SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
Web App
Security
Practices of
the Highly
Confident
Security findings from F5
State of Application
Delivery 2015
The threat less
mentioned
Analysis of some of the biggest breaches of this century finds a great deal
of attention paid to effect and less on causes. Of the top 25 breaches (as
identified by number of records exposed) a perhaps surprising
percentage (44%) were attributable to web application compromise.
2005 20102008 2009 2011 2013 2014
40M CC 134M CC 1.3M ID 112M PII 50M PII
150M CC
4.5M PII
Data Exposed by Top 25 Breaches 2000-2014
through web application compromise
The outcome of successful web application compromise is troubling, with
all three primary data types represented: credit card numbers, personal
information and credentials. This
stands in contrast to other
breaches arising from stolen
credentials or theft (human
element).
Similarly troubling is that the most
vocal security initiatives of late
have been SSL Everywhere and
two-factor authentication. Both
are certainly good practices and
help improve security postures but
neither address the web
application security needed to
prevent compromises that have
exposed over 600 million records
in the past 14 years.
SOURCES: Verizon DBIR 2014, trade publication reports
App layer
confidenceGiven the severity of outcomes experienced due to web application
compromise in the past it was somewhat surprising to find the majority
of respondents in our State of Application Delivery 2015 survey were
confident or very confident on the topic of web application security.
This led to further analysis of responses with careful attention paid to
security practices in this arena as reported by respondents. We asked
about very specific web application security practices with respect to
protecting data across three primary surfaces: the client, the request and
the response.
What we discovered was a high correlation of attention paid to all three
surfaces and the level of confidence in withstanding application layer
attacks as reported by respondents.
SOURCE: F5 State of Application Delivery 2015
Best Practices
Web application security best practices focus on making decisions
whether to allow or deny (or scrub) data at different points in the client-
app conversation:
• When the client first connects
• When a request from the client is received
• When a response from the app is received
Web application security services are able to make decisions regarding
the legitimacy of the client based on variables like geolocation, operating
system and device type, whether requests are malicious or not based on
the presence of signatures and other malicious tells, and whether
responses conform to expectations or contain sensitive data.
We asked respondents to categorize their protection at each of these
three potential attack indicator points as either “always”, “sometimes” or
“never”. Then we looked at these answers in relation to respondents
level of confidence. The correlation between the two was readily
apparent: organizations employing more comprehensive web application
security practices were highly confident in their ability to withstand an
application layer attack.
0% 50% 100%
Client
Request
Response
Low Confidence
Confidence
High Confidence
ALWAYS PROTECT
SOURCE: F5 State of Application Delivery 2015
High Confidence
Client Request Response
Always Protect 66% 69% 63%
Sometimes Protect 17% 13% 14%
Never Protect 2% 1% 3%
Confidence
Client Request Response
Always Protect 59% 55% 37%
Sometimes Protect 26% 27% 34%
Never Protect 2% 4% 8%
Low Confidence
Client Request Response
Always Protect 41% 18% 41%
Sometimes Protect 47% 65% 41%
Never Protect 6% 6% 6%
Comprehensive web
app security practices
lead to confidence
Thank you
You can download the full State
of Application Delivery 2015
report at http://f5.com/SOAD

Mais conteúdo relacionado

Mais de Lori MacVittie

Web 2 And Application Delivery Public
Web 2 And Application Delivery PublicWeb 2 And Application Delivery Public
Web 2 And Application Delivery Public
Lori MacVittie
 

Mais de Lori MacVittie (10)

Architectural Patterns for Scaling Microservices and APIs - GlueCon 2015
Architectural Patterns for Scaling Microservices and APIs - GlueCon 2015Architectural Patterns for Scaling Microservices and APIs - GlueCon 2015
Architectural Patterns for Scaling Microservices and APIs - GlueCon 2015
 
The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change) The Internet of Security Things (A Story about Change)
The Internet of Security Things (A Story about Change)
 
HTTP/2 Changes Everything
HTTP/2 Changes EverythingHTTP/2 Changes Everything
HTTP/2 Changes Everything
 
5 ways to use node.js in the network
5 ways to use node.js in the network5 ways to use node.js in the network
5 ways to use node.js in the network
 
What are Software Defined Application Services
What are Software Defined Application ServicesWhat are Software Defined Application Services
What are Software Defined Application Services
 
Operationalize all the network things
Operationalize all the network thingsOperationalize all the network things
Operationalize all the network things
 
Programming proxies to do what we need so we don't have to talk to the networ...
Programming proxies to do what we need so we don't have to talk to the networ...Programming proxies to do what we need so we don't have to talk to the networ...
Programming proxies to do what we need so we don't have to talk to the networ...
 
