Web 2.0Web 2.0 – Security RecommendationsSecurity...

35
Web 2.0 Security Recommendations Web 2.0 Security Recommendations Ken Kaminski Ken Kaminski Security Architect – Northeast US Enterprise CISSP, GCIA, GCFA Ci S t Cisco Systems © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public BRKSEC-2052_c1 1

Transcript of Web 2.0Web 2.0 – Security RecommendationsSecurity...

Page 1: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

Web 2.0 – Security RecommendationsWeb 2.0 Security Recommendations

Ken KaminskiKen KaminskiSecurity Architect – Northeast US EnterpriseCISSP, GCIA, GCFACi S tCisco Systems

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 1

Page 2: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

AgendaAgenda

Reputation Services

Web application security – Secure Coding and Web Application Firewalls

Perimeter Web Gateway

End-user security (social engineering)

Client Security

Monitoring and Botnet Detectiong

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 2

Page 3: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

Solutions

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 3

Page 4: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

Fighting the Last WarFighting the Last War

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 4

Page 5: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

But I’ve Got Firewalls, IPS, Anti-Virus and URL Filtering?!and URL Filtering?!

Firewalls don’t stop port 25 or user requests for protocol-compliant HTTP(S)compliant HTTP(S)IPS does not stop social engineeringNew vulnerabilities continuallyyAnti-virus is shockingly ineffective due to mutating viruses

390 LdPinch security signatures since original in 2003More than 30 000 Bagel variantsMore than 30,000 Bagel variants

URL filtering can’t categorize an infinite number of sourcesURL filtering can’t protect from legitimate sites being hackedEnd-users roamEnd-users choose to install, override securityO i f t d l hid

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 5

Once infected, malware hides

Page 6: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

Malware Defeats Anti-Virus SignaturesMalware Defeats Anti Virus Signatures

Criminals have developed tools to mutate malware to defect signature-based detection

At DefCon teams of researchers proved their success yet againyet again

Seven viruses and two exploits, all well-known, were mutated to defeat anti-virus enginesmutated to defeat anti virus engines

Winning time: 2 hours, 25 minutes

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 6

Page 7: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

Virus Sophistication Beats AVVirus Sophistication Beats AV

182 virus tools at VX Heavens website vx.netlux.orgE l NGVCK (N t G ti Vi C ti Kit)Example: NGVCK (Next Generation Virus Creation Kit)

Poly/Metamorphic tools create random variantsViruses download fresh copy every 24 hoursViruses use buddy program to reinstall virus if disinfected

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 7

Page 8: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

Has anyone seen my silver bullet?Has anyone seen my silver bullet?

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 8

8

Page 9: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

Reputation Services

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 9

Page 10: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

1. What is Reputation?1. What is Reputation?or “Is all reputation the same?”

Email Security IPS

Web Security

Firewally

Reputation is the history of both actions and qualities of a specific IP address or network. This is calculated using some of the hundreds of different types of data found in the Sensor Database.

For different types of devices different parameters canFor different types of devices, different parameters can mean more or less for the reputation of a device.

Ex:The fact of sending SPAM is highly relevant to an email

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 10

Ex:The fact of sending SPAM is highly relevant to an email reputation device and less so to an IPS sensor.

Page 11: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

1. Web Reputation FiltersP di ti R l Ti Th t P tiPredictive, Real-Time Threat Prevention

Parameters – The More the

URL Blacklists

URL Whitelists

Better Security Intelligence Operations

Dynamic IP Addresses

Bot Networks

URL Behavior

Global Volume Data

Domain Registrar Information

C i d H t Li tSensorsN t k

SecurityM d li

Output as a scoreCompromised Host List

Real-Time Cloud Analysis

Network Owners

Network Modeling

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 11

Known Threat URLs

Page 12: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

Protection For a Dynamic Web 2.0 WorldVisibility Beyond the Initial ThreatVisibility Beyond the Initial Threat

Web Reputation Filters S h bj t t j t

Trusted Web SiteClient PC Web servers not affiliated with the trusted web site

Scan each object, not just the initial request

Web pages are made up of objects coming from different

(e.g. ad servers)

Compromised websites often grab malicious objects from externalobjects coming from different

sources

Objects can be images, executables JavaScript

malicious objects from external sources

Security means looking at each object individually not just the

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 12

executables, JavaScript… object individually, not just the initial request

Page 13: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

Web Application Firewalls- Secure Coding- Web Application Firewalls

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 13

Page 14: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

Focus of Today’s Attacks2/3rd of Attacks Focused Here

Focus of Today s Attacks

Custom Web ApplicationsCustomized Packaged AppsInternal and 3rd Party Code

Business Logic & Code

Operating

DatabaseServers

Operating

ApplicationServers

Operating

WebServers

Network

gSystemsSystems

gSystems

Network Firewall

IDSIPS

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 14

No magic signatures or patches for your custom PHP script

Page 15: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

2. Web Application Security2. Web Application Security

Inventory pages, servers, development environments, groups

Secure Web Development MethodologyWeb applications treat all input as malicious and validate accordingly

Target OWASP top ten (owasp org) and SANS top 20 (sans org)Target OWASP top ten (owasp.org) and SANS top 20 (sans.org)

Applications should always consider user input malicious and filter out what it doesn't need

Applications should use session ID generation libraries that rely on well-known hash or randomization functions

Application should not print out verbose error messages to regular users

Coders must pay attention to "developers-only" comments in page source

Consider Web Application Firewall

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 15

pp

Page 16: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

You Said OWASP?You Said OWASP?

http://www.owasp.orgOWASP = Open Web App Security Project

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 16

Source: WhiteHat Security, 2007

Page 17: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

Web Application Firewall (WAF)Web Application Firewall (WAF)

