0% found this document useful (0 votes)
23 views8 pages

Application Security For The Data Center

Uploaded by

abery.au
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views8 pages

Application Security For The Data Center

Uploaded by

abery.au
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

WEB APPLICATION SECURITY

FOR THE DATA CENTER


Securing Applications From Threats Requires An
Integrated Solution That Enhances Enterprise Firewall
And Intrusion Prevention Technologies

SOLUTION GUIDE
SOLUTION GUIDE: WEB APPLICATION SECURITY FOR THE DATA CENTER

INTRODUCTION vulnerability scanning provider, noted that in 2016, 55% of their


customers’ websites have at least one critical vulnerability that can
Most organizations focus their limited resources on locking
be exploited for an attack.
down access and controlling their networks to protect their data
centers from external threats. The latest generation of enterprise
PROTECTING APPLICATIONS FROM APTS
firewalls and intrusion prevention systems (IPS) primarily focus on
securing the network and controlling access to it. These are great APTs are custom-developed, targeted attacks. They can evade
technologies, however there are limits to what they can offer to straightforward detection, using previously unseen (or “zero-day”)
provide complete protection against threats that target applications, malware, exploit vulnerabilities (unpatched security holes), and come
application services, and users. from brand-new or seemingly innocent hosting URLs and IPs. Their
goal is to compromise their target system with advanced code
As soon as an application is opened to the Internet, it is a target.
techniques that attempt to circumvent security barriers and stay
All that stands between an attacker and an organization’s sensitive
under the radar as long as possible.
data is an unassuming login screen. No matter how many layers
of network security are in place, this entry point could expose Web-based applications can be a significant vector in APTs. Many
customer data, proprietary information, or sensitive financial web applications allow the uploading of files that could be risks.
information if the application hasn’t been hardened or protected by Antivirus scans can check for previously identified attack types,
some other means. however APTs generally are tailored to circumvent traditional AV
detection and many slip past this first line of defense.
In this solution guide we’ll explore the top challenges organizations
face when it comes to securing applications and the data they host,
SECURE APPLICATION TRAFFIC GROWTH
including web application vulnerabilities, advanced persistent threats
(APTs), and scaling application encryption. Although not a threat, many enterprises are aggressively expanding
SSL to all their web-facing applications. Even seemingly benign
APPLICATIONS ARE EASY TARGETS applications are getting the “secure” treatment in order to patch
known or unknown vulnerabilities to other more important systems.
There is no question that a firewall is your first line of defense for
Sandvine’s Encrypted Traffic Report 2016 saw encrypted traffic
network security. Today’s latest firewall technologies are almost
volume increase to 30 percent in 2015 and estimated 50 percent
bulletproof, at least at the layer 2 and 3 levels. Attackers and cyber
growth in 2016. Combined with this explosive expansion in traffic,
criminals know this and have had to adapt their techniques. Not
the complexity of moving to more advanced encryption keys as the
that they won’t try to look for firewall vulnerabilities, rather they
technology expands from 1,024 keys to 2,048 and now 4,096, is
know that high-value targets like financial institutions, retailers, and
doubling and even quadrupling secure packet sizes. Servers and
government agencies have tightened their security policies and the
load balancers are struggling to keep up with this demand using
days of easy data breaches at the firewall are over.
today’s current crop of secure application delivery solutions.
The fastest growing categories of attacks and data breaches
are those that target applications, and application layer services. COMPLETE APPLICATION SECURITY EXTENDS
These represent many of the remaining weak spots and there are PAST THE FIREWALL
countless possibilities to exploit code vulnerabilities, and application
Each of the areas presented in the previous section provide unique
modules.
challenges that need more than a firewall or an IPS to completely
address. Most firewall and IPS systems today, including our
WEB APPLICATION ATTACKS
FortiGate product line, have features that can solve many of these
Verizon’s 2017 Data Breach Investigations Report revealed that over new problems. However, in general they are limited to signature
40 percent of all data breaches were caused by web application detection and need additional solutions to provide complete
vulnerabilities. The Open Web Application Security Project (OWASP) protection for unknown and zero-day attacks. FortiGate has many
has consistently reported since 2010 that almost every web-based services that can be enabled such as deep packet inspection
application has one or more vulnerabilities listed in their Top 10 list and data loss prevention (DLP), but even with those, there are
of application security risks. They have also reported that 95 percent still loopholes and there are performance impacts that need to be
of all websites are attacked annually using cross-site scripting and considered in enterprise deployments.
injection techniques. Acunetix, an industry leading web application

