Page 32 - Informatics, July 2021
P. 32

Technology Update



              ly in the traffic path between the requestor (for   protection device like an IPS or network firewall  may have limited to no resources to build security
              example, a browser client) and the Web applica-  Normalization -  Attackers  often  manipu-  controls into the application or fix vulnerabilities
              tion server. Within the in-line model, WAF can be   late an exploit payload to bypass WAF detection   in source code
              configured in a) routed b) Bridged or c) Reverse   (for example by URL-encoding portions of the
              Proxy method to inspect and process the traffic.   payload). WAFs normalize the requests to perform   SSL & Weak Cypher Overrides
              In-line WAFs actively block the requests that   analysis and bust the evasion by attackers e.g.   Encryption protects data in the traffic stream
              violate the rule sets. This architecture demands   escaped and encoded characters, self-referenc-  from prying eyes and the option here is to give the
              caution to ensure no service interruption surpris-  ing paths, international character sets, etc.  keys to the WAF so the stream can be decrypted,
              es happen in production. Alternately, it is possi-                     inspected, and processed. Additionally, WAF plugs
              ble to run a WAF in-line, but keep it in a moni-  APIs - WAFs offer API support to build custom   the weak ciphers to prevent side-channel or down-
              tor-only (or passive) mode.         detection techniques or rules for specialized   grade attacks. When a client tries to use disabled/
                                                  assessments, such as logic checks. These APIs are   vulnerable SSL/TLS protocols or cipher suites, the
              TAP/ SPAN                           integrated with the WAF parsing engine  request is redirected to specific error page/s. At
                This  mode  is also  known  as “passive” mode
              because the WAF is kept out of the traffic path
              and monitors traffic from a tap or span port. Tap/  Application Fortification
              span WAFs are often used to collect data for use
              in investigatory or forensic analysis. This mode                    SQL
              supports traffic blocking by communicating to               Path   Injection  Code
              another  system  (like  a  network  firewall)  and        Transversal      Injection
              having that system perform the blocking.         Header                          Cross-Site
                Further, an Application Firewall can be       Tampering                         Scripting
              network-based or host-based, or cloud-based. It
              is primarily deployed in the reverse-proxy mode   OS Command                            Remote File
                                                                                                       Inclusion
              and is placed in front of one or more websites or   Injection  Pattern Recognition
              applications.
                We can deploy a WAF appliance ON-Premise
              or  have  a  hosted  virtual  appliance.  An  evolving   Encoding                            Vulnerability
                                                                                                             Probes
              architecture is Cloud-delivered WAF as-a-service.
                Cloud and Virtualization are driving the need             Data Masking                  Server Masking
              for new architectural models in Web Application   Extension                                    Cookie
              Firewalls. Cloud-based WAFs intercept traffic    Type     Upload Inspection            Session Protection    Tampering
              before it enters the organization’s network. Virtu-                 Web
              alized environments present a unique challenge                     Server
              because the VMs running on top of a hypervisor                                               Session
              form their mini-network where traffic is passed   MIME Type     App Masking                 Hijacking
              from server to server without having to traverse
              the network. To prevent application attacks intra-                                       Denial of
              VM, a WAF needs to be able to see the traffic. This   Malware                            Service
              can be accomplished by using an API to monitor   Inspection    Signature DB

              activity via the hypervisor. WAF can fit in an orga-
              nization’s architecture easily with its various form   Known Viruses/              Cross-Site
              factor choices. A host WAF is a software option   Trojans/ Worms                  Request forgery
                                                                         Protocol
              where the software is installed on the same              Compliances  Spammer  Bad User
                                                                                         Agents
              server that the Web application is running.                         Bots
              Detection Techniques
                WAFs (most of them) use a blended approach                           the same time, a WAF can define cipher suite over-
              of different techniques to ensure the most accu-  Special WAF Features  rides for each version of the SSL/ TLS protocols.
              rate detection coverage. These techniques are:  Virtual Patching
                Signatures -  Similar to the signatures for   WAF helps to shorten the window of exposure   Emergency Hosting (Audit Exemption)
              anti-virus and Intrusion Prevention Systems (IPS)   to vulnerabilities. If your application is hosted   Web  Application  Firewall  is  vital  to  enable
              WAF signatures match a pre-set string or regular   on a platform that has a known vulnerability, but   emergency hosting as it dynamically models an
              expression (RegEx) to the traffic looking for   you have not had a chance to patch it yet, you   application  structure  and  its  elements.  It  under-
              known attacks. WAF ships with a set of signatures   can write a rule that looks for traffic attempting   stands the expected application responses and
              and these are updated by the OEMs regularly with   to exploit that vulnerability and block the traffic   usage. Accordingly, it profiles the URLs, Directo-
              the evolution of attacks.           until you can get the vulnerable system patched.   ries, Cookies, Form fields, URL parameters, HTTP
                Rules - Rules define how to inspect a web   This is known as virtual patching. Virtual patches   methods, and Referrers. Having understood the
              request and what to do when the request matches   are a key component of a strong WAF, often   application, it provides a Layer-7 shield around
              the inspection criteria. Generally, it links together   requiring integration with a vulnerability scanner.   it. This protective shield, however, must not be
              a series of strings with logical operators like AND,   It is always difficult to keep pace with the   construed as a replacement of necessary audit
              OR, NOT and may contain nested statements at   number of vulnerabilities and updates on open-  compliance which has to be met anyhow. WAF
              any depth. WAFs can also “learn” traffic patterns   source servers that we commonly use today eg.   service essentially takes care of vulnerabilities
              on the fly and look for anomalies on a set of base-  Drupal, WordPress, Joomla, etc. Their vulnerabili-  that are either altogether new or are missed/
              line rules. This intelligence can be used for a new   ties can be taken care of by virtual patching. Virtual   uncovered via penetration testing or source code
              rule setting for the WAF or on a complimentary   Patching helps to protect legacy applications that   reviews.




              32  informatics.nic.in  July 2021
   27   28   29   30   31   32   33   34   35   36   37