Skip to:Content
|
Bottom
Cover image for Enterprise web services security
Title:
Enterprise web services security
Personal Author:
Publication Information:
Hingham, Mass. : Charles River Media, 2006
Physical Description:
1v + 1 CD-ROM
ISBN:
9781584504139
General Note:
Accompanied by compact disc : CP 6893
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000004580944 TK5105.59 H64 2006 Open Access Book Book
Searching...

On Order

Summary

Summary

Enterprise Web Services Security provides the information developers, application architects, and security professionals need to build security policies and strategies from the ground up in a Web Services environment. Most security books focus on computer, network, or Web Services Security in isolation, relegating the other areas to overview chapters or appendices. This book takes a holistic approach that mirrors the perspective one must have regardless of whether they are planning and implementing the security mechanisms for a Web Service, a Web site, or an enterprise. It details how to secure critical components such as workstations, servers, and networks, the goals behind an enterprise's security policies, the policies an organization should have in place, and how to communicate those policies using WS-Policy Framework and WS-Security Policy.


Author Notes

Rickland Hollar (McLean, VA) is a Senior Applications Architect with the central Intelligence Agency (CIA)
Rick Murphy (Annandale, VA) is a Senior Principal INFOSEC Scientist at Mitretek Systems, a public interest research and development firm


