SlideShare a Scribd company logo
© 2013 Imperva, Inc. All rights reserved.
CMS Hacking 101
Analyzing the Risk with 3rd Party Applications
Confidential1
Barry Shteiman
Senior Security Strategist
© 2013 Imperva, Inc. All rights reserved.
Agenda
Confidential2
§  CMS defined
§  Risks and trends
§  Recent incidents
§  Into the details
•  An attack campaign
•  Industrialized attack campaign
§  Reclaiming security
© 2013 Imperva, Inc. All rights reserved.
Today’s Speaker - Barry Shteiman
Confidential3
§  Senior Security Strategist
§  Security consultant working
with the CTO office
§  Author of several application
security tools
§  Open source security projects
code contributor
§  Twitter @bshteiman
© 2013 Imperva, Inc. All rights reserved.
CMS Defined
Confidential4
Content Management System
© 2013 Imperva, Inc. All rights reserved.
What is a CMS?
Confidential5
A content management system (CMS) is a computer program
that allows publishing, editing and modifying content as well as
maintenance from a central interface.
Source: https://en.wikipedia.org/wiki/Content_management_system
© 2013 Imperva, Inc. All rights reserved.
Deployment Distribution
Confidential6
Source: http://trends.builtwith.com/cms
© 2013 Imperva, Inc. All rights reserved.
Enterprise Adoption
Confidential7
© 2013 Imperva, Inc. All rights reserved.
Risks and Trends
Confidential8
© 2013 Imperva, Inc. All rights reserved.9
OWASP Top 10 – 2013 Update
New, A9 - Using Known Vulnerable Components
Confidential
© 2013 Imperva, Inc. All rights reserved.10
3rd Party
According to Veracode:
•  “Up to 70% of internally developed code originates outside of the
development team”
•  28% of assessed applications are identified as created by a 3rd
party
Confidential
© 2013 Imperva, Inc. All rights reserved.
When a 3rd Party Brings its Friends
Confidential11
§  More than 20% of the 50 most popular WordPress plugins are
vulnerable to web attacks
§  7 out of top 10 most popular e-commerce plugins are vulnerable to
common Web attacks
-- Checkmarx Ltd. research lab “The Security State of WordPress’ Top 50 Plugins” white paper, June 18, 2013
You can’t fix code you don’t own, even if you
host your own, that code has third party
components in it.
© 2013 Imperva, Inc. All rights reserved.
Attack Surface
Confidential12
Source: https://www.bsi.bund.de/DE/Publikationen/Studien/CMS/Studie_CMS.html
BSI is Germany's federal office for information security
In a research conducted by BSI in Germany, ~20% of the
vulnerabilities discovered were found in the CMS core, ~80%
in plugins and extensions.
© 2013 Imperva, Inc. All rights reserved.
Classic Web Site Hacking
Confidential13
Hacking
1.  Identify Target
2.  Find Vulnerability
3.  Exploit
Single Site Attack
© 2013 Imperva, Inc. All rights reserved.
Classic Web Site Hacking
Confidential14
Hacking
1.  Identify Target
2.  Find Vulnerability
3.  Exploit
Hacking
1.  Identify Target
2.  Find Vulnerability
3.  Exploit
Hacking
1.  Identify Target
2.  Find Vulnerability
3.  Exploit
Hacking
1.  Identify Target
2.  Find Vulnerability
3.  Exploit
Hacking
1.  Identify Target
2.  Find Vulnerability
3.  Exploit
Multiple Site Attacks
© 2013 Imperva, Inc. All rights reserved.
CMS Hacking
Confidential15
Hacking
1.  Identify CMS
2.  Find Vulnerability
3.  Exploit
CMS Targeting Attack
© 2013 Imperva, Inc. All rights reserved.
Recent Incidents
Confidential16
© 2013 Imperva, Inc. All rights reserved.
3rd Party Code Driven Incidents
Confidential17
Breached via 3rd party application on Drupal.org own servers.
© 2013 Imperva, Inc. All rights reserved.
3rd Party Code Driven Incidents
Confidential18
3rd party service provider hacked, customer data affected.
© 2013 Imperva, Inc. All rights reserved.
3rd Party Code Driven Incidents
Confidential19
Yahoo’s 3rd party hack as detailed in Imperva’s January HII report.
HII Report: http://www.imperva.com/docs/HII_Lessons_Learned_From_the_Yahoo_Hack.pdf
© 2013 Imperva, Inc. All rights reserved.
CMS Related Incidents
Confidential20
