CyberTalk

Web application security explained

Aaron Rose, Security Architect & Office of the CTO

Aaron Rose is a Cyber Security Evangelist, Security Architect & Member of the Office of the CTO at Check Point Software Technologies.  A subject matter expert in cloud, Internet of Things, and application security; Aaron has focused his career on securing organizations & their resources beyond the perimeter of the traditional network firewall.

An avid international traveler, Aaron welcomed the opportunity to spend three months in Tel Aviv, Israel training with Check Point’s research and development teams at the company’s global headquarters.

In this outstanding thought leadership interview, Aaron Rose provides insights into web application security and so much more. Harness proven strategies, understand challenges, and cultivate cost-consciousness in the process. Discover premium cyber security knowledge and know-how. 

Tell us about what you’re seeing in terms of threats to cloud computing and web applications?

In the past 10 years or so, the way that businesses use the internet has changed drastically. Many companies have developed new, innovative web applications that store and manipulate vast stores of data.  Traditionally, these applications were hosted in an on-premise data center, but today more and more companies are migrating these web applications to the public cloud. The cloud affords us many benefits: scalability, everything-as-a-service, and near infinite resources at the push of a button – but it also greatly increases a business’s attack surface.

What are some of the common threats faced by web applications?

What are the advantages to implementing automated application security?

Legacy web application firewalls (WAFs) taught us one thing; if your web application’s security can’t be automated, it’s practically useless in an age where applications, and those who wish to attack them, are evolving at an exponential pace.

Traditional solutions in this space often employ a static approach to application protections, meaning they rely on attack signatures rather than analyzing the behavior of the request and the reputation of the user making it.  This approach leads to a high rate of false positives, blocking legitimate users from using your application.  To address this issue, WAF administrators must maintain an ever-growing list of exclusions and manual rules. 

If an organization already owns a WAF, how can owners determine if it still meets the needs of the business?

When evaluating an existing or new application security solution, consider these questions:

What should organizations look for in obtaining a new web application firewall?

What is the difference between a WAF and RASP (runtime application self-protection)?

A Web Application Firewall (WAF) and Runtime Application Self-Protection (RASP) are both solutions to protect web applications.  But how they accomplish this is the key difference.

A WAF sits in front of the application, inspecting the web traffic and preventing the malicious requests from reaching the application in the first place.  In contrast, a RASP is designed to run on the device serving the application. By existing at this level, a RASP can monitor all aspects of the application at runtime & prevent attacks based on their impact to the application.  However, since a RASP runs at the device level, often it may require greater overhead and could impact application performance.

In configuring a WAF and/or RASP, are there any special concerns for CISOs or IT admins?

Yes, depending on the WAF solution you choose, and how it’s deployed there are additional points to consider during your deployment.

How can these types of security mechanisms lower costs in the long run?

Determining a WAF’s cost effectiveness is a critical step in the evaluation process.  The costs of a WAF typically consist of:

After determining the total cost involved with your solution you now have a basis to determine the potential cost savings.  According to a publication by the Open Web Application Security Project (OWASP), the potential cost savings of a WAF can be considering from multiple points of view:

 

Exit mobile version