Top Banner
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation OWASP http://www.owasp.org SOA Security <Iris Levari> <OWASP role> <Amdocs> <[email protected]> <12/3/07>
37

SOA Security

Dec 30, 2015

Download

Documents

ryder-lindsay

SOA Security. . . Agneda. What Is SOA SOA life cycle & Security SOA Generated Security Concerns / opportunities SSO & SSO Federation WS Security Standard. Agneda. What Is SOA SOA life cycle & Security - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: SOA Security

Copyright © The OWASP FoundationPermission is granted to copy, distribute and/or modify this document under the terms of the OWASP License.

The OWASP Foundation

OWASP

http://www.owasp.org

SOA Security

<Iris Levari><OWASP role><Amdocs><[email protected]>

<12/3/07>

Page 2: SOA Security

2OWASP

Agneda

What Is SOA SOA life cycle & Security SOA Generated Security Concerns /

opportunities SSO & SSO Federation WS Security Standard

Page 3: SOA Security

3OWASP

Agneda

What Is SOA SOA life cycle & Security SOA Generated Security Concerns /

opportunities SSO & SSO Federation WS Security Standard

Page 4: SOA Security

4OWASP

SOA Example

Page 5: SOA Security

5OWASP

SOA Key Terms

Page 6: SOA Security

6OWASP

SOA - Service Oriented Architecture

Business processes oriented architecture Decomposing business processes into

discreet functional units = services Existing or new business functionalities are

grouped into atomic business services Evolution of distributed computing and

modular programming driven by newly emergent business requirements

Application development focused on implementing business logic

Page 7: SOA Security

7OWASP

Service Properties

Service isLoosely coupledHigh-level granularitySelf describing Hardware or software platform interoperabilityDiscoverableService can be composed of other services Context-independent

Page 8: SOA Security

8OWASP

Service Oriented Architecture - Advantages & Disadvantages

Advantages Maximize reuseReduce integration costFlexible & easily changed to reflect business

process change

ShortcomingsMessage handling and parsingLegacy application services wrappingComplex service design and implementation

Page 9: SOA Security

9OWASP

SOA Example

Page 10: SOA Security

10OWASP

Agneda

What Is SOASOA life cycle & Security SOA Generated Security Concerns /

opportunities SSO & SSO Federation WS Security Standard

Page 11: SOA Security

11OWASP

Business-Driven Development Methodology

Page 12: SOA Security

12OWASP

Security Encompasses all life cycle aspects

Page 13: SOA Security

13OWASP

Agneda

What Is SOA SOA life cycle & SecuritySOA Generated Security Concerns /

opportunities SSO & SSO Federation WS Security Standard

Page 14: SOA Security

14OWASP

New Security Threats

SOA Introduces the following new security threats:Services to be consumed by entities outside of

the local trust domainConfidential data passes the domain’s trust

boundaries Authentication and authorization data is

communicated to external trust domainsSecurity must be enforced across the trust

domain Managing user and service identities

Page 15: SOA Security

15OWASP

Security Considerations

The propagation of users and services across domain trust boundaries

The need to seamlessly connect to other organizations on a real-time transactional basis

Security controls for each service and service combinations

Managing identity and security across a range of systems and services with a mix of new and old technologies

Protecting business data in transit and at rest Compliance with corporate industry & regulatory

standards Composite services

Page 16: SOA Security

16OWASP

New Techniques In Integration Security

SOA introduces new techniques In integration securityMessage level security vs. transport level

security Converting security enforcement into a serviceDeclarative & policy-based security

Page 17: SOA Security

17OWASP

Message Level Security vs. Transport Level Security

Transport level security (SSL/VPN)Point-to-point message exchangeEncrypts the entire messageSender must trust all intermediariesRestricts protocols that can be used (i.e. https)

Message level securityEnd-to-end security Different message fields within the same

message should be read by different entities

Page 18: SOA Security

18OWASP

Transport Layer Security

Page 19: SOA Security

19OWASP

Security in the Message

ReceiverSenderSender IntermediaryIntermediary ReceiverReceiver

Security Context

|||

Security Context

|||

HTTP security (SSL) is point-to-point

WS-Security provides context over multiple end points.