© 2013 Imperva, Inc. All rights reserved.
Into the Details
Confidential21
How a CMS Attack Campaign Might Look
© 2013 Imperva, Inc. All rights reserved.22
The Attacker’s Focus
Server Takeover
Direct Data Theft
Confidential
© 2013 Imperva, Inc. All rights reserved.
CMS Mass Hacking
Confidential23
Source: www.exploit-db.com
Step 1: Find a vulnerability in a CMS platform
Even public vulnerability databases, contain thousands
of CMS related vulnerabilities.
© 2013 Imperva, Inc. All rights reserved.
CMS Gone Wild(card)
Confidential24
Step 2: Identify a fingerprint in a relevant CMS-based site
A fingerprint can be
•  Image
•  URL
•  Tag
•  Object Reference
•  Response to a query
•  etc..
© 2013 Imperva, Inc. All rights reserved.
Fingerprinted
Confidential25
Tag based
The code will usually contain fingerprints (unless obfuscated) of
the CMS in use.
© 2013 Imperva, Inc. All rights reserved.
Fingerprinted
Confidential26
URL based
An administrator interface may be front facing, allowing detection
and login attempts
© 2013 Imperva, Inc. All rights reserved.
Google Dork for the Masses
Confidential27
§  Query: inurl:(wp-config.conf | wp-config.txt) ext:(conf | txt | config)
§  Results: 144,000
© 2013 Imperva, Inc. All rights reserved.
Google Dork for the Masses
Confidential28
In our case: Database Host, User and Password Exposed
© 2013 Imperva, Inc. All rights reserved.
Botnets Targeting Your CMS
Confidential29
Recently Observed:
•  Botnets Scan websites for
vulnerabilities
•  Inject Hijack/Drive-by code to
vulnerable systems
•  Onboarding hijacked
systems into the Botnet
© 2013 Imperva, Inc. All rights reserved.
From a Botnet Communication
Confidential30
Botnet operator uses zombies to
scan sites for vulnerabilities
* As observed by Imperva’s ADC Research Team
Google Dork
© 2013 Imperva, Inc. All rights reserved.
From a Botnet Communication
Confidential31
Botnet exploits vulnerabilities and
absorbs victim servers
* As observed by Imperva’s ADC Research Team
© 2013 Imperva, Inc. All rights reserved.
Reclaiming Security
Confidential32
Securing 3rd Party Applications
© 2013 Imperva, Inc. All rights reserved.
Analyzing the Attack Surface
Confidential33
Graphics Source: https://www.bsi.bund.de/DE/Publikationen/Studien/CMS/Studie_CMS.html
BSI is Germany's federal office for information security
Certain vulnerabilities in 3rd party applications, can only be properly fixed
using Web Application Firewalls.
© 2013 Imperva, Inc. All rights reserved.
Deployment Matters
Confidential34
Cloud based deploymentOn premise deployment
Applications and 3rd party code
deployed in your virtual/physical
data center.
Hosted applications and B2B
services.
Imperva Incapsula
Cloud
© 2013 Imperva, Inc. All rights reserved.
When a company builds its security model it usually does
not take into account elements that are not in control,
which creates the security hole.
Companies should:
§  Implement policies both on the legal and technical
aspects to control data access and data usage.
§  Require third party applications to accept your security
policies and put proper controls in place
§  Monitor.
Recommendations
35 Confidential35
© 2013 Imperva, Inc. All rights reserved.
§  Assume third-party code – coming from partners,
vendors, or mergers and acquisitions – contains
serious vulnerabilities
§  Pen test before deployment to identify these issues
§  Deploy the application behind a WAF to
•  Virtually patch pen test findings
•  Mitigate new risks (unknown on the pen test time)
•  Mitigate issues the pen tester missed
•  Use cloud WAF for remotely hosted applications
§  Virtually patch newly discovered CVEs
•  Requires a robust security update service
Technical Recommendations
36 Confidential36
© 2013 Imperva, Inc. All rights reserved.
Post-Webcast
Discussions
Answers to
Attendee
Questions
Webcast
Recording Link
Join Group
Join Imperva LinkedIn Group,
Imperva Data Security Direct, for…
Presentation Materials
Confidential3737
© 2013 Imperva, Inc. All rights reserved.
www.imperva.com
38 Confidential

