Download presentation
Presentation is loading. Please wait.
1
Web Information Systems Engineering (WISE)
Security for Web Information Systems: Towards Compromise-Resilient Architectures Web Information Systems Engineering (WISE) 17/08/1440 confidential
2
Introduction Security services play an important role in assuring the reliability and integrity of any information system The dynamic, distributed nature of Web Information Systems also introduces multiple points of potential security compromise Compromise resilience is as important as compromise resistance 17/08/1440 confidential
3
Basic Model Model Agents access Web information resources
Data Resource Agent Model Agents access Web information resources Resources provide services and process data 17/08/1440 confidential
4
Security Services Authentication: Who are you?
Agent Resource Data Authentication: Who are you? Authorization: What can you do? Data protection: How is the data secured? 17/08/1440 confidential
5
Authentication Approaches Who are you?
Agent Resource Data Agents, resources exchange claims of identity Authentication authority issues credentials, helps validate claims Authentication Authority Agents and resources have authentication credentials associated with their identities 17/08/1440 confidential
6
Authorization Approaches What can you do?
Agent Resource Data Authorization authority supports policy decisions Resources enforce policy Authorization Authority 17/08/1440 confidential
7
Data Protection Approaches How is the data secured?
Agent Resource Stored data is encrypted Key authority manages keys -- which also need access control! Key Authority Agents, resources exchange data through a secure channel 17/08/1440 confidential
8
Typical Security Architecture
Agent Resource Data Authentication Authority Key Authority Authorization Authority Authorities support agents, resources in establishing security 17/08/1440 confidential
9
Potential Security Compromises
Attack Agent Attack Resource Attack Data Attack Authentication Authority Attack Key Authority Compromises happen. What’s the impact? Replicated, mobile nature of system introduces multiple points of compromise Authorization Authority Attack 17/08/1440 confidential
10
Authentication Compromises
Agent Attack Resource Data Authentication Authority Key Authority Authorization Authority Agent can be impersonated to resource 17/08/1440 confidential
11
Authentication Compromises
Agent Attack Resource Data Authentication Authority Key Authority Authorization Authority Resource can be impersonated to agent 17/08/1440 confidential
12
Authentication Compromises
Agent Resource Data Authentication Authority Attack Key Authority Authorization Authority Anyone can be impersonated! Attack the authority, and/or its administrators 17/08/1440 confidential
13
Authorization Compromises
Agent Resource Data Authentication Authority Key Authority Attack Authorization Authority Anyone can be authorized! Attack the authority, and/or its administrators 17/08/1440 confidential
14
Data Protection Compromises
Agent Resource Data Authentication Authority Key Authority Attack Any key can be recovered! But data remains secure unless encrypted data also compromised Authorization Authority 17/08/1440 confidential
15
Data Protection Compromises
Agent Resource Attack Data Authentication Authority Key Authority Authorization Authority Any encrypted data can be recovered! But data remains secure unless keys also compromised 17/08/1440 confidential
16
Compromise Resilience
Attack Agent Attack Resource Attack Data Attack Authentication Authority Attack Key Authority Attack Authorization Authority How do you mitigate the risk? Resilience vs. resistance 17/08/1440 confidential
17
Authentication Compromise Resilience
Agent Resource Data Agent’s credentials should be short-lived and context-specific Home agent supports agent in obtaining them Resource’s credentials can be similarly strengthened Authentication Authority Home Agent 17/08/1440 confidential
18
Authentication Compromise Resilience
Agent Resource Data Authentication authority’s credentials and validation data should be short-lived Master authority manages distribution of data and credentials Authentication Authority Home Agent Master Authentication Authority 17/08/1440 confidential
19
Authentication Compromise Resilience
Agent Resource Data Authentication Authority Home Agent Multi-administrator and multi-authority approaches can also help Master Authentication Authority 17/08/1440 confidential
20
Authorization Compromise Resilience
Agent Resource Data Authorization Authority Authorization authority’s credentials should be short-lived Multi-administrator or -authority also helps Master Authorization Authority 17/08/1440 confidential
21
Data Protection Compromise Resilience
Agent Resource Data Key Authority Key Authority Key Authority Key Authority Secret sharing reduces impact of compromise of one key authority Trusted execution protects keys in field 17/08/1440 confidential
22
Data Protection Compromise Resilience
Agent Resource Data Key Authority Key Authority Key Authority Key Authority Proactive secret sharing maintains resilience by updating shares periodically Distributed cryptography uses keys in split form 17/08/1440 confidential
23
A Resilient Security Architecture Anticipating compromise mitigates risk
Resilience Manager Agent Resource Data Key Authority Key Authority Authentication Authority Key Authority Authorization Authority Home Agent Master Authentication Authority Master Authorization Authority 17/08/1440 confidential
24
Observations Countermeasures such as short-lived, context-specific credentials, secret sharing limit impact of security compromises The distributed nature of Web Information Systems facilitates such countermeasures New components easily introduced into architecture Web Information Systems can lead the industry in compromise resilience 17/08/1440 confidential
25
Conclusion: Two Questions
What do you call an attacker who compromises a Web Information System? Answer : a WISE-Cracker What do you call a Web Information System that is resilient against such compromise? Answer : a Web Information System Engineered with Resilience = WISER 17/08/1440 confidential
26
RSA Security helps organizations and individuals confidently protect identities and digital assets (intellectual property). The company secures more than 15 million user identities, safeguards trillions of business transactions annually and manages the confidentiality of data in tens of thousands of applications worldwide. RSA Security’s reputation is built on a 20-year history of ingenuity, leadership and proven technologies, and our more than 18,000 customers and 1000 technology and integration partners worldwide. 17/08/1440 confidential 26 26
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.