SlideShare a Scribd company logo
Akamai is the global leader in Content Delivery Network (CDN) services, making the
Internet fast, reliable and secure for its customers. The company's advanced web
performance, mobile performance, cloud security and media delivery solutions are
revolutionizing how businesses optimize consumer, enterprise and entertainment
experiences for any device, anywhere.
• Akamai delivers daily web traffic reaching more than 30 Terabits per second
• Akamai delivers nearly 3 trillion internet interactions each day
• Akamai has the most pervasive content delivery network(CDN) – more than 240.000
servers in over 130 countries and more than 1.600 networks around the world.
About Akamai
How the Akamai Intelligent Platform Works
Akamai Configuration Segment
Origin Server and DNS
- www.sony.co.uk
IN CNAME [Akamai
edge]
- origin.sony.co.uk
IN A [Origin server
IP]
SSL Certificate
Two types of certificate in Akamai
• Client to Akamai (①)
• Akamai to Origin (②, ③)
Redirection / Modify Path
There are two types of URL redirection methodologies in Akamai. One is general 301/302 redirection and
the other one is to change origin forwarding.
1) 301/302 Redirection
1) Redirection from a certain path to a different path
2) Redirection from a certain path to a different host
3) Redirection from a certain path to a different host and a different path
4) Relative path redirection
2) Modify path
Akamai modify path can forward a previously defined URL to a different origin server which is not main
origin.
www.sony.co.uk/electronics/*  GWT origin server
www.sony.co.uk/mysony/*  Region origin server
TTL – Time to Live / Cache rule
Two methodologies in Akamai
1) setting cache control by certain path
/mysony/* no-cache, /campaign/* 30 min
2) setting cache control by certain extension
.css 4hours, .js 30min
Failover
When and how to show “Sorry page”
When edge servers receives 500/503 error code from origin servers, Akamai will switch to “Sorry page”.
Note: “Sorry page” will not be cached in Akamai server. Instead of caching “Sorry page”, Akamai edge
remembers the exact Client IP for 30 seconds and during this moment Akamai keep showing “Sorry page”
to the same client. Since “Sorry page” is never be cached, there is no need to do a cache clear during
whole activity.
NetStorage
NetStorage is a storage service that provided by Akamai platform.
Sample of a NetStorage content link: www.sony.co.uk/test/eu/sample.jpg
Security Solution
Security Solution Overview
Security Solution Function List
# Function name Description Target of threat
1 Rate control Restrict requests from specific IP addresses temporarily when it
detected to be exceeded threshold by number of accesses in a
short period of time by same IP
DDoS
2 NW list
management
Apply Whitelist and Blacklist to block access to Akamai edge unauthorized
access and
Attacker IPs
3 WAF Based on OWASP mod-security rule set, Akamai WAF inspect
HTTP request body to protect against attacks such as SQL Injection
& Cross-Site Scripting
Site penetration,
SQL injection,
XSS etc.
4 Edge Servers Block other than HTTP and HTTPS protocols. Mitigates DDoS
attacks by distributed processing on over 100,000 servers
DDoS
5 Site Shield Allow accesses to origin servers via Akamai network only by
registering typical Akamai server IP to the Firewall
DDoS,
unauthorized
access
Rate Control
To protect origin server from the much requests during short time period like DDoS, there is a security
option service called Rate Control.
Rate Control has several rules. Each rules has 2 types of threshold based on actual access analysis.
If an IP exceeds with the threshold, Akamai blocks the request coming from the specific IP. After 15
minutes, Akamai will allows the access again unless it exceeding thresholds again.
Operation team analyzes Akamai access log periodically and redefine the thresholds.
DDoS mitigation
A Reverse Proxy & Load Balancer
Only accepts application layer traffic via ports 80 (HTTP) & 443 (HTTPS)
Network attacks dropped at Edge
UDP Fragments, ICMP Floods, SYN Floods, ACK Floods, RESET Floods, UDP Floods
Massive scalability
Average traffic volume of 6Tbps spiking in
excess of 9Tbps,
Defend one network hop from request – keep
away from Origin
Natively in path
No rerouting, no added latency,
no single point of failure
Network List Management
To protect non-prod environments from accesses of public internet, there is a security option
service called Network list management.
• Allow or restrict requests from
specific IP addresses
• Implement IP Blacklists &
Whitelists
• Geography-based blocking
• 10,000 CIDR entries supported
Named lists – e.g. Tor exit nodes
WAF
Application-layer controls inspect HTTP request body to protect against attacks such as
SQL Injection & Cross-Site Scripting
Akamai WAF is provided based on OWASP Mod-Security. By distributing processing on the large
number of Akamai servers, it does not affect to the performance even it received a large number of
malicious requests.
OWASP ModSecurity Core Rule Set
• Protocol Violations
• Protocol Anomalies
• Request Limits
• HTTP Policy
• Generic Attacks
• Trojans
• Outbound (Leakage)
WAF
Akamai WAF checks the request whether to match the rules one by one of more than 200.
Because each rules are defined based on anomaly score, Akamai checks that whether total
of anomaly score by the request exceed threshold. Each threshold for each Risk group such
as XSS/SQL injection are defined based on Best Practices by Akamai.
Custom Rules
Create policy-based rules that are enforced before or after execution of the
application layer controls
WAF : Scoring samples
Site Shield
To protect origin server from public internet, there is a security option service called Site
Shield.
With this service a list of Akamai edge server IPs is provided to Sony. Origin Servers in Sony
network need to whitelist those IPs in Firewall and also need to limit access only to those IPs.
Restricted access is aiming for protecting origin servers from various Internet security threats
comes to origin directly.
Notes: This IP list is updated regularly due to Akamai regular server maintenance. Sony
needs to update whitelist in each firewall that shielding origin servers.
Q & A

