SlideShare a Scribd company logo
What are XML Firewalls Adam Vincent, Layer 7 Technologies Federal Technical Director Prepared for Institute of Electrical and Electronics Engineers (IEEE) Given at IEEE Chapter Meeting on April 17th, 2008 in Mclean, VA
Firewalls Overview  Traditional Firewalls do very little to mitigate XML vulnerabilities since they are normally configured to allow all ASCII traffic through port 80, and XML is ASCII.  XML firewalls are devices for implementing security policies, as specifically applied to XML messages. The following slides review XML firewalls, with a focus on how they are used to mitigate security risks. The focus of this section will be on boundary protection, although when you look at an SOA it is important to look at the entirety of the architecture.  Providing boundary protection is a necessary step to providing end-to-end security. What is an XML Firewall?
What is an XML Firewall? What is a Firewall? Firewall Policies Definition:  Limits access  between networks in accordance with  local security policies .
Firewall Implements a Policy The policy specifies all the factors that must be considered when making a decision what actions should be taken upon making a decision The firewall implements the policy What is an XML Firewall?
Two Categories of Firewalls Network firewalls (a.k.a. IP/port firewalls): Decisions are made based purely upon factors relating to the packet’s origin and destination: Where did the packet come from? Who originated the packet? Where is its destination? What time did the packet arrive?   Application firewalls: Decisions are made based upon the content of the message: Is the content of the message acceptable? Is the content of a high-value transaction? Is the content of a low-value transaction? Is the content of the message structured appropriately?  What is an XML Firewall?
Two Categories of Firewalls What is an XML Firewall? Check IP/port Network firewalls Check message content Application firewalls Note: many routers already do this checking
What is an XML Firewall? What is an XML Firewall? XML Firewall What should I do with this XML document/message? Policies Definition: An XML firewall is a tool that takes as input an  XML document/message and enforces security policies  XML
Example Deployment  What is an XML Firewall?
XML Firewalls can do IP/Port checking and content checking What is an XML Firewall? Stateful Inspection:   Analysis of data within the lowest levels of the protocol stack in order to compare the current session with previous ones for detection of suspicious activity   Deep Packet Inspection:   Analysis of content of a thru-passing packet, searching for illegal statements to decide if the packet can pass.  Check IP/port Packet firewalls Check message content Application firewalls XML Firewalls Note: many routers already do this checking Stateful Inspection Deep Packet Inspection
What Factors Enter into an XML Firewall's Decision? Decisions can be made based upon countless factors, e.g., Package-based factors: Where did the connection/message come from? Who originated the connection/message? Where is its destination? What time did the connection/message arrive?  What time was the connection/message sent? Content-based factors: Is the content of the message acceptable? Is the content a high-value transaction? Is the content a low-value transaction? Is the content of the message structured appropriately? Is the XML security header formatted correctly? What is an XML Firewall?
What Actions can an XML Firewall Take? If the firewall decides the message/document is not acceptable for propagation, it may: log the document return the document discard the document Etc. If the firewall decides the message/document is acceptable for propagation, it may: simply forward it along route it along a special path delay sending it along for a period of time Etc. What is an XML Firewall?
What is an XML Firewall? Example of a Check that an XML Firewall may Perform "Does the XML conform to the data business rules,  i.e.,  does it validate against a XML Schema defining the business rules?” “ Does the XML contain malicious code” “ Does the Message Level Security component of the message comply with the DoD/IC requirements” “ Authentication/Authorization of the sender/message creator”
Policy Enforcement Point (PEP) It enforces that the message adheres to the policy and may per policy take input from one or more external resources to use in its enforcement process XML Firewalls provide centralized management and enforcement when acting as a PEP What is an XML Firewall? This is analogous to the PEP.
Policy Decision Point (PDP) Makes a decision based upon destination resource and calling entity. It sends the decision to a PEP, which carries out Enforcement XML Firewalls can utilize inputs from a PDP, or can act as a PDP when one is not available.  What is an XML Firewall? PEP PDP
Attribute Services (AS) Provides attributes about resources and/or entities as inputs to a PDP XML Firewalls can utilize inputs from an Attribute Service, or can act as a AS when one is not available What is an XML Firewall? PDP AS PEP
