Skip to main content

Simplifying Web Security

There are a bunch of Blog posts on 11/11 Cyberattack.... Threats like these help in understanding the pains and gains of planning/deploying effective web security measures....

The fundamental principles of Security - confidentiality, integrity and availability need to drive the decision making process....for securing Web Properties(Portals, ecommerce and business websites)

In my opinion, the defences need to be created at every level of the infrastructure....the key layers being:

Hardware
=======
Network
Storage
Servers
Appliances

Software
=======
Operating System
Webserver
Application server
Database server
Special appliance firmware/os

The typical threats are centered around increase in load (DoS/DDoS), compromising data (sql injection or Web server exploits) and compromising Authentication/Authorization methods.

A simple approach to deal with most of the issues is by using a 3 step approach:

1. Improve application security - Application security is turning from art form to more exact science with thier relavent calculations. this is slow and painful process of securing, reauditing and assessing the impact on the overall security posture

2. Increase Server capacity -- Methods like vmware and/Blade server environment help us to define the scale that is needed to handle sever capacity... biggest challage is to augment server capacity as soon as we see a threat. the simple Robinhood approach- to steal from peter to give it to paul... The way this works:

1: To have a Virtualization software(vmware/Xen/Virtual server) is used as a part of every server build.

2: Convert your physical servers in virtual servers and create the set of files that makes up the know good image. Keep there VM images are all of the webservers that are serving low volume content. activate the VM's behind the same load balancer...inorder to handle any suddent traffic bursts...



3. Tighten the Perimeter -- The approach here is to protect each layer of security so that some of the illegite traffic should not be able to enter....

Snort-inline - IDS/IPS
ArmorLogic - Application firewall
Fortigate - Unified threat managment

Are we home safe with all these methods... not yet...the key to responding any crisis is calmly listening/listings all the possible threats, map it to various measures undertaken to reduce the attack surface.

Comments

Popular posts from this blog

ForeThought -- Global directory service for the Digital world

ForeThought Real world is full of people. We have phone books,yellow pages, maps and postal addresses to get to them. Real world is governed by laws, rules and norms. Digital world is full of devices and devices only(severs, desktops, appliances, gadgets etc..) In the digital world, We have DNS, IP Addresses/SMTP mail address, Routers/gateways. All of these methods are still rudimentery to lookup and locate attributes, features and functions of devices. Most devices serve a useful purpose. some of them are misused to inflict pain and damage in the digital world. Clear knowledge attributes, features and functions of devices can hel in reducing the risk and help us in responding to misuse of these devices. An idea of a Global Directory Service -- for locating Devices worldwide....These devices are attributed to People, Resources and Services.... This type of service can help in Asset tracking, Monitoring, Communications, Incident response, forensics and Da...

Blueprint for a new ITaaS Service Provider

Cloud computing is raising the expectation on the agility, availability and access to sophisticated computing and communication platforms for small and medium business. Today most critical IT components for running a successful business are available as SaaS, PaaS or IaaS platforms. There is little value in recreating all these services from the scratch by a new age service provider. It may be prudent to create a skeletal platform for essential services while taking a position of services broker to organize a rich portfolio by aggregating important services into tightly knit IT-as-a –Service offering. The initial target market for such a service provider is Small and Medium Business. We will review aspirations and capabilities needed to serve the ever increasing expectations of small and medium customers from a modern service provider. The Vision, Strategy and Execution plan to create a modern Information Technology as a Service (ITaaS) provider infrastructure is described on the...

RAINing Appliances in the Clouds

Appliances always had a soft-corner in Data center and cloud strategy. My Brush with appliances started in early 2000. We were looking at soultions for traffic management and billing for small ISP. the solutions with software and hardware were quite complicated. We came across small company out of Israel called Allot Networks (www.allot.com). they did a good job in a simple way. Later at NVIDIA, I was exposed Netapp for NAS storage which quickly pivoted into block storage with iscsi. they literally gave away the iscsi protocol license for free with the box for a long time. On the network side, my Exposure was with F5 networks while managing nvidia.com. We were facing scalability issues during product launhces and driver release announcements. We tried newer players such as Array Networks and Netscaler while they were in Beta. We ended up assisting and supporting Netscaler with our feedback to evolve the product to have in-memory caching. In VMworld 2013, I have seen a emergence ...