Site Resources Dynamic Salesdocs WP Integrated Web App Security

Embed Size (px)

Citation preview

  • 8/6/2019 Site Resources Dynamic Salesdocs WP Integrated Web App Security

    1/9

    www.citrix.com

    Integrated web application security White Paper

    Bene ts of integrated webapplication security

  • 8/6/2019 Site Resources Dynamic Salesdocs WP Integrated Web App Security

    2/9

    IntroductionApplication layer attacks are epidemic. According to the CSI/FBI ComputerCrime and Security Survey 2009, 92 percent of businesses have suffered from

    a successful application attack in the previous 12 months. Even worse,according to the Symantec State of Enterprise Security Report 2010, 75percent of enterprises surveyed experienced some form of cyber attack in 2009.

    To combat the attacks and the potential for data loss, web applications musthave active protectionsimilar to the way networks must be actively protectedby IDS, IPS and stateful rewalls. In addition to preventing attacks, theeffectiveness of a modern application delivery solution also depends on itsability to deliver performance, reliability and lower cost of ownership.Application deliver controllers (ADCs) provide the capabilities necessary toaccelerate, optimize and secure web applications and web services.

    Application delivery, an imperative for organizations, involves a exible setof services that can ef ciently accommodate changing application and uservariables while consistently ensuring the highest levels of performance, securityand availability, and lower total cost of ownership. In contrast to conventionalapproaches to application management, application delivery bridges the gapbetween traditional networks and modern applications, thereby avoiding theneed to continuously add resources or hard code changes to underlyingcomponents and systems as high-level business requirements evolve.

    This paper clari es the speci c security abilities that an ideal web applicationdelivery solution should exhibit. It also highlights the signi cant advantagesof the tightly integrated security module of Citrix NetScaler .

    The application deliveryimperativeApplications are crucial to business success. The level of dependency on thesetools of automation has steadily risen over the past decade and this trend willcontinue. Several trends affect ITs ability to maintain the accessibility,performance and, thus, overall usefulness of these applications to their users.The rise of cloud computing has extended the web application model, breakingthe traditional security model by providing multi-tenancy on shared equipmentand services. Mobility, globalization and off-shoring are moving users furtheraway from headquarters, while datacenter consolidation, security and

    regulatory compliance are driving centralization of information resources,often introducing barriers that make the associated applications less accessible.

    Compounding matters are an increasing reliance on web applications and othertechnologies which are notoriously insecure and performance-challenged,and rising expectations among users and business managers. Transactionsmust be executed nearly instantaneously. When faced with changing businessrequirements, IT needs to be able to roll-out new applications very quickly.Cloud computing providers often cite these quick response time bene ts andthey rely on fast results even more than traditional enterprises.

    2

  • 8/6/2019 Site Resources Dynamic Salesdocs WP Integrated Web App Security

    3/9

    Integrated web application security White Paper

    Addressing these challenges with traditional networking, security andmanagement solutions is insuf cient. They lack the application awarenessneeded to compensate for a network infrastructure not designed withmodern applications in mind. Network rewalls are tuned to the speci cneeds of networking. Web application rewalls are tuned to meet the speci cneeds of dynamic web applications.

    Security requirements forapplication deliveryApplication delivery requires security that is robust, adaptable andcomprehensive. Organizations have done a relatively good job with networksecurity. Confronted with reasonably strong defenses at the network layer,hackers have resorted to attacking weaknesses at higher layers of thecomputing stack.

    An even bigger factor has been a shift in attacker motivation. Rather thanattempting to gain notoriety, attackers now focus squarely on obtainingvaluable information including passwords, credit card details and SocialSecurity numbers, and the resulting nancial rewards. The greater emphasisbeing placed on application-layer attacks corresponds to the fact thatapplications are a direct and convenient conduit to this type of data.

    Application SecurityOrganizations should make a corresponding shift in their security strategiesand architectures. The consensus of leading security experts and regulators isthat more attention needs to be paid to establishing robust, application-layerdefenses. In no case is this need greater than for web applications. Not onlyare web applications exceedingly vulnerable, but they are also the primaryvehicle for e-commerce and customer portals and a front door to potentiallylucrative data. The net result is that web applications are now a favoredtarget of hackers everywhere.