What is an XML Firewall? Firewalls and PEP/PDP/AS A firewall can act as either a PEP, a PDP, or an AS. When a firewall is acting as a PEP, it "consults" a PDP service (externally or internally) and gives it information about what it knows, and asks "What should I do?"  Thus, a firewall must always have both a PEP and a PDP. A firewall may provide a PEP, PDP, and a AS PDP Traffic inputs Firewall Firewall AS
What is an XML Firewall? Firewall acting as a PEP only Firewall (acting as a PEP only) PDP service "Do this" ” Bob wants to  Send a message  To Service A" Attribute service ” Tell me about Bob”  ” Bob is in the Army”  Threat Protection, Verify Message Security, Audit, and Call out to PDP Policies doc Policies
What is an XML Firewall? More Realistic use of an XML Firewall XML Firewall PDP service Attribute service Threat Protection, Verify Message Security, Audit, Authenticate/Authorize via ABAC Attribute Repository (LDAP) PEP Policies doc
XML Acceleration (1 of 2) XML is verbose and processing can be time consuming  XML Firewalls provide mechanisms to accelerate XML processing: Utilize hardware-based mechanisms to accelerate XML processing Utilize low-level software processing capabilities and pipelining to accelerate XML processing What is an XML Firewall? XML Firewall Policies Back-end applications are relieved from doing all of this XML processing Policy Verified Policy Un-verified Back-end  applications XML New XML
XML Acceleration (2 of 2) Here’s some XML processing which can be done very quickly with an XML Firewall: Validate XML Message against an XML Schema Transform using XSLT an XML input for output to a back-end service Verify message conforms to WS-Security Specification XPATH Processing and Content Based Routing What is an XML Firewall?
Threat Detection An XML Firewall can perform detection and mitigation of malicious code using XML as a vector of attack What is an XML Firewall? XML Firewall Malicious Code Policy Malicious code is not allowed to pass Entity A Entity B XML Purchase Order (with Malicious Code)
Access Control An XML Firewall can perform fine grained Authentication and Authorization of a sending, and receiving entity What is an XML Firewall? XML Firewall Access Control Policy is allowed to send purchase orders to (B) Entity A Entity B XML Purchase Order
Complex Access Control What is an XML Firewall? Organization Green Michelle Dimitri Program X Organization Blue Policy Enforcement Point Secure Token Server (STS) for Federation Policy Application Point WS-MetadataExchange of WS-Policy Documents WS-Trust Token Requests WSS secure SOAP messages with bound SAML tokens Policy Administration
XML Schema Validation An XML Firewall can determine whether an XML message/document conforms to an XML Schema   What is an XML Firewall? XML Firewall XML Schema Entity A Entity B XML Document XML Document
XSL Transformation An XML Firewall can change XML messages/documents through an integrated XSLT processor What is an XML Firewall? XML Firewall XML Schema Entity A Entity B XML Document New XML Document
XML Filtering An XML Firewall can filter incoming XML traffic based on message size, disallowed content, other metadata, etc. What is an XML Firewall? XML Firewall Policies Message Size Limit Exceeded Entity A Entity B LARGE XML Document
Dynamic Routing An XML Firewall routes a request based on content, network parameters or other metadata  What is an XML Firewall? Firewall Where should I route this document? Policies Busy Not busy.  Document is routed here. Entity A $1,000,000 Purchase Order
Service Virtualization/Abstraction Mask back-end resources from external probing   What is an XML  Firewall? XML Firewall Policies “ I’m Service (A)” This is the actual  service (A) The XML Firewall shields the actual service from external attacks by acting as a virtual stand-in to the service. Message to Service (A)
Quality of Service (QoS) Enables you to provide service priorities A $1,000,000.00 transaction will get expedited service, a $2.00 transaction will get regular service What is an XML Firewall? Firewall On arrival, priority goes to $1,000,000 Purchase Order Policies $1,000,000 Purchase Order $2.00 Purchase Order
Auditing  Provides service level auditing capabilities Number of requests Types of requests Where requests originate What is an XML Firewall? Firewall Audit Data Service 2 Service 1
Virus Detection (1 of 2) Many XML Firewalls offer virus detection capabilities Viruses in attachments (MIME and DIME Messages) Viruses in XML content What is an XML Firewall? Firewall Virus Detected! Virus
Virus Detection (2 of 2) How XML Firewalls offer Virus Protection What is an XML Firewall? Firewall External Virus Engine Symantec/Other Scanner Virus Def Update
Conclusions Whew…. You now know everything  …Just kidding Keep in mind that SOA is a moving target and changes by the Day! Questions & Comments: Adam Vincent [email_address] 703-965-1771 What is an XML Firewall?

