Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Implementing a WAF

Mark Hillick
November 23, 2012
140

Implementing a WAF

Presentation @ local Owasp Ireland Chapter on my experiences of implementing a Web Application Firewall

Mark Hillick

November 23, 2012
Tweet

Transcript

  1. INTRODUCTION - WAF TODAY? WAF deployments were initially propelled by

    PCI ......... but are now increasingly driven by security best practices. Source: Forrester 2010 Thursday 20 May 2010
  2. INTRODUCTION - EH???? WHAT???? XSS XSRF SQL Injection APT Zero

    Day Click Jacking Cookie/Session Hijacking Thursday 20 May 2010
  3. STARTING OUT - SATISTICS 6.5 times more expensive to fix

    a flaw in development than during design, 15 times more in testing, and 100 times more in development. Source http://2010survey.whitehatimperva.com/ Thursday 20 May 2010
  4. STARTING OUT - INTERNAL SELL (1) Technical issues in business

    language (e.g. just-in- time patching) and a bit of Thursday 20 May 2010
  5. STARTING OUT - INTERNAL SELL (2) Know your costs Advantages

    over cheaper alternatives! Thursday 20 May 2010
  6. STARTING OUT - INTERNAL SELL (4) There is a disconnect

    between the acknowledgement of security issues and the willingness to fix them. Source: The HP Security Laboratory Blog Thursday 20 May 2010
  7. STARTING OUT - INTERNAL SELL (4) Do not oversell WAF

    != unhackable Thursday 20 May 2010
  8. STARTING OUT - PLAN (4) UAT & SDLC Configuration -

    Delegation? Alerting Incident Response Plan Logging & Analysis Reporting Thursday 20 May 2010
  9. TEST - POLICY Administration Policy Who has access? Delegation? Change

    Management - different? Incident Response Plan? What is an Incident? Thursday 20 May 2010
  10. IMPLEMENTATION - SET-UP +.ve Security Model Transparent Informational Logging Generic

    versus Specific Analysis Reporting Thursday 20 May 2010
  11. POST-IMP - STILL, OH YES? SDLC Network Firewall & ACLs

    Code Analysis Penetration &Vulnerability Testing Incident Response Plan???? -> Incident? What? Thursday 20 May 2010
  12. RESOURCES SANS Reading Room (Scareware via Web App exploit) SANS,

    Owasp, WebAppSec Web 2.0 -> Blogs, Twitter Vendor Sites Thursday 20 May 2010
  13. CONCLUSION - WAF Extra layer of defence but also admin

    Can be an excellent and effective solution Is it what I need? Only a part of defence-in-depth!!!! Thursday 20 May 2010