    More than 80 percent of the 2,652 total vulnerabilities reportedfor commercial applications in the second half of 2009 wereattributed to web applications and related technologies (source:Cenzic Web Application Security Trends Report Q3-Q4, 2009,Cenzic Inc.)

    Of the top-attacked vulnerabilities that Symantec observed in

    2009, four of the top ve being exploited were client-sidevulnerabilities that were frequently targeted by web-based attacks.(Source: Symantec State of Enterprise Security Report 2010)

    Attacks against web applications constitute more than 60 percentof the total attack attempts observed on the Internet (source: SANSInstitute, Top Security Risks, September 2009,http://www.sans.org/top-cyber-security-risks/)

    3

  • 8/6/2019 Site Resources Dynamic Salesdocs WP Integrated Web App Security

    4/9

    4

    Over 90 percent of enterprise proprietary web applicationsanalyzed had serious vulnerabilities that could potentially lead tothe exposure of sensitive con dential user information duringtransactions (source: Cenzic Web Application Security TrendsReport Q3-Q4, 2009, Cenzic Inc.)

    IT compliance regulations also require better protection for applications.Most of the applicable regulations and legislation, including the PaymentCard Industry Data Security Standard (PCI-DSS), implicitly requireapplication-speci c countermeasures as part of a comprehensive informationsecurity program.

    Network and system level protectionPlacing greater emphasis on application-layer security is warranted giventhe current threat environment. This does not alleviate the need to providecomprehensive network-level protection, typically by taking advantage of a

    solutions native capabilities in combination with complementary, standalonenetwork security gateways (e.g., rewalls, virtual private networks and intrusionprevention systems). In addition, individual application delivery componentsshould be self-defending as a result of including a range of system-levelprotection mechanisms.

    The Citrix NetScaler SolutionIt is estimated that 75 percent of all Internet traf c traverses a CitrixNetScaler system every day. This can be attributed to granular L4-7 visibilityinto application requests and responses, a cornerstone of the solutions

    ability to accelerate applications, improve their availability and enhancesecurity. NetScaler provides for security in both the MPX physical appliancesand VPX virtual appliances in con gurations that enable acceleration,optimization and security.

    A robust web application frewallNetwork rewalls are simply not up to the task of securing web applications.In general, they do not understand the inner workings of protocols andlanguages such as HTML and XML; they do not understand HTTP sessions;they cannot validate user inputs to an HTML application; they cannot lteror obfuscate sensitive data included in server responses; they cannot detectmaliciously modi ed parameters in a URL request; and they are not capable

    of inspecting SSL-encrypted traf c. Most importantly, network rewalls donot understand session data, which is used to maintain state in the otherwisestateless HTTP protocol. It is because of these shortcomings that the PCI DataSecurity Standard calls for the use of web application rewalls and that afull-featured web application rewallwhether embedded or implementedas a standalone systemshould be considered an essential component of acomplete web application delivery solution. It is equally essential that such a

    rewall be robust. Like NetScaler Application Firewall , it should include thefollowing core capabilities to ensure that it provides a superior degree of application-layer security:

    PCI-DSS andapplication security

    The Payment Card Industry DataSecurity Standard applies tomerchants, nancial institutionsand other entities that store,process or transmit the Primary

    Account Numbers associatedwith credit cards from severalleading payment brands(e.g., Visa, MasterCard and

    American Express). Particularlyrelevant is Requirement 6 of thestandard, which calls for subjectorganizations to develop andmaintain secure systems andapplications. Even more speci cis Section 6, which states thatweb facing applications should

    be protected by installing anapplication-layer rewall in frontof them, or by having all customapplication code reviewed forcommon vulnerabilities by anorganization that specializes inapplication security.

  • 8/6/2019 Site Resources Dynamic Salesdocs WP Integrated Web App Security

    5/9

    Integrated web application security White Paper

    5

    Deep inspection The incorporated inspection technology shouldbe capable of reconstructing all bi-directional communications,including SSL-encrypted traf c, to ensure correct applicationbehavior and the validity of user machine inputs. Related functionsinclude: bi-directional parsing and analysis of all application traf c;complete header and payload inspection; semantic extraction of relevant objects; and sessionization (i.e., the maintenance of sessionstate despite the use of stateless web protocols).

