Page 31 - Informatics, July 2021
P. 31

Technology Update



              WEB APPLICATION FIREWALL


              Defense against Layer-7 Attacks




              Edited by MOHAN DAS VISWAM              eb Application Firewall (WAF) is the latest    While WAF is important, it is most effective
                                                      entry into the Layered Data Centre Secu-  with other security components. A comprehen-
              The application layer (L7)         Writy model. It forms an integral part of a   sive enterprise security model positions a WAF
                                                                                     alongside IPS, NGFW, Scanner, SIEM, etc.
                                                  multilayer security architecture and provides se-
              is the hardest to defend.           curity at the topmost layer of TCP/ IP stack that
                                                  is most vulnerable and most targeted in the cur- WAF Policies & Working Models
              Hackers get direct access to        rent threat landscape. Web Application Firewalls   WAF analyses Hypertext Transfer Protocol
                                                  examine the data payload beyond the simple IP   (HTTP) requests and applies a set of rules to
              the bounty they are seeking,        and TCP header examination. They protect web   understand what parts of that conversation are
              by compromising layer-7.  The       systems against known and unknown threats and   benign and what parts are malicious. It employs
                                                  vulnerabilities. Customized inspections can de-  various approaches/models to analyze and
              need is to have a product           tect and prevent several of the most dangerous   filter the content. WAF operates through a set of
                                                  application security flaws.        rules often called policies. These policies aim to
              with an understanding of the          Next-Generation Firewall (NGFW) and Intru-  protect against vulnerabilities in the application
                                                  sion Prevention/Detection System (IPS/IDS) are   by filtering out malicious traffic.
              “real-world techniques” or          powerless to tackle and handle modern web   WAF that operates based on a blacklist (nega-
              “methods” hackers use. It is        attacks. So here is where the  Web Application   tive security model) protects against known
                                                  Firewall fills the gap. Acting as an intermediary   attacks. This model is appropriate for public
              here that the Web Application       service between your website application and   websites where sources are unknown. However,
                                                  the visitor browsing your site, WAF intercepts and   the model highly resources intensive.
              Firewall technology delivers        strips malicious requests before they can cause   Conversely, WAF based on an allow list (posi-
                                                  any damage. With application layer logic funda-  tive security model) only admits traffic that has
              the promise. With the right WAF     mental to its working, WAF can detect/under-  been pre-approved. It is highly efficient but may
              with right policies in place, you   stand unusual traffic activity with ease.  at times un-intentionally block benign traffic. Web
                                                                                     Application Firewalls also offer a hybrid security
              can block the array of attacks      Internal Architecture              model, that implements elements of both.
                                                    The internal structure of the Web Applica-
              that aim to exfiltrate data.        tion Firewall is often complex and the interac-  WAF Deployment Architecture
                                                  tion between components changes from one   There are two main architectural consider-
                                                  manufacturer to other. However, the resultant   ations related to WAF placement: In-line or tap/
                                                  impact of deploying WAF is roughly the same.   span.
                                                  The below-given figure depicts a typical internal  IN-LINE
                                                  structuring of WAF.                    In this architecture, the WAF is placed direct-

                                                    WAF Architecture










                              Ratnaboli Ghorai
                              Dinda
                              Dy. Director General
                              & HoG
                              ratnaboli@nic.in




                              Raj K. Raina
                              Sr. Technical Director
                              & HoD
                              rk.raina@nic.in



                                                                                               July 2021  informatics.nic.in 31
   26   27   28   29   30   31   32   33   34   35   36