英文【Akamai】全栈应用与API安全解决方案白皮书_第1页
英文【Akamai】全栈应用与API安全解决方案白皮书_第2页
英文【Akamai】全栈应用与API安全解决方案白皮书_第3页
英文【Akamai】全栈应用与API安全解决方案白皮书_第4页
英文【Akamai】全栈应用与API安全解决方案白皮书_第5页
已阅读5页,还剩57页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

WHITEPAPER

Akamai

FromWAFtoWAAP:

Akamai’sApproach

toaHolisticAppandAPISecuritySolution

Akamai

Contents

Introduction04

TraditionalaWAF05definitionof

ChallengesWAF06withatraditional

Design—WAFtoWAAP07principles

Akamai’stoWAAP10approach

M10ovingbeyondrulesets

MDDoS10odernizingapplication-layerdefensesbeyondratelimiting

Single11solutionforcomprehensiveprotection

TheAdaptiveSecurityEngine12

Adaptive13threatdetection

A13utomaticupdates

Testingtoensureaccuracy14framework

Automaticself-tuning15

C15onfigurationandautomationflexibility

Verify16intherealworld

I16ntegratingmodernizedprotections

ApplicationsecurityandDDoS18defense

BehavioralDDoSEngine:How19itworks

Applicationaccuracy21security

ClientReputationscores22

Malware23protection

Application24securityanalytics

APIProfiling25Discoveryand

|2

Akamai

|3

Botvisibilityandmitigation27

Bot&APIProtector27visibilityandmitigationintrinsictoApp

Key28botcapabilities

MoreaWAF:29thanBenefitsfromtheAkamaisolution

Threat30intelligenceanddetection

A30kamaiplatformintelligence

Threatresponse31researchandincident

T31hreatresearch

Iresponse31ncident

R31apidthreatdetection

CVE32protection

Globallydistributededgeplatform33

R33eliabilityandresiliency

Global35scale

P35erformance

Edgepowers36platformprotection

ManagedAttackSupport37

SecurityOperationsCommandCenter(SOCC)37

Conclusion38

|4

Akamai

Introduction

Withincreasinglylargeanddiverseattacksurfaces,growingoperationalfriction

andcost,andcontinuouslyevasivemultidimensionalthreats,securityteamsneed

visibilitybeyondthetraditionalwebapplicationfirewall(WAF).Specifically,theyneedmoreautomatedtoolstoincreaseefficiency,anddeeperprotectionsintheappand

applicationprogramminginterface(API)ecosystem.Themoremodernterminology

fortheseprotectionsiswebapplicationandAPIprotection(WAAP).Discerning

organizationsprioritizingthesecurityoftheirbusinessandthesafetyoftheir

customersdemandcomprehensiveprotectionagainstseveralthreatsacrosstheir

entiredigitalestate.Inadditiontoprotectingappsfromknown,unknown,andzero-dayattacks,theseprotectionsinclude:

•Adaptivethreatdetection

•Automatedpolicyupdates

•RobustDDoSdefense

•APIdiscoveryandprotection

•Botvisibilityandmitigation

•Easyintegrationsfordevelopmentlifecycles

ThispaperdiscussesthetraditionalWAFtechnology,theshiftfromWAFtoWAAP,

andthecontinuedmarketdemandthatisevolvingWAAPsolutions.Asanestablishedleaderinthesecurityspace,Akamaifocusesourapproachoninnovatingsecurity

technologiesthatpowerandprotectlifeonlineforendusers.

Akamai

TraditionaldefinitionofaWAF

AtraditionalWAFsitsinthemiddleofthetrafficflowbetweenendusersandaweb

application.TheWAFinspectsunencryptedorencrypted

HTTPtrafficpassingthrough

itforanyattacksasdefinedbyalistofrules.

