When the scan was over, I saved the results and decided to dig deeper. The tabbed interface at the bottom of the application window held the bulk of the scan information. The tabs grew more detailed as they ran from left to right, starting with a high-level explanation of the exploit; typical ways that it could be used to hack code; links to advisories, educational videos and specific fix recommendations; and the exact request/response code that was used in the test.
The product placed all the information required to diagnose, correct and educate to prevent particular vulnerabilities from resurfacing right at my fingertips. I could designate particular alerts as false positives, and I could log defects to a common defect tracking solution, such as ClearQuest, where it would appear in a developer’s to do list complete with remediation instructions.
Reporting in AppScan is excellent – it’s fully customisable, automated, tweakable and available in a variety of formats. The product’s coolest reporting feature enabled me to develop Microsoft Word report templates that would populate themselves with AppScan data.
IBM’s Proventia GX5108 is a 2U rack-mounted IPS device that can be equipped with eight 10/100/1000 adapters in any combination of copper or fiber port pairs. The GX5108 can protect four network segments in inline mode, comes equipped with redundant power supplies and storage, and can be clustered for high availability. Those who wish to deploy a single GX5108 can manage it through an able Web GUI. For larger deployments, the IPS can also be managed from IBM SiteProtector software, or through an outsourced management agreement with IBM Managed Security Services.
IBM Proventia Web application protection is an additional set of rules included in every Proventia IPS to help address and limit the primary sources of web application and infrastructure attacks. Given the power of this product, I found installation and configuration to be mind-bogglingly easy. When I brought the GX5108 under management in SiteProtector, the product automatically installed recommended IBM X-Force policies (which thereafter updated automatically) and launched a Web Application Protection wizard to automate construction and implementation of additional security policies to protect custom web applications.
I assessed the GX5108’s performance with BreakingPoint BPS 1K, a network load-generation tool known for its ability to thoroughly and accurately assess performance of security devices such as firewalls, IPSes and security switches. When configured with about 3,000 IPS rules enabled, the IBM device easily exceeded its rated 1.2G bps of total throughput with a maximum total throughput of 1.6G bps and maximum of 2.3 million concurrent TCP connections. Under a full SYN flood, the GX5108 still passed between 500M and 600M bps of legitimate traffic. I then used the full BreakingPoint strike pack (54158) to assess the GX5108’s ability to block attacks. The IPS blocked 131 of 136 web application-specific attacks (of the overall 2,282 attacks).
IBM Proventia Management SiteProtector is IBM’s security infrastructure management software. It’s a central console used to monitor, measure and manage agents on security devices, servers and workstations. I found it very easy to organise managed devices into groups and then set policy based on the type and severity of the event and the group of devices it affected.
As with IBM’s Rational AppScan, I found that reporting was again a strong point.
SiteProtector’s SecurityFusion module is the reporting component that fuses the individual solutions together. This free add-on component to SiteProtector typically runs on its own server and correlates vulnerability scans of applications from Rational AppScan with network intrusion events detected by the Proventia IPS GX5018.
Using the product’s graphical interface, I was able to build policies that specified which IP addresses to monitor and how to prioritise different events. Prioritisation is key in developing an overall web app security action plan. For instance, vulnerability fixes for inactive services can wait, but known, actively attacked vulnerabilities on outward-facing systems demand immediate attention.
Any security management platform of this caliber must have built-in mechanisms for ensuring and documenting regulatory compliance. Rational AppScan solutions include more than 40 standard security compliance reports, including PCI Data Security Standard, ISO 17799 and ISO 27001, HIPAA, GLBA and Basel II.
With SecurityFusion, an organisation gains a valuable tool that can measure and report compliance on such wide-ranging aspects of security as code development, server infrastructure, web applications and network traffic. Given this wide scope, the product can provide IT departments with a rare opportunity to generate reports documenting regulatory compliance on the device, asset or code unit level, and directly show the ramifications to line-of-business activities.
Matthew D. Sarrel is executive director of Sarrel Group, an IT test lab, editorial services and consulting firm in New York.
Page: 1 2
Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…
Explore the future of work with the Silicon In Focus Podcast. Discover how AI is…
Executive hits out at the DoJ's “staggering proposal” to force Google to sell off its…
US prosecutors confirm earlier reports, demand Google sells off Chrome web browser and end default…
Following Australia? Technology secretary Peter Kyle says possible ban on social media for under-16s in…
Restructuring expert appointed to oversea Northvolt's main facility in northern Sweden, amid financial worries