20
Share this eBook The Future of Web Security 10 Things Every Web Application Firewall Should Provide

10 Things Every WAF Should Provide [eBook]

  • Upload
    imperva

  • View
    3.791

  • Download
    0

Embed Size (px)

DESCRIPTION

Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Why? (1) Hackers evade traditional network security defenses to take down Websites and to steal data. (2) Malicious users probe Websites around-the-clock looking for vulnerabilities. (3) And, Automation tools such as off-the-shelf attack toolkits and botnets make it easy to execute large-scale attacks. Web application firewalls have become the central platform for protecting applications against all online threats. This eBook explains in detail the 10 features that every Web application firewall should provide.

Citation preview

Page 2: 10 Things Every WAF Should Provide [eBook]

Share this eBook

Contents

THE FUTURE OF WEB SECURITY EBOOK

SECTION 1: The Future of Web Security

SECTION 2: Why Traditional Network Security Fails

SECTION 3: Why Web Application Firewalls Succeed

SECTION 4: 10 Things Every Web Application Firewall Should Provide

SECTION 5: Additional Resources

SECTION 6: About Imperva

Page 3: 10 Things Every WAF Should Provide [eBook]

Share this eBook

The Future of Web Security

OVER 50% of organizations experienced a Web application breach in the past year. Many of these incidents led to severe financial losses.

- Infosecurity Magazine, citing Forrester Consulting

Page 4: 10 Things Every WAF Should Provide [eBook]

Share this eBook

The Future of Web Security

Securing Web applications against cybercriminals, hacktivists, and state-sponsored attackers is a never-ending effort. Why?

Time and again, organizations that rely solely on network security solutions to protect their applications have seen their Websites breached.

HACKERS EVADE TRADITIONAL NETWORK SECURITY DEFENSES TO TAKE

DOWN WEBSITES AND TO STEAL DATA

MALICIOUS USERS PROBE WEBSITES

AROUND-THE-CLOCK LOOKING FOR VULNERABILITIES

AUTOMATION TOOLS

SUCH AS OFF-THE-SHELF ATTACK TOOLKITS AND

BOTNETS MAKE IT EASY TO EXECUTE LARGE-SCALE ATTACKS

Page 5: 10 Things Every WAF Should Provide [eBook]

Share this eBook

The Future of Web Security

Web application firewalls have become the central platform for protecting applications against all online threats.

TECHNICAL WEB ATTACKS

SQL INJECTION

CROSS-SITE SCRIPTING

REMOTE FILE INCLUSION

BUSINESS LOGIC ATTACKS

DISTRIBUTED DENIAL-OF-SERVICE

SITE SCRAPING

BRUTE-FORCE ATTACKS

COMMENT SPAMMING

ONLINE FRAUD ATTACKS

MALWARE

IDENTITY THEFT

ACCOUNT TAKEOVER

Page 6: 10 Things Every WAF Should Provide [eBook]

Share this eBook

Why Traditional Network Security Fails

TRADITIONAL NETWORK SECURITY SOLUTIONS

CANNOT detect cookie, session, or parameter tampering

attacks

CANNOT stop fraudulent devices

or business logic attacks

CANNOT block attacks that exploit custom Web application

vulnerabilities

Page 7: 10 Things Every WAF Should Provide [eBook]

Share this eBook

Why Web Application Firewalls Succeed

WEB APPLICATION FIREWALLS

CAN detect cookie, session, or parameter tampering

attacks

CAN stop fraudulent devices

or business logic attacks

CAN block attacks that exploit custom Web application

vulnerabilities

Page 8: 10 Things Every WAF Should Provide [eBook]

Share this eBook

10 Things Every Web Application Firewall Should Do

#1 Requirement: Detect Unusual Requests

#2 Requirement: Stay in Front of Hackers

#3 Requirement: Thwart Evasion Techniques

#4 Requirement: Prevent Automated Attacks and Shut Down Bots

#5 Requirement: Recognize Known Malicious Sources

#6 Requirement: Virtually Patch Vulnerabilities

#7 Requirement: Stop Fraud Malware

#8 Requirement: Stop Fraudulent Transactions

#9 Requirement: Support On Premise and Cloud Deployments

#10 Requirement: Streamline and Scale Operations

Page 9: 10 Things Every WAF Should Provide [eBook]

Share this eBook

Advanced, custom Web attacks outpace signatures.

YOUR WAF MUST Detect Unusual Requests- Understand the protected application including URLs, parameters, and cookies

- Inspect parameter values for special characters and recognize when these characters

are expected or indicative of an attack

- Learn application changes without manual intervention

“Input validation is the single best defense against injection and XSS vulnerabilities.”

– BRENT HUSTON, State of Security

CHALLENGE #1

Page 10: 10 Things Every WAF Should Provide [eBook]

Share this eBook

Threats to online applications continue to evolve.

CHALLENGE #2

A WAF should “automatically receive and apply dynamic signature updates from a vendor or other source.”

– Recommended WAF capability in the PCI DSS

Information Supplement: Application Reviews and

Web Application Firewalls Clarified

YOUR WAF MUST Stay in Front of Hackers- Leverage live attack, reputation, and fraud data to identify active attacks and

the attackers

- Provide automatic updates to security signatures, policies, reputation data,

and fraud intelligence

Page 11: 10 Things Every WAF Should Provide [eBook]

Share this eBook

CHALLENGE #3

Stop Web attacks without blocking legitimate traffic.