MostWAFsrelyonapredefinedlistofrulestoidentifymalicious

HTTPrequests

interspersedwithlegitimate

HTTPtraffictoguardagainstthousandsofpotential

knownexploits.Inaddition

,newattackvectorsoradditionalpermutationsofexistingonescontinuouslyevolveandareexploitedbythreatactors.ThisiswhereatraditionalWAFcontinuallyneedstohaveitsrulesupdatedandtunedtothelegitimatetraffic

characteristics,whichwilldifferonaper-applicationbasisandchangeovertime.

Asendusershavedemandedmoreprotectionandperformance,WAFshaveexpandedtheirscopetoincludeadjacentsecuritytechnologiesandserviceslikedistributed

denial-of-service(DDoS)mitigation,APIsecurity,andbotmitigationcapabilities.Thiscontinuingevolutionwarrantsanewdefinitionandnewterminology.

|5

|6

Akamai

ChallengeswithatraditionalWAF

OrganizationswithaWAFoftenclaimthatitfailstomeetinitialexpectationsintermsofeffectiveness,easeofmanagement,andimpactonprotectedapplicationsandAPIs.Duetowebperformanceissuesthatoftenoccurfrominspectingbillionsofweband

APIrequestsformaliciouscode,WAFshaveoftenbeenasourceofintraorganizationalfriction,performancedegradation,andobstructiontodeploymentduetosecurity

protocols.

SomeofthemostsignificantdeploymentchallengeswithtraditionalWAFsstemfromthefollowing:

•Inaccuratedetectionsandhighfalsepositivescreatealertfatigueandadditionalrisk

•WAFsrelyonmanualreview,tuning,andmaintenance

•Lackofgranularcontrolsleadtoheavy-handeddenypoliciesthatinterruptend-userexperienceandbusinessprocesses

•Out-of-datethreatintelligenceincreasesvulnerabilities

•Decreasedperformanceandcoverageduetorestrictionsandinflexibility

•Toolimitedtoprotectdigitalexpansion

TraditionalWAFsareapowerfulsecuritytool.However,theycanoftenleave

organizationswithoperationalpainsandunmitigatedrisksthatwillbeaddressedinthispaper.

OrganizationslookingtoupdatetheirWAFtechnologywithaWAAPsolutionshould

ensurethatthesolutiondeliversbothbusinessvalueandrobustsecurityprotections.TheconversionfromWAFtoWAAPcombinesthispowerofprotectionwith

functionality,efficiencies,andeaseofusetomeetbusinesses’needs,bothforsecurityteamsandotherteams.

|7

Akamai

Designprinciples—WAFtoWAAP

AsthetraditionalWAFproductfocusesonend-userrulecreation,anyvendorcan

buildaWAFsolutionandbringittomarketwithrelativeease,asdemonstratedbytheprevalenceofcommercialofferingsbuiltaroundtheopensourceOpenWorldwide

ApplicationSecurityProjectModSecurityCoreRuleSet(OWASPCRS).

However,itisdifficultforaprovidertodesignacomprehensiveWAAPsolutionthatcan:

•Bedeployedin-linetoprotectapplicationsandAPIsasnewvulnerabilitiesemerge

•Keepupwithmodernappdevelopmentpractices

•ProvideequallystronglayersofDDoSdefense,botmitigation,APIprotection,andclient-sidewebapplicationprotections

AsAkamaiapproachedthedesignofourWAAPsolution,webelieveditshouldbe

morethan“goodenough.”App&APIProtectorwascreatedtoaddresssecurityriskswhilekeepingourcustomerorganizationsfocusedonmajorbusinessobjectives.

Asablueprinttoourdesign,webelievedanidealWAAPsolutionshouldprovide:

Effectivesecurity

Applicationsruneveryaspectofthebusiness.Securingthemagainstmaliceis

thefoundationalgoalofacorporatesecurityteam.SecurityteamsarechallengedtofindaWAAPsolutionthatdeliversbest-of-breeddetectionsinaWAAPsolution.Theidealsecuritytoolprioritizesdetectionefficacy,asitisthemostimportant

aspectofaWAAPsolution,andhasastellartrackrecordofzero-day,exploit,

andCommonVulnerabilitiesandExposures(CVE)defense,aswellasanimpressiveavailabilityhistory.

