were weak 
5.Same passwords were used for public SSH- access 
6.The SSH-server was not patched, root access could be gained 
7.Same passwords were used for email accounts, Google apps and for gmail-administrators 
8.Using admin-rights, many email accounts were scavenged for information 
9.Emailing was used for social engineering to gain even more access to other sites
11.9.2014 
(C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 
11 
Drivers and issues for choosing an application firewall
11.9.2014 
(C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 
12 
Drivers and issues for choosing an application firewall 
•An application firewall (WAF) would not make us PCI-DSS compliant 
•It would only partially answer one of the requirements set by the PCI- council 
•BUT - depending on the product we choose we could 
–increase the overall security level of all of our public internet services 
–accelerate our websites 
–apply quick fixes to 0-day vulnerabilities when we most need it 
–safely deploy applications with known issues to the public while investigating the root cause 
–possibly protect our web-services 
”0-day vulnerabilities must be fixed IMMEDIATELY.”
11.9.2014 
(C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 
13 
Minutes to learn, a lifetime to master 
•A few do's and don't along the way 
–Don't expect the application firewall to be a generic solution to issues in your software development 
–Don't ditch external security audits 
–Don't expect everything to be up and running smoothly day 1 
–Don't expect that the application firewall never requires attention 
–Make sure you have a process to monitor discrepancies and (major) changes in your traffic profile
11.9.2014 
(C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 
14 
Minutes to learn, a lifetime to master 
•A few do's and don't along the way 
–It does add security where you need it the most 
–It does fix issues with your applications programmers can't (at least not fast enough) 
–It gives you a good idea of what is going on with your applications
11.9.2014 
(C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 
15 
Minutes to learn, a lifetime to master 
•Plan the implementation beforehand 
•Inform your stakeholders about possible issues when rolling out 
•Treat the application firewall rollout as any major software update in your system 
•Don't try to solve everything at once – Think big, start small 
”A WAF-project is like any other IT-project – it fails of not conducted properly”
Thank You! Kiitos! Tack! 
Questions? 
Kysymyksiä? 
Frågor? 
Hopefully at least a few... 
Contact: 
thomas.malmberg@aktia.fi 
http://fi.linkedin.com/in/thomasmalmberg
Web Application Firewall - Web Application & Web Services Security integrated in Global Application Offering
Ad

More Related Content

What's hot (20)

SecDevOps 2.0 - Managing Your Robot Army
SecDevOps 2.0 - Managing Your Robot ArmySecDevOps 2.0 - Managing Your Robot Army
SecDevOps 2.0 - Managing Your Robot Army
conjur_inc
 
Waratek Securing Red Hat JBoss from the Inside Out
Waratek Securing Red Hat JBoss from the Inside OutWaratek Securing Red Hat JBoss from the Inside Out
Waratek Securing Red Hat JBoss from the Inside Out
Waratek Ltd
 
Waratek overview 2016
Waratek overview 2016Waratek overview 2016
Waratek overview 2016
Waratek Ltd
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
Alert Logic
 
DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017
kieranjacobsen
 
Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving Infrastructures
SBWebinars
 
DevSecOps, The Good, Bad, and Ugly
DevSecOps, The Good, Bad, and UglyDevSecOps, The Good, Bad, and Ugly
DevSecOps, The Good, Bad, and Ugly
4ndersonLin
 
Secure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsSecure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOps
CloudPassage
 
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-MelhaouiCSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
NCCOMMS
 
AWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWSAWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWS
Eric Smalling
 
The Cloud - What's different
The Cloud - What's differentThe Cloud - What's different
The Cloud - What's different
Chen-Tien Tsai
 
Zero trust server management - lightning
Zero trust server management - lightningZero trust server management - lightning
Zero trust server management - lightning
Kevin Gilpin
 
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps  - The What and the Why | Ritesh ShregillAgile Network India | DevSecOps  - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
AgileNetwork
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
AlgoSec
 
Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3
Trish McGinity, CCSK
 
Dev seccon london 2016 intelliment security
Dev seccon london 2016   intelliment securityDev seccon london 2016   intelliment security
Dev seccon london 2016 intelliment security
DevSecCon
 
Cloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO SuccessfulCloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO Successful
CloudPassage
 
Elizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unisonElizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unison
DevSecCon
 
Stephen Sadowski - Securely automating infrastructure in the cloud
Stephen Sadowski - Securely automating infrastructure in the cloudStephen Sadowski - Securely automating infrastructure in the cloud
Stephen Sadowski - Securely automating infrastructure in the cloud
DevSecCon
 
Technologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudTechnologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the Cloud
CloudPassage
 
SecDevOps 2.0 - Managing Your Robot Army
SecDevOps 2.0 - Managing Your Robot ArmySecDevOps 2.0 - Managing Your Robot Army
SecDevOps 2.0 - Managing Your Robot Army
conjur_inc
 
Waratek Securing Red Hat JBoss from the Inside Out
Waratek Securing Red Hat JBoss from the Inside OutWaratek Securing Red Hat JBoss from the Inside Out
Waratek Securing Red Hat JBoss from the Inside Out
Waratek Ltd
 
Waratek overview 2016
Waratek overview 2016Waratek overview 2016
Waratek overview 2016
Waratek Ltd
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
Alert Logic
 
DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017DevSecOps - CrikeyCon 2017
DevSecOps - CrikeyCon 2017
kieranjacobsen
 
Deploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving InfrastructuresDeploying Secure Modern Apps in Evolving Infrastructures
Deploying Secure Modern Apps in Evolving Infrastructures
SBWebinars
 
DevSecOps, The Good, Bad, and Ugly
DevSecOps, The Good, Bad, and UglyDevSecOps, The Good, Bad, and Ugly
DevSecOps, The Good, Bad, and Ugly
4ndersonLin
 
Secure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsSecure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOps
CloudPassage
 
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-MelhaouiCSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
NCCOMMS
 
AWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWSAWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWS
Eric Smalling
 
The Cloud - What's different
The Cloud - What's differentThe Cloud - What's different
The Cloud - What's different
Chen-Tien Tsai
 
Zero trust server management - lightning
Zero trust server management - lightningZero trust server management - lightning
Zero trust server management - lightning
Kevin Gilpin
 
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps  - The What and the Why | Ritesh ShregillAgile Network India | DevSecOps  - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
AgileNetwork
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
AlgoSec
 
Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3
Trish McGinity, CCSK
 
Dev seccon london 2016 intelliment security
Dev seccon london 2016   intelliment securityDev seccon london 2016   intelliment security
Dev seccon london 2016 intelliment security
DevSecCon
 
Cloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO SuccessfulCloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO Successful
CloudPassage
 
Elizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unisonElizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unison
DevSecCon
 
Stephen Sadowski - Securely automating infrastructure in the cloud
Stephen Sadowski - Securely automating infrastructure in the cloudStephen Sadowski - Securely automating infrastructure in the cloud
Stephen Sadowski - Securely automating infrastructure in the cloud
DevSecCon
 
Technologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the CloudTechnologies You Need to Safely Use the Cloud
Technologies You Need to Safely Use the Cloud
CloudPassage
 

Viewers also liked (20)

Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)
Deivid Toledo
 
Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014
Sophos Benelux
 
XSS and CSRF with HTML5
XSS and CSRF with HTML5XSS and CSRF with HTML5
XSS and CSRF with HTML5
Shreeraj Shah
 
Most In Demand Information Security Skills
Most In Demand Information Security SkillsMost In Demand Information Security Skills
Most In Demand Information Security Skills
InterQuest Group
 
Benefits of Web Application Firewall
Benefits of Web Application FirewallBenefits of Web Application Firewall
Benefits of Web Application Firewall
davidjohnrace
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
Harsh Kevadia
 