More Related Content

PPTX
Hotspot!
PPT
Web server
PDF
CNIT 129S: Ch 4: Mapping the Application
PDF
CNIT 129S: Ch 7: Attacking Session Management
PDF
Alice Phieu - WordPress For Beginners
PPTX
Asp.net web api
PDF
June OpenNTF Webinar - Domino V12 Certification Manager
PDF
Getting Started with Process Builder
Hotspot!
Web server
CNIT 129S: Ch 4: Mapping the Application
CNIT 129S: Ch 7: Attacking Session Management
Alice Phieu - WordPress For Beginners
Asp.net web api
June OpenNTF Webinar - Domino V12 Certification Manager
Getting Started with Process Builder

What's hot (20)

PDF
Shopify Ecommerce Solutions Proposal PowerPoint Presentation Slides
PDF
Simplifying The S's: Single Sign-On, SPNEGO and SAML
PDF
CNIT 129S: Ch 3: Web Application Technologies
PPTX
Payroll presentation Pitching
PPTX
How to fix ‘database is corrupt: cannot allocate space’ error in lotus notes
PPTX
Azure Logic Apps
PPTX
PPTX
IDS+Honeypots Making Security Simple
PPTX
UiPath Certified Professional Certification for Specialized AI.pptx
PDF
IBM Traveler Management, Security and Performance
PDF
Experts Live 2022 - Attack Surface Reduction rules...your best ally against r...
PPTX
HCL Domino V12 Key Security Features Overview
PPTX
SINGLE SIGN-ON
PPT
Web servers – features, installation and configuration
PPTX
Introduction To WordPress
PPTX
Robot Framework
PDF
JavaScript for Hackers.pdf
PPTX
A Brief History of Web publishing (from HTML to WordPress)
PDF
Introduction to Apex Triggers
PPTX
Api testing
Shopify Ecommerce Solutions Proposal PowerPoint Presentation Slides
Simplifying The S's: Single Sign-On, SPNEGO and SAML
CNIT 129S: Ch 3: Web Application Technologies
Payroll presentation Pitching
How to fix ‘database is corrupt: cannot allocate space’ error in lotus notes
Azure Logic Apps
IDS+Honeypots Making Security Simple
UiPath Certified Professional Certification for Specialized AI.pptx
IBM Traveler Management, Security and Performance
Experts Live 2022 - Attack Surface Reduction rules...your best ally against r...
HCL Domino V12 Key Security Features Overview
SINGLE SIGN-ON
Web servers – features, installation and configuration
Introduction To WordPress
Robot Framework
JavaScript for Hackers.pdf
A Brief History of Web publishing (from HTML to WordPress)
Introduction to Apex Triggers
Api testing

Viewers also liked (7)

PPTX
CMS Hacking
PPT
The most possible risk factors faced by Wordpress Developers
PPTX
Botnets presentation
PPTX
Botnets 101
PPT
Botnet Detection Techniques
PPT
The Loyalty Program: A Recipe for Success
PDF
Digital Strategy 101
CMS Hacking
The most possible risk factors faced by Wordpress Developers
Botnets presentation
Botnets 101
Botnet Detection Techniques
The Loyalty Program: A Recipe for Success
Digital Strategy 101

Similar to CMS Hacking 101 (20)