Table of Contents

Introductionp. xxi
1 Security in the Networked Worldp. 1
Business on the Internetp. 3
B2Bp. 3
B2Cp. 4
Evolving Business Modelsp. 4
Information Protectionp. 5
Privacyp. 5
Corporate Confidentialityp. 6
Legal Obligationsp. 6
Web Servicesp. 7
XMLp. 8
SOAPp. 8
The Messaging Modelp. 9
Security Challengesp. 10
Threats and Risksp. 10
Policyp. 10
Internetp. 11
Intranetp. 11
Extranetp. 12
Wirelessp. 12
Countermeasuresp. 13
WS-*Family of Standardsp. 14
Virtual Domain Model for Web Services Securityp. 15
Security Domainsp. 15
Enclavesp. 15
Trust Relationshipsp. 16
The Modelp. 16
Summaryp. 16
Referencesp. 17
2 Threats and Attacksp. 19
Threats, Vulnerabilities, and Countermeasuresp. 20
Ensuring Reliabilityp. 21
Vandalism and Sabotagep. 24
Denial of Servicep. 26
Privacy and Confidentiality Breachesp. 27
Data Integrity Violationsp. 29
Man-in-the-Middle Attacksp. 30
Spoofing Attacksp. 31
Mobile-Code Threatsp. 32
Fraudp. 34
Special Considerations for Web Services Environmentsp. 35
Summaryp. 38
Referencesp. 39
3 Security Goalsp. 41
Protecting Your Assetsp. 42
Common Security Termsp. 42
Reducing Vulnerabilitiesp. 43
Realistically Assessing Threatsp. 47
Choosing the Right Countermeasuresp. 51
Recognizing and Accepting Residual Riskp. 52
Classic Security Goalsp. 53
Confidentialityp. 54
Integrityp. 54
Availabilityp. 55
Transaction Security Goalsp. 56
Authenticationp. 57
Scalabilityp. 58
Nonrepudiationp. 59
The Role of Security Policy in Web Services Security Enforcementp. 60
Summaryp. 61
Referencesp. 61
4 The Internet and World Wide Web Infrastructurep. 63
Internet 101p. 64
TCP/IPp. 65
HTTPp. 67
Security Domainsp. 71
Client System Vulnerabilitiesp. 73
Browser Vulnerabilitiesp. 74
Java Virtual Machine Vulnerabilitiesp. 76
Networksp. 77
TCP/IP Vulnerabilitiesp. 77
HTTP Vulnerabilitiesp. 79
SMTP Vulnerabilitiesp. 79
Server Vulnerabilitiesp. 81
Web Server Vulnerabilitiesp. 82
Other Vulnerabilitiesp. 82
Summaryp. 83
Referencesp. 83
5 Web Servicesp. 85
Web Services Standardsp. 86
XMLp. 88
Elements and Attributesp. 88
Namespacesp. 90
Schemasp. 92
Transformationsp. 96
SOAPp. 99
Document Style Messagesp. 100
RPC Style Messagesp. 103
Bindingp. 105
WSDLp. 105
UDDIp. 109
Web Services Toolkitsp. 115
Summaryp. 116
Referencesp. 116
6 Security Policy Basicsp. 119
The Importance of Security Policyp. 120
Steps in Developing a Security Policyp. 122
Identify the Assets You Are Trying to Protectp. 123
Identify the Threats You Are Protecting Againstp. 123
Map Threats to Probability of Loss and Costp. 125
Implement Cost-Effective Measuresp. 126
Continuously Review and Improve Security Policiesp. 126
The Security Policy Documentp. 127
Summaryp. 127
Referencesp. 128
7 Communicating Policyp. 129
Expressing Security Policy in Web Servicesp. 130
WS-Policyp. 131
Normal Formp. 132
Compact Formp. 133
Merging Policies and Resolving Conflictsp. 135
WS-SecurityPolicyp. 135
SecurityToken Assertionp. 136
Confidentiality Assertionp. 138
Integrity Assertionp. 139
Visibility Assertionp. 142
SecurityHeader Assertionsp. 143
MessageAge Assertionsp. 144
Putting It Together: An Examplep. 144
WS-PolicyAttachmentp. 146
Tying Policies to Subjectsp. 146
Making Policies Discoverablep. 148
Effective Policyp. 152
Summaryp. 153
Referencesp. 153
8 Protecting the System Componentsp. 155
Security Controls for the System Componentsp. 156
The Clientp. 156
Workstation Vulnerabilitiesp. 157
Operating System Securityp. 158
Browser Securityp. 159
Downloading Componentsp. 164
ActiveX Securityp. 167
Java Securityp. 169
Scriptingp. 171
Plug-Insp. 172
The Networkp. 173
Network Vulnerabilitiesp. 173
Wireless Communicationsp. 174
Firewallsp. 175
Gateways, Guards, and Routersp. 176
Virtual Private Networksp. 177
Serversp. 177
Web Server Vulnerabilitiesp. 179
Operating System Securityp. 181
Summaryp. 183
Referencesp. 184
9 Protecting Messages, Transactions, and Datap. 187
Protecting a Web Services Exchangep. 188
Securing the Communications Channelp. 190
Link, Network, and Applications Layer Encryptionp. 191
Point-to-Point Encryptionp. 191
End-to-End Encryptionp. 192
Using SSL to Establish Secure Sessionsp. 192
Identity Management and Trustp. 192
Trust Relationshipsp. 193
Identity Managementp. 193
Passwords and Pass-Phrasesp. 195
Smart Cardsp. 196
Third-Party Brokersp. 196
Certificate Authoritiesp. 197
Kerberos Authentication Serversp. 197
Policy Decision Pointsp. 197
Microsoft .NET Passportp. 197
Liberty Alliancep. 198
Authenticationp. 198
User IDs and Passwordsp. 199
X.509 Public Key Authenticationp. 200
LDAP (The Role of Directory Services)p. 201
Kerberosp. 202
Authorizationp. 205
Basic Web Serversp. 208
J2EE Applications Serversp. 210
ASP.NET Serversp. 211
Access Controlp. 213
Choosing the Identity Mapping Schemep. 217
Mandatory Access Controlsp. 219
Choosing the Access Control Decision Pointp. 220
Summaryp. 221
Referencesp. 221
10 Implementing the Information Security Triadp. 225
Confidentialityp. 226
Encryptionp. 226
Steganographyp. 242
SSL and TLSp. 243
Integrityp. 247
Digital Signaturesp. 247
Nonrepudiationp. 250
Summaryp. 251
Referencesp. 251