{{more}} Kibana4
{{more}} Kibana4{{more}} Kibana4
{{more}} Kibana4
琛琳 饶
 
Apache安装配置mod security
Apache安装配置mod securityApache安装配置mod security
Apache安装配置mod security
Huang Toby
 
File upload vulnerabilities & mitigation
File upload vulnerabilities & mitigationFile upload vulnerabilities & mitigation
File upload vulnerabilities & mitigation
Onwukike Chinedu. CISA, CEH, COBIT5 LI, CCNP
 
Sql injection bypassing hand book blackrose
Sql injection bypassing hand book blackroseSql injection bypassing hand book blackrose
Sql injection bypassing hand book blackrose
Noaman Aziz
 
Cross Domain Hijacking - File Upload Vulnerability
Cross Domain Hijacking - File Upload VulnerabilityCross Domain Hijacking - File Upload Vulnerability
Cross Domain Hijacking - File Upload Vulnerability
Ronan Dunne, CEH, SSCP
 
The Hidden XSS - Attacking the Desktop & Mobile Platforms
The Hidden XSS - Attacking the Desktop & Mobile PlatformsThe Hidden XSS - Attacking the Desktop & Mobile Platforms
The Hidden XSS - Attacking the Desktop & Mobile Platforms
kosborn
 
XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015
XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015
XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015
CODE BLUE
 
Methods to Bypass a Web Application Firewall Eng
Methods to Bypass a Web Application Firewall EngMethods to Bypass a Web Application Firewall Eng
Methods to Bypass a Web Application Firewall Eng
Dmitry Evteev
 
주로사용되는 Xss필터와 이를 공격하는 방법
주로사용되는 Xss필터와 이를 공격하는 방법주로사용되는 Xss필터와 이를 공격하는 방법
주로사용되는 Xss필터와 이를 공격하는 방법
guestad13b55
 
Building Advanced XSS Vectors
Building Advanced XSS VectorsBuilding Advanced XSS Vectors
Building Advanced XSS Vectors
Rodolfo Assis (Brute)
 
New Methods in Automated XSS Detection & Dynamic Exploit Creation
New Methods in Automated XSS Detection & Dynamic Exploit CreationNew Methods in Automated XSS Detection & Dynamic Exploit Creation
New Methods in Automated XSS Detection & Dynamic Exploit Creation
Ken Belva
 
Web Application Firewalls Detection, Bypassing And Exploitation
Web Application Firewalls  Detection, Bypassing And ExploitationWeb Application Firewalls  Detection, Bypassing And Exploitation
Web Application Firewalls Detection, Bypassing And Exploitation
Sandro Gauci
 
XPath Injection
XPath InjectionXPath Injection
XPath Injection
Roberto Suggi Liverani
 
Waf bypassing Techniques
Waf bypassing TechniquesWaf bypassing Techniques
Waf bypassing Techniques
Avinash Thapa
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)
Deivid Toledo
 
Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014
Sophos Benelux
 
XSS and CSRF with HTML5
XSS and CSRF with HTML5XSS and CSRF with HTML5
XSS and CSRF with HTML5
Shreeraj Shah
 
Most In Demand Information Security Skills
Most In Demand Information Security SkillsMost In Demand Information Security Skills
Most In Demand Information Security Skills
InterQuest Group
 
Benefits of Web Application Firewall
Benefits of Web Application FirewallBenefits of Web Application Firewall
Benefits of Web Application Firewall
davidjohnrace
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
Harsh Kevadia
 
{{more}} Kibana4
{{more}} Kibana4{{more}} Kibana4
{{more}} Kibana4
琛琳 饶
 
Apache安装配置mod security
Apache安装配置mod securityApache安装配置mod security
Apache安装配置mod security
Huang Toby
 
Sql injection bypassing hand book blackrose
Sql injection bypassing hand book blackroseSql injection bypassing hand book blackrose
Sql injection bypassing hand book blackrose
Noaman Aziz
 
Cross Domain Hijacking - File Upload Vulnerability
Cross Domain Hijacking - File Upload VulnerabilityCross Domain Hijacking - File Upload Vulnerability
Cross Domain Hijacking - File Upload Vulnerability
Ronan Dunne, CEH, SSCP
 
