Download Slide 1

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Airport security wikipedia , lookup

Proxy server wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Wireless security wikipedia , lookup

Unix security wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Distributed firewall wikipedia , lookup

Computer security wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Mobile security wikipedia , lookup

Security-focused operating system wikipedia , lookup

Cross-site scripting wikipedia , lookup

Transcript
Enterprise-wide
Web Security
Res. Assistant Enis Karaarslan
Ege Univ. Campus Network Manager
ULAK-CSIRT
http://csirt.ulakbim.gov.tr/eng
CONTENT
1. Why web security?
2. Network / web system Awareness
3. Secure Coding
4. Enterprise Web Security Model






Standardization
Awareness
Training/Testing
Detection
Prevention
Coordination Centre
CONTENT (cont.)
 4.
Implementation
 5. Conclusion
1. Why need web security?
 Web

information systems, devices ...etc
 Web


(server) usage increases
incidents increase
Zone-H – 400,000 (%36) increase in 2004
CSI-FBI – “Computer Crime and Security
Survey” - %95 of the correspondents
experienced more than 10 web site incidents
in 2005
Why need web security? (contd.)
 Incidents


can cause
Loss of privacy of the customer data
Many results of private data loss

Damage to the enterprise’s/vendor’s reputation
Reaching network devices and ...

Etc.

Major Problems in Web Security
• Not enough importance is
given for the web security
• Traditional security
measures are not sufficient
• Insufficient web server
security
• Lack of secure coding
We wouldn’t need so much
network security,
if we didn’t have such bad
software security.
Bruce Schneier
To win a war,
one must know
the way
Sun Tzu
The Art of War
2. Network / Web System Awareness
 Know
your enemy (?)
 Know
yourself,
know your assets
know what to protect
 Know
your systems more than the attacker
Network / Web System Awareness
(contd.)
 Network Awareness
the ability of knowing what is happening on
the network
 Web
System Awareness
specialized form of network awareness



Web System Awareness
Vulnerability Analysis
System Monitoring
Web System Awareness
 Web
Infrastructure Awareness
Collect and have current system information
 Vulnerability
Testing
Know your visible weaknesses
 Monitoring
the system
See the current status of the system
Web Infrastructure Awareness
 Web
server IP addresses
 Protocols used (https, http)
 Site domain names
(ex. socrates.ege.edu.tr)
 Web server ports (80, 8080, etc)
 Operating system (Linux, Windows, etc)
 Web server software types and versions
(Apache 2.0, IIS 6.0, etc)
Web Infrastructure Awareness (contd)

Content Management Systems (CMS), Portals,
Wikis, Bulletin Boards, discussion forums

Web frameworks (PHP, .NET, J2EE, Ruby on
Rails, ColdFusion, Perl, etc) and all types of web
applications

Application file names

Path to the applications, the directory structures

Application parameters and their types
3.Secure Coding
 Secure
coding and vulnerability testing in
Software Devolopment Life Cycle (SDLC)
 Assurance Models
Ex. OWASP Clasp, Microsoft SDL
 OWASP
Tutorials
http://www.owasp.org
Secure Coding (contd.)
Can not be implemented perfectly as
 Project deadlines
 Programmer’s lack of security-awareness
But should be focused on.
Also network based measures must be
considered.
4. Enterprise Wide Web Security Model
Model consists of sub modules:
 Standardization
 Awareness
 Training/Testing
 Detection
 Prevention
 Coordination Centre
Standardization
 Policy
based
Define what is permitted, what is not
 Define the preffered system
Supply templates, best practices
 Secure coding
 Documentation
Training / Testing
 Workshop
Show secure coding examples, attack scenarios
 Training


Portal
Related secure coding best practices
Guidelines, standards
 Test
Server

Black box testing

Source code analysis
Intrusion Detection
 Intrusion
Detection Systems
Ex. Snort, Mod Security
 Log
Control
 Honeypot, honeynet
Prevention
 Access
Control
Ex. Network firewall, router ACL
 Server
Local Security
Ex. Mod Security
 Reverse
Proxy - Web Application Firewall
Ex. Mod Security – Mod Rewrite
5. Implementation

Web Security model on process in
Ege University –Turkey

Web Security Group in Ulak-Csirt

Focus on Web System awareness
and training

Open source tools

Results will be given
5.1. Active/Passive System Awaress
 Aim
is to collect and have the current view
of the web system
 Active Scan



NMAP – AMAP
Perl Code for the analysis
Open Source Search Engine (future work)
 Passive


Scan
Snort
Mod Security
Active/Passive System Awaress Model
Test Deployment Schema
• IDS configured for web security
– WEBIDS
– TWEBIDS- knows web system infrastructure
Statistical Results
WEBIDS
Total Number of Alerts
Source IP Address
Destination IP Address
Unique IP Links
Unique Alerts
TWEBIDS
902,151
92,046
79,419
17,010
106
106
87,062
10,657
112
99
• Alerts collected in one month duration
• TWEBIDS which knows the system, has more
specific alerts and less false alarms
• More statistics in the paper
Vulnerability Analysis
Awareness Portal
A web portal for web server administrators and
security proffessionals:

Detailed reports about their web systems

Summarized information about the vulnerabilities

Recommend actions to solve the problems.

Track the changes on the systems.

Plan to expand this implementation to control the
critical web servers of the universities in the
Turkish Acedemic Network ULAKNET.
System Database Schema
5.2. Training

Workshops, meetings, live demos
Web server administrators, web application developers
Habits can’t change easily
 Education is a must!
 Documentations



Turkish documents - translations
http://websecurity.ege.edu.tr
http://csirt.ulakbim.gov.tr/dokumanlar
İTU-Ninova – Web Security e-learning content
http://ninova.itu.edu.tr
6. Conclusion


For enterprise web security, implement modules
of the Web Security Model

Complexity versus protection

Select the modules which suite your enterprise
Primary objectives for the enterprise wide web
security should be:

Web system awareness

Training web server administrators, web programmers
Conclusion (contd.)
 Systems
should be monitored for Intrusion
Detection
 Web security firewall implementation if
possible
 Future plans:



Fully integrate this model
Continue to increase web security awareness
Continue to involve in documentation projects
and translations
Thanks for your interest ....
Any questions?
Contact:
[email protected]
[email protected]
ULAK-CSIRT
http://csirt.ulakbim.gov.tr/eng