INTRODUCTION - WAF TODAY?
WAF deployments were initially propelled by PCI .........
but are now increasingly driven by security best
practices.
Source: Forrester 2010
Thursday 20 May 2010
Slide 7
Slide 7 text
INTRODUCTION - NUMBERS
$200
million
20%
Thursday 20 May 2010
Slide 8
Slide 8 text
INTRODUCTION - VENDORS
Software/Hardware
Commercial/Open Source
Thursday 20 May 2010
Slide 9
Slide 9 text
INTRODUCTION - EH???? WHAT????
XSS XSRF SQL Injection
APT Zero Day
Click Jacking
Cookie/Session Hijacking
Thursday 20 May 2010
INTRODUCTION - PRE-SALES
Know your subject
Question, Ask, Query, Demand
Plan, Test, Plan, Test
Thursday 20 May 2010
Slide 12
Slide 12 text
STARTING OUT - GOAL
Thursday 20 May 2010
Slide 13
Slide 13 text
STARTING OUT - RESEARCH
Research -> knowledge & understanding
Thursday 20 May 2010
Slide 14
Slide 14 text
STARTING OUT - SATISTICS
6.5 times more expensive to fix a flaw in
development than during design,
15 times more in
testing, and
100 times more in development.
Source http://2010survey.whitehatimperva.com/
Thursday 20 May 2010
Slide 15
Slide 15 text
STARTING OUT - INTERNAL SELL (1)
Technical issues in business language (e.g. just-in-
time patching)
and a bit of
Thursday 20 May 2010
Slide 16
Slide 16 text
STARTING OUT - INTERNAL SELL (2)
Know your costs
Advantages over cheaper alternatives!
Thursday 20 May 2010
Slide 17
Slide 17 text
STARTING OUT - INTERNAL SELL (4)
There is a disconnect between the
acknowledgement of security issues
and the willingness to fix them.
Source: The HP Security Laboratory Blog
Thursday 20 May 2010
Slide 18
Slide 18 text
STARTING OUT - INTERNAL SELL (4)
Do not oversell
WAF != unhackable
Thursday 20 May 2010
TEST - POLICY
Administration Policy
Who has access?
Delegation?
Change Management - different?
Incident Response Plan?
What is an Incident?
Thursday 20 May 2010
POST-IMP - TICK TOCK, NO MORE!!
Thursday 20 May 2010
Slide 39
Slide 39 text
POST-IMP - USE IT!
NO!!!!!!
Thursday 20 May 2010
Slide 40
Slide 40 text
POST-IMPLEMENTATION - STILL?
As someone-else once said!!
Thursday 20 May 2010
Slide 41
Slide 41 text
RESOURCES
SANS Reading Room (Scareware via Web App
exploit)
SANS, Owasp, WebAppSec
Web 2.0 -> Blogs, Twitter
Vendor Sites
Thursday 20 May 2010
Slide 42
Slide 42 text
CONCLUSION - WAF
Extra layer of defence but also admin
Can be an excellent and effective solution
Is it what I need?
Only a part of defence-in-depth!!!!
Thursday 20 May 2010