The Hidden XSS - Attacking the Desktop & Mobile Platforms
The Hidden XSS - Attacking the Desktop & Mobile PlatformsThe Hidden XSS - Attacking the Desktop & Mobile Platforms
The Hidden XSS - Attacking the Desktop & Mobile Platforms
kosborn
 
XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015
XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015
XSS Attacks Exploiting XSS Filter by Masato Kinugawa - CODE BLUE 2015
CODE BLUE
 
Methods to Bypass a Web Application Firewall Eng
Methods to Bypass a Web Application Firewall EngMethods to Bypass a Web Application Firewall Eng
Methods to Bypass a Web Application Firewall Eng
Dmitry Evteev
 
주로사용되는 Xss필터와 이를 공격하는 방법
주로사용되는 Xss필터와 이를 공격하는 방법주로사용되는 Xss필터와 이를 공격하는 방법
주로사용되는 Xss필터와 이를 공격하는 방법
guestad13b55
 
New Methods in Automated XSS Detection & Dynamic Exploit Creation
New Methods in Automated XSS Detection & Dynamic Exploit CreationNew Methods in Automated XSS Detection & Dynamic Exploit Creation
New Methods in Automated XSS Detection & Dynamic Exploit Creation
Ken Belva
 
Web Application Firewalls Detection, Bypassing And Exploitation
Web Application Firewalls  Detection, Bypassing And ExploitationWeb Application Firewalls  Detection, Bypassing And Exploitation
Web Application Firewalls Detection, Bypassing And Exploitation
Sandro Gauci
 
Waf bypassing Techniques
Waf bypassing TechniquesWaf bypassing Techniques
Waf bypassing Techniques
Avinash Thapa
 
Ad

Similar to Web Application Firewall - Web Application & Web Services Security integrated in Global Application Offering (20)

Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
pvanwoud
 
Integration into the Secure SDLC Process.ppt
Integration into the Secure SDLC Process.pptIntegration into the Secure SDLC Process.ppt
Integration into the Secure SDLC Process.ppt
Imam Halim Mursyidin
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
London School of Cyber Security
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
Meg Weber
 
Tips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile Apps
TechWell
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
Alert Logic
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
centralohioissa
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
Mike Spaulding
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
iMIS
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
iMIS
 
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
IBM Security
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
ssusera76ea9
 
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Chris Hails
 
Fortify technology
Fortify technologyFortify technology
Fortify technology
Imad Nom de famille
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
Denim Group
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
Denim Group
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
Claus Cramon Houmann
 
Security Testing for Mobile and Web Apps
Security Testing for Mobile and Web AppsSecurity Testing for Mobile and Web Apps
Security Testing for Mobile and Web Apps
DrKaramHatim
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
Nicholas Davis
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded system
Rogue Wave Software
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
pvanwoud
 
Integration into the Secure SDLC Process.ppt
Integration into the Secure SDLC Process.pptIntegration into the Secure SDLC Process.ppt
Integration into the Secure SDLC Process.ppt
Imam Halim Mursyidin
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
Meg Weber
 
Tips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile Apps
TechWell
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
Alert Logic
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
centralohioissa
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
Mike Spaulding
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
iMIS
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
iMIS
 
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
Re-defining Endpoint Protection: Preventing Compromise in the Face of Advance...
IBM Security
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
ssusera76ea9
 
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Auckland (ISC)2 Chapter - Building the ‘Bob Semple Cyber Tank'
Chris Hails
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
Denim Group
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
Denim Group
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
Claus Cramon Houmann
 
Security Testing for Mobile and Web Apps
Security Testing for Mobile and Web AppsSecurity Testing for Mobile and Web Apps
Security Testing for Mobile and Web Apps
DrKaramHatim
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
Nicholas Davis
 
Cyber security - It starts with the embedded system
Cyber security - It starts with the embedded systemCyber security - It starts with the embedded system
Cyber security - It starts with the embedded system
Rogue Wave Software
 
