presentation title placeholder

90

Upload: others

Post on 12-Nov-2021

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Presentation Title Placeholder
Page 2: Presentation Title Placeholder
Page 3: Presentation Title Placeholder

Page 4: Presentation Title Placeholder

How much WAF do you need?

Security

Goals

Application

Profile

Operational

Capacity

Why do you want a WAF ?

Compliance

Security Best Practice

Response to Actual Threats

What kind of Applications do you need to protect ?

Critical vs Non Critical

Legacy vs Custom

DevOps or not

Who will manage the WAF ?

How many people

How much time

Page 5: Presentation Title Placeholder

Security

Goals

• Check Box

• Compliance

• Top10 OWASP mitigation

• Recurrent Audits

• Specific Protection (L7 DDoS, Scraping)

• Visibility on Web Attacks

• Safely expose API

• Business owner – identify risks and

constrains

© 2018 F5 Networks

Security Goals

Page 6: Presentation Title Placeholder

Application

Profile

• How Many Applications

• Same or Different Applications

• Legacy Applications / Agile

• Custom / Well-Known Applications

Application Profile

Page 7: Presentation Title Placeholder

Operational

Capacity

• Who will manage the WAF policy?

• How Many People

• Network / Security / Dev People

• Amount of Time Available

Operational Capacity

Page 8: Presentation Title Placeholder

••

• ASM provides Server Technology Detection (v13.0+)

• Understand what you are trying to protect and why

Page 9: Presentation Title Placeholder

Page 10: Presentation Title Placeholder

Gidon Leizer

Product Manager ASM

“The Best Web Application Firewall you may have is the one you can Manage.”

Page 11: Presentation Title Placeholder

Page 12: Presentation Title Placeholder
Page 13: Presentation Title Placeholder

• Policy Tuning

• Pen tests

• Performance Tests

• Final Policy Tuning

• Pen Tests

• What types of WAF protections?

• Cookies

• Brute Force

• DDOS

• Web Scraping

• Bot Defense

Page 14: Presentation Title Placeholder
Page 15: Presentation Title Placeholder

Apps

Internet

Devices

Data Center

ASM ASM

••

Page 16: Presentation Title Placeholder

Page 17: Presentation Title Placeholder

• https://support.f5.com/csp/article/K7825

Page 18: Presentation Title Placeholder

Page 19: Presentation Title Placeholder

•• https://support.f5.com/csp/article/K9970

• Subscribe to F5 labs threat intelligence• https://f5.com/labs

Page 20: Presentation Title Placeholder
Page 21: Presentation Title Placeholder

Page 22: Presentation Title Placeholder

Page 23: Presentation Title Placeholder

Page 24: Presentation Title Placeholder

Page 25: Presentation Title Placeholder

Page 26: Presentation Title Placeholder

© F5 Networks, Inc 26

Page 27: Presentation Title Placeholder

© F5 Networks, Inc 27

Page 28: Presentation Title Placeholder

Page 29: Presentation Title Placeholder

Page 30: Presentation Title Placeholder
Page 31: Presentation Title Placeholder

Page 32: Presentation Title Placeholder

••

Page 33: Presentation Title Placeholder
Page 34: Presentation Title Placeholder

Page 35: Presentation Title Placeholder

Page 36: Presentation Title Placeholder
Page 37: Presentation Title Placeholder

Page 38: Presentation Title Placeholder

• The term blacklisting is used because signatures are checked against parameters (negative security = blacklisting)

Page 39: Presentation Title Placeholder
Page 40: Presentation Title Placeholder

• Ensure Parameters are checked by attack signatures

• Keep attack signatures up to date

Page 41: Presentation Title Placeholder
Page 42: Presentation Title Placeholder

Page 43: Presentation Title Placeholder

••

• Proactive Bot Defense and Bot signatures are relatively benign

• With the exception of Proactive requiring JS, which mobile clients do not support

• Can greatly reduce alarms and false positives

Page 44: Presentation Title Placeholder

•• https://support.f5.com/csp/article/K00736342

Page 45: Presentation Title Placeholder

• https://support.f5.com/csp/article/K15405450

Page 46: Presentation Title Placeholder

••

Page 47: Presentation Title Placeholder

••

• https://support.f5.com/csp/article/K29359407

Page 48: Presentation Title Placeholder

Page 49: Presentation Title Placeholder

Page 50: Presentation Title Placeholder

Page 51: Presentation Title Placeholder

Page 52: Presentation Title Placeholder

ASM 12.0+ Limit Request

Size

Limit Query

String Size

Specify Storage

Format

CSV YES YES YES

Key-Value Pair YES YES NO

Common Event Format (ArcSight) YES NO NO

BIGIQ YES YES NO

Page 53: Presentation Title Placeholder

• https://support.f5.com/csp/article/K11930

Page 54: Presentation Title Placeholder

Page 55: Presentation Title Placeholder

• https://support.f5.com/csp/article/K04211103

Page 56: Presentation Title Placeholder

Page 57: Presentation Title Placeholder

• https://support.f5.com/csp/article/K57420543

Page 58: Presentation Title Placeholder

Page 59: Presentation Title Placeholder
Page 60: Presentation Title Placeholder

Page 61: Presentation Title Placeholder

Page 62: Presentation Title Placeholder

• https://support.f5.com/csp/article/K29418033

Page 63: Presentation Title Placeholder

Page 64: Presentation Title Placeholder

• https://support.f5.com/csp/article/K02212345

Page 65: Presentation Title Placeholder

Page 66: Presentation Title Placeholder

• https://support.f5.com/csp/article/K40120684

Page 67: Presentation Title Placeholder

Page 68: Presentation Title Placeholder

••

Page 69: Presentation Title Placeholder

Page 70: Presentation Title Placeholder

Page 71: Presentation Title Placeholder
Page 72: Presentation Title Placeholder

Page 73: Presentation Title Placeholder

•••

Page 74: Presentation Title Placeholder
Page 75: Presentation Title Placeholder

Page 76: Presentation Title Placeholder

••

Page 77: Presentation Title Placeholder
Page 78: Presentation Title Placeholder

Page 79: Presentation Title Placeholder

••

Page 80: Presentation Title Placeholder

Page 81: Presentation Title Placeholder

••

• Other requests cause a violation

Page 82: Presentation Title Placeholder

Page 83: Presentation Title Placeholder
Page 84: Presentation Title Placeholder

•• https://support.f5.com/csp/article/K07359270

• OWASP Top 10 2017• https://devcentral.f5.com/articles/big-ip-asm-and-the-owasp-top-10-2017-28911

• ASM Operations Guide• https://support.f5.com/kb/en-us/products/big-ip_asm/manuals/product/f5-asm-operations-

guide.html

Page 85: Presentation Title Placeholder
Page 86: Presentation Title Placeholder
Page 87: Presentation Title Placeholder
Page 88: Presentation Title Placeholder
Page 89: Presentation Title Placeholder
Page 90: Presentation Title Placeholder

PROTECTION