11 Communicating Security Credentialsp. 253
Client-Server Credential Communicationp. 254
WS-Securityp. 255
Message Security Modelp. 255
Security Header Elementp. 256
XML Encryptionp. 265
XML Signaturep. 271
Message Protectionp. 276
Putting It Together: An Examplep. 277
Summaryp. 279
Referencesp. 280
12 Auditp. 283
Goal of Auditp. 284
What to Auditp. 284
Auditable Eventsp. 285
Audit Informationp. 286
Levels of Auditp. 286
Networkp. 287
Serverp. 288
Componentsp. 288
Applicationp. 289
Active versus Passive Auditingp. 292
Audit Data Processingp. 293
Intrusion Detection and Prevention Systemsp. 294
Intrusion Detection System Basicsp. 295
Intrusion Prevention Systemsp. 295
Summaryp. 296
Referencesp. 296
13 Virtual Domain Model for Web Services Securityp. 299
Trust Relationshipsp. 300
General Security Context Modelp. 301
Types of Trust Relationshipsp. 302
Trust Relationships Between Principalsp. 303
Trust Domainsp. 304
Trust Relationships Between Domainsp. 306
Creating Physical and Logical Trust Domainsp. 308
Where Should Trust Relationships Be Created?p. 308
What Credentials Will Be Used?p. 309
What Are the Integrity and Confidentiality Considerations?p. 310
How Will Credentials Be Provisioned?p. 311
What Principals Will a Given Principal Trust?p. 312
Creating Virtual Trust Domainsp. 314
Experience Basedp. 314
Reference Basedp. 315
Reputation Basedp. 318
Summaryp. 319
Referencesp. 320
14 Establishing and Communicating Trustp. 321
Types of Trust Relationshipsp. 322
WS-Trustp. 324
The Web Services Trust Modelp. 324
Requesting and Returning Tokens: The STS Frameworkp. 324
Negotiation and Challenge Extensionsp. 328
Key and Token Extensionsp. 329
WS-Federationp. 330
Basic Conceptsp. 331
Federation Metadatap. 333
Attribute and Pseudonym Servicesp. 333
WS-SecureConversationp. 334
Security Contextp. 334
Context Bindingp. 334
XKMSp. 335
XML Key Registration Servicep. 335
XML Key Information Servicep. 336
XML Key Management Service Bulk Operationsp. 337
SAMLp. 337
XACMLp. 340
Summaryp. 344
Referencesp. 344
15 Pulling It All Together: Using Virtual Trust Domains to Secure Enterprise Web Servicesp. 347
Enterprise Web Servicesp. 348
Step 1 Identify the Parties Involvedp. 349
Who Are the Clients?p. 350
How Will Clients Access the Service?p. 350
How Will Clients Discover the Service?p. 350
What Intermediaries Are Involved in the Transaction?p. 351
Does the Web Service use Other Services?p. 351
Step 2 Identify Relevant Domain Infrastructure and Capabilitiesp. 351
How Many Security Domains are Involved in Supporting the Service?p. 352
What Security Services are Provided in the Domains Involved?p. 352
What Token Services are Involved in Providing those Services?p. 352
What Supporting Services are Provided in the Domains Involved?p. 353
Step 3 Identify Necessary Security Services Based on Local Policiesp. 353
Are Authentication Services Needed?p. 353
What Resource or Information Needs To Be Protected?p. 354
Are Authorization and Access Control Services Needed?p. 354
Are Confidentiality Services Needed?p. 355
Are Integrity Services Needed?p. 356
Step 4 Identify Gaps and Project a Virtual Trust Domainp. 356
Missing Servicesp. 358
Differences in Servicesp. 359
Security-Relevant Differences in Levelsp. 360
New Boundaries and Boundary Servicesp. 362
Step 5 Allocate New Infrastructure Services across Physical and Logical Domainsp. 362
Security Servicesp. 364
Support Servicesp. 364
Service Distribution Strategyp. 364
Step 6 Allocate Security Services across Actorsp. 364
J2EE Environmentp. 365
.NET Environmentp. 367
Crossing a Technology Boundaryp. 368
Step 7 Create and Distribute Discovery and Policy Artifactsp. 371
Summaryp. 371
16 FutureScapep. 373
Going Mobilep. 374
What Is Self-Protecting Data?p. 374
Protecting Data In Transitp. 375
Protecting Data At Restp. 377
Protecting Data In Usep. 378
Digital Rights Managementp. 379
Rights Expression Languagesp. 380
Web Services' Rolep. 381
Summaryp. 381
Referencesp. 381
Appendix A The Security Policy Documentp. 383
Introductionp. 384
Responsible Organizationsp. 385
Physical Securityp. 385
Personnel Securityp. 386
Security Standardsp. 386
Defending the Computing Environmentp. 387
Workstation Securityp. 388
Server Securityp. 388
HTTP Servicesp. 389
Database Management System (DBMS) Servicesp. 389
Applications Servicesp. 390
Network Securityp. 390
Secure Messagingp. 390
Mobile Codep. 390
Defending the Enclave Boundaryp. 391
Firewallsp. 391
Virtual Private Networks (VPNs)p. 392
Remote Accessp. 392
Guardsp. 393
Content Filteringp. 393
Virus Protectionp. 393
Gateway Spam Filtering and Virus Protectionp. 393
Defending the Network and Infrastructurep. 394
Supporting Infrastructurep. 394
Key Managementp. 394
Intrusion Protectionp. 395
Auditp. 396
Backups and Retentionp. 396
Disaster Recoveryp. 396
Web Servicesp. 397
Security Incident Handling and Responsep. 398
Notificationp. 398
Points of Contactp. 398
Containmentp. 399
Assess Damage, Perform Triagep. 399
Recoveryp. 399
Referencesp. 399
Appendix B About the CD-ROMp. 401
System Requirementsp. 401
CD-ROM Contentsp. 402
Web Sitep. 402
Indexp. 403
Go to:Top of Page