Ad

Recently uploaded (20)

Mastering Public Speaking: Key Skills for Confident Communication
Mastering Public Speaking: Key Skills for Confident CommunicationMastering Public Speaking: Key Skills for Confident Communication
Mastering Public Speaking: Key Skills for Confident Communication
karthikeyans20012004
 
Cross-Cultural-Communication-and-Adaptation.pdf
Cross-Cultural-Communication-and-Adaptation.pdfCross-Cultural-Communication-and-Adaptation.pdf
Cross-Cultural-Communication-and-Adaptation.pdf
rash64487
 
stackconf 2025 | Building a Hyperconverged Proxmox VE Cluster with Ceph by Jo...
stackconf 2025 | Building a Hyperconverged Proxmox VE Cluster with Ceph by Jo...stackconf 2025 | Building a Hyperconverged Proxmox VE Cluster with Ceph by Jo...
stackconf 2025 | Building a Hyperconverged Proxmox VE Cluster with Ceph by Jo...
NETWAYS
 
The Role of Training and Development on Employee Performance: A Study on City...
The Role of Training and Development on Employee Performance: A Study on City...The Role of Training and Development on Employee Performance: A Study on City...
The Role of Training and Development on Employee Performance: A Study on City...
SintiakHaque
 
Challenges faced by women in banking sector
Challenges faced by women in banking sectorChallenges faced by women in banking sector
Challenges faced by women in banking sector
SintiakHaque
 
What's behind Mining Race? The fastest-growing Bitcoin movement
What's behind Mining Race? The fastest-growing Bitcoin movementWhat's behind Mining Race? The fastest-growing Bitcoin movement
What's behind Mining Race? The fastest-growing Bitcoin movement
Mining RACE
 
Schedule III content for PPT as per Companies Act
Schedule III content for PPT as per Companies ActSchedule III content for PPT as per Companies Act
Schedule III content for PPT as per Companies Act
PriyankaAgarwal941449
 
Math Quiz Presentation in Red and Green Fun Style.pptx
Math Quiz Presentation in Red and Green Fun Style.pptxMath Quiz Presentation in Red and Green Fun Style.pptx
Math Quiz Presentation in Red and Green Fun Style.pptx
candrakurniawan56
 
Navigating the Digital Asset Landscape-From Blockchain Foundations to Future ...
Navigating the Digital Asset Landscape-From Blockchain Foundations to Future ...Navigating the Digital Asset Landscape-From Blockchain Foundations to Future ...
Navigating the Digital Asset Landscape-From Blockchain Foundations to Future ...
BobPesakovic
 
The Role of Training and Development on Employee Performance: A Study on City...
The Role of Training and Development on Employee Performance: A Study on City...The Role of Training and Development on Employee Performance: A Study on City...
The Role of Training and Development on Employee Performance: A Study on City...
SintiakHaque
 
formative assessment Laura Greenstein.pptx
formative assessment Laura Greenstein.pptxformative assessment Laura Greenstein.pptx
formative assessment Laura Greenstein.pptx
Soumaya Jaaifi
 
International Business of Mexico City
International Business of Mexico CityInternational Business of Mexico City
International Business of Mexico City
SintiakHaque
 
NL-based Software Engineering (NLBSE) '25
NL-based Software Engineering (NLBSE) '25NL-based Software Engineering (NLBSE) '25
NL-based Software Engineering (NLBSE) '25
Sebastiano Panichella
 
A Psalm of Life Experimental including the definitions
A Psalm of Life Experimental including the definitionsA Psalm of Life Experimental including the definitions
A Psalm of Life Experimental including the definitions
GenesisMedel1
 
fermentation presentation'. very easy ppt
fermentation presentation'. very easy pptfermentation presentation'. very easy ppt
fermentation presentation'. very easy ppt
naveenkumawatstar
 