More Related Content

What's hot

Web Application Firewall
Web Application FirewallWeb Application Firewall
Web Application Firewall
Chandrapal Badshah
 
Azure WAF
Azure WAFAzure WAF
Azure WAF
Cheah Eng Soon
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
Akamai Technologies
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
Cisco Canada
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
YouAttestSlideshare
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
Cloudflare
 
UI5 with Akamai - Introduction to the Content Delivery Network
UI5 with Akamai - Introduction to the Content Delivery NetworkUI5 with Akamai - Introduction to the Content Delivery Network
UI5 with Akamai - Introduction to the Content Delivery Network
Gokul Anand E, PMP®
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
Prime Infoserv
 
Understanding SASE
Understanding SASE Understanding SASE
Understanding SASE
Haris Chughtai
 
Connecting Your SIEM Tool with Akamai Security Events
Connecting Your SIEM Tool with Akamai Security EventsConnecting Your SIEM Tool with Akamai Security Events
Connecting Your SIEM Tool with Akamai Security Events
Akamai Developers & Admins
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewallskkkseld
 
AWS Cloud Security
AWS Cloud SecurityAWS Cloud Security
AWS Cloud Security
AWS Riyadh User Group
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks
 
AWS WAF
AWS WAFAWS WAF
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
Guardicore - Shrink Your Attack Surface with Micro-SegmentationGuardicore - Shrink Your Attack Surface with Micro-Segmentation
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
CSNP
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
BAKOTECH
 
Advanced security in Barracuda WAF
Advanced security in Barracuda WAFAdvanced security in Barracuda WAF
Advanced security in Barracuda WAF
Aravindan A
 
Secure code practices
Secure code practicesSecure code practices
Secure code practices
Hina Rawal
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
n|u - The Open Security Community
 
Building an E-Commerce Business on AWS
Building an E-Commerce Business on AWSBuilding an E-Commerce Business on AWS
Building an E-Commerce Business on AWS
Amazon Web Services
 

What's hot (20)

Web Application Firewall
Web Application FirewallWeb Application Firewall
Web Application Firewall
 
Azure WAF
Azure WAFAzure WAF
Azure WAF
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
UI5 with Akamai - Introduction to the Content Delivery Network
UI5 with Akamai - Introduction to the Content Delivery NetworkUI5 with Akamai - Introduction to the Content Delivery Network
UI5 with Akamai - Introduction to the Content Delivery Network
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Understanding SASE
Understanding SASE Understanding SASE
Understanding SASE
 