    A comprehensive security model Utilizing a hybrid (whitelist andblacklist) security model, NetScaler can enforce positive security andthwart attacks associated with negative security. Positive securityentails enforcing industry standards (e.g., for HTTP) and codingbest practices (e.g., for HTML and Java) to block traf c that is notconsistent with good application behavior. The result is a provenmeasure of protection against zero-day attacks; complementedby threat signatures and correlation techniques that identify andblock speci c attack measures.

    Protection for infrastructure and users To protect against themost common web application exploits, namely buffer over ows,SQL injection, cross-site scripting and cross-site request forgery, aweb application rewall must provide security not just for thecomponents that comprise application infrastructure (e.g., servers,operating systems, databases and application programs), but forthe trust relationship between users and these components as well.

    XML protection As service oriented architectures and Web 2.0initiatives proliferate, enterprises need to provide protection notjust for HTML-based applications but also for applications thatrely on XML and associated web services technologies. XML issubject to many of the attacks previously mentioned including SQLinjection, cross-site scripting and many more that can be adaptedto attack XML-based applications. In addition to detecting andblocking these common application threats, NetScaler ApplicationFirewall includes a rich set of XML-speci c security protections andsecures all avors of XML. These include schema validation tothoroughly verify SOAP messages and XML payloads, and apowerful XML attachment check to block attachments containingmalicious executables or viruses. Advanced XML protections includeWSDL scanning prevention and blocking of XPath injection attacks.

    Adaptive learning Web applications are unique in both their designand their protective requirements. To provide for comprehensiveapplication protection, adaptive learning establishes and maintains

    a highly speci c mapping of normal-good behavior, includingexpected-valid inputs, tuned to the application. This effectivelyampli es the power of each of the three previous capabilities; helpsimprove the ability to protect dynamic applications such as thoseutilizing client-side JavaScript; and reduces the likelihood of mistakenly blocking benign traf c by establishing fuller context anda better semantic understanding of all application states, transactionsand associated data. A robust web application rewall shouldsupport both global and per-application security rules. This helpsensure that consistent yet appropriate defenses and policy areestablished across all applications.

  • 8/6/2019 Site Resources Dynamic Salesdocs WP Integrated Web App Security

    6/9

    6

    Multi-layer cloaking This feature thwarts a hackers ability toconduct reconnaissance and thus devise an effective strategy forexploiting established vulnerabilities or nding new ones. Iteliminates or otherwise masks the transmission of potentiallysensitive information about the components that comprise theapplication environment. Representative functionality includesremoval-replacement of all unnecessary server response headers;re-writing of internal URLs; removal of HTML comments; MACaddress shielding; and encryption of elements such as hidden form

    elds and cookie names and values.

    Prevention of data leakage A prudent last line of defense againstattacks targeting sensitive customer or corporate data is to activelyguard against the leakage of this type of information in serverresponses. Related functions include inspecting the entire datastream (not just HTTP headers); ensuring precision when matchingdata objects (e.g., by correlating content with context); andproviding an option to transform matching data objects,

    as opposed to simply blocking them. Data leakage capabilitiesextend to protect Payment Card Industry credit card numbers,U.S. Social Security numbers and de ned organizational data. TheHTTP callout feature extends data leakage protection to integratethird-party solutions, such as DLP.

    These are just the core security capabilities that form the foundation of arobust web application rewall. For other relevant security features, as wellas requisite management capabilities, readers are encouraged to review thematerials posted at www.citrix.com, or contact a Citrix representative.

    The advantages of anintegrated solutionDeploying standalone web application rewall systems is possible andmay even be appropriate under certain circumstances, for example, becauseof placement in the network, budget constraints, performance or capacityrequirements, or politics pertaining to ownership and managementresponsibilities. Citrix offers a range of dedicated hardware-based webapplication rewalls with secure throughput supported from 500 Mbps toover 5 Gbps. These models offer scalable Pay-as-You-Grow options toboost performance through a simple license upgrade.