Accuracy

Securityteamsneedtofindtherightbalanceofmitigatingriskswhileenablingthebusinesstomovewithspeed.Idealsolutionswillhaveself-tuningmechanismsthathelptoreducefalsepositiveswhilenotcompromisingend-userexperienceand

businessprocesses.

Akamai

|8

Modernprotections

Organizationsmustcontinuously(andoftenmanually)updateprotectionstothelatestrulestoaddressnewvulnerabilitiesastheyarediscovered.Todothis,theyneedtwokeyabilities:accesstothelatestintelligenceacrossattackvectorsandskilledsecurityresourcesthatcantailorthedefensestrategytomeetmalleableattacks.Anideal

solutionwillbealeaderinthethreatintelligencecommunityandprovidecapabilitiesthatsimplifysecurityoperationsacrosstheestate’sprotections.

Adaptivity

Thethreatlandscapeevolvesatarapidpace.WithAI-poweredattacksonthehorizon,securityteamsneedtobemoreefficientthaneverintheirsecurityoperations.IdealWAAPsolutionswillhaveacombinationofadvancedautomation,machinelearning,anddeepglobalintelligencetodeliverupdatesautomaticallyandprovidecustomizedrulemodificationsuggestionsthatareimplementedinaclick.

Visibility

TraditionalWAFsolutionstypicallyprovideanever-endingstreamofalertsandrelyonsecuritypractitionerstocarefullyanalyzeeachalertburningthroughin-house

resources.AmoreeffectiveWAAPsolutionprovidesmulti-solutionvisibilityand

proactivecontextaroundattacksbynotifyinganorganizationwhen,where,andhowtheyoccurredtoalleviatetheresourceburden.

Scalability

Asolutionwithoutenoughscaletohandleincomingtrafficcaneasilybecomea

bottleneckthatincreasesweblatencyandhasthepotentialtobreakunderload.AneffectiveWAAPapproachseamlesslyandautomaticallyscalestomatchtrafficdemandsandattacksastheyvaryovertime,andprovidecontinuousprotection

withoutinterruptionorreducedperformance.

Akamai

Cooperation

Aneffectivesecuritysolutionneedstobeintegrableintothecurrentstack,

programmable,simpletouse,andfrictionless.Anidealsolutionbuildsabridgebetweensecurityanddevelopmentteams.

Support

Duringdemandingsecurityevents,organizationsareoftenoverwhelmedbytheskillsandresourcesneededtoprovideatimelyresolution.Anidealsolutionwillhaveregularmanagedserviceoptions,aswellason-demandserviceoptions,thatcanprovide

expertiseandmitigationforcommonscenariosincludingactiveattacks,servicesissues,staffturnover,internalskillsetgaps,andmore.

Withthesedesignprinciplesinmind,let’sexplorehowAkamaiapproachesbuildingourleadingWAAPsolution,App&APIProtector,startingwiththecoretechnology.Oursolutioncombinesmanysecurityproductsinonetoholisticallyaddress

challengesinsecuringapplications,defendingagainstvolumetricDDoSattacks,protectingAPIsacrosstheestate,andcontrollingbottraffic.

|9

|10

Akamai

Akamai’sapproachtoWAAP

Movingbeyondrulesets

AsthemarketmovedfromtraditionalWAFdesignprinciplestothemodernand

effectivesecuritysolutionofWAAP,effectivedetectionandmitigationtechnologyremainedthefocus.

AkamaifirstintroducedourWAFin2009astheworld’sfirstedge-basedWAF.

SecurityvendorsatthistimewereofferingWAFsbasedonstaticrulesetsastheir

foundationfordetections.Akamaidifferentiatedatthattimebybuildingaproprietaryrules-basedenginecalledKonaRuleSet,whichemployedasmallnumberofflexiblerules(ratherthanstaticrules)inconjunctionwithananomalyscoringmodeltobetteraddressaccuracyandvisibilityintoattacks.