The WAF is a drop-in solution that protects web-enabled applications from attackspp

PCI Compliance, Virtual App Patching, Data Loss Prevention

Secure – Deep packet protection of the most common vulnerabilitiesDrop-in - Does not require recoding applications, deployable in under an hourPCI 6 5/6 6 compliance is just a few clicks away

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 17

PCI 6.5/6.6 compliance is just a few clicks away

Page 18: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

WAF Network DeploymentData Center

WAF Network Deployment DMZ

tom

ns

External WebBrowsers HTMLLoad Balancer

aged

or

Cust

b A

pplic

atio

n

HTML/XMLInternet

Pack

aW

eb

Web Application

Fi ll WAF

Typically deployed in the DMZ or WWW Server Farm access

Firewall Gateways

WAF Manager

yp y p yCluster of 2 appliances behind Load Balancer for FailoverDistributed solution:

Manager = GUI

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 18

Manager = GUIGateways = Policy Enforcement Points

Page 19: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

Perimeter Web Gateway

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 19

Page 20: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

3. Perimeter Web GatewayApplication-Specific Security GatewayApplication Specific Security Gateway

BLOCK Incoming Threats:Internet

Reputation Services

(The Common Security Database)

BLOCK Incoming Threats:Viruses, Trojans, WormsSpyware, Adware, PhishingUnauthorized Access

Security Database)

APPLICATION-SPECIFICSECURITY GATEWAY

MANAGEMENT C t ll

WEBSecurity Gateway

Controller

LAN/WAN

ENFORCE Policy:Acceptable UseRegulatory ComplianceIntellectual PropertyE ti

CENTRALIZE Admin:Per-user policyPer-user reportingQuarantine

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 20

EncryptionURL Filtering

Archiving

Page 21: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

Multi-Layered Malware DefenseProtection Against Today’s ThreatsProtection Against Today s Threats

Web Anti Virus/AntiL4 Traffic Monitor

Web Reputation Services

Anti-Virus/Anti-Malware Engines

Blocks much of Blocks malwareBlocks much of unknown/

known malware traffic at

connection time

Blocks malware based on deep

content analysis

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 21

connection time

Page 22: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

HTTPS Use Cases

SSL Trojans

HTTPS Use Cases

SSL Trojansand Malware

SecureAnonymizingAnonymizing

Proxies

SecureWebmail

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 22

WebmailAttachments

Page 23: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

HTTPs DecryptionSolution: The Active Man-in-the-MiddleSolution: The Active Man in the Middle

An appliance acting as an SSL proxy (an active MitM) negotiates two

Corporatenetwork

HTTPs conversations.

Web server

1. Negotiate algorithms. 1. Negotiate algorithms.

2. Authenticate server certificate.

3. Generate proxied server certificate.

4. Authenticate “server” certificate.

5 Generate encryption keys 5 Generate encryption keys5. Generate encryption keys. 5. Generate encryption keys.

6. Encrypted data channel established.

6. Encrypted data channel established.

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 23

Page 24: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

End User Security

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 24

Page 25: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

4. End User Security4. End User Security

Train users with real-world examplesStreamline security policies to include essentialsTrain users to understand web works and parse URLs

Firefox 3 and IE 7 have improved UI

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 25

Page 26: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

Browser SecurityBrowser Security

Browsers have built-in phishing/malware updates

Internet Explorer 8 (currently in beta 2 status)– adds XSS filters

– blocks “><script>… types of attacks on both GET and POST

– can be controlled by server-set HTTP header

Firefox add-on called NoScript–detects more vectors/encodings than IE8.0 …

– … but probably less user friendly (more geek-oriented)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 26

Page 27: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

Google Browser SecurityGoogle Browser Security

Google anti-malware search results effective–Interstitial page warning of infection pops up

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 27

Page 28: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

Client Security

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 28

Page 29: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

5. Client Security5. Client Security

Vulnerability scanning and patching (including web browser ecosystem)

Assess anti-virus and consider behavior-based system Host Intrusion Prevention System (HIPS)– Host Intrusion Prevention System (HIPS)

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 29

Page 30: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

Behavior-Based Rules

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 30

Page 31: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

HIPS Agent Consolidates Multiple Endpoint ProductsProducts

Desktop and Server Protection:• Distributed Firewall – Port

Only one agent to purchase, deploy and manage

Blocking & Packet Inspection• Host-based Intrusion Prevention• Day Zero Virus/Worm Protection

File Integrity Checking• File Integrity Checking• Application Blacklist/Whitelist• Policy Enforcement• Spyware/Adwarepy• Operating System Hardening• Web Server Protection• Data Leakage Protection• Wireless Interface Controls

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 31

Complementary with Anti-Virus

Page 32: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

HIPS Pro’s and ConsHIPS Pro s and Cons

Pro:The best HIPS products, using only the default policies, have never been compromised by anything that appeared in the wild

CSO Surveys - #1 Security Technology with the Most ROI

Proven ROI – savings in system admin time

Con:Large project – up front time and effort across multiple groups

Tuning required to reduce amount of Information and tune policies

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 32

Page 33: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

Monitoring

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 33

Page 34: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

6. Monitoring6. Monitoring

Assume your security will fail and look for symptoms

IPS, Botnet Traffic Filters, Netflow will show infections and security weaknesses

SRI bothunter is free tool

Netflow can require significant work

IPS systems indicate attack profile as well as internal hosts attacking other hosts

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 34

Page 35: Web 2.0Web 2.0 – Security RecommendationsSecurity ...media.govtech.net/GOVTECH_WEBSITE/EVENTS/... · Protection For a Dynamic Web 2.0 World Visibility Beyond the Initial ThreatVisibility

Q and A

© 2009 Cisco Systems, Inc. All rights reserved. Cisco PublicBRKSEC-2052_c1 35