03.05.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

12.1 End-to-end security<br />

This part of the book largely concentrates on securing <strong>WebSphere</strong> hosted<br />

applications, but the application is only one part of the e-business infrastructure<br />

which provides the services to support the publication of applications to the<br />

intended user audience.<br />

In order to provide a secure solution, the entire infrastructure and the flow of data<br />

through the infrastructure must be examined for possible breaches. Best<br />

practices require that a complete Risk Analysis be carried out and Risk Mitigation<br />

processes implemented with the remaining risks proactively monitored and the<br />

entire system regularly audited.<br />

<strong>Security</strong> needs to be addressed at several levels, physical access, network<br />

access, platform operating system(s), application services throughout the<br />

infrastructure, for example: Web server software, middleware connectors and<br />

messaging infrastructure, and trusted operational personnel.<br />

Each level must be addressed both independently of and together with the<br />

others. The most trivial example would be a system where all other levels had<br />

been addressed except that of the personnel.<br />

Corrupt and/or malicious employees with authorized access to a system are the<br />

single greatest security threat and, apart from proactive auditing, there is little<br />

that can be effective there in a technological solution.<br />

Though this is often overlooked, access to the physical elements of a system can<br />

open the system to attack both by intruders, people who should not have<br />

physical access and in the more common case by otherwise authorized<br />

personnel. Once direct access to either the servers or the network devices, for<br />

example the hub/switch to which clustered application servers are connected, is<br />

obtained, then all the other methods of attack become much easier.<br />

If the platform operating systems have not been “hardened” then free range<br />

administrative and diagnostic tools installed by default can be used both to cause<br />

damage and compromise information, either by changing or stealing it.<br />

“Hardening” systems at this level must include file permissions and passwords.<br />

Particular care must be taken with “remote” administration tools, be they<br />

accessed by browser or thick client.<br />

The network level is popularly thought to be most often attacked, at least as<br />

represented in the popular media. After all, the point of e-business applications is<br />

to publish them so that Internet access for the intended audience is available.<br />

Attacks such as Denial of Service (DoS), where the server is relentlessly<br />

bombarded with thousands of spurious requests with the intention of flooding the<br />

Chapter 12. Tivoli Access Manager 371

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!