Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Application Security Best Practices At Microsoft Ensuring the lowest possible exposure and vulnerability to attacks Published: January 2003.
OWASP Secure Coding Practices Quick Reference Guide
DMZ (De-Militarized Zone)
DMZ (De-Militarized Zone)
Firewalls Steven M. Bellovin Matsuzaki ‘maz’ Yoshinobu 1.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Securing the Borderless Network March 21, 2000 Ted Barlow.
System and Network Security Practices COEN 351 E-Commerce Security.
Chapter 12 Network Security.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
Chapter 7 HARDENING SERVERS.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Security and Policy Enforcement Mark Gibson Dave Northey
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Payment Card Industry (PCI) Data Security Standard
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Introduction to SQL Server 2000 Security Dave Watts CTO, Fig Leaf Software
Chapter 6: Packet Filtering
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
IIS Security Sridurga Mavram. Contents -Introduction -Security Consideration -Creating a web page -Drawbacks -Security Tools -Conclusion -References.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Firewall Security.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
1 Securing Network Services. 2 How TCP Works Set up connection between port on source host to port on destination host Each connection consists of sequence.
Security fundamentals Topic 10 Securing the network perimeter.
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
Purpose Present Drivers and Context for Firewalls Define Firewall Technology Present examples of Firewall Technology Discuss Design Issues Discuss Service.
NKU James Walden Director of the CIS
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Security fundamentals
ArcGIS for Server Security: Advanced
CompTIA Security+ Study Guide (SY0-401)
Web Development Web Servers.
Securing the Network Perimeter with ISA 2004
Introduction to SQL Server 2000 Security
CompTIA Security+ Study Guide (SY0-401)
Chapter 27: System Security
Firewalls Routers, Switches, Hubs VPNs
دیواره ی آتش.
How to Mitigate the Consequences What are the Countermeasures?
IS4680 Security Auditing for Compliance
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation OWASP An Architect’s View of Application Security Multi-tiered Systems Rick Carlin, Security Architect February 2009

OWASP Goals  Understand how applications fit into a multi- tiered architecture  Enhance awareness of risk outside the application  Illustrate 10 basic principles to mitigate application security risks

OWASP What is a Multi-tiered System (MTS)? MTS is a layered architecture that meets a business need consisting of:  Presentation layer  Application layer  Messaging layer (for multi-DB systems)  Data layer  Network Layer (interconnections)

OWASP Risk: Tunnel Vision Multi-tiered architectures are put together by teams, each with their unique vision for the system:  System administrators  Database administrators  Developers  Quality Assurance  Security analysts  Marketing  Communications  Web masters  Business Analysts  Help Desk  Business Units  Legal  Compliance  Human Resources  Project Managers

OWASP Risk: Ownership We are hampered in securing “the system” because of ownership issues for “our system” which is a single component in MTS. There is often no responsibility for “System Security” which includes each layer, interconnections and enterprise services

OWASP Other Risks to MTS  Vulnerabilities in systems  Vulnerabilities in applications  Vulnerabilities in networks  Vulnerabilities in design  Vulnerabilities in enterprise services  External threats  Internal threats

OWASP Mitigating Risk Reduce “Attack Surface” through:  System design  Layered security  Consistent processes Application of security principles (GASP)

OWASP

1. Separation of Networks  No direct traffic from external to internal networks (zones)  Routers, switches don’t maintain state!  “Deny all that is not explicitly allowed”

OWASP

2. Isolated Network (DMZ)  Buffer network between external and internal networks.  “Presents” the system to the user  Do not mix production and test networks

OWASP

3. Sterile Environment  Treat DMZ systems as unsafe  Practice good housekeeping (debugs, dumps, temporary files…)  Secrets are hard to keep

OWASP 4. No RA to Mgmt Systems  Many applications offer administrative controls directly via presentation layer (port, url, etc)  Network or server remote access should be blocked (ssh, telnet, pca, rdp, http, etc)  Only allow this access via authenticated, secure RA services (IPSec, VPN, SSL-VPN)

OWASP 5. Lockdown before exposure  Require Dev, QA, SA, Sec to complete testing from documented processes  Require an approval process to place system in DMZ  Accept “residual risk” and authorize system operation in writing

OWASP 6. Least Access  Access granted at the minimum level required  Practice at system and network level  Document and restrict use of built-in accounts

OWASP 7. Least Use  Servers only used for one purpose  Remove unused services and applications  Example: Web server is not the SMTP server

OWASP 8. O.S. Isolation  Never install applications on the operating system partition  Use native ACL’s on application directories  No parent paths in applications

OWASP 9. Monitoring  Use IDS/IDP  Offload logs to central repository  Custom apps need to generate logs  Understand what’s going on - situational awareness

OWASP 10. Encrypted Data Transfer  Understand what data is in your system  Use standard encryption protocols for data in transit (SSL/TLS)  End-to-end encryption (transit to rest)

OWASP Enterprise Services  DNS  Time  Patching  Anti-Virus  Logging  Management  Authentication  Code deployment

OWASP The Application Interface Don’t trust input! Always perform -  INPUT VALIDATION  BOUNDS CHECKING  Never trust the client!

OWASP Layer Interconnections  Use discrete channels  Firewalls track state  End-to-end encryption requires change to host IDS  Don’t reinvent the encryption wheel

OWASP Unique to Presentation  Authentication should occur at this layer  Debugging – monitor for use  No dynamic data calls!  Point of attack if everything else is set up properly

OWASP Tracking the User  Parameterize the user name  Ensure uniqueness of session ID  Parameterize the session ID  Pass username and session id through successive layers

OWASP Unique to Application  Security is defined by business rules  Support teams at tier 2  Forgotten management interfaces  Data cross-roads

OWASP Unique to Database  No users access the database  Developers do not access production  Remove access to system stored procedures  All access to data via stored procedure  No code in the tables

OWASP Unique to Network  Border router – Not a firewall, but…  blocks rfc1918 both ways  blocks ping (ICMP echo request & echo reply)  blocks network and broadcast addresses  performs anti-spoofing  Developers – don’t invent network protocols, unless that’s your job - the firewall breaks them.  Keep address space to the minimum required

OWASP Putting it all Together  Use Firewall and isolated network  Use System build process  Authorize system for operation  Monitor system

OWASP

NIST Guides to Security  SP “An Introduction to Computer Security: The NIST Handbook”  SP “Generally Accepted Principles and Practices for Securing Information Technology Systems”  SP “Guide to General Server Security” Section 2.4 Server Security Principles

OWASP Thank you! Rick Carlin, CISSP (2003) 12 Years - IS/IT Security * Security Architect * Senior I.S. Systems Analyst * Security Engineer * Senior Data Security Analyst * Data Security Technician