Skip to main content

Simplifying Web Security

There are a bunch of Blog posts on 11/11 Cyberattack.... Threats like these help in understanding the pains and gains of planning/deploying effective web security measures....

The fundamental principles of Security - confidentiality, integrity and availability need to drive the decision making process....for securing Web Properties(Portals, ecommerce and business websites)

In my opinion, the defences need to be created at every level of the infrastructure....the key layers being:

Hardware
=======
Network
Storage
Servers
Appliances

Software
=======
Operating System
Webserver
Application server
Database server
Special appliance firmware/os

The typical threats are centered around increase in load (DoS/DDoS), compromising data (sql injection or Web server exploits) and compromising Authentication/Authorization methods.

A simple approach to deal with most of the issues is by using a 3 step approach:

1. Improve application security - Application security is turning from art form to more exact science with thier relavent calculations. this is slow and painful process of securing, reauditing and assessing the impact on the overall security posture

2. Increase Server capacity -- Methods like vmware and/Blade server environment help us to define the scale that is needed to handle sever capacity... biggest challage is to augment server capacity as soon as we see a threat. the simple Robinhood approach- to steal from peter to give it to paul... The way this works:

1: To have a Virtualization software(vmware/Xen/Virtual server) is used as a part of every server build.

2: Convert your physical servers in virtual servers and create the set of files that makes up the know good image. Keep there VM images are all of the webservers that are serving low volume content. activate the VM's behind the same load balancer...inorder to handle any suddent traffic bursts...



3. Tighten the Perimeter -- The approach here is to protect each layer of security so that some of the illegite traffic should not be able to enter....

Snort-inline - IDS/IPS
ArmorLogic - Application firewall
Fortigate - Unified threat managment

Are we home safe with all these methods... not yet...the key to responding any crisis is calmly listening/listings all the possible threats, map it to various measures undertaken to reduce the attack surface.

Comments

Popular posts from this blog

RAINing Appliances in the Clouds

Appliances always had a soft-corner in Data center and cloud strategy. My Brush with appliances started in early 2000. We were looking at soultions for traffic management and billing for small ISP. the solutions with software and hardware were quite complicated. We came across small company out of Israel called Allot Networks (www.allot.com). they did a good job in a simple way. Later at NVIDIA, I was exposed Netapp for NAS storage which quickly pivoted into block storage with iscsi. they literally gave away the iscsi protocol license for free with the box for a long time. On the network side, my Exposure was with F5 networks while managing nvidia.com. We were facing scalability issues during product launhces and driver release announcements. We tried newer players such as Array Networks and Netscaler while they were in Beta. We ended up assisting and supporting Netscaler with our feedback to evolve the product to have in-memory caching. In VMworld 2013, I have seen a emergence ...

Living a dream...five years of moving from services to lasting products.

RCV innovations has transformed from a training and consulting outfit to product based services organization.  The last five years had a see-saw effect on our existence as a viable business. We cannot forget the contributions of our mentors, early patrons and partners- Niranjan, Brad, Rakesh,Dorothy, Avik, Supriya, Sridhar, Bhaskar, Jaipal, Kishan, Joseph, Goutam, Mishra and many others. I am deeply moved by the faith some of our new customers have placed on us by adopting VAMANiT appliances for their business needs. Our team is grateful for the opportunity to serve you to the best of our ability. I am humbled by the commitment and excitement the team has shown in executing our new Nested Data center strategy. The pace at which we have trained ourselves in cutting-edge VMware vSAN and NSX technologies is noteworthy.  We are applying our VMware knowledge to Strategic and Mission critical applications by integrating energy efficient purpose built VAMANiT Nested Data ...

Information Infrastructure for Human Advancement - Vedic thought

Human Advancement is a far-cry when we are living in a world where human existence is threatened by man-made vulnerabilities. Human existence is threatened by Global warming - Natural disasters Health Crisis - Drinking water, Biodiversity/Genetically Modified Food, Virus Outbreaks Materials Crisis - Availability of Petroleum/Rare-earth for EV's (Lithium/Dyspersium) Security Crisis - Cyber Security/Data Breaches Global Political/Economic environment – Sanctions/Tariffs Purpose and Motivation Purpose of this conversation is to discuss the application of emerging technologies in information infrastructure for improving resilience of the human race and aspire for human advancement. This requires understanding key concepts of AI/Deep learning/Machine Learning, Nueromorphic computing and Pervasive computing in the context of  human interactions. There is need for a Multi-disciplinary approach involving Non-STEM and STEM(Science, Technology, Engineering and Math)...