PDF
Top Security Trends for 2014
PDF
Hiding in Plain Sight: The Danger of Known Vulnerabilities
PDF
Protecting Against Vulnerabilities in SharePoint Add-ons
PPT
The State of Application Security: Hackers On Steroids
PPTX
Vulnerability Management
PPT
The Top 10/20 Internet Security Vulnerabilities – A Primer
PDF
Hacking Encounters of the 3rd Kind
PDF
Lessons Learned From the Yahoo! Hack
PPTX
Imperva - Hacking encounters of the 3rd kind
PPTX
WordPress Security: Beyond The Plugin
PDF
Anatomy of the Compromised Insider
PDF
Identifying a Compromised WordPress Site
PDF
Top Security Trends for 2013
PPTX
VAPT_FINAL SLIDES.pptx
PDF
Web hackingtools cf-summit2014
PDF
Check point presentation june 2014
PDF
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
PDF
Web hackingtools 2015
PDF
Web hackingtools 2015
PDF
Targeted Defense for Malware & Targeted Attacks
Top Security Trends for 2014
Hiding in Plain Sight: The Danger of Known Vulnerabilities
Protecting Against Vulnerabilities in SharePoint Add-ons
The State of Application Security: Hackers On Steroids
Vulnerability Management
The Top 10/20 Internet Security Vulnerabilities – A Primer
Hacking Encounters of the 3rd Kind
Lessons Learned From the Yahoo! Hack
Imperva - Hacking encounters of the 3rd kind
WordPress Security: Beyond The Plugin
Anatomy of the Compromised Insider
Identifying a Compromised WordPress Site
Top Security Trends for 2013
VAPT_FINAL SLIDES.pptx
Web hackingtools cf-summit2014
Check point presentation june 2014
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
Web hackingtools 2015
Web hackingtools 2015
Targeted Defense for Malware & Targeted Attacks

More from Imperva (20)

PPTX
Cybersecurity and Healthcare - HIMSS 2018 Survey
PPTX
API Security Survey
PPTX
Imperva ppt
PPTX
Beyond takeover: stories from a hacked account
PPTX
Research: From zero to phishing in 60 seconds
PDF
Making Sense of Web Attacks: From Alerts to Narratives
PDF
How We Blocked a 650Gb DDoS Attack Over Lunch
PPTX
Survey: Insider Threats and Cyber Security
PPTX
Companies Aware, but Not Prepared for GDPR
PPTX
Rise of Ransomware
PDF
7 Tips to Protect Your Data from Contractors and Privileged Vendors
PDF
SEO Botnet Sophistication
PDF
Phishing Made Easy
PDF
Imperva 2017 Cyber Threat Defense Report
PDF
Combat Payment Card Attacks with WAF and Threat Intelligence
PDF
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
PDF
Get Going With Your GDPR Plan
PDF
Cyber Criminal's Path To Your Data
PDF
Combat Today's Threats With A Single Platform For App and Data Security
PPTX
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Cybersecurity and Healthcare - HIMSS 2018 Survey
API Security Survey
Imperva ppt
Beyond takeover: stories from a hacked account
Research: From zero to phishing in 60 seconds
Making Sense of Web Attacks: From Alerts to Narratives
How We Blocked a 650Gb DDoS Attack Over Lunch
Survey: Insider Threats and Cyber Security
Companies Aware, but Not Prepared for GDPR
Rise of Ransomware
7 Tips to Protect Your Data from Contractors and Privileged Vendors
SEO Botnet Sophistication
Phishing Made Easy
Imperva 2017 Cyber Threat Defense Report
Combat Payment Card Attacks with WAF and Threat Intelligence
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
Get Going With Your GDPR Plan
Cyber Criminal's Path To Your Data
Combat Today's Threats With A Single Platform For App and Data Security
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation

Recently uploaded (20)

PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PPTX
Tartificialntelligence_presentation.pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
STKI Israel Market Study 2025 version august
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
The various Industrial Revolutions .pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Architecture types and enterprise applications.pdf
PPTX
Modernising the Digital Integration Hub
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
observCloud-Native Containerability and monitoring.pptx
Web Crawler for Trend Tracking Gen Z Insights.pptx
Tartificialntelligence_presentation.pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
Assigned Numbers - 2025 - Bluetooth® Document
Final SEM Unit 1 for mit wpu at pune .pptx
Group 1 Presentation -Planning and Decision Making .pptx
STKI Israel Market Study 2025 version august
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
DP Operators-handbook-extract for the Mautical Institute
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Zenith AI: Advanced Artificial Intelligence
The various Industrial Revolutions .pptx
NewMind AI Weekly Chronicles – August ’25 Week III
Module 1.ppt Iot fundamentals and Architecture
Architecture types and enterprise applications.pdf
Modernising the Digital Integration Hub
sustainability-14-14877-v2.pddhzftheheeeee
A novel scalable deep ensemble learning framework for big data classification...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor

CMS Hacking 101

  • 1. © 2013 Imperva, Inc. All rights reserved. CMS Hacking 101 Analyzing the Risk with 3rd Party Applications Confidential1 Barry Shteiman Senior Security Strategist
  • 2. © 2013 Imperva, Inc. All rights reserved. Agenda Confidential2 §  CMS defined §  Risks and trends §  Recent incidents §  Into the details •  An attack campaign •  Industrialized attack campaign §  Reclaiming security
  • 3. © 2013 Imperva, Inc. All rights reserved. Today’s Speaker - Barry Shteiman Confidential3 §  Senior Security Strategist §  Security consultant working with the CTO office §  Author of several application security tools §  Open source security projects code contributor §  Twitter @bshteiman
  • 4. © 2013 Imperva, Inc. All rights reserved. CMS Defined Confidential4 Content Management System
  • 5. © 2013 Imperva, Inc. All rights reserved. What is a CMS? Confidential5 A content management system (CMS) is a computer program that allows publishing, editing and modifying content as well as maintenance from a central interface. Source: https://en.wikipedia.org/wiki/Content_management_system
  • 6. © 2013 Imperva, Inc. All rights reserved. Deployment Distribution Confidential6 Source: http://trends.builtwith.com/cms
  • 7. © 2013 Imperva, Inc. All rights reserved. Enterprise Adoption Confidential7
  • 8. © 2013 Imperva, Inc. All rights reserved. Risks and Trends Confidential8
  • 9. © 2013 Imperva, Inc. All rights reserved.9 OWASP Top 10 – 2013 Update New, A9 - Using Known Vulnerable Components Confidential
  • 10. © 2013 Imperva, Inc. All rights reserved.10 3rd Party According to Veracode: •  “Up to 70% of internally developed code originates outside of the development team” •  28% of assessed applications are identified as created by a 3rd party Confidential
  • 11. © 2013 Imperva, Inc. All rights reserved. When a 3rd Party Brings its Friends Confidential11 §  More than 20% of the 50 most popular WordPress plugins are vulnerable to web attacks §  7 out of top 10 most popular e-commerce plugins are vulnerable to common Web attacks -- Checkmarx Ltd. research lab “The Security State of WordPress’ Top 50 Plugins” white paper, June 18, 2013 You can’t fix code you don’t own, even if you host your own, that code has third party components in it.
  • 12. © 2013 Imperva, Inc. All rights reserved. Attack Surface Confidential12 Source: https://www.bsi.bund.de/DE/Publikationen/Studien/CMS/Studie_CMS.html BSI is Germany's federal office for information security In a research conducted by BSI in Germany, ~20% of the vulnerabilities discovered were found in the CMS core, ~80% in plugins and extensions.
  • 13. © 2013 Imperva, Inc. All rights reserved. Classic Web Site Hacking Confidential13 Hacking 1.  Identify Target 2.  Find Vulnerability 3.  Exploit Single Site Attack
  • 14. © 2013 Imperva, Inc. All rights reserved. Classic Web Site Hacking Confidential14 Hacking 1.  Identify Target 2.  Find Vulnerability 3.  Exploit Hacking 1.  Identify Target 2.  Find Vulnerability 3.  Exploit Hacking 1.  Identify Target 2.  Find Vulnerability 3.  Exploit Hacking 1.  Identify Target 2.  Find Vulnerability 3.  Exploit Hacking 1.  Identify Target 2.  Find Vulnerability 3.  Exploit Multiple Site Attacks
  • 15. © 2013 Imperva, Inc. All rights reserved. CMS Hacking Confidential15 Hacking 1.  Identify CMS 2.  Find Vulnerability 3.  Exploit CMS Targeting Attack
  • 16. © 2013 Imperva, Inc. All rights reserved. Recent Incidents Confidential16
  • 17. © 2013 Imperva, Inc. All rights reserved. 3rd Party Code Driven Incidents Confidential17 Breached via 3rd party application on Drupal.org own servers.
  • 18. © 2013 Imperva, Inc. All rights reserved. 3rd Party Code Driven Incidents Confidential18 3rd party service provider hacked, customer data affected.
  • 19. © 2013 Imperva, Inc. All rights reserved. 3rd Party Code Driven Incidents Confidential19 Yahoo’s 3rd party hack as detailed in Imperva’s January HII report. HII Report: http://www.imperva.com/docs/HII_Lessons_Learned_From_the_Yahoo_Hack.pdf
  • 20. © 2013 Imperva, Inc. All rights reserved. CMS Related Incidents Confidential20