Is India on Track for a $5 Trillion GDP?
Is India on Track for a $5 Trillion GDP?Is India on Track for a $5 Trillion GDP?
Is India on Track for a $5 Trillion GDP?
bhaktiparekh10
 
stackconf 2025 | 2025: I Don’t Know K8S and at This Point, I’m Too Afraid To ...
stackconf 2025 | 2025: I Don’t Know K8S and at This Point, I’m Too Afraid To ...stackconf 2025 | 2025: I Don’t Know K8S and at This Point, I’m Too Afraid To ...
stackconf 2025 | 2025: I Don’t Know K8S and at This Point, I’m Too Afraid To ...
NETWAYS
 
Challenges faced by women in banking sector
Challenges faced by women in banking sectorChallenges faced by women in banking sector
Challenges faced by women in banking sector
SintiakHaque
 
Steve Nickel What Can I Give 05.18.2025.pptx
Steve Nickel What Can I Give 05.18.2025.pptxSteve Nickel What Can I Give 05.18.2025.pptx
Steve Nickel What Can I Give 05.18.2025.pptx
FamilyWorshipCenterD
 
ICST/SBFT Tool Competition 2025 - UAV Testing Track
ICST/SBFT Tool Competition 2025 - UAV Testing TrackICST/SBFT Tool Competition 2025 - UAV Testing Track
ICST/SBFT Tool Competition 2025 - UAV Testing Track
Sebastiano Panichella
 
Mastering Public Speaking: Key Skills for Confident Communication
Mastering Public Speaking: Key Skills for Confident CommunicationMastering Public Speaking: Key Skills for Confident Communication
Mastering Public Speaking: Key Skills for Confident Communication
karthikeyans20012004
 
Cross-Cultural-Communication-and-Adaptation.pdf
Cross-Cultural-Communication-and-Adaptation.pdfCross-Cultural-Communication-and-Adaptation.pdf
Cross-Cultural-Communication-and-Adaptation.pdf
rash64487
 
stackconf 2025 | Building a Hyperconverged Proxmox VE Cluster with Ceph by Jo...
stackconf 2025 | Building a Hyperconverged Proxmox VE Cluster with Ceph by Jo...stackconf 2025 | Building a Hyperconverged Proxmox VE Cluster with Ceph by Jo...
stackconf 2025 | Building a Hyperconverged Proxmox VE Cluster with Ceph by Jo...
NETWAYS
 
The Role of Training and Development on Employee Performance: A Study on City...
The Role of Training and Development on Employee Performance: A Study on City...The Role of Training and Development on Employee Performance: A Study on City...
The Role of Training and Development on Employee Performance: A Study on City...
SintiakHaque
 
Challenges faced by women in banking sector
Challenges faced by women in banking sectorChallenges faced by women in banking sector
Challenges faced by women in banking sector
SintiakHaque
 
What's behind Mining Race? The fastest-growing Bitcoin movement
What's behind Mining Race? The fastest-growing Bitcoin movementWhat's behind Mining Race? The fastest-growing Bitcoin movement
What's behind Mining Race? The fastest-growing Bitcoin movement
Mining RACE
 
Schedule III content for PPT as per Companies Act
Schedule III content for PPT as per Companies ActSchedule III content for PPT as per Companies Act
Schedule III content for PPT as per Companies Act
PriyankaAgarwal941449
 
Math Quiz Presentation in Red and Green Fun Style.pptx
Math Quiz Presentation in Red and Green Fun Style.pptxMath Quiz Presentation in Red and Green Fun Style.pptx
Math Quiz Presentation in Red and Green Fun Style.pptx
candrakurniawan56
 
Navigating the Digital Asset Landscape-From Blockchain Foundations to Future ...
Navigating the Digital Asset Landscape-From Blockchain Foundations to Future ...Navigating the Digital Asset Landscape-From Blockchain Foundations to Future ...
Navigating the Digital Asset Landscape-From Blockchain Foundations to Future ...
BobPesakovic
 