Thenin2017,Akamaiintroducedautomatedattackgroups,whicheliminatedthe

needfororganizationstocontinuallyconfigureandupdateruleswithAkamai-managedprotections.Automatedattackgroupswerearevolution,quicklyenabledacross

thousandsofactiveAkamaicustomerWAFpoliciestotakeadvantageofthisnewapproach.

Akamaicontinuedtoevolveourapproachtoapplicationsecurity,prioritizingcombinedapplicationandAPIprotection,includingbotdefensecapabilities,withthelaunchof

App&APIProtectorin2021—thisWAAPsolutionaimedtoreplaceKonaSiteDefenderWAFforenterpriseandgrowingglobalbusinesses.App&APIProtectorchanged

thewayAkamaiapproachedsecurityoperationsbymodernizingtheKonaRuleSettechnologyintotheAdaptiveSecurityEngine.

Modernizingapplication-layerDDoSdefensesbeyondratelimiting

WhenitcomestoDDoS,ratelimitingisaprovenandeffectivetool.Yettheriseof

sophisticatedLayer7DDoSattacks,multi-vectorassaults,andtheexploitationofAPIshaslefttraditionalDDoSdefensesstrugglingtokeepup.Staticdefenses,whichrely

onfixedthresholdsandpredefinedsignatures,arereactiveandpronetofalsepositives,especiallyasattackersincreasinglyblendmalicioustrafficwithlegitimaterequests.

ThisiswhereAkamaichangedtheapproachtoDDoSdefenseandintroducednewinnovationssuchasURLProtectionandtheBehavioralDDoSEngine.

Akamai

|11

The

BehavioralDDoSEngine

isacutting-edgeadditiontoAkamaiApp&APIProtector,joiningtheAdaptiveSecurityEngineasoneofitscoretechnologies.Together,theseenginesofferunprecedentedprotectionagainstmodernthreats,makingAkamaia

leaderinWAAP.Thisdual-engineapproachsetsAkamaiapartbydeliveringautomatedupdates,self-tuningcapabilities,andcontext-awaredetectionforahands-off

experience.

Singlesolutionforcomprehensiveprotection

Today,changecontinuestoredefineapplicationsecuritywithmoderndevelopmentpracticesviaserverlessedgecomputing,microservices-basedarchitectures,single-pageapplications,andSaaS/IaaS/PaaS/FaaSapproachesbeingusedthatshape

applicationsecurity.

ToprotectmodernapplicationsandAPIsincomplexITenvironments,Akamaire-architectedourapplicationsecuritytechnologywithamoreadaptive,flexible,andholisticapproach.AsAkamai’sWAAPsolutionmigratedfromWebApplication

ProtectorandKonaSiteDefendertoApp&APIProtector,moresecuritycapabilitiesandfeaturedtoolsetswereincorporated.

App&APIProtectornowprovidesmanyadditionalsecurityenhancements,allofwhicharevisibleandcontrolledviaasingleinterface.Akamai’sWAAPsolutioncombines:

1.AnAdaptiveSecurityEngine

2.Applicationsecuritywithgranularcontrols

3.DDoSdefense,includingadvancedLayer7DDoSprotection

4.APIprotection,includingdiscoveryandPIIprotectionfeatures

5.Botvisibilityandmitigationcapabilities

6.Aplatformforglobalscale,threatintelligence,andresiliency

|12

Akamai

TheAdaptiveSecurityEngine

TheAdaptiveSecurityEngineprovidesnext-generationprotectionattheintersectionofmachinelearning(ML),real-timesecurityintelligence,cybersecurityexperts,

andadvancedautomation.AsAkamai’scoretechnologyfordetectionanddefense,theAdaptiveSecurityEngineenablesahands-offapproachtoprotectentirewebapplicationsandAPIestates.ItalsoaddstoAkamai’sadvancementsfromWAF

toWAAP,whichincorporatecorrelatingsecuritysolutionsincludingbotmanager,DDoSprotection,DevOpsintegrations,andmore.