Dynamic Infrastructure
Dynamic InfrastructureDynamic Infrastructure
Dynamic Infrastructure
 
Nine Ways to Use Network-Side Scripting
Nine Ways to Use Network-Side ScriptingNine Ways to Use Network-Side Scripting
Nine Ways to Use Network-Side Scripting
 
Web 2 And Application Delivery Public
Web 2 And Application Delivery PublicWeb 2 And Application Delivery Public
Web 2 And Application Delivery Public
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Web app security practices of the highly confident

  • 1. Web App Security Practices of the Highly Confident Security findings from F5 State of Application Delivery 2015
  • 2. The threat less mentioned Analysis of some of the biggest breaches of this century finds a great deal of attention paid to effect and less on causes. Of the top 25 breaches (as identified by number of records exposed) a perhaps surprising percentage (44%) were attributable to web application compromise. 2005 20102008 2009 2011 2013 2014 40M CC 134M CC 1.3M ID 112M PII 50M PII 150M CC 4.5M PII Data Exposed by Top 25 Breaches 2000-2014 through web application compromise The outcome of successful web application compromise is troubling, with all three primary data types represented: credit card numbers, personal information and credentials. This stands in contrast to other breaches arising from stolen credentials or theft (human element). Similarly troubling is that the most vocal security initiatives of late have been SSL Everywhere and two-factor authentication. Both are certainly good practices and help improve security postures but neither address the web application security needed to prevent compromises that have exposed over 600 million records in the past 14 years. SOURCES: Verizon DBIR 2014, trade publication reports
  • 3. App layer confidenceGiven the severity of outcomes experienced due to web application compromise in the past it was somewhat surprising to find the majority of respondents in our State of Application Delivery 2015 survey were confident or very confident on the topic of web application security. This led to further analysis of responses with careful attention paid to security practices in this arena as reported by respondents. We asked about very specific web application security practices with respect to protecting data across three primary surfaces: the client, the request and the response. What we discovered was a high correlation of attention paid to all three surfaces and the level of confidence in withstanding application layer attacks as reported by respondents. SOURCE: F5 State of Application Delivery 2015
  • 4. Best Practices Web application security best practices focus on making decisions whether to allow or deny (or scrub) data at different points in the client- app conversation: • When the client first connects • When a request from the client is received • When a response from the app is received Web application security services are able to make decisions regarding the legitimacy of the client based on variables like geolocation, operating system and device type, whether requests are malicious or not based on the presence of signatures and other malicious tells, and whether responses conform to expectations or contain sensitive data. We asked respondents to categorize their protection at each of these three potential attack indicator points as either “always”, “sometimes” or “never”. Then we looked at these answers in relation to respondents level of confidence. The correlation between the two was readily apparent: organizations employing more comprehensive web application security practices were highly confident in their ability to withstand an application layer attack. 0% 50% 100% Client Request Response Low Confidence Confidence High Confidence ALWAYS PROTECT SOURCE: F5 State of Application Delivery 2015
  • 5. High Confidence Client Request Response Always Protect 66% 69% 63% Sometimes Protect 17% 13% 14% Never Protect 2% 1% 3% Confidence Client Request Response Always Protect 59% 55% 37% Sometimes Protect 26% 27% 34% Never Protect 2% 4% 8% Low Confidence Client Request Response Always Protect 41% 18% 41% Sometimes Protect 47% 65% 41% Never Protect 6% 6% 6% Comprehensive web app security practices lead to confidence
  • 6. Thank you You can download the full State of Application Delivery 2015 report at http://f5.com/SOAD