Copyright © 2005 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.

Slides:



Advertisements
Similar presentations
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Advertisements

InfoCard and the Identity Metasystem Kim Cameron, Chief Architect of Identity Microsoft.
Web Service Ahmed Gamal Ahmed Nile University Bioinformatics Group
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Attacking Session Management Juliette Lessing
VM: Chapter 5 Guiding Principles for Software Security.
Windows CardSpace and the Identity Metasystem Glen Gordon Developer Evangelist, Microsoft
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Security Controls – What Works
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
The Laws of Identity and Cardspace Charles Young Solidsoft.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Phishing – Read Behind The Lines Veljko Pejović
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Stephen S. Yau CSE , Fall Security Strategies.
5205 – IT Service Delivery and Support
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
Sierra Systems itSMF Development Days Presentation March 4 th, 2014 Colin James Assyst Implementation Specialist.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Security Technological Security Implementation and Privacy Protection.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Who are you? From Directories and Identity Silos to Ubiquitous User-Centric Identity Mike Jones, Microsoft and Dale Olds, Novell.
A Claims Based Identity System Steve Plank Identity Architect Microsoft UK.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Windows Azure Dave Glover Developer Evangelist Microsoft Australia Tel:
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
SEC835 Practical aspects of security implementation Part 1.
Chad La Joie Shibboleth’s Future.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
1 XML Based Networking Method for Connecting Distributed Anthropometric Databases 24 October 2006 Huaining Cheng Dr. Kathleen M. Robinette Human Effectiveness.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SEC835 Runtime authentication Secure session management Secure use of cryptomaterials.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Shibboleth What is it and what is it good for? Chad La Joie, Georgetown University.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Master Data Management & Microsoft Master Data Services Presented By: Jeff Prom Data Architect MCTS - Business Intelligence (2008), Admin (2008), Developer.
KIM: Kuali Abstraction Layer for Identities, Groups, Roles, and Permissions.
Security Discussion IST Retreat June IT Security Statement definition In the context of computer science, security is the prevention of, or protection.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Identity and Access Management
VIRTUALIZATION & CLOUD COMPUTING
Secure Software Confidentiality Integrity Data Security Authentication
Data and Applications Security Developments and Directions
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Chapter 18 MobileApp Design
An Identity on the Internet
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License. The OWASP Foundation OWASP AppSec DC October Integrating Identity Services into Web Apps Gunnar Peterson CTO, Arctec Group

OWASP AppSec DC Identity is under attack  Identity risks  Anti-Phishing Working Group July report of 14,135 phishing reports excerpt  Number of brands hijacked by phishing campaigns in July: 71  Number of brands comprising the top 80% of phishing campaigns in July: 6  Country hosting the most phishing websites in July: United States  Contain some form of target name in URL: 46 %  No hostname just IP address: 41 %  Percentage of sites not using port 80: 9 %  Average time online for site: 5.9 days  Longest time online for site: 30 days  Key finding: study found 174 unique applications for password stealing, and 918 unique password stealing malicious URLs

OWASP AppSec DC Identity is under attack (cont.)  Identity risks (cont.)  Publicly reported data breaches since the Choicepoint incident (2/15/05)  Over 50 million personal information records stolen including (very abbreviated list) –Bank of America 1.2 million (lost backup tape) –San Jose Med. Group 185,000 (stolen computer) –Wachovia 676,000 (dishonest insider) –Dept of Justice 80,000 (stolen laptop) –Univ of Utah 100,000 (hacking) –Lucas County Children Services 900 (exposed by ) –Merlin Data Services 9,000 (Bogus account setup) –Lexis Nexis 280,000 (password compromised)  The world is flat: identity attacks target identity data wherever it is found - small companies, big companies, government, non-profit, educational institutions, home users.

OWASP AppSec DC Understanding Identity  Foundations of Identity  Subjects  Claims  Claims about subjects are evaluated to negotiate access

OWASP AppSec DC The Laws of Identity  Codified on Identityblog.com  Why do we need laws to deal with identity?