Machine

learning

Adaptive

SecurityEngine

Technologybeyond

aWAFrulesetfor

intelligent,proactive

modernization

9PBintelligencedatabase

Advanced

automation

threathunters

400human

TheAdaptiveSecurityEngineisuniquebecauseitlearnstrafficandattackpatterns

uniquetoeachcustomer,analyzesthecharacteristicsofeveryrequestinrealtime,

andusesthatknowledgetointerceptandadapttofuturethreats.Itusesthesame

platforminsightandintelligencetoreducefalsepositivesviatuningrecommendations.Thisself-tuningfeatureofferseaseofusebysecurityanddevelopmentteamsby

deliveringadaptivethreatprotectionsasproactiveupdates.

Akamai

|13

Adaptivethreatdetection

Theengineemploysamultidimensionalthreatscoringmodelthatcombinesplatformintelligencewithdata/metadatafromeachrequest.Thisdataisactionedwith

decision-makinglogictoaccuratelyidentifytrueattacks.

Adaptivedetectionsareespeciallyeffectiveinidentifyinghighlytargeted,evasive,

andstealthyattackssincesophisticatedattackersinvestmoretimeandeffortintheirapproach.Asattackersscanforvulnerabilitiesandmisconfigurations,theAdaptive

SecurityEnginecollectsandcorrelatesevidenceabouttheirtacticstomakeattackers’historicalfingerprintsmoreidentifiable.

Inadditiontotheactualpayloadanditslocationwithintherequest,otherexamplesofattackdimensionsitevaluatesforeachclientinclude:

•Ahistoryofreconnaissanceand/orattacks(e.g.,frequency,magnitude,severity)

•Anysignofmaliciousautomationandattacktooling

•Correlationtoknownsourcesofattacktraffic

Moreover,theAdaptiveSecurityEngineisenhancedwithtwoproprietarytechnologies:SmartDetect,whichtokenizestheinputintoafingerprintforhighlyaccuratedetection,andSmartSniff,whichdetectstherightcontenttypeoftherequestbodytoprevent

contentmanipulationandbypass.AkamaithreatresearchersleverageAkamai’sexpansiveinfrastructureandsystemstopassivelyrunnewdetectionsacrossallproductiontrafficandthenanalyzethoseresultsusingMLmodels.

Automaticupdates

Manyorganizationstodayhaveinsufficientresourcesorsecurityexpertiseto

continuouslytrackdevelopingthreats,updateconfigurations,andretestagainst

theirwebtraffictooptimizepolicies.Inresponse,AkamaicontinuouslyupdatestheAdaptiveSecurityEngineusinganAI/MLautomatictestingframeworktoaccountforchangingthreatswhilemaintaininghighaccuracy.Theseupdateshaveoften

protectedagainstzero-dayattacksbeforetheywereannounced.

|14

Testingframeworktoensureaccuracy

TestingaWAAPsolutionreliesonasimplepremise:Testdifferentattackvectorsandstopwebattacks.However,thefollowingfactorsneedtobeconsidered:

•Real-worldenvironmentsaremorecomplexthantestenvironmentsandoftenleadtofalsepositivesandfalsenegatives.

•Designingatestingframeworkwithaccuracyinmindrequiresadditional

verification—notjustattackdetection,butdoingsowithoutinadvertentlytriggeringfalsepositivesorfalsenegatives.

•Testingrequirestheuseofrealwebtraffic—bothlegitimateandattacktraffic.

AdaptiveSecurityEngineupdatesconsistofmultiplestagestoensurelegitimatetrafficisnotadverselyimpacted:

•Alldetectionsarelabtestedusingsynthetictraffictoensuretheyproperlycatchattackswhilenotintroducingfalsepositives.

•Updatesarethentestedonliveproductiontraffictoensurethesampleisvalidforcurrentplatformtraffic.Thisprocessinvolvesrunningtheupdateinshadowmodeonrealcustomertraffic.Runninginshadowmodeensuresnoimpacttocustomertrafficwhilestillrunningtestdetectionaccuracy.

•Onceanupdatehaspassedstagetwo,MLidentifiespatternsortriggersthathumananalysismayhavemissed,afterwhichtheThreatResearchTeam

manuallyreviewsresults.