    However, consideration should be given to the numerous advantages associatedwith operating NetScaler Application Firewall as a seamlessly integratedcomponent of the NetScaler web application delivery solution. Citrix offersapplication delivery controllers with complete application rewall supportthat provide up to 12 Gbps of secure application rewall throughput. Inaddition, NetScaler VPX virtual appliance models offer the ultimate inon-demand support. VPX allows an IT administrator to spin up additionalapplication rewall instances on-the- y that can be con gured to tailoredsettings for individual applications and pools of speci c users.

  • 8/6/2019 Site Resources Dynamic Salesdocs WP Integrated Web App Security

    7/9

    Integrated web application security White Paper

    7

    Constructive consolidationOne of the more obvious advantages of a combined solution is achieving ameasure of infrastructure consolidation. In this way, all of the key applicationdelivery functional objectivesperformance, availability and securityare

    provided in a single platform, thereby alleviating the need to deploy separatedevices (and potentially a second set of load balancers to front-end the webapplication rewalls). The result is an effective reduction in infrastructurecomplexity, and lower total cost of ownership due to lower capital andoperational expenditures.

    Enhanced e fciency and per ormance, andimproved e ectivenessIn its most basic form, an application delivery controller yields bene ts derivedchie y from reductions in physical complexity, i.e., fewer boxes to purchase,incorporate in the network and maintain. However, as with NetScaler

    Application Firewall and the full NetScaler ADC, consolidation that emphasizeslogical integration can add other signi cant advantages.

    First, there is the bene t achieved by not having to repeat core processesmultiple times, once for each separate device. Conducting cryptographicoperations and other packet-level functionssuch as connection handling,header inspections, positive model enforcement and denial-of-servicepreventiononly once signi cantly reduces not only the aggregate resourcerequirements but also the latency introduced to the applications that arebeing delivered.

    Next is the operational bene t of being able to set security policies in thesame way and at the same time that other application delivery policies arebeing con gured. The intuitive AppExpert Visual Policy Builder, a keyfeature of NetScaler, enables all application delivery policies to be createdwithout the need for coding complex programs or scripts.

    Finally, there is the architectural bene t of not having to wrestle with separatedevices for different parts of the application delivery solution. Potentialcon icts or overlapping capabilities are avoided, as are compatibility problemsthat may arise when using products from multiple vendors.

    A proven, highly capable plat ormIts strong presence and continued success in the market are evidence thatNetScaler is a highly capable platform. NetScaler has been architected to bea high-performance, high-capacity system, as detailed below:

    A purpose-built system The NetScaler OS is based upon theFreeBSD operating system for management familiarity, securityhardening and extensibility. NetScaler takes complete control overmemory management, process timing and network access. Thisenables extensive optimization of the interactions that occurbetween its various processes and subsystems. NetScaler ApplicationFirewall is supported to 12 Gbps on the higher-end of the NetScalerMPX series of ADCs.

  • 8/6/2019 Site Resources Dynamic Salesdocs WP Integrated Web App Security

    8/9

    8

    A customized TCP/IP stack Control over the system scheduler isalso instrumental in maximizing the bene ts of a highly customizedTCP/IP stack. Extremely ef cient packet processing is made possibleby having scheduled states (versus interrupt-based transitions) andbeing able to eliminate numerous, intermediate packet queues.Other stack optimizations yield superior connection-handlingcapabilities (e.g., consistently fast lookup times regardless of connection volume) and enable Request Switching, a TCP/HTTPconnection multiplexing feature that signi cantly reduces the loadon downstream application servers. The customized NetScaler TCPstack prevents Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks against protected backend servers.

    Hardware-optimized SSL and FIPS NetScaler MPX leverageshardware-accelerated SSL modules from Cavium and FIPS-enabledmodels incorporate Cavium FIPS cards.

    Hardware-independence with VPX NetScaler VPX is a software-based virtual appliance that runs on off-the-shelf hardware andthe most popular server hypervisor platforms (XenServer, Hyper-Vand ESX).