OWASP AppSec DC The Laws of Identity -- identityblog.com  1. User control and consent: Technical identity systems must only reveal information identifying a user with the user's consent  2. Minimal disclosure for a constrained use: The solution that discloses the least amount of identifying information and best limits its use is the most stable long-term solution.  3. Justifiable parties: Digital identity systems must be designed so the disclosure of identifying information is limited to parties having a necessary and justifiable place in a given identity relationship  4. Directed Identity: A universal identity system must support both "omni-directional" identifiers for use by public entities and "unidirectional" identifiers for use by private entities, thus facilitating discovery while preventing unnecessary release of correlation handles

OWASP AppSec DC The Laws of Identity -- identityblog.com (cont.)  5. Pluralism of operators and technologies: A universal identity system must channel and enable the inter-working of multiple identity technologies run by multiple identity providers.  6. Human integration: The universal identity metasystem must define the human user to be a component of the distributed system integrated through unambiguous human-machine communication mechanisms offering protection against identity attacks  7. Consistent experience across contexts: t he unifying identity metasystem must guarantee its users a simple, consistent experience while enabling separation of contexts through multiple operators and technologies.

OWASP AppSec DC Architecting Identity  Identity Lifecycle  Generation  Representation  Consumption Usage  Transformation  Identity architectural concerns  Access control  Regulatory and legal  Privacy  Personalization  Domain attributes  Provisioning  Audit and reporting  Identity mapping services  Concerns can conflict and cascade

OWASP AppSec DC Architecting Identity  Risk examples  Promiscuous identity - Identity information leakage across domains  Disclosure of personal information  Overall vulnerabilities in weak identity implementations: custom coded identity layers and functions, username and password, password recovery  Phishing  User knowledge  Offline combination of personal information - data mining  Lack of full lifecycle protection of identity information  Lack of consistent usage of identity in distributed systems - inherent tradeoffs in using proxies, impersonation, delegation, etc.  Weaknesses in identity cascade across system - developers are instructed not to write their own crypto algorithms, but home grown identity system “protect” the crypto functionality

OWASP AppSec DC Impersonation & Delegation Bob Web Server Charlie App Server DB Server Alice Thin Client Bob Web Server Charlie App Server DB Server Alice Thin Client Alice Bob Charlie Impersonation Delegation Alice Review “Security Design Patterns” by Blakley & Heath for a full treatment of options

OWASP AppSec DC Security Domain Federated Identity Security Domain Federation User Store Alice App Red Fed Server Green Fed Server App/ Resources Standards support and emerging toolsets and vendor support in Federation space: SAML, WS-Federation, Liberty

OWASP AppSec DC Alice in Identityland  Problems in distributed systems are that the identity silos do not reflect the security context of the transaction Silo Bob Web Server Charlie App Server DB Server Alice Thin Client Identity Silos are tightly coupled

OWASP AppSec DC Alice in Identityland  Use an Identity Abstraction Layer to facilitate interoperability, security, and loose coupling Silo Bob Web Server Charlie App Server DB Server Alice Thin Client Identity Abstraction Layer Support query, update, attribution Standards and vendor/tool support emerging: WS-Trust for security token exchange, creation, and validation for SAML, Kerberos, Username/pwd, X.509 SAML KerbX.509

OWASP AppSec DC Identity Abstraction Layer  Identity Runtime Services:  Abstract identity implementation details from interface  Authoritative source for identity data  Reporting services:  Audit, logging, reporting  Differentiate between runtime services and provisioning

OWASP AppSec DC Identity Abstraction Layer  Goals  Abstract back end systems, similar to how a data access layer works in n tier systems  Use strong identity standards for interoperability across domains  Service oriented focus: decouple identity from systems  Functions  Access control  Naming services  Checkpoint services  Common descriptor format  Consistent interface, api, and data exchange format for accessing and updating identity data

OWASP AppSec DC Guarding the Keys to the Kingdom  Hardening identity servers and services  Design for failure  Usability  Incident response  Assurance  Availability

OWASP AppSec DC Project Roles  Identity architect: identity system architecture and implementation  Application architect: responsible for application requirements  Developer: writes code (and unit tests) but should not be writing custom crypto, password recovery, and provisioning systems

OWASP AppSec DC Where to go from here  OWASP Guide  Build Security In DHS Portal  cert.gov/portal/article/bestpractices/assembly_integration_and_evolution/Identity_in_Assembly_and_Integration.xml cert.gov/portal/article/bestpractices/assembly_integration_and_evolution/Identity_in_Assembly_and_Integration.xml  Blogosphere  Identityblog identityblog.com  Id Corner idcorner.org  Open Group  Jericho Forum focused on deperimeterization   Security Design Patterns: 