Connecting Your SIEM Tool with Akamai Security Events
Connecting Your SIEM Tool with Akamai Security EventsConnecting Your SIEM Tool with Akamai Security Events
Connecting Your SIEM Tool with Akamai Security Events
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
AWS Cloud Security
AWS Cloud SecurityAWS Cloud Security
AWS Cloud Security
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
 
AWS WAF
AWS WAFAWS WAF
AWS WAF
 
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
Guardicore - Shrink Your Attack Surface with Micro-SegmentationGuardicore - Shrink Your Attack Surface with Micro-Segmentation
Guardicore - Shrink Your Attack Surface with Micro-Segmentation
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Advanced security in Barracuda WAF
Advanced security in Barracuda WAFAdvanced security in Barracuda WAF
Advanced security in Barracuda WAF
 
Secure code practices
Secure code practicesSecure code practices
Secure code practices
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Building an E-Commerce Business on AWS
Building an E-Commerce Business on AWSBuilding an E-Commerce Business on AWS
Building an E-Commerce Business on AWS
 

Similar to Akamai waf

CIRCUIT 2015 - Akamai: Caching and Beyond
CIRCUIT 2015 - Akamai:  Caching and BeyondCIRCUIT 2015 - Akamai:  Caching and Beyond
CIRCUIT 2015 - Akamai: Caching and Beyond
ICF CIRCUIT
 
Content Growth by Kams Yueng
Content Growth by Kams YuengContent Growth by Kams Yueng
Content Growth by Kams Yueng
MyNOG
 
Clone your Network with OpenNebula
Clone your Network with OpenNebulaClone your Network with OpenNebula
Clone your Network with OpenNebula
NETWAYS
 
OpenNebulaConf 2013 - Keynote: Clone your Network with OpenNebula by Thomas H...
OpenNebulaConf 2013 - Keynote: Clone your Network with OpenNebula by Thomas H...OpenNebulaConf 2013 - Keynote: Clone your Network with OpenNebula by Thomas H...
OpenNebulaConf 2013 - Keynote: Clone your Network with OpenNebula by Thomas H...
OpenNebula Project
 
Akamai company profile
Akamai company profileAkamai company profile
Akamai company profile
rahulp9999
 
BGP and Traffic Engineering with Akamai
BGP and Traffic Engineering with AkamaiBGP and Traffic Engineering with Akamai
BGP and Traffic Engineering with Akamai
Internet Society
 
10+апреля+лучшие+практики+и+инновации+вадим+береговский+akamai
10+апреля+лучшие+практики+и+инновации+вадим+береговский+akamai10+апреля+лучшие+практики+и+инновации+вадим+береговский+akamai
10+апреля+лучшие+практики+и+инновации+вадим+береговский+akamai
elenae00
 
10+апреля+лучшие+практики+и+инновации+вадим+береговский+akamai
10+апреля+лучшие+практики+и+инновации+вадим+береговский+akamai10+апреля+лучшие+практики+и+инновации+вадим+береговский+akamai
10+апреля+лучшие+практики+и+инновации+вадим+береговский+akamaielenae00
 
40 - IDNOG03 - Bob Lau (Akamai) - BGP and Traffic Engineering
40 - IDNOG03  - Bob Lau (Akamai) - BGP and Traffic Engineering40 - IDNOG03  - Bob Lau (Akamai) - BGP and Traffic Engineering
40 - IDNOG03 - Bob Lau (Akamai) - BGP and Traffic Engineering
Indonesia Network Operators Group
 
Cyberoam security on amazon web services
Cyberoam security on amazon web servicesCyberoam security on amazon web services
Cyberoam security on amazon web services
CyberoamAcademy
 
Kona Web Application Firewall Product Brief - Application-layer defense to pr...
Kona Web Application Firewall Product Brief - Application-layer defense to pr...Kona Web Application Firewall Product Brief - Application-layer defense to pr...
Kona Web Application Firewall Product Brief - Application-layer defense to pr...
Akamai Technologies
 
Deployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceDeployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_appliance
Alfredo Boiero Sanders
 
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiAtmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
PROIDEA
 
AWS Summit Sydney 2014 | Understanding AWS Security
AWS Summit Sydney 2014 | Understanding AWS SecurityAWS Summit Sydney 2014 | Understanding AWS Security
AWS Summit Sydney 2014 | Understanding AWS Security
Amazon Web Services
 
AWS re:Invent 2016: Amazon CloudFront Flash Talks: Best Practices on Configur...
AWS re:Invent 2016: Amazon CloudFront Flash Talks: Best Practices on Configur...AWS re:Invent 2016: Amazon CloudFront Flash Talks: Best Practices on Configur...
AWS re:Invent 2016: Amazon CloudFront Flash Talks: Best Practices on Configur...
Amazon Web Services
 
EDNS0 Client-Subnet for DNS based CDNs by Matt Jansen
EDNS0 Client-Subnet for DNS based CDNs by Matt JansenEDNS0 Client-Subnet for DNS based CDNs by Matt Jansen
EDNS0 Client-Subnet for DNS based CDNs by Matt JansenMyNOG
 
Hackproof Your Cloud – Responding to 2016 Threats
Hackproof Your Cloud – Responding to 2016 ThreatsHackproof Your Cloud – Responding to 2016 Threats
Hackproof Your Cloud – Responding to 2016 Threats
Amazon Web Services
 
Brocade vADC Portfolio Overview 2016
Brocade vADC Portfolio Overview 2016Brocade vADC Portfolio Overview 2016
Brocade vADC Portfolio Overview 2016
Scott Sims
 
Hackproof Your Cloud: Responding to 2016 Threats
Hackproof Your Cloud: Responding to 2016 Threats Hackproof Your Cloud: Responding to 2016 Threats
Hackproof Your Cloud: Responding to 2016 Threats
CloudCheckr
 
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...
Amazon Web Services
 

Similar to Akamai waf (20)

CIRCUIT 2015 - Akamai: Caching and Beyond
CIRCUIT 2015 - Akamai:  Caching and BeyondCIRCUIT 2015 - Akamai:  Caching and Beyond
CIRCUIT 2015 - Akamai: Caching and Beyond
 
Content Growth by Kams Yueng
Content Growth by Kams YuengContent Growth by Kams Yueng
Content Growth by Kams Yueng
 
Clone your Network with OpenNebula
Clone your Network with OpenNebulaClone your Network with OpenNebula
Clone your Network with OpenNebula
 
OpenNebulaConf 2013 - Keynote: Clone your Network with OpenNebula by Thomas H...
OpenNebulaConf 2013 - Keynote: Clone your Network with OpenNebula by Thomas H...OpenNebulaConf 2013 - Keynote: Clone your Network with OpenNebula by Thomas H...
OpenNebulaConf 2013 - Keynote: Clone your Network with OpenNebula by Thomas H...
 
Akamai company profile
Akamai company profileAkamai company profile
Akamai company profile
 
BGP and Traffic Engineering with Akamai
BGP and Traffic Engineering with AkamaiBGP and Traffic Engineering with Akamai
BGP and Traffic Engineering with Akamai
 
10+апреля+лучшие+практики+и+инновации+вадим+береговский+akamai
10+апреля+лучшие+практики+и+инновации+вадим+береговский+akamai10+апреля+лучшие+практики+и+инновации+вадим+береговский+akamai
10+апреля+лучшие+практики+и+инновации+вадим+береговский+akamai
 
10+апреля+лучшие+практики+и+инновации+вадим+береговский+akamai
10+апреля+лучшие+практики+и+инновации+вадим+береговский+akamai10+апреля+лучшие+практики+и+инновации+вадим+береговский+akamai
10+апреля+лучшие+практики+и+инновации+вадим+береговский+akamai
 
