17
Web Services Security Web Services Security Kerry Champion Kerry Champion CTO, Westbridge Technology June 8, 2004

Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004

Embed Size (px)

Citation preview

Page 1: Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004

Web Services SecurityWeb Services Security

Kerry ChampionKerry Champion CTO, Westbridge Technology

June 8, 2004

Page 2: Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004

Successful Internet StandardsSuccessful Internet Standards

Person Person

• SMTP

• S/MIME

• Instant Messaging

Person Program Program Program

• HTML

• DHTML

• Applets

• XML Schema

• SOAP

• WSDL

• WS-Security

Broadly Accepted Loosely Coupled Cross Organization Extensible

Page 3: Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004

Service-Oriented Architecture (SOA)Service-Oriented Architecture (SOA)

organizing business systems as reusable

components not fixed processes

SOA =

standards based + loosely-coupled + robust

Reusable =

Page 4: Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004

Diverse Web Services Diverse Web Services

XML allows all to play

Most heavily used Services have most primitive standards support. Systems doing billions in transactions today began development 18+ months ago

New code written with current version of J2EE and .NET

Legacy applications, Packaged applications, Specialized devices

Page 5: Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004

Diverse Service ConsumersDiverse Service Consumers

OutsourcedCall Center

Accounts Receivable

On-line MarketingPrograms

Employees’ Contact Managers

Independent Agents

Common CustomerData Repository

Page 6: Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004

Key Key CharacteristicsCharacteristics

Thousands of distinct

consumers

Identity of human that triggered the request is commonly used in program-to-program communication

Spread over hundreds of organizations

With different tools and IT teams. In practice it is unknowable to service what tools will be used by consumer.

At different levels of standards support

XML Schema, SOAP, WSDL, WS-Security, WS-Policy

OutsourcedCall Center

Accounts Receivable

On-line MarketingPrograms

Employees’ Contact Managers

Independent Agents

Common CustomerData Repository

Page 7: Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004

Key CharacteristicsKey Characteristics

With different network

architectures and transports in use

HTTP, HTTPS, MQ, TIBCO, JMS

With different security mechanisms

deployed

Authentication, encryption, signature, content scanning, malicious attack protections, message validation

With identity data in multiple non-

federated systems

Directories, ID management systems, certificates supported by PKIs, single sign-on systems, etc.

OutsourcedCall Center

Accounts Receivable

On-line MarketingPrograms

Employees’ Contact Managers

Independent Agents

Common CustomerData Repository

Page 8: Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004

Key QuestionKey Question

How do you secure all Web Services

while enabling appropriate access,

given diversity of

security mechanisms and policies?

How do you secure all Web Services

while enabling appropriate access,

given diversity of

security mechanisms and policies?

Page 9: Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004

What to doWhat to do

– Make every endpoint behave the same way– Make single repository for all shared data

– Make every endpoint capable of behaving every way

– Negotiate preferences at runtime– Have federated sharing across multiple

repositories

– Use infrastructure to define Service Views– Services and consumers stay as is– Service View abstraction layer mediates

between them

Naïve Response

Elegant Response

Practical Response

Page 10: Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004

Service Views Present Secure InterfacesService Views Present Secure Interfaces

Each Service View• Provide instant security, interoperability, monitoring, routing, and auditing• Enables contracts between consumer and provider supporting local and global policies• Automatically supports latest standards• Support instant interoperability• Leverage existing infrastructure• Hide back end complexity

Requires No Change of Base Services

Service View Service View

.NET J2EE PackagedApp

LegacySystem

ESB,MQ,JMS

CompositeServices

Security for SOA Infrastructure

Security Management

Standards Interoperability

XML Acceleration

SOA Related

Infrastructure

Flexible Deployment

Scalable Administration

AuthDirectory

IdentityMgmt

PKI

NetworkMgmt

UDDI

SystemMgmt

Page 11: Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004

Advantages of Service Views designAdvantages of Service Views design Base web service does not change

