Layer 7: Managing SOA Security and Operations with SecureSpan

1,221 views
1,082 views

Published on

Francois Lascelles presents Managing SOA Security and Operations with Layer 7's SecureSpan.

Published in: Technology, Business
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,221
On SlideShare
0
From Embeds
0
Number of Embeds
8
Actions
Shares
0
Downloads
1
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Layer 7: Managing SOA Security and Operations with SecureSpan

  1. 1. Managing SOA Security and Operations with SecureSpan Francois Lascelles Technical Director, Layer 7 Technologies
  2. 2. About Layer 7 <ul><li>Layer 7 is the leading vendor of security and governance for: </li></ul>2003 2006 2009 Customers Revenue XML SOA Cloud
  3. 3. Why Layer 7 SecureSpan? <ul><li>Faster time to market </li></ul><ul><ul><ul><ul><li>Reduce development, deployment and management efforts </li></ul></ul></ul></ul><ul><ul><ul><ul><li>JBossESB infrastructure service, delegate business logic </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Faster additions, changes </li></ul></ul></ul></ul><ul><li>Governance </li></ul><ul><ul><ul><ul><li>Enterprise-wide view of services </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Real time monitoring, reporting </li></ul></ul></ul></ul><ul><li>Agility </li></ul><ul><ul><ul><ul><li>Service virtualization </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Decoupled policy enforcement </li></ul></ul></ul></ul><ul><li>Security </li></ul><ul><ul><ul><ul><li>Threat protection, access control, trust management, … </li></ul></ul></ul></ul>
  4. 4. SecureSpan XML Gateway  secure ws transit point  ws-security implementation  trust management  mediation, integration  threat protection  auditing, sla  monitoring, reporting
  5. 5. Hardware or software appliance form factor <ul><li>Hardware Appliance </li></ul><ul><li>Military grade, hardened device </li></ul><ul><li>Telecom grade performance </li></ul><ul><li>FIPS 140-2 certified crypto </li></ul><ul><li>Hard and soft XML acceleration </li></ul><ul><li>Virtual Appliance </li></ul><ul><li>Pre-installed, hardened RHEL image </li></ul><ul><li>ESX certified, Amazon, private clouds </li></ul><ul><li>FIPS 140-2 certified crypto (soft mode) </li></ul><ul><li>Soft (native) XML acceleration </li></ul>COTS appliance form factor enables ‘drop-in’ solution with minimal deployment time and instant value. No agents to deploy, no dependencies.
  6. 6. Policy Studio Policies are created by organizing assertions in logical tree structures. Policies are changed on the fly, without service interruptions. Rich palette, extensible through JAVA API. Design, implementation and deployment in hours, not months or years. Automated, scripted provisioning and management through API.
  7. 7. Message level aware intermediary Web Services Delegate common or expensive XML related tasks from your endpoints to your infrastructure. Cut development costs and increase governance by implementing more business logic at infrastructure level.
  8. 8. How to implement security in the Enterprise SOA? <ul><li>Authentication </li></ul><ul><li>Authorization </li></ul><ul><li>Integrity </li></ul><ul><li>Confidentiality </li></ul><ul><li>Key management </li></ul><ul><li>Threat protection </li></ul><ul><li>Non-repudiation </li></ul><ul><li>Audit </li></ul>Security implemented in the service endpoints? endpoints applications IAM <ul><li>Less governance </li></ul><ul><li>Expensive development task </li></ul><ul><li>An obstacle to loose coupling </li></ul><ul><li>Resources not used effectively </li></ul><ul><li>ESB and WS stacks not appropriate for edge security </li></ul>
  9. 9. Delegating endpoint security XML Gateway enforces security for incoming traffic on behalf of protected services. XML Gateway secures outgoing traffic on behalf of protected services. protected services
  10. 10. Identity Federation, Trust Management <ul><li>Identity and Access Management interfacing </li></ul><ul><ul><ul><li>Runtime access control rules enforcement </li></ul></ul></ul><ul><ul><ul><li>LDAP, SUN OpenSSO, Novell AM, Oracle AM, Netegrity, Tivoli, MSAD </li></ul></ul></ul><ul><li>STS, SSO </li></ul><ul><ul><ul><li>SAML issuing, validation </li></ul></ul></ul><ul><ul><ul><li>WS-Trust, SAML-P </li></ul></ul></ul><ul><ul><ul><li>WS-SecureConversation </li></ul></ul></ul><ul><ul><ul><li>WS Federation </li></ul></ul></ul><ul><li>Fined grain trust management </li></ul>