40 - IDNOG03 - Bob Lau (Akamai) - BGP and Traffic Engineering
40 - IDNOG03  - Bob Lau (Akamai) - BGP and Traffic Engineering40 - IDNOG03  - Bob Lau (Akamai) - BGP and Traffic Engineering
40 - IDNOG03 - Bob Lau (Akamai) - BGP and Traffic Engineering
 
Cyberoam security on amazon web services
Cyberoam security on amazon web servicesCyberoam security on amazon web services
Cyberoam security on amazon web services
 
Kona Web Application Firewall Product Brief - Application-layer defense to pr...
Kona Web Application Firewall Product Brief - Application-layer defense to pr...Kona Web Application Firewall Product Brief - Application-layer defense to pr...
Kona Web Application Firewall Product Brief - Application-layer defense to pr...
 
Deployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceDeployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_appliance
 
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł KuśmierskiAtmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
Atmosphere 2014: Helping the Internet to scale since 1998 - Paweł Kuśmierski
 
AWS Summit Sydney 2014 | Understanding AWS Security
AWS Summit Sydney 2014 | Understanding AWS SecurityAWS Summit Sydney 2014 | Understanding AWS Security
AWS Summit Sydney 2014 | Understanding AWS Security
 
AWS re:Invent 2016: Amazon CloudFront Flash Talks: Best Practices on Configur...
AWS re:Invent 2016: Amazon CloudFront Flash Talks: Best Practices on Configur...AWS re:Invent 2016: Amazon CloudFront Flash Talks: Best Practices on Configur...
AWS re:Invent 2016: Amazon CloudFront Flash Talks: Best Practices on Configur...
 
EDNS0 Client-Subnet for DNS based CDNs by Matt Jansen
EDNS0 Client-Subnet for DNS based CDNs by Matt JansenEDNS0 Client-Subnet for DNS based CDNs by Matt Jansen
EDNS0 Client-Subnet for DNS based CDNs by Matt Jansen
 
Hackproof Your Cloud – Responding to 2016 Threats
Hackproof Your Cloud – Responding to 2016 ThreatsHackproof Your Cloud – Responding to 2016 Threats
Hackproof Your Cloud – Responding to 2016 Threats
 
Brocade vADC Portfolio Overview 2016
Brocade vADC Portfolio Overview 2016Brocade vADC Portfolio Overview 2016
Brocade vADC Portfolio Overview 2016
 
Hackproof Your Cloud: Responding to 2016 Threats
Hackproof Your Cloud: Responding to 2016 Threats Hackproof Your Cloud: Responding to 2016 Threats
Hackproof Your Cloud: Responding to 2016 Threats
 