    Integrated authentication and authorization NetScaler includesthe ability to integrate with RADIUS, LDAP, TACACS+,Active Directory and other authentication and authorizationdirectory services.

    Integrated SSL VPN Select NetScaler versions include Citrix Access Gateway SSL VPN capabilities for secure remote access.Support for Perl-Compatible Regular Expressions ensures thatadministration rights can be con gured not just on the basis of roles and functions or commands, but also on the basis of theentities upon which the functions are intended to operate.

    System level ACLs and AppExpert Access to NetScaler managementaddresses can be controlled via con gurable, default-enabled,system-level ACLs. Rules can be based on typical network-levelparameters, including source-destination IP address or TCP port,protocol and source MAC address. The included AppExpertfunctionality provides templates and resources for simplifying thecon guration and management of complex web applications.

    Multi-layer networking code This refers to the ability of thesystem-level ACLs to effectively act as a gatekeeper to thedeeper-level, FreeBSD management functions.

    Accounting Robust logging, optionally to an external server,provides an invaluable and preserved audit trail for administrativeactivities and system-level events.

    Application Firewall operates as an integrated component of the NetScalersystem, with all of these capabilities and their bene ts operating in concertfor comprehensive application acceleration, optimization and protection.

  • 8/6/2019 Site Resources Dynamic Salesdocs WP Integrated Web App Security

    9/9

    About Citrix

    Citrix Systems, Inc. (NASDAQ:CTXS) is a leading provider of virtual computing solutions that help companies deliver IT as anon-demand service. Founded in 1989, Citrix combines virtualization, networking, and cloud computing technologies into a fullportfolio of products that enable virtual workstyles for users and virtual datacenters for IT. More than 230,000 organizationsworldwide rely on Citrix to help them build simpler and more cost-effective IT environments. Citrix partners with over 10,000companies in more than 100 countries. Annual revenue in 2009 was $1.61 billion.

    2010 Citrix Systems, Inc. All rights reserved. Citrix , NetScaler , Application Firewall and Access Gateway are trademarks of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered in the United States Patent and Trademark Of ceand in other countries. All other trademarks and registered trademarks are property of their respective owners.

    0910

    Worldwide HeadquartersCitrix Systems, Inc.851 West Cypress Creek RoadFort Lauderdale, FL 33309, USAT +1 800 393 1888T +1 954 267 3000

    www.citrix.com

    AmericasCitrix Silicon Valley4988 Great America ParkwaySanta Clara, CA 95054, USAT +1 408 790 8000

    EuropeCitrix Systems International GmbHRheinweg 98200 Schaffhausen, SwitzerlandT +41 52 635 7700

    Asia PacifcCitrix Systems Hong Kong Ltd.Suite 6301-10, 63rd FloorOne Island East18 Westlands RoadIsland East, Hong Kong, ChinaT +852 2100 5000

    Citrix Online Division6500 Hollister AvenueGoleta, CA 93117, USAT +1 805 690 6400

    SummaryOrganizations are deploying new cloud and web applications, and continuingto support legacy web applications. The need to address a myriad of ongoing

    trends that threaten mission-critical applications by negatively impactingtheir performance and accessibility makes the deployment of applicationdelivery solutions a necessity. At the same time, prevailing conditions inrisk and regulatory environments require strategic countermeasures such asweb application rewalls to establish substantially greater degrees of application-layer security.

    Organizations have choices in how to implement these requirements. Usingmultiple, standalone devices is one path and it may even be warranted undercertain circumstances. In general, however, a better option is to take advantageof NetScaler Application Firewall as a seamlessly integrated component of the NetScaler application delivery solution. Its complementary web application

    rewall capabilities enhance the NetScaler solution at the same time that the

    rewall bene ts from the performance, reliability and network-system-levelsecurity capabilities that make NetScaler a market-leading platform forapplication delivery. The result is better overall application performance alongwith signi cantly reduced complexity and cost of ownership. With these

    exible Citrix solutions, standalone application rewalls may be upgradedvia a software license to full NetScaler application delivery solutions whenneeded; this applies to either the MPX built-for-purpose physical appliancesor the VPX virtual appliances.

    Integrated web application security White Paper