The Role of Training and Development on Employee Performance: A Study on City...
The Role of Training and Development on Employee Performance: A Study on City...The Role of Training and Development on Employee Performance: A Study on City...
The Role of Training and Development on Employee Performance: A Study on City...
SintiakHaque
 
formative assessment Laura Greenstein.pptx
formative assessment Laura Greenstein.pptxformative assessment Laura Greenstein.pptx
formative assessment Laura Greenstein.pptx
Soumaya Jaaifi
 
International Business of Mexico City
International Business of Mexico CityInternational Business of Mexico City
International Business of Mexico City
SintiakHaque
 
NL-based Software Engineering (NLBSE) '25
NL-based Software Engineering (NLBSE) '25NL-based Software Engineering (NLBSE) '25
NL-based Software Engineering (NLBSE) '25
Sebastiano Panichella
 
A Psalm of Life Experimental including the definitions
A Psalm of Life Experimental including the definitionsA Psalm of Life Experimental including the definitions
A Psalm of Life Experimental including the definitions
GenesisMedel1
 
fermentation presentation'. very easy ppt
fermentation presentation'. very easy pptfermentation presentation'. very easy ppt
fermentation presentation'. very easy ppt
naveenkumawatstar
 
Is India on Track for a $5 Trillion GDP?
Is India on Track for a $5 Trillion GDP?Is India on Track for a $5 Trillion GDP?
Is India on Track for a $5 Trillion GDP?
bhaktiparekh10
 
stackconf 2025 | 2025: I Don’t Know K8S and at This Point, I’m Too Afraid To ...
stackconf 2025 | 2025: I Don’t Know K8S and at This Point, I’m Too Afraid To ...stackconf 2025 | 2025: I Don’t Know K8S and at This Point, I’m Too Afraid To ...
stackconf 2025 | 2025: I Don’t Know K8S and at This Point, I’m Too Afraid To ...
NETWAYS
 
Challenges faced by women in banking sector
Challenges faced by women in banking sectorChallenges faced by women in banking sector
Challenges faced by women in banking sector
SintiakHaque
 
Steve Nickel What Can I Give 05.18.2025.pptx
Steve Nickel What Can I Give 05.18.2025.pptxSteve Nickel What Can I Give 05.18.2025.pptx
Steve Nickel What Can I Give 05.18.2025.pptx
FamilyWorshipCenterD
 
ICST/SBFT Tool Competition 2025 - UAV Testing Track
ICST/SBFT Tool Competition 2025 - UAV Testing TrackICST/SBFT Tool Competition 2025 - UAV Testing Track
ICST/SBFT Tool Competition 2025 - UAV Testing Track
Sebastiano Panichella
 

Web Application Firewall - Web Application & Web Services Security integrated in Global Application Offering