  • 21. © 2013 Imperva, Inc. All rights reserved. Into the Details Confidential21 How a CMS Attack Campaign Might Look
  • 22. © 2013 Imperva, Inc. All rights reserved.22 The Attacker’s Focus Server Takeover Direct Data Theft Confidential
  • 23. © 2013 Imperva, Inc. All rights reserved. CMS Mass Hacking Confidential23 Source: www.exploit-db.com Step 1: Find a vulnerability in a CMS platform Even public vulnerability databases, contain thousands of CMS related vulnerabilities.
  • 24. © 2013 Imperva, Inc. All rights reserved. CMS Gone Wild(card) Confidential24 Step 2: Identify a fingerprint in a relevant CMS-based site A fingerprint can be •  Image •  URL •  Tag •  Object Reference •  Response to a query •  etc..
  • 25. © 2013 Imperva, Inc. All rights reserved. Fingerprinted Confidential25 Tag based The code will usually contain fingerprints (unless obfuscated) of the CMS in use.
  • 26. © 2013 Imperva, Inc. All rights reserved. Fingerprinted Confidential26 URL based An administrator interface may be front facing, allowing detection and login attempts
  • 27. © 2013 Imperva, Inc. All rights reserved. Google Dork for the Masses Confidential27 §  Query: inurl:(wp-config.conf | wp-config.txt) ext:(conf | txt | config) §  Results: 144,000
  • 28. © 2013 Imperva, Inc. All rights reserved. Google Dork for the Masses Confidential28 In our case: Database Host, User and Password Exposed
  • 29. © 2013 Imperva, Inc. All rights reserved. Botnets Targeting Your CMS Confidential29 Recently Observed: •  Botnets Scan websites for vulnerabilities •  Inject Hijack/Drive-by code to vulnerable systems •  Onboarding hijacked systems into the Botnet
  • 30. © 2013 Imperva, Inc. All rights reserved. From a Botnet Communication Confidential30 Botnet operator uses zombies to scan sites for vulnerabilities * As observed by Imperva’s ADC Research Team Google Dork
  • 31. © 2013 Imperva, Inc. All rights reserved. From a Botnet Communication Confidential31 Botnet exploits vulnerabilities and absorbs victim servers * As observed by Imperva’s ADC Research Team
  • 32. © 2013 Imperva, Inc. All rights reserved. Reclaiming Security Confidential32 Securing 3rd Party Applications
  • 33. © 2013 Imperva, Inc. All rights reserved. Analyzing the Attack Surface Confidential33 Graphics Source: https://www.bsi.bund.de/DE/Publikationen/Studien/CMS/Studie_CMS.html BSI is Germany's federal office for information security Certain vulnerabilities in 3rd party applications, can only be properly fixed using Web Application Firewalls.
  • 34. © 2013 Imperva, Inc. All rights reserved. Deployment Matters Confidential34 Cloud based deploymentOn premise deployment Applications and 3rd party code deployed in your virtual/physical data center. Hosted applications and B2B services. Imperva Incapsula Cloud
  • 35. © 2013 Imperva, Inc. All rights reserved. When a company builds its security model it usually does not take into account elements that are not in control, which creates the security hole. Companies should: §  Implement policies both on the legal and technical aspects to control data access and data usage. §  Require third party applications to accept your security policies and put proper controls in place §  Monitor. Recommendations 35 Confidential35
  • 36. © 2013 Imperva, Inc. All rights reserved. §  Assume third-party code – coming from partners, vendors, or mergers and acquisitions – contains serious vulnerabilities §  Pen test before deployment to identify these issues §  Deploy the application behind a WAF to •  Virtually patch pen test findings •  Mitigate new risks (unknown on the pen test time) •  Mitigate issues the pen tester missed •  Use cloud WAF for remotely hosted applications §  Virtually patch newly discovered CVEs •  Requires a robust security update service Technical Recommendations 36 Confidential36
  • 37. © 2013 Imperva, Inc. All rights reserved. Post-Webcast Discussions Answers to Attendee Questions Webcast Recording Link Join Group Join Imperva LinkedIn Group, Imperva Data Security Direct, for… Presentation Materials Confidential3737
  • 38. © 2013 Imperva, Inc. All rights reserved. www.imperva.com 38 Confidential