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

Akamai waf

  • 1.
  • 2. Akamai is the global leader in Content Delivery Network (CDN) services, making the Internet fast, reliable and secure for its customers. The company's advanced web performance, mobile performance, cloud security and media delivery solutions are revolutionizing how businesses optimize consumer, enterprise and entertainment experiences for any device, anywhere. • Akamai delivers daily web traffic reaching more than 30 Terabits per second • Akamai delivers nearly 3 trillion internet interactions each day • Akamai has the most pervasive content delivery network(CDN) – more than 240.000 servers in over 130 countries and more than 1.600 networks around the world. About Akamai
  • 3. How the Akamai Intelligent Platform Works
  • 5. Origin Server and DNS - www.sony.co.uk IN CNAME [Akamai edge] - origin.sony.co.uk IN A [Origin server IP]
  • 6. SSL Certificate Two types of certificate in Akamai • Client to Akamai (①) • Akamai to Origin (②, ③)
  • 7. Redirection / Modify Path There are two types of URL redirection methodologies in Akamai. One is general 301/302 redirection and the other one is to change origin forwarding. 1) 301/302 Redirection 1) Redirection from a certain path to a different path 2) Redirection from a certain path to a different host 3) Redirection from a certain path to a different host and a different path 4) Relative path redirection 2) Modify path Akamai modify path can forward a previously defined URL to a different origin server which is not main origin. www.sony.co.uk/electronics/*  GWT origin server www.sony.co.uk/mysony/*  Region origin server
  • 8. TTL – Time to Live / Cache rule Two methodologies in Akamai 1) setting cache control by certain path /mysony/* no-cache, /campaign/* 30 min 2) setting cache control by certain extension .css 4hours, .js 30min
  • 9. Failover When and how to show “Sorry page” When edge servers receives 500/503 error code from origin servers, Akamai will switch to “Sorry page”. Note: “Sorry page” will not be cached in Akamai server. Instead of caching “Sorry page”, Akamai edge remembers the exact Client IP for 30 seconds and during this moment Akamai keep showing “Sorry page” to the same client. Since “Sorry page” is never be cached, there is no need to do a cache clear during whole activity.
  • 10. NetStorage NetStorage is a storage service that provided by Akamai platform. Sample of a NetStorage content link: www.sony.co.uk/test/eu/sample.jpg
  • 13. Security Solution Function List # Function name Description Target of threat 1 Rate control Restrict requests from specific IP addresses temporarily when it detected to be exceeded threshold by number of accesses in a short period of time by same IP DDoS 2 NW list management Apply Whitelist and Blacklist to block access to Akamai edge unauthorized access and Attacker IPs 3 WAF Based on OWASP mod-security rule set, Akamai WAF inspect HTTP request body to protect against attacks such as SQL Injection & Cross-Site Scripting Site penetration, SQL injection, XSS etc. 4 Edge Servers Block other than HTTP and HTTPS protocols. Mitigates DDoS attacks by distributed processing on over 100,000 servers DDoS 5 Site Shield Allow accesses to origin servers via Akamai network only by registering typical Akamai server IP to the Firewall DDoS, unauthorized access
  • 14. Rate Control To protect origin server from the much requests during short time period like DDoS, there is a security option service called Rate Control. Rate Control has several rules. Each rules has 2 types of threshold based on actual access analysis. If an IP exceeds with the threshold, Akamai blocks the request coming from the specific IP. After 15 minutes, Akamai will allows the access again unless it exceeding thresholds again. Operation team analyzes Akamai access log periodically and redefine the thresholds.
  • 15. DDoS mitigation A Reverse Proxy & Load Balancer Only accepts application layer traffic via ports 80 (HTTP) & 443 (HTTPS) Network attacks dropped at Edge UDP Fragments, ICMP Floods, SYN Floods, ACK Floods, RESET Floods, UDP Floods Massive scalability Average traffic volume of 6Tbps spiking in excess of 9Tbps, Defend one network hop from request – keep away from Origin Natively in path No rerouting, no added latency, no single point of failure
  • 16. Network List Management To protect non-prod environments from accesses of public internet, there is a security option service called Network list management. • Allow or restrict requests from specific IP addresses • Implement IP Blacklists & Whitelists • Geography-based blocking • 10,000 CIDR entries supported Named lists – e.g. Tor exit nodes
  • 17. WAF Application-layer controls inspect HTTP request body to protect against attacks such as SQL Injection & Cross-Site Scripting Akamai WAF is provided based on OWASP Mod-Security. By distributing processing on the large number of Akamai servers, it does not affect to the performance even it received a large number of malicious requests. OWASP ModSecurity Core Rule Set • Protocol Violations • Protocol Anomalies • Request Limits • HTTP Policy • Generic Attacks • Trojans • Outbound (Leakage)
  • 18. WAF Akamai WAF checks the request whether to match the rules one by one of more than 200. Because each rules are defined based on anomaly score, Akamai checks that whether total of anomaly score by the request exceed threshold. Each threshold for each Risk group such as XSS/SQL injection are defined based on Best Practices by Akamai. Custom Rules Create policy-based rules that are enforced before or after execution of the application layer controls
  • 19. WAF : Scoring samples
  • 20. Site Shield To protect origin server from public internet, there is a security option service called Site Shield. With this service a list of Akamai edge server IPs is provided to Sony. Origin Servers in Sony network need to whitelist those IPs in Firewall and also need to limit access only to those IPs. Restricted access is aiming for protecting origin servers from various Internet security threats comes to origin directly. Notes: This IP list is updated regularly due to Akamai regular server maintenance. Sony needs to update whitelist in each firewall that shielding origin servers.
  • 21. Q & A