2
SOLUTION GUIDE: WEB APPLICATION SECURITY FOR THE DATA CENTER

The most used application-level protection features of FortiGate that malicious code is developed specifically for a single target with
and other firewalls are IP reputation and signature detection. Usually no forewarning until the malware is deployed. Signatures and IP
subscription-based services, IP reputation and attack signatures are reputation also can’t fully protect web applications from attacks
very effective measures that block attacks before any processing as many code-based vulnerabilities have almost unlimited ways to
is applied by the firewall. If an attack is from a known source or it bypass any predefined signatures.
matches a predefined signature, it is blocked automatically without In the face of these threats, Fortinet has risen to the occasion with
the firewall having to perform any further inspection. FortiGate offers purpose-built solutions to supplement the protections in firewalls
these services through our award-winning FortiGuard Labs. and IPS platforms. These include web application firewalls for
Although these are very effective to block attacks from known application security, advanced application delivery controllers (ADCs)
sources and previous attack patterns, zero-day and APTs bypass to meet the demands of secure application traffic, and sandboxing
these detection systems. In some cases APTs are so customized, integration to isolate malicious code for inspection.

PCI COMPLIANCE, FIREWALLS, AND WAFS APPLICATION THREATS: THE OWASP TOP 10

We’ve done our best to highlight the case that you’re going to Threat Firewall WAF
need more than a firewall to completely protect your applications 1 Injection (SQL, OS, and LDAP) No Yes
and data. If you’re in one of the many industries that deal in
Broken Authentication and Session
e-commerce and banking, you must consider PCI compliance 2 No Yes
Management
for your network and application security.
3 Sensitive Data Exposure Yes Yes
Although PCI DSS standards are not directly mandated by law, 4 XML External Entities (XXE) No Yes
many laws, especially at the state and local level, specifically
5 Broken Access Control No Yes
mention PCI compliance to meet legal requirements. A
firewall alone is not going to be enough. To pass PCI DSS 6.6 6 Security Misconfiguration No Yes
compliance, you’re going to need a web application firewall to 7 Cross-Site Scripting No Yes
meet all the OWASP Top 10 Application Threats that are referred 8 Insecure Deserialization No Yes
to in that section. Below is a list of the OWASP Top 10 and how
Using Components with Known
a WAF stacks up against a firewall. 9 No Yes
Vulnerabilities
10 Insufficient Logging and Monitoring No Yes

3
SOLUTION GUIDE: WEB APPLICATION SECURITY FOR THE DATA CENTER

APPLICATION SECURITY SOLUTIONS


Fortinet is much more than our enterprise-class FortiGate firewalls. We offer many solutions WEB APPLICATION
that provide network and application security for a data center. The following section covers SECURITY THREATS
many of the advanced threats and challenges that data centers face today along with the nnPublic facing applications are
solutions offered by Fortinet. For more details on the products presented, white papers, attractive targets
case studies and other useful information, please visit Fortinet.com.
nnSensitivecustomer and proprietary
data exposed
nnAlmost every web application has
vulnerabilities
nnFirewalls
and IPS can only detect
known threats
nn95 percent of all websites have
experienced cross-site scripting and
SQL injection attacks

WEB APPLICATION VULNERABILITY PROTECTION


Web applications are attractive targets to hackers as they are public-facing applications
that require being open to the Internet. As many provide major e-commerce and business-
driving tools, they can contain cardholder, company, and other sensitive data.
Perimeter security technologies such as IPS and firewalls have focused on network and
transport layer attacks. Many vendors, including Fortinet have added application layer
enhancements, usually referred to as “Deep Packet Inspection” (DPI) to extend signature
detection to the application layer. Although DPI is useful in protecting against attacks on the
web server infrastructure (IIS, Apache, etc.), it cannot protect against attacks on custom
web application code such as HTML and SQL.

