13.07.2015 Views

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

IBM WebSphere V5.0 Security - CGISecurity

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

andwidth to and from the server until it can no longer handle legitimaterequests, are not strictly in the realm of security since no information is changedor stolen. Real time operational performance reporting and pre-arrangedre-routing procedures are the only real defense. IP spoofing, impersonatinganother legitimate connection and thereby passing the IP and protocol filters offirewalls is an area of more concern and so IP addresses alone cannot bereliably used to identify authorized connections unless you are absolutely certainyou have a trusted path between both the source machine and the target.Where physical access is compromised, network sniffing, inserting a device orsoftware which reads all the traffic between two points for later analysis or evenreal time substitution becomes possible. Virtual Private Networks (VPN) andcryptographic technologies can address some of these issues on a point to pointbasis between pieces of the infrastructure. A “trusted path”, that is, anun-encrypted or non-certificate passed connection can only be considered withinRegion 2 DMZs when physical access and personnel are absolutely controlled;for example: a crossover cable from a firewall port to a security proxy.Exploitation of bugs in the software services throughout the infrastructure is avery real threat. In order to secure systems from this kind of attack, operationalprocedures to keep patches and fixes up to date must be in place and theimplementation of a “defense in depth” architecture is recommended, such asthe one illustrated in Figure 12-1 on page 375, where there are multiple physicaland logical layers that an attack must compromise each in turn before gainingaccess to the application and its information.Each segment of the infrastructure which supports an e-business applicationmust be analyzed for possible risk and the overall design of your system shouldinclude risk mitigation methods at each point.12.2 Network identity and centralized security servicesTivoli Access Manager for e-business V3.9 is the current name for what inimmediately previous versions has been Tivoli SecureWay Policy Director.Access Manager is a collected suite of security management services with avariety of distributed blades and plug-ins for the infrastructure components ofe-business applications.The renaming is significant as it highlights one of the overriding concerns for anyenterprise with multiple Web based applications: how do you control accessacross your entire e-business infrastructure without multiple and possiblyconflicting security policies?372 <strong>IBM</strong> <strong>WebSphere</strong> <strong>V5.0</strong> <strong>Security</strong> Handbook

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!