Download presentation
Presentation is loading. Please wait.
Published byAntonia Pierce Modified over 9 years ago
1
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation OWASP http://www.owasp.org Protecting Data From The Web Tier Mike Fleck CEO CipherPoint Software, Inc. mfleck@cipherpoint.com @CipherPointSW 888-657-5355 3-22-2012
2
OWASP 2 Agenda Why does this matter? Drivers for data protection Shifting application architectures Common data encryption challenges Why Infosec struggles to keep up Why protect data from the web tier A web tier data protection architecture Questions
3
OWASP Why Does This Matter? Shift in thinking about security control effectiveness from network > application > data Auditors recognize value of encrypting data “higher in the stack” Applications moving to 3-tier web architecture Cloud data protection = encrypting @ web tier Web tier affords a unique place from which to apply data encryption and access controls to application data and unstructured content 3
4
OWASP Data Protection Drivers Compliance: PCI DSS, HIPAA/HITECH, GLBA, state breach laws Native platform controls are generally inadequate to secure against insider threats, including IT admins Given current threat climate w/ APTs and determined attackers, need that last line of defense for stored data 4 “69% said that complying with data protection and privacy regulations was the main driver behind use of encryption” Ponemon 2010 Enterprise Encryption Study
5
OWASP Enforcing “Need to Know”, “Least Privileges” PCI DSS 7.1.1 Restriction of access rights to privileged user IDs to least privileges necessary to perform job responsibilities, Audit procedure = Confirm that access rights for privileged user IDs are restricted to least privileges necessary to perform job responsibilities. HIPAA/HITECH HIPAA requires access control to limit access to those with valid need to know, encryption is an addressable requirement GLBA Access control required to limit access to authorized individuals, encryption for NPI required 5
6
OWASP PCI Assessment Failings 6
7
OWASP Most Challenging Compliance Requirements 7
8
OWASP Sources of Compliance & Security Pain 8
9
OWASP Sea Change in Security Control Placement 9 http://movetheworld.files.wordpress.com/2008/01/evolution-of-security-controls-graph-only.png
10
OWASP App Architecture, Delivery Models Changing 10 Client- server 3 Tier, web based apps On premise IT Cloud
11
OWASP Today’s Data Encryption Challenges Effective threat protection = higher level insertion point Low level insertion (FDE, Bitlocker) only protect media loss/theft Application insertion = best threat protection, not common from app vendors, hard to DIY & get right Key management “it’s 2am, on a Saturday, we have to restore an encrypted file from 2008, where the @#!&% is the encryption key” Silo’ed or centralized Making it easy: operationalizing compliance requirements for key rotation, key lifecycle, information lifecycle 11
12
OWASP More Key Management 12
13
OWASP Data Encryption & Access Control Challenges for Web Apps, & SaaS Delivery Where can/should we insert? How do we afford protection for data stored in cloud/SaaS? How can enterprises retain control of keys for data stored in cloud/SaaS services? How to keep IT admins at cloud service providers from viewing sensitive data? 13
14
OWASP Policy Enforcement @ Web Front End 14 Front-end Servers Application Servers Database Server End users Web Server Admin Shared Services Admin Database Admin Need to manage Need to know PEPPEP PEPPEP WFE Policy Enforcement Point
15
OWASP Visibility @ WFE for Security Decisions 15 What: Where: Who: Cipherpoint\csmith https://www.covert.com/HR/payroll
16
OWASP Security Control Possibilities Selectively encrypt information for specific users, or URI destinations Unstructured files Fields in web forms Apply access controls for user groups Enforce need to know for IT admins Apply sophisticated access controls for authorized users Time of day, excessive file downloads, strange download locations, etc. 16
17
OWASP WFE Encryption & Access Control Previously had to either convince your app vendor to add this capability, or DIY In either case, odds are poor for: getting key management right, and making the encryption easy to use, easy to manage Ubiquitous web application architectures opens up encryption & access control platform possibilities at the WFE 17
18
OWASP Use Cases Web-based collaboration portals, on premise, e.g. SharePoint, ECM systems Sensitive information protection such as HR data, IP, business plans Compliance regulated data, e.g. PII, NPI, ePHI Where outsiders are the new insider threat: Cloud collaboration platforms, Google Docs, Box.net, et al Any SaaS application… 18
19
OWASP About CipherPoint Incorporated 2010 1 st provider of transparent content encryption for Microsoft SharePoint Insider threat protection Separation of duties Mass market pricing Building a cloud collaboration security platform 19
20
OWASP Questions? 20
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.