Top Banner
Application Security Rafal Chrusciel Senior Security Operations Analyst, F5 Networks [email protected]
39

Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Aug 20, 2018

Download

Documents

doankhanh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Application Security

Rafal ChruscielSenior Security Operations Analyst, F5 Networks

[email protected]

Page 2: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Agenda

• Who are we?

• Anti-Fraud

• F5 Silverline DDOS protection

• WAFaaS

• Threat intelligence & malware research

• Publications

Page 3: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Who we are?

Page 4: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

F5 SOC Organization

Vice-President

Managers

Customer Engagement Managers

Architects

DDOS Analysts

WAF Analysts

Anti-Fraud Analysts

Malware Analysts

Seattle Warsaw

Tel-Aviv

Page 5: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

F5 SOC Milestones

• 2013• Versafe acquisition

• 2014• F5 WebSafe release

• Seattle SOC launch

• Defense.net acquisition

• F5 Silverline Volumetric DDoS release

• 2015• Warsaw SOC Launch

• F5 Silverline Web Application Firewall release

• 2017• F5 Silverline WAF Express release

• Delivering 3 SOC services 24x7x365 – Silverline DDoS mitigation, Silverline WAFaaS, Anti Fraud services

Page 6: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Anti-Fraud

Page 7: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Unlimited Expert Malware AnalysisAssess damage, understand attackers and resolve vulnerabilities

• Analyzes any malware submitted including that detected by F5 Web Fraud Protection solutions

• Investigates and reports on malware includingcomponents, attributes, target, controls, purpose, etc..

• Discovers indicators of compromise

• Identifies source and level of sophistication

• Helps prevent future malware attacks and eliminate risks associated with analyzing malware

• Includes C&C shutdown services, and WebSafe C&C drop zone investigation

Specialized researchers and

analyst at your service

Always available

24x7Malware Analysis

Team

Page 8: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

BIG-IP Fraud Protection Service

Organization’s DMZ

Web

Application

Alert Server

Internet

Online Users

WebSafeComponentsVia F5 iRules

Cloud or on-premise

Internet

Page 9: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Phishing attacks

Page 10: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Malware detection

Page 11: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Citadel malware

Page 12: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

External injections detection

Page 13: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Infected computers

Page 14: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Citadel – domain availability

Page 15: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

F5 Silverline DDOS protection

Page 16: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

F5 Silverline – proxy mode

Page 17: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

F5 Silverline – routed mode

Page 18: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Volumetric attacks – real threat?

Page 19: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Mirai – DNS Water Torture

blabla.victim.comISP’S DNS SERVER

AUTHORITIVE DNS SERVER

AUTHORITIVE DNS SERVER

AUTHORITIVE DNS SERVER

Unresponsive

AUTHORITIVE DNS SERVER

IOT BOT Unresponsive

Unresponsive

Unresponsive

Page 20: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Mirai, Mirai, Mirai… Take the focusoff protocol attacks?

Page 21: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

DDoS Future

ImgSource: http://vavatech.pl/technologie/mobilne/androidImgSource: http://www.business2community.com/big-data/internet-

things-iot-going-impact-business-01572401#EcT94ktBwj7BZPYh.97

Page 22: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Silverline WAFaaS

Page 23: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

BIG-IP® Application Security Manager™

• Highest scaling & most flexible solution that provides transparent protection

from ever-changing threats

• Best DAST integration & virtual patching to reduce risks from vulnerabilities

• Deploys as a full proxy or transparent full proxy (bridge mode)

• Industries best BOT detection measures

• Secures against the OWASP top 10

BIG-IP Local Traffic Manager

BIG-IP Application Security Manager

Secure response delivered

Request made

BIG-IP ASM security policy checked

Server response generated

BIG-IP ASM applies security policy

Vulnerable application

Drop, block or forward

request

Application attack filtering &

inspection

SSL , TCP, HTTP DoS

mitigation

Response inspection for errors

and leakage of sensitive

information

BIG-IP ASM security policy checked

Page 24: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

WAF as a Service

F5 security experts proactively monitor, and fine-tune policies to protect web applications and data from new and emerging threats.

• Expert policy setup

• Policy fine-tuning

• Proactive alert monitoring

• False positives tuning

• Detection tuning

• Whitelist / Blacklist Set up and monitoring

Availability & Support

Expert Policy Setup and Management

Active Threat Monitoring

F5 Security Operations Center

Page 25: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Effective Policy Management

Step 1: Deployment

Phase

Step 2:

Building Phase

Step 3:

Learning Phase

Step 4: Enforcement

Phase:

Step 5: Continual

Tuning

On Boarding Call is

scheduled

Set up an account

Agree to an

implementation plan

Create a proxy

environment for the

application

Analyze your applications

Live traffic feeds ASM

policy builder

SOC tunes policies based

on resolutions of WAF

Violation Logs

Virtual Patching via

VA/DAST scans

Enforcement call

scheduled between

customer and SOC

Maintenance window is

established

Monitoring for False

positives

Follow call scheduled to

obtain customer sign off

Continual tuning based

on WAF Violation Logs

Resolution

Periodic calls with

customer

Repeat Steps 2-5 as

changes are made to the

application

Create and enable

baseline policy for basic

top security threats

SOC analyzes app for

security tuning per

customer specifications

Page 26: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

WAFaaS – proxy mode

Page 27: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

24x7 service, expert policy tuning

Page 28: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Web Scraping protection

Page 29: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Silverline WAF Express

• Predefined policies for different technologies

• Whitelisting available

• Low number of false-positives

• F5 SOC expertise during deployment phase

Page 30: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Threat Intelligence & Malware Research

Page 31: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

F5 Threat Monitor

Page 32: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Fraud Targets

Page 33: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

C&C Servers

Page 34: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Mobile Trojans

Page 35: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Phishing Sites

Page 36: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Threat Intelligence Statistics

Page 37: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Publications

Page 38: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

F5 Newsroom

https://f5.com/labs

Page 39: Application Security - Veracomp · BIG-IP Application Security Manager Secure response delivered Request made BIG-IP ASM security policy checked Server response generated BIG-IP ASM

Solutions for an application world.

[email protected]