ReceiverSenderSender IntermediaryIntermediary ReceiverReceiver

Security ContextSecurity Context

Page 20: SOA Security

20OWASP

Transport Security For Web Services Pros and Cons

Pros Cons

Mature: SSL/VPN Point to point: messages are in the clear after reaching SSL endpoint

Supported by most servers and clients

Waypoint visibility: can’t have partial visibility into the message parts

Understood by most system administrators

Granularity

Simpler Transport dependant: applies only to HTTP

Page 21: SOA Security

21OWASP

Message Security For Web Services Pros And Cons

Pros Cons

Persistent message self-protecting

Encompasses many other standards including XML encryption, XML signature, X.509 certificates and more

Portions of the message can be secured to different parties

Different security policies can be applied to request and respond transport

Page 22: SOA Security

23OWASP

Message Level Security (example)

integration of a brokerage and a bank. An investor securely attaches authorization to withdraw funds from a

bank account to the trading request submitted to the brokerage. The attached authorization is secured from

everyone, including the brokerage. Only the bank read it and make use of it.

Page 23: SOA Security

24OWASP

Converting Security into a Service

Security services provide service such as:AuthenticationAuthorization

Message servicesEncryption decryption SigningVerificationSignaturesLog messages scrub messages

Facilitates integration Reduces development cost

Page 24: SOA Security

25OWASP

SOA Security Reference Model

Page 25: SOA Security

26OWASP

Agneda

What Is SOA SOA life cycle & Security SOA Generated Security Concerns /

opportunities SSO & SSO Federation WS Security Standard

Page 26: SOA Security

27OWASP

Traditional SSO

Security is hard coded into each application User credentials are transmitted across enterprise boundaries

Page 27: SOA Security

28OWASP

SOA SSO Federation

Page 28: SOA Security

29OWASP

SOA SSO Federation Cont’

Traditional limited implementation using 3rd party SSO solutions No easy integration with applications that have

not been written by the same 3rd party SSO manufacturer

SOA solution Managing security interaction between

applicationsClients and servers dynamically negotiate

security policiesEasy implementation

Page 29: SOA Security

30OWASP

Agneda

What Is SOA SOA life cycle & Security SOA Generated Security Concerns /

opportunities SSO & SSO FederationWS Security Standard

Page 30: SOA Security

31OWASP

WS-security Standard

SOAP security (securing the web service messages)

SOAP header extension Standard Feb. 2007 Ver 1.1 (OASIS) Any combination of In Request/Response

AuthenticationEncryption Digital Signature

Page 31: SOA Security

32OWASP

Web Services Stack

Page 32: SOA Security

33OWASP

Web Services Security Architecture

Page 33: SOA Security

34OWASP

“WS –Security” Building Blocks

Security Tokens Username Token Username Token with Password Digest Binary Security Token

X.509 Version 3 certificates Kerberos tickets

Signatures signs all or part of the soap body

Reference List or Encrypted Key

Page 34: SOA Security

35OWASP

Structure of a Basic Web Services Security SOAP Header

Page 35: SOA Security

36OWASP

Structure of a Basic Web Services Security SOAP Header (cont.)

Page 36: SOA Security

37OWASP

XML Encryption in WS-Security

Use of a <ReferenceList> in the Security Header Pointing to the

Parts of the Message Encrypted with XML Encryption

Page 37: SOA Security

40OWASP

Providing Integrity XML Signature in Web Services Security

XML SignatureVerify a security token or SAML assertion Message integrity

XML syntaxExplicit <reference> element points to what is

being signed One or more XML signaturesOverlapping is possible