Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

6/14/2007
12:00 PM
50%
50%

Inside-Out Security

Basic defenses that lack depth create needless vulnerabilities - internal and external

8:00 AM -- Defense in depth -- it's a term we hear all the time in security, and some of us practice it without even realizing it. But it's probably one of the most important theories to a solid security architecture.

Let's look for a moment at what a normal, small, mom-and-pop e-commerce site looks like. It is probably running on Linux in a shared hosting environment, with FTP access. There's probably a firewall in place, but it allows inbound FTP, HTTP, and HTTPS from anywhere. It's unlikely that mom or pop even know how to link to the SSL-enabled portion of their site. The site allows PHP, PERL, and Java. The site does a fairly good job at isolating the user accounts in their respective FTP directories, but that's about all it does.

What I've described is vulnerable not just from the outside, but it's also vulnerable to man-in-the-middle attacks, as well as other users of the same system. It makes the assumption that the only people who are going to attack it are outside the perimeter, and there are no vulnerabilities in the Web application or the services provided. Furthermore, it makes an assumption about the fact that those protocols have nothing sensitive traveling over them.

This is about as simple as a network gets, and it's also just about as vulnerable as it gets. This is not a well defended application. While you are designing an application, you need to think about it from a number of attackers' perspectives -- remote attackers and insiders.

Insiders can be part of the company, or like in the case above, they can be other users of the same virtual system. Building up the network to defend against external threats makes sense, but you cannot rely on it alone, as you still need the application to listen on ports 80 and 443.

Understanding that should help explain why auditing code, and looking at the Web application as its own problem requiring additional layers of security, is critical to analyzing your risk profile. Adding layers is never a bad thing, as long as you aren't causing those layers to deny service when it is a critical, always-on type environment. Weigh your business risks against the Web application's purpose, as well as how it interacts with the rest of the system, its developers, and the consumer. And, oh yeah -- just say no to shared hosting if security is a concern.

— RSnake is a red-blooded lumberjack whose rants can also be found at Ha.ckers and F*the.net. Special to Dark Reading.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9405
PUBLISHED: 2020-02-26
IBL Online Weather before 4.3.5a allows unauthenticated reflected XSS via the redirect page.
CVE-2020-9406
PUBLISHED: 2020-02-26
IBL Online Weather before 4.3.5a allows unauthenticated eval injection via the queryBCP method of the Auxiliary Service.
CVE-2020-9407
PUBLISHED: 2020-02-26
IBL Online Weather before 4.3.5a allows attackers to obtain sensitive information by reading the IWEBSERVICE_JSONRPC_COOKIE cookie.
CVE-2020-9398
PUBLISHED: 2020-02-25
ISPConfig before 3.1.15p3, when the undocumented reverse_proxy_panel_allowed=sites option is manually enabled, allows SQL Injection.
CVE-2015-5201
PUBLISHED: 2020-02-25
VDSM and libvirt in Red Hat Enterprise Virtualization Hypervisor (aka RHEV-H) 7-7.x before 7-7.2-20151119.0 and 6-6.x before 6-6.7-20151117.0 as packaged in Red Hat Enterprise Virtualization before 3.5.6 when VSDM is run with -spice disable-ticketing and a VM is suspended and then restored, allows r...