Protecting Web Services and Web Applications Against Security Threats
Protecting Web Services and Web Applications Against Security Threats
Protecting Web Services and Web Applications Against Security Threats
Rix Groenboom
Support Manager
Parasoft UK Ltd
OWAS rix.groenboom@parasoft.com
P
AppSe
c
Copyright © 2006 - The OWASP Foundation
Permission is granted to copy, distribute and/or modify this
document under the terms of the GNU Free Documentation
Europ License.
e The OWASP
May 2006 http://www.owasp.org/
Foundation
What We Will Explore
bomb.xml
Enterprise
network
protected by
firewall
Application is the
only way in
Must keep
application open
for business
User (potential
hackers) must
have access to
the application
OWASP AppSec Europe 2006 8
Software as a Service: Security
Challenges
Application
Legacy Thin Web
Logic
Client Site
Web
Services
Source:
The Wall Street Journal Online (Feb 13, 2006)
http://online.wsj.com/article/SB1139260535524
66409.html
OWASP AppSec Europe 2006 16
Challenge - Properly Addressing
Security
Testing security “into” the Web service
application:
Common “end-of-cycle” security testing can detect some
standard application security vulnerabilities, however…
Approaching security merely as a “bug finding” exercise is
inefficient and costly
It is impossible to cover all possible execution paths with testing!
Available techniques:
Static / Dynamic Code analysis
Map policies to executable rules
Configure the rules based on the policies and projects
at hand
Compliance SOA Development Governance in SDLC
Like: SOAP, WSDL, Schema, XML Metadata.
Runtime SOA Governance
Management, Registry, Orchestration
OWASP AppSec Europe 2006 24
Securing Web Services: Step 4
Regression Testing
Software development is an iterative process
An iterative development process fails without
regression testing. The same applies to security
Fixing a security vulnerability should be coupled
with a policy and an enforcement mechanism to
prevent it from reoccurring again
Regression testing practices results in a visible
quality process that reinforces trust
Thank you
Resources
http://www.cgisecurity.com/ws/
http://www.oasis-open.org/committees/tc_cat.php?c
http://www.soaleaders.org/
Commercial
http://www.parasoft.com/