  11. 11. Threat Protection <ul><li>Network/OS level threats </li></ul><ul><li>Message level threats </li></ul><ul><li>Consistent security policies for heterogeneous environment </li></ul>Schema poisoning Recursive entity attacks Code injections WSDL fishing Parser attacks …
  12. 12. Service level monitoring, enforcement <ul><li>Real time contract lookup and enforcement (SLA) </li></ul><ul><li>Throughput quotas </li></ul><ul><ul><ul><li>Per identity, per operation </li></ul></ul></ul><ul><li>Throttling </li></ul><ul><ul><ul><li>Protect service endpoints </li></ul></ul></ul><ul><li>Monitoring of response times </li></ul><ul><ul><ul><li>Custom alert triggers </li></ul></ul></ul><ul><ul><ul><li>Custom reporting </li></ul></ul></ul><ul><li>Priority routing rules </li></ul>
  13. 13. Loose coupling, late binding Who does that? Route message to appropriate endpoint <ul><li>Routing based on </li></ul><ul><li>remote IP </li></ul><ul><li>content </li></ul><ul><li>identity, identity attribute </li></ul><ul><li>pattern </li></ul>New type of request <ul><li>Last minute binding involving consultation of resource </li></ul><ul><li>LDAP </li></ul><ul><li>UDDI </li></ul><ul><li>database </li></ul><ul><li>external WS </li></ul>
  14. 14. ESB co-processing <ul><li>SecureSpan Infrastructure Service </li></ul><ul><ul><li>Accelerated XSLT </li></ul></ul><ul><ul><li>Accelerated XSD </li></ul></ul><ul><ul><li>Accelerated pattern detection </li></ul></ul><ul><ul><li>WSS Processing </li></ul></ul><ul><ul><li>SLA Enforcement </li></ul></ul>JBossESB
  15. 15. Enterprise Service Manager Agent-less WS Management  Enterprise wide view of services  Performance and usage reports  Service and policy migration  Remote gateway start/stop  Custom reports  Remote gateway upgrade, upload modules*
  16. 16. Assisted migration across environments
  17. 17. Enterprise services in the cloud Enterprise deploys own services on cloud provider Monitoring? Msg level security? Quality of service? Reports? Enterprise subscriber Lack of in-house service governance is a barrier to adoption
  18. 18. SecureSpan on public/enterprise cloud
  19. 19. Customer case: air traffic scheduling service provider Hosted service Data agglomeration Fixed file length proprietary format LHR AMS FRA YYZ Runway information fed from airports Repurposed data sent to airlines and outsourced systems EDS flight planner Lufthansa systems Swiss airline <ul><li>Edge security, threat protection </li></ul><ul><li>Trust management </li></ul><ul><li>Transformation </li></ul><ul><li>Service virtualization </li></ul>
  20. 20. Customer case: insurance cross platform integration <ul><li>Central access point to all services </li></ul><ul><li>Transport mediation (e.g. http to mq) </li></ul><ul><li>WS mediation (e.g. addressing, security) </li></ul><ul><li>Identity mapping </li></ul><ul><li>Centralized transaction platform </li></ul><ul><li>Mainframe </li></ul><ul><ul><li>- consumers </li></ul></ul><ul><ul><li>- providers </li></ul></ul><ul><li>Enterprise resource planning </li></ul><ul><li>SAP (XI/PI) </li></ul><ul><ul><li>- consumers </li></ul></ul><ul><ul><li>- providers </li></ul></ul><ul><li>Distributed transaction platform </li></ul><ul><li>JBoss </li></ul><ul><ul><li>- consumers </li></ul></ul><ul><ul><li>- providers </li></ul></ul><ul><li>Office Automation </li></ul><ul><li>. NET , Office </li></ul><ul><ul><li>- consumers </li></ul></ul><ul><ul><li>- providers </li></ul></ul>
  21. 21. Customer case: healthcare electronic exchange - Health records - Prescriptions - Provider services National PKI infrastructure … <ul><li>Service virtualization for simulation projects </li></ul><ul><li>Complex security validation </li></ul><ul><ul><li>SHA256 based signatures </li></ul></ul><ul><ul><li>Custom token extensions </li></ul></ul><ul><li>Full PKI integration, revocation checking </li></ul><ul><li>Sophisticated validation (XSD, Schematron) </li></ul>Hospital and emergency applications
  22. 22. Customer case: military CDS <ul><li>Guard pattern </li></ul><ul><li>Federation/Trust Management/SAML </li></ul><ul><li>Data screening </li></ul><ul><li>FIPS 140-2 level 3 compliancy </li></ul><ul><li>Common criteria EAL4+ </li></ul>AIR FORCE Others ARMY NAVY
  23. 23. For more information about SecureSpan: http://www.layer7tech.com

×