WEB APPLICATION FIREWALLS (WAFS)


Securing web applications requires a completely different approach than signature detection
alone. Only a web application firewall can provide complete application protection by
understanding application logic and what elements exist on the web application such as
URLs, parameters, and what cookies it uses. Using behavioral monitoring of application
usage, the WAF can deeply inspect every application in your data center to build a baseline
of normal behaviors and trigger actions to protect your applications when anomalies arise
from attacks.

4
SOLUTION GUIDE: WEB APPLICATION SECURITY FOR THE DATA CENTER

FORTIWEB WEB APPLICATION FIREWALLS


SECURE APPLICATION
TRAFFIC GROWTH
nnMost organizations rapidly deploying
SSL to protect all applications
nnSecure traffic growing at rapid rate
nnApplication delivery infrastructure
strained to keep up
FortiWeb Web Application Firewalls provide specialized, layered web application threat
protection for medium/large enterprises, application service providers, and SaaS providers. nnFirewalls usually have limited
FortiWeb Web Application Firewalls protect web-based applications and Internet-facing data application delivery functionality
from attacks and breaches. Using advanced techniques it provides bidirectional protection nnExpansion of complex encryption
against malicious sources, DoS attacks, and sophisticated threats such as SQL injection, keys (2,048 and 4,096) put increased
cross-site scripting, buffer overflows, file inclusion, cookie poisoning, and numerous other demands on data center resources
attack types.
nnWAF throughputs ranging from 25 Mbps to 20 Gbps
nnMultiple, correlated threat detection methods include protocol validation, behavioral
identification, FortiGate quarantined IP polling, and subscription-based FortiGuard IP
reputation, antivirus and web attack signatures
nnIncluded vulnerability scanner and support for virtual patching with third-party scanner
integration
nnSandbox integration for protection from Advanced Persistent Threats
nnSimplified deployment with automatic setup tools and integration with FortiGate

SECURE APPLICATION DELIVERY


Users have come to expect applications to be there when they need them and to respond
immediately. It is a given now that they also expect that you are protecting their and your
organization’s sensitive data. In order to provide the security that almost every application
needs, data center managers are deploying SSL on almost every application, however this
comes at a cost in user capacities, speed, and latency.
As mentioned previously, the trend in secure traffic growth will strain even the best-
architected data centers to keep up with this demand. Coupled with this is that SSL
encryption keys are getting more complicated as they expand from the older 1,024-bit keys
to 2,048, and now 4,096.

ADCS WITH SSL OFFLOADING


Application Delivery Controllers (ADCs) offer the feature to offload SSL traffic from servers to
the ADC itself. Most manufacturers can do this using software encryption and decryption,
however only hardware-accelerated appliances have the dedicated ASIC processors to
handle the speeds of a modern data center. Most software-based devices can handle a few
hundred to a few thousand transactions per second vs. hardware-based appliances that
can manage tens-of-thousands of secure transactions per second.
By offloading this processor-intensive traffic from the servers to the ADC, secure
applications can scale up to 100 times while at the same time reducing response rates for
end users.

