24.10.2013 Views

FortiWeb and the OWASP Top 10 - Fortinet

FortiWeb and the OWASP Top 10 - Fortinet

FortiWeb and the OWASP Top 10 - Fortinet

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

FORTINET – <strong>FortiWeb</strong> <strong>and</strong> <strong>the</strong> <strong>OWASP</strong> <strong>Top</strong> <strong>10</strong><br />

Mitigating <strong>the</strong> most dangerous application security threats<br />

A8. Failure to Restrict URL<br />

Access<br />

A9. Insufficient Transport<br />

Layer Protection<br />

A<strong>10</strong>.Unvalidated Redirects<br />

<strong>and</strong> Forwards<br />

Summary<br />

Many web applications check URL access rights<br />

before rendering protected links <strong>and</strong> buttons.<br />

However, applications need to perform similar<br />

access control checks each time <strong>the</strong>se pages<br />

are accessed, or attackers will be able to forge<br />

URLs to access <strong>the</strong>se hidden pages anyway.<br />

Applications frequently fail to au<strong>the</strong>nticate,<br />

encrypt, <strong>and</strong> protect <strong>the</strong> confidentiality <strong>and</strong><br />

integrity of sensitive network traffic. When<br />

<strong>the</strong>y do, <strong>the</strong>y sometimes support weak<br />

algorithms, use expired or invalid certificates,<br />

or do not use <strong>the</strong>m correctly.<br />

Web applications frequently redirect <strong>and</strong><br />

forward users to o<strong>the</strong>r pages <strong>and</strong> websites, <strong>and</strong><br />

use untrusted data to determine <strong>the</strong><br />

destination pages. Without proper validation,<br />

attackers can redirect victims to phishing or<br />

malware sites, or use forwards to access<br />

unauthorized pages.<br />

PAGE 7<br />

Au<strong>the</strong>ntication Offload allows<br />

organizations to use <strong>FortiWeb</strong> to<br />

au<strong>the</strong>nticate different URLs in different<br />

Realms. Administrators can define URL<br />

groups that require specific<br />

au<strong>the</strong>ntication while o<strong>the</strong>r URLs open to<br />

<strong>the</strong> public. Using <strong>FortiWeb</strong>’s<br />

au<strong>the</strong>ntication capability ensures correct<br />

URL access rights are enforced.<br />

<strong>FortiWeb</strong>, when deployed as a reverse<br />

proxy, adds a SSL layer <strong>and</strong> enforces SSL<br />

v3 only <strong>and</strong> cipher size higher than 128<br />

bits to maintain strong encryption.<br />

Auto-Learn profiling indentifies when<br />

parameters are used in a different manner<br />

<strong>the</strong>n supposed to. Validation enforcement<br />

makes sure characters that are usually<br />

associated with redirects <strong>and</strong> forwards are not<br />

allowed as part application usage.<br />

The <strong>OWASP</strong> <strong>Top</strong> Ten provides a great starting point for customers to measure <strong>the</strong>ir application security <strong>and</strong> prioritize<br />

<strong>the</strong>ir risk. M<strong>and</strong>ated by <strong>the</strong> Payment Card Industry (PCI) st<strong>and</strong>ard as a key requirement as part of section 6 <strong>and</strong> widely<br />

adopted by many organizations <strong>the</strong> <strong>OWASP</strong> <strong>Top</strong> <strong>10</strong> is an important guideline that helps companies focus on application<br />

security.<br />

<strong>FortiWeb</strong>’s integrated Web Application Firewall <strong>and</strong> Vulnerability assessment scanner allow customers to protect against<br />

high risk attacks such as defined in <strong>the</strong> <strong>OWASP</strong> <strong>Top</strong> Ten <strong>and</strong> many o<strong>the</strong>rs.<br />

<strong>Fortinet</strong> (NASDAQ: FTNT) is a worldwide p rovider of network security appliances <strong>and</strong> <strong>the</strong> market leader in unified th reat management (UTM). Our<br />

products <strong>and</strong> subscription services p rovide broad, integrated <strong>and</strong> high-performance p rotection against dynamic security th reats while simplifying<br />

<strong>the</strong> IT security infrastructu re. Our customers include enterprises, service p roviders <strong>and</strong> gove rnment entities worldwide, including <strong>the</strong> majority of <strong>the</strong><br />

2009 Fortune Global <strong>10</strong>0. <strong>Fortinet</strong> ’s flagship FortiGate p roduct delivers ASIC-accelerated performance <strong>and</strong> integrates multiple layers of security<br />

designed to help p rotect against application <strong>and</strong> network th reats. <strong>Fortinet</strong> ’s broad product line goes beyond UTM to help secu re <strong>the</strong> extended en -<br />

terprise – from endpoints, to <strong>the</strong> perimeter <strong>and</strong> <strong>the</strong> co re, including databases <strong>and</strong> applications. <strong>Fortinet</strong> is headquarte red in Sunnyvale, Calif., with<br />

offices around <strong>the</strong> world.<br />

[Document #]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!