“Web application firewalls must deliver more sophisticated control at the application layer through a variety of contextual rule sets and behavioral analysis.”

– SANDRA KAY MILLER, Core of the Matter,

Information Security Magazine

YOUR WAF MUST thwart Evasion Techniques- Examine multiple attack indicators with an analytics engine and block attacks

without false positives

- Compare requests over time to detect repetitive attacks, such as brute-force

login or DDoS attacks

Page 12: 10 Things Every WAF Should Provide [eBook]

Share this eBook

Protect applications from automated attacks.

CHALLENGE #4

YOUR WAF MUST Prevent Automated Attacks and Shut Down Bots- Analyze browser capabilities to distinguish bots from legitimate Web browsers

- Detect an excessive number of Web requests in a short period of time

Page 13: 10 Things Every WAF Should Provide [eBook]

Share this eBook

Identify malicious users or illicit sites before the damage is done.

YOUR WAF MUST Recognize Known Malicious Sources- Recognize users referred from a phishing site

- Link to a cloud-based community defense that shares accurate, live information about hackers, bots, and fraudsters

CHALLENGE #5

- Detect access from anonymous proxies and Tor networks

- Restrict access by location to eliminate unwanted traffic and to thwart DDoS attacks originating from a specific country

Page 14: 10 Things Every WAF Should Provide [eBook]

Share this eBook

Patch vulnerabilities that could leave applications exposed for days or months.

- Prevent attempts to exploit application vulnerabilities

- Provide input validation, HTTP protocol validation, and attack signatures

that can block most vulnerability exploits out-of-the-box

- Integrate with application scanners and build custom policies to ensure

strict security measures are applied to known application vulnerabilities

YOUR WAF MUST Virtually Patch Vulnerabilities

CHALLENGE #6

“Web Application Firewalls genuinely raise the bar on application security…they ‘virtually’ patch the application faster than code fixes can be implemented.”

– ADRIAN LANE, Securosis

Page 15: 10 Things Every WAF Should Provide [eBook]

Share this eBook

Detect users infected with malware.

YOUR WAF MUST Stop Fraud Malware- Analyze end user attributes and Web traffic patterns for the tell-tale signs of malware infection and then block

malware-infected devices

- Monitor a suspect user for a specified period of time, generate an alert, or integrate with a fraud management solution to

open an investigation case

CHALLENGE #7

Page 16: 10 Things Every WAF Should Provide [eBook]

Share this eBook

Fortify applications against fraudulent transactions.

YOUR WAF MUST Stop Fraudulent Transactions- Mitigate payment and new account fraud without requiring application changes

- Integrate with cloud-based fraud security solutions to extract and analyze a number of

user and transaction attributes including browser irregularities, known fraudulent devices,

and suspicious payment information

- Correlate fraud risk data with Web attack and user information to accurately identify and

stop fraud

CHALLENGE #8

VINA5255 1100 4476 0030

VINA5255 1100 4476 0030

VINA5255 1100 4476 0030

VINA5255 1100 4476 0030

VINA5255 1100 4476 0030

VINA5255 1100 4476 0030

VINA5255 1100 4476 0030

VINA5255 1100 4476 0030

VINA5255 1100 4476 0030

VINA5255 1100 4476 0030

VINA5255 1100 4476 0030

VINA5255 1100 4476 0030

“A layered fraud prevention approach provides defense in depth, and it is the best policy for preventing and containing losses that result from today’s and tomorrow’s threats.”

– AVIVAH LITAN, Gartner

Page 17: 10 Things Every WAF Should Provide [eBook]

Share this eBook

Support diverse application architectures.

YOUR WAF MUST Support On Premise and Cloud Deployments- Maintain flexible, inline and non-inline configuration options that support unique on

premise requirements

- Support virtual appliance solutions for private clouds and cloud-based security services

CHALLENGE #9

“Cloud-based security services offer an easy and effective way to make websites faster and protect websites against hackers and bots.”

– LAWRENCE PINGREE, Gartner

Page 18: 10 Things Every WAF Should Provide [eBook]

Share this eBook

Manage multiple Web application firewalls.

YOUR WAF MUST Streamline and Scale Operations- Incorporate point-and-click security policies

- Provide centralized management for synchronized policies and application profiles across all Web application firewalls,

even those in separate locations

- Deliver detailed, actionable security event information

CHALLENGE #10

Page 20: 10 Things Every WAF Should Provide [eBook]

Share this eBook

Imperva Headquarters3400 Bridge Parkway, Suite 200

Redwood Shores, CA 94065Tel: +1-650-345-9000Fax: +1-650-345-9004

Toll Free (U.S. only): +1-866-926-4678www.imperva.com

© Copyright 2013 Imperva, Inc. All rights reserved. Imperva, the Imperva logo and SecureSphere are trademarks of Imperva, Inc. All other brand or product names are trademarks or registered trademarks of their respective holders.

About Imperva

Imperva is a pioneer and leader of a new category of business security solutions for critical

applications and high-value data in the data center. Imperva’s award-winning solutions

protect against data theft, insider abuse, and fraud while streamlining regulatory compliance

by monitoring and controlling data usage and business transactions across the data center, from

storage in a database or on a file server to consumption through applications.

LEARN MORE

Find Us on the Web | Contact Us Direct | Read our Blog