5
SOLUTION GUIDE: WEB APPLICATION SECURITY FOR THE DATA CENTER

FORTIADC SANDBOXING
Even with the best threat detection defenses, sometimes it’s just
best to let the code “explode” to see what it’s going to do. This
is where a sandbox comes in and acts like a bomb squad. The
suspicious code is isolated in a virtual bomb detonation chamber
and allowed to do what it was intended to do. Since the sandbox is
completely isolated from your network and applications, if the code
is malware, it’s not going to do any harm to your real environment.
Once the code is extracted and installed in the sandbox, it’s easy to
FortiADC hardware and virtual ADCs provide unmatched server examine the changes it makes to do the damage it was intended to
load balancing performance whether scaling an application across do. If it is assessed to be a threat, the malware is quarantined and
a few servers in a single data center or serving multiple applications blocked from entering your network.
to millions of users around the globe. With included SSL offloading,
HTTP compression, global server load balancing, firewall, and link FORTISANDBOX AND FORTICLOUD SANDBOX – ADVANCED
load Balancing, they offer the performance, features, and security THREAT DETECTION
needed at a single all-inclusive price.
nnL4 throughput from 500 Mbps to 60 Gbps.
nnComplete layer 4 to 7 server load balancing solution with
intelligent policy-based routing
nnWeb application firewall and IP reputation (subscriptions required)
nnScripting for custom load balancing and content rewriting rules
nnAntivirusand FortiSandbox integration to detect infections and With the increasing volume and sophistication of cyber-attacks, it
APTs in web application file attachments takes only one threat to slip through security for a data breach to
nnSSL forward proxy for increased secure traffic inspection with occur. CISOs have adopted sandboxing as an essential component
FortiGate firewalls of their security strategies to help combat previously unknown
threats.
nnQualified for Microsoft Exchange and Skype for Business
While attack surfaces are becoming more dynamic due to the rise
ADVANCED THREAT PROTECTION FOR APPLICATIONS of IoT and cloud-based services, a continuing shortage of cyber
security talent is driving organizations to integrate sandboxing with
Malware can come in any form and can be one of the most difficult
greater controls and a high degree of automation.
threats to detect. Some forms of it can be simple to detect as they
may route a user to a website to download malicious code. Newer FortiSandbox and FortiCloud Sandbox are a key parts of Fortinet’s
methods are much more obfuscated and rely on many different integrated and automated Advanced Threat Protection solution.
vectors to infect users or data center infrastructure elements. nnCritical protection against advanced and emerging threats
This complexity, combined with the almost limitless options for zero- nnAutomated sharing of threat intelligence in real time to disrupt
day malware attacks can make it almost impossible for firewalls and attacks early in the cycle without human intervention
IPS systems to detect all these threats. Additionally, many of them
nnBroad integration with Fortinet and third-party security solutions
may be buried in seemingly harmless code that in some cases may
to help protect an organization’s dynamic attack surface
take years to be fully exposed.
nnFlexible form factors to help support various industry requirements

6
SOLUTION GUIDE: WEB APPLICATION SECURITY FOR THE DATA CENTER

INTEGRATED APPLICATION SECURITY WITH THE FORTINET SECURITY FABRIC


Only Fortinet can offer the security, performance, and integration for a total network and application security solution that can meet the
needs of your data center. Starting with the award-winning FortiGate firewall as a foundation, Fortinet offers the additional products and
services you need to provide complete protection that goes beyond firewalls to protect your applications, users, and sensitive data.
No matter how complex your needs are, a comprehensive Fortinet security solution that includes WAF, application delivery, and sandbox
integration is easy to setup and manage. We provide you the tools you need to centrally manage your Fortinet solutions and tools for
consolidated threat analysis and reporting.

SUMMARY
A firewall is the first line of network defense in your data center, however many new trends that target applications and end users require
additional protections that a firewall or an IPS can’t provide. Signature-based detection, IP reputation, and deep packet inspection can stop
some of these advanced threats, but they are limited in what they can offer. Additional products like web application firewalls, application
delivery controllers, and sandboxing are needed to address these new threats to your data center and users.
Fortinet offers a wide range of products that not only complement our class-leading FortiGate firewalls, they also are designed to work
together seamlessly in Fortinet’s Security Fabric ecosystem. For more information on the products presented in this white paper, please visit
Fortinet.com.

7
SOLUTION GUIDE: WEB APPLICATION SECURITY FOR THE DATA CENTER

GLOBAL HEADQUARTERS EMEA SALES OFFICE APAC SALES OFFICE LATIN AMERICA HEADQUARTERS
Fortinet Inc. 905 rue Albert Einstein 300 Beach Road 20-01 Sawgrass Lakes Center
899 Kifer Road 06560 Valbonne The Concourse 13450 W. Sunrise Blvd., Suite 430
Sunnyvale, CA 94086 France Singapore 199555 Sunrise, FL 33323
United States Tel: +33.4.8987.0500 Tel: +65.6513.3730 Tel: +1.954.368.9990
Tel: +1.408.235.7700
www.fortinet.com/sales

Copyright © 2018 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law
trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other
results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied,
except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in
such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal
lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most
current version of the publication shall be applicable. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this
publication without notice, and the most current version of the publication shall be applicable. February 23, 2018 8:19 AM
Mac:Users:susiehwang:Desktop:Egnyte:Egnyte:Shared:Creative Services:Team:Susie-Hwang:Egnyte:Shared:CREATIVE SERVICES:Team:Susie-Hwang:SG-WebAppSec:SG-WebAppSec

You might also like