Consumer does not change

Service View appears as native web service to consumer

Allows different security mechanism assumptions at service and consumer

Allows different standards assumptions at service and consumer

Allows different transport assumption at service and consumer

Offloads from service developer need to support full range of security standards and mechanisms

Is deployable today

Implements loose-coupling while satisfying practical requirements

Page 12: Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004

Implementation of Secure Service ViewsImplementation of Secure Service Views

Needed Web Services infrastructure goes by many names:Service Virtualization, Web Services Management Platform, XML Firewall, SOAP Gateway, Web Service Gateway, etc. etc.

Multiple vendors provide offerings Key Review Criteria:

Security

Monitor, Report, Alert

Interoperability

Interface Management

Page 13: Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004

SecuritySecurityAuthentication, Access ControlEncryption, SignatureMalicious Attack, Content InspectionSchema Validation, Standards

WestbridgeXMS

Service Consumer

Service Consumer

Existing Security Infrastructure

Web Service

Network Firewall

Authentication, Access Control Authorities, RSA, Oblix, Netegrity, LDAP, SAML,X.509, HTTP, Authentication, Active Directory,

PKI Infrastructure, CRL, OCSP, 3DES, SHA, XML Encryption, XML Signature, WS Security

ExistingSecurity

Infrastructure

NetworkAttack

Application Attack

HTTP JMS

MQ HTTPS

Page 14: Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004

Last Request LatencyMessages per Second

Avg. Message SizeFailed Requests

SLA MonitoringTroubleshootingPerf. MonitoringReal-time View

Malicious AttacksRequests > $10,000Authorization Failed

Weekend Activity

Audit TrailsRegulatoryDebugging

SLA Reporting

Malicious Attack Paging

Exceed Message Rate

sends SNMP Trap

TriggersExceptionsDebugging

SLA Enforcement

Example Benefits

Monitor, Report, AlertMonitor, Report, Alert

Variety of status notifications can be utilized

Service Tracker Monitors connectedservices

SAP

Mainframe

.NET

PeopleSoft

J2EE

MS Excel

Monitoring Reporting Alerting

Service Tracker

Page 15: Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004

InteroperabilityInteroperabilityStandards Support

XML, SOAP, WSDL

.NET, SunOne, IBM, WS-I, Oasis, W3C, BEA, Oracle, Microsoft, etc.

Transport– HTTP, HTTPS (SSL), JMS, MQ, Tibco

Security– XML Signature, signatures (RSA-

SHA1, DSA SHA1), XML Encryption, encryption (RSA Keys, 3DES, AES, 128/192/256 bit keys),

– SAML, LDAP, WS-Security, HTTP-based authentication

– Active Directory, XKMS, OCSP, PKI Infrastructure (including PKCS#7, #10, #11, #12), CRL, X.509 Certificates,

XML– XML Schema, DTD– XPath, XSLT – Alerting: SNMP and SMTP

Data Transformation

Routing

Transport

Mediation

Credential

Mapping

X.509 Liberty

XMS Gateway

SAML LDAP WS Sec. Etc…

Web Services

XMS Gateway

Web Service

XMS Gateway

XMS Gateway

Web ServicesWeb Service

Web Services

Service Consumer

Page 16: Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004

Interface ManagementInterface Management

• Publishing Workflow

• Service Upgrades

• Provisioning

• Versioning

XMS Manager

Configure Stage Test Publish

Customers

Partners

Sales

Web Service

Web Service

Web Service

Service View

Service View

Page 17: Web Services Security Kerry Champion CTO, Westbridge Technology June 8, 2004

SummarySummary

Real-world considerations create barriers to the loosely-coupled

vision of Web Services and SOA, while maintaining required security.

The “naïve” response creates tight-coupling and does not scale up

The “elegant” response requires a couple more generations of

standards and tools development

The “practical” response uses current tools to implement Service

Views.