  • 1. Web Application & Web Services Security integrated in Global Application Offering - Problems? No, no problems at all. - Yes. We're using WAF too. 3.11.2011 Thomas Malmberg
  • 2. 11.9.2014 (C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 2 Agenda •Security and its many faces •Drivers and issues for choosing an application firewall •Minutes to learn, a lifetime to master ”Questions may be asked at any given time” Web Application & Web Services Security integrated in Global Application Offering
  • 3. 11.9.2014 (C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 3 Security and its many faces •Security has to be applied on many levels in an organization –Processes –User management –Firewalls –Keycards –Doors –SSL –Penetration testing –Training –... •Can security be enforced by applying Magnum Force?
  • 4. 11.9.2014 (C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 4 Security and its many faces •Carrot and stick – approach –Give some and get some –Design and enforce policies, not "magnum force" –Involve the right people – You need to "sell your agenda" –Make sure you "enable business" (but what does that really mean?) –In certain cases, deploying a new technology is the right solution
  • 5. 11.9.2014 (C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 5 Drivers and issues for choosing an application firewall ..but wait - let's recap what REALLY happened (or what should have happened) The Stick PCI-DSS The Carrot Cut costs on expensive application re-testing and re-coding and re- inventing and re- everything
  • 6. 11.9.2014 (C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 6 Drivers and issues for choosing an application firewall •PCI-DSS was "the drop that spilled the cup" •Before PCI-DSS we had at least this: –National Legislation –Financial Supervisory Authority Directives –EU Legislation & Directives –Finanssivalvonta, Finansinspektionen –Common Sense •Then we woke up and realized that... –Security had many faces –Security cannot be bought (but neat firewalls can!) –Security is a mindset –Security is a way of life Financial Supervisory Authority: • Finanssivalvonta (FI) • Finansinspektionen (SE)
  • 7. 11.9.2014 (C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 7 Drivers and issues for choosing an application firewall •Today we understand that –Credit-card numbers are not everything –There are a lot of different input sources to definitive compliancy –It is not wise to pursue different directives or legislations separately –Everything we do in this field increases the overall security
  • 8. 11.9.2014 (C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 8 Drivers and issues for choosing an application firewall
  • 9. 11.9.2014 (C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 9 Case HBGary •HBGary and HBGary Federal position themselves as experts in computer security. The companies offer both software and services to both the public and private sectors. •HBGary Federal CEO Aaron Barr thought he had unmasked the hacker hordes of Anonymous and was preparing to name and shame those responsible for co-ordinating the group's actions, including the denial-of-service attacks that hit MasterCard, Visa, and other perceived enemies of WikiLeaks late last year •Anonymous is a diverse bunch: though they tend to be younger rather than older, their age group spans decades. Some may still be in school, but many others are gainfully employed office-workers, software developers, or IT support technicians, among other things. •Source: http://arstechnica.com/tech- policy/news/2011/02/anonymous-speaks-the-inside- story-of-the-hbgary-hack.ars/
  • 10. 11.9.2014 (C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 10 Case HBGary 1.The CMS-system had an SQL-injection vulnerability 2.Usernames were stolen from the user-database 3.Passwords were hashed using simple MD5 w/o salting 4.Passwords were weak 5.Same passwords were used for public SSH- access 6.The SSH-server was not patched, root access could be gained 7.Same passwords were used for email accounts, Google apps and for gmail-administrators 8.Using admin-rights, many email accounts were scavenged for information 9.Emailing was used for social engineering to gain even more access to other sites
  • 11. 11.9.2014 (C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 11 Drivers and issues for choosing an application firewall
  • 12. 11.9.2014 (C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 12 Drivers and issues for choosing an application firewall •An application firewall (WAF) would not make us PCI-DSS compliant •It would only partially answer one of the requirements set by the PCI- council •BUT - depending on the product we choose we could –increase the overall security level of all of our public internet services –accelerate our websites –apply quick fixes to 0-day vulnerabilities when we most need it –safely deploy applications with known issues to the public while investigating the root cause –possibly protect our web-services ”0-day vulnerabilities must be fixed IMMEDIATELY.”
  • 13. 11.9.2014 (C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 13 Minutes to learn, a lifetime to master •A few do's and don't along the way –Don't expect the application firewall to be a generic solution to issues in your software development –Don't ditch external security audits –Don't expect everything to be up and running smoothly day 1 –Don't expect that the application firewall never requires attention –Make sure you have a process to monitor discrepancies and (major) changes in your traffic profile
  • 14. 11.9.2014 (C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 14 Minutes to learn, a lifetime to master •A few do's and don't along the way –It does add security where you need it the most –It does fix issues with your applications programmers can't (at least not fast enough) –It gives you a good idea of what is going on with your applications
  • 15. 11.9.2014 (C) Thomas Malmberg [FOR INTENDED AUDIENCES ONLY] 15 Minutes to learn, a lifetime to master •Plan the implementation beforehand •Inform your stakeholders about possible issues when rolling out •Treat the application firewall rollout as any major software update in your system •Don't try to solve everything at once – Think big, start small ”A WAF-project is like any other IT-project – it fails of not conducted properly”
  • 16. Thank You! Kiitos! Tack! Questions? Kysymyksiä? Frågor? Hopefully at least a few... Contact: [email protected] http://fi.linkedin.com/in/thomasmalmberg