•Onlywhenthesechecksarepassedateachphasecanachangemovetothe

nextphaseandbedeployedtoalargersegmentofthenetwork.After100%

deployment,self-tuningcapabilitieswilleliminateanyremainingfalsepositivesparticulartocustomers’trafficpatterns.

|15

Automaticself-tuning

Automaticself-tuningalleviatestheburdenofmanualtuning,whichcanleadto

outdatedpoliciesandhumanerror,foranear-hands-offexperience.TheAdaptive

SecurityEngineappliesML,statisticalmodels,andheuristicsacrossalltriggersforeachsecuritypolicytoaccuratelydifferentiatebetweenrealattacksandend-user

trafficmisidentifiedasattacks.Itisnotagenericplatform-widecheckthatisappliedonlyduringonboarding,butratheracontinuoustuningprocessperformed24/7/365withnoend-userconfigurationorintervention.

Self-tuningisfrictionlessandsimple.Securityadministratorscaneasilyreview

andacceptrecommendationswithoneclickviatheuserinterface,ortheycan

automateusingAppSecAPIs,command-lineinterface(CLI),orTerraform.Forgreatertransparency,apre-filteredlinktoWebSecurityAnalyticsshowsallrequestsdeemedasfalsepositiveswitharationaleprovidedforeachtuningrecommendation.

Configurationandautomationflexibility

WhenaWAAPsolutionvendormovespastthetraditionalrulesettechnology,

configurationandautomationbecomemoreflexible.TheAdaptiveSecurityEnginegrantstheabilityto:

•HavedifferenttypesofWAFupdates(autovs.manual)fordifferentapplicationsandtheirassociatedriskappetite

•Controlactionperattackgroupandcontributingrulenecessaryforcustomizationifapplication/trafficbehaviorisnotstandard

•SetupsimpleandcomplexconditionsfordifferentrequestcharacteristicssuchasIP,geo,header,payload,etc.

•ProactivelymitigatethreatsourcesthathavebeendetectedcarryingoutsuspiciousWAFattack/scanningforyourownapps,withPenaltyBox

•Modifydebugheader

•Modifyrequestpayloadinspectionsizeorattackpayloadloggingsettings

•Runsimulationsofchangeindetectionlogictoconfidentlypushthesechangesonproduction

Akamai

|16

Verifyintherealworld

EvaluationmodeprovidesAkamaicustomerswithflexibilityandgranularityin

configuringspecificAdaptiveSecurityEngineversionsandtestingupdatesornewrules/policies.Customerscanseenewupdatesorchangesbeforechoosingto

enableasappropriateornecessaryfortheirspecificwebapplicationenvironment.Foreffectivesecuritymodernization,Akamaibelievesthattestingonreal-timetrafficimprovessecurityoutcomesovertestingonpasttraffic.Evaluationmodeissimilartoapplyingashadowrulewhereyoucanseethereal-timeresultsasifthepolicy

wereenforced—yetwithnoimpacttocurrentendusers.Organizationscanoptforthismanual/evaluationmodeofoperationtominimizeunexpectedimpactonfalsepositivesandfalsenegatives.

Integratingmodernizedprotections

SecurityandDevOpsteamscanalsooperationalizesecuritybyintegratingcallstoAkamaiAPIsusingtheCLI,AkamaiTerraform,orscriptsintheirCI/CDautomation

pipeline.Configurationandautomationflexibilityensurethatpowerfulsecurityneverhindersdevelopmentvelocity.Theseintegrationscan:

•Enablerapidonboardapplications

•Provideuniformmanagementofsecuritypoliciesacrosslargeapplicationportfolios

•Centralizesecurityenforcementacrosshybridandmulticloudinfrastructures

•ImprovecollaborationbetweenDevOpsandsecurityteamsinaGitOpsworkflowforoptimalcoverage

Akamai

Additionally,securityinformationandeventmanagement(SIEM)allowsyoutocollectsecurityeventsthattakeplaceontheAkamaiplatform.Inturn,ourSIEMIntegrationsolutionpr

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论