Application Security For The Data Center
Application Security For The Data Center
SOLUTION GUIDE
SOLUTION GUIDE: WEB APPLICATION SECURITY FOR THE DATA CENTER
2
SOLUTION GUIDE: WEB APPLICATION SECURITY FOR THE DATA CENTER
The most used application-level protection features of FortiGate that malicious code is developed specifically for a single target with
and other firewalls are IP reputation and signature detection. Usually no forewarning until the malware is deployed. Signatures and IP
subscription-based services, IP reputation and attack signatures are reputation also can’t fully protect web applications from attacks
very effective measures that block attacks before any processing as many code-based vulnerabilities have almost unlimited ways to
is applied by the firewall. If an attack is from a known source or it bypass any predefined signatures.
matches a predefined signature, it is blocked automatically without In the face of these threats, Fortinet has risen to the occasion with
the firewall having to perform any further inspection. FortiGate offers purpose-built solutions to supplement the protections in firewalls
these services through our award-winning FortiGuard Labs. and IPS platforms. These include web application firewalls for
Although these are very effective to block attacks from known application security, advanced application delivery controllers (ADCs)
sources and previous attack patterns, zero-day and APTs bypass to meet the demands of secure application traffic, and sandboxing
these detection systems. In some cases APTs are so customized, integration to isolate malicious code for inspection.
PCI COMPLIANCE, FIREWALLS, AND WAFS APPLICATION THREATS: THE OWASP TOP 10
We’ve done our best to highlight the case that you’re going to Threat Firewall WAF
need more than a firewall to completely protect your applications 1 Injection (SQL, OS, and LDAP) No Yes
and data. If you’re in one of the many industries that deal in
Broken Authentication and Session
e-commerce and banking, you must consider PCI compliance 2 No Yes
Management
for your network and application security.
3 Sensitive Data Exposure Yes Yes
Although PCI DSS standards are not directly mandated by law, 4 XML External Entities (XXE) No Yes
many laws, especially at the state and local level, specifically
5 Broken Access Control No Yes
mention PCI compliance to meet legal requirements. A
firewall alone is not going to be enough. To pass PCI DSS 6.6 6 Security Misconfiguration No Yes
compliance, you’re going to need a web application firewall to 7 Cross-Site Scripting No Yes
meet all the OWASP Top 10 Application Threats that are referred 8 Insecure Deserialization No Yes
to in that section. Below is a list of the OWASP Top 10 and how
Using Components with Known
a WAF stacks up against a firewall. 9 No Yes
Vulnerabilities
10 Insufficient Logging and Monitoring No Yes
3
SOLUTION GUIDE: WEB APPLICATION SECURITY FOR THE DATA CENTER
4
SOLUTION GUIDE: WEB APPLICATION SECURITY FOR THE DATA CENTER
5
SOLUTION GUIDE: WEB APPLICATION SECURITY FOR THE DATA CENTER
FORTIADC SANDBOXING
Even with the best threat detection defenses, sometimes it’s just
best to let the code “explode” to see what it’s going to do. This
is where a sandbox comes in and acts like a bomb squad. The
suspicious code is isolated in a virtual bomb detonation chamber
and allowed to do what it was intended to do. Since the sandbox is
completely isolated from your network and applications, if the code
is malware, it’s not going to do any harm to your real environment.
Once the code is extracted and installed in the sandbox, it’s easy to
FortiADC hardware and virtual ADCs provide unmatched server examine the changes it makes to do the damage it was intended to
load balancing performance whether scaling an application across do. If it is assessed to be a threat, the malware is quarantined and
a few servers in a single data center or serving multiple applications blocked from entering your network.
to millions of users around the globe. With included SSL offloading,
HTTP compression, global server load balancing, firewall, and link FORTISANDBOX AND FORTICLOUD SANDBOX – ADVANCED
load Balancing, they offer the performance, features, and security THREAT DETECTION
needed at a single all-inclusive price.
nnL4 throughput from 500 Mbps to 60 Gbps.
nnComplete layer 4 to 7 server load balancing solution with
intelligent policy-based routing
nnWeb application firewall and IP reputation (subscriptions required)
nnScripting for custom load balancing and content rewriting rules
nnAntivirusand FortiSandbox integration to detect infections and With the increasing volume and sophistication of cyber-attacks, it
APTs in web application file attachments takes only one threat to slip through security for a data breach to
nnSSL forward proxy for increased secure traffic inspection with occur. CISOs have adopted sandboxing as an essential component
FortiGate firewalls of their security strategies to help combat previously unknown
threats.
nnQualified for Microsoft Exchange and Skype for Business
While attack surfaces are becoming more dynamic due to the rise
ADVANCED THREAT PROTECTION FOR APPLICATIONS of IoT and cloud-based services, a continuing shortage of cyber
security talent is driving organizations to integrate sandboxing with
Malware can come in any form and can be one of the most difficult
greater controls and a high degree of automation.
threats to detect. Some forms of it can be simple to detect as they
may route a user to a website to download malicious code. Newer FortiSandbox and FortiCloud Sandbox are a key parts of Fortinet’s
methods are much more obfuscated and rely on many different integrated and automated Advanced Threat Protection solution.
vectors to infect users or data center infrastructure elements. nnCritical protection against advanced and emerging threats
This complexity, combined with the almost limitless options for zero- nnAutomated sharing of threat intelligence in real time to disrupt
day malware attacks can make it almost impossible for firewalls and attacks early in the cycle without human intervention
IPS systems to detect all these threats. Additionally, many of them
nnBroad integration with Fortinet and third-party security solutions
may be buried in seemingly harmless code that in some cases may
to help protect an organization’s dynamic attack surface
take years to be fully exposed.
nnFlexible form factors to help support various industry requirements
6
SOLUTION GUIDE: WEB APPLICATION SECURITY FOR THE DATA CENTER
SUMMARY
A firewall is the first line of network defense in your data center, however many new trends that target applications and end users require
additional protections that a firewall or an IPS can’t provide. Signature-based detection, IP reputation, and deep packet inspection can stop
some of these advanced threats, but they are limited in what they can offer. Additional products like web application firewalls, application
delivery controllers, and sandboxing are needed to address these new threats to your data center and users.
Fortinet offers a wide range of products that not only complement our class-leading FortiGate firewalls, they also are designed to work
together seamlessly in Fortinet’s Security Fabric ecosystem. For more information on the products presented in this white paper, please visit
Fortinet.com.
7
SOLUTION GUIDE: WEB APPLICATION SECURITY FOR THE DATA CENTER
GLOBAL HEADQUARTERS EMEA SALES OFFICE APAC SALES OFFICE LATIN AMERICA HEADQUARTERS
Fortinet Inc. 905 rue Albert Einstein 300 Beach Road 20-01 Sawgrass Lakes Center
899 Kifer Road 06560 Valbonne The Concourse 13450 W. Sunrise Blvd., Suite 430
Sunnyvale, CA 94086 France Singapore 199555 Sunrise, FL 33323
United States Tel: +33.4.8987.0500 Tel: +65.6513.3730 Tel: +1.954.368.9990
Tel: +1.408.235.7700
www.fortinet.com/sales
Copyright © 2018 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law
trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other
results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied,
except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in
such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal
lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most
current version of the publication shall be applicable. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this
publication without notice, and the most current version of the publication shall be applicable. February 23, 2018 8:19 AM
Mac:Users:susiehwang:Desktop:Egnyte:Egnyte:Shared:Creative Services:Team:Susie-Hwang:Egnyte:Shared:CREATIVE SERVICES:Team:Susie-Hwang:SG-WebAppSec:SG-WebAppSec