Virtualizing Application Security
Virtualizing Application Security
Intrusion Detection
And Prevention
Internet
Desktop and
Content Network Security Application Security
Security 1990s 2000s
1980s
Web app layer: 75% of
hacker attacks occur here
80 443
Application Security Drivers
1000+ applications
Mixture of internal & external
applications
Multiple BU’s in multiple
countries
In-Sourced & Out-Sourced
resources
Worldwide team with varying
degrees of expertise and
experience in Web app
security
Getting Control Over Security
C-Level
Will I get Hacked?
Information Security
Business Unit
Business Unit
Dev Dev Dev
Business Unit
QA QA QA
Pre-Production
Production
Web Application Security
Optimization
Junk non-
Low High Example: Junk data in my test account that affects only me.
shared data
Example: Passing along attacks/junk data to business
Collateral
High Medium partners. Damage/alerts to connected backend systems –
damage potentially even at other companies.
Example: Delete entire table in database. SQL Disclosure and
Major loss
High Low Blind SQL SmartAttacks. Solution: Avoid these select attacks
of data and strings.
IPS Alarms / Low - Example: Some group of users locked out for
Medium hours (based on IP address).
Blockage Medium
Account
Low High Example: Test account locked out.
Lockouts
Example: System slow for all users until cause
Disruptive load
Low Low determined and attacks slowed. Solution: Can be
on system avoided by throttling.
How Can You Best
Test Production Apps?
Production Apps
100
Soln #3
Unsafe Attacks
Depth Soln #2
(% checked Moderate Attacks
for Vuln)
Soln #1
Safe Attacks
0
0
Breadth 1,000+
(# of Apps)
Alternative #4: Test Production
Apps Using Virtualization
A Copy Applications
A A A
B Copy Applications
B B B
C Copy Applications
C C C
Virtualized
Applications Applications Virtualized
Production
Applications
Applications
A
Hailstorm Snapshot of
You can test your
Enterprise B Production
apps for Web ARC
security easily by Applications
Automated C
taking a virtual Continuous
snapshot Assessment
of the apps Detailed continuous assessment results
provided as both a dashboard and exportable
report format
Attaining Breadth & Depth
in Web Application Security
100
Virtualized
Application
Depth Dev / QA Testing
(% checked
Testing
for Vuln)
Safe Attacks
on All Apps
0
0
Breadth 1,000+
(# of Apps)
Cenzic Hailstorm ARC integrated
With VMware LabManager
3. Request 3 4
2
deploy
4. Deploy 6
5. Assess
5
6. Request AEE
ESX ESX ESX
undeploy
VMware Lab Manager /
Virtual Center
Solution 1 – Virtualize
all apps including Production
production for testing
(most value) 3
Solution 2 – Virtualize
QA and Dev for 1
Pre-Production
testing
2
Solution 3 – Conduct
safe attacks on Dev, QA, Staging
production (least
value)
Application Security Best Practices
High
1 time test
Dev / QA
Risk
Continuous testing 1 time test
Dev / QA Dev / QA / Prod
(Safe Tests)
Continuous Testing
Low
Entire SDLC