More Related Content

PPTX
ASA Firewall Interview- Questions & Answers
PDF
Cisco Meraki- Simplifying IT
DOCX
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
PPT
Distributed document based system
PPTX
CCNA4 Verson6 Chapter1
PDF
What's new in MQ 9.1.* on z/OS
PDF
Meraki Solution Overview
PDF
Meraki Overview
ASA Firewall Interview- Questions & Answers
Cisco Meraki- Simplifying IT
Palo Alto Networks PANOS 5.0 Radius Authentication OTP using Yubikey
Distributed document based system
CCNA4 Verson6 Chapter1
What's new in MQ 9.1.* on z/OS
Meraki Solution Overview
Meraki Overview

What's hot (20)

PDF
O365 to cisco cloud guide
PPT
Cisco icons
PPTX
Using ibm mq in managed file transfer environments final
PDF
Fortinet security fabric
PPTX
IBM API Connect Deployment `Good Practices - IBM Think 2018
PPT
Fortigate Training
PPT
Cisco Network Icon Library
PDF
Web Security Deployment
PPTX
安全SD-WAN-Fortinet-AWS Summit2022.pptx
PPTX
Palo Alto Networks 28.5.2013
PPT
Vp npresentation 2
PDF
IBM Managed File Transfer Solutions Overview
PDF
F5 Networks: architecture and risk management
PDF
PDF
Succeeding with Secure Access Service Edge (SASE)
PDF
Meraki overview sales deck inside sales
PPT
Data power use cases
PPTX
Ping Identity
PDF
Microsoft 365 Compliance
PDF
Network Access Control (NAC)
O365 to cisco cloud guide
Cisco icons
Using ibm mq in managed file transfer environments final
Fortinet security fabric
IBM API Connect Deployment `Good Practices - IBM Think 2018
Fortigate Training
Cisco Network Icon Library
Web Security Deployment
安全SD-WAN-Fortinet-AWS Summit2022.pptx
Palo Alto Networks 28.5.2013
Vp npresentation 2
IBM Managed File Transfer Solutions Overview
F5 Networks: architecture and risk management
Succeeding with Secure Access Service Edge (SASE)
Meraki overview sales deck inside sales
Data power use cases
Ping Identity
Microsoft 365 Compliance
Network Access Control (NAC)
Ad

Similar to Layer 7 Technologies: What Is An Xml Firewall (20)

PDF
Principles of Information Security 6th Edition Whitman Solutions Manual
PDF
Principles of Information Security 6th Edition Whitman Solutions Manual
PDF
Principles of Information Security 6th Edition Whitman Solutions Manual
PDF
Principles of Information Security 6th Edition Whitman Solutions Manual
PDF
Principles of Information Security 6th Edition Whitman Solutions Manual
PDF
Principles of Information Security 6th Edition Whitman Solutions Manual
PDF
Immediate download Principles of Information Security 6th Edition Whitman Sol...
PPT
Unit II Chapter 6 firewalls.ppt
PPT
Cryptography and Network Security Slide.
PDF
Principles of Information Security 6th Edition Whitman Solutions Manual
PDF
Parsing of xml file to make secure transaction in mobile commerce
PPT
Layer 7: Managing SOA Security and Operations with SecureSpan
PPTX
Web Api services using IBM Datapower
PDF
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
PDF
Intorduction to Datapower
DOCX
PDF
XTM moving security forward
PPTX
Product Overview Nov 2010 V1
PPT
Network security and cryptography ppt.ppt
Principles of Information Security 6th Edition Whitman Solutions Manual
Principles of Information Security 6th Edition Whitman Solutions Manual
Principles of Information Security 6th Edition Whitman Solutions Manual
Principles of Information Security 6th Edition Whitman Solutions Manual
Principles of Information Security 6th Edition Whitman Solutions Manual
Principles of Information Security 6th Edition Whitman Solutions Manual
Immediate download Principles of Information Security 6th Edition Whitman Sol...
Unit II Chapter 6 firewalls.ppt
Cryptography and Network Security Slide.
Principles of Information Security 6th Edition Whitman Solutions Manual
Parsing of xml file to make secure transaction in mobile commerce
Layer 7: Managing SOA Security and Operations with SecureSpan
Web Api services using IBM Datapower
Ten new topics on security+ 2011 (sy0 301) (domain 1.0 network security)
Intorduction to Datapower
XTM moving security forward
Product Overview Nov 2010 V1
Network security and cryptography ppt.ppt
Ad

More from CA API Management (20)

PDF
Api architectures for the modern enterprise
PDF
Mastering Digital Channels with APIs
PDF
Takeaways from API Security Breaches Webinar
PDF
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
PDF
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
PDF
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
PPTX
API Monetization: Unlock the Value of Your Data
PDF
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
PDF
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
PDF
Enabling the Multi-Device Universe
PDF
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
PDF
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
PPTX
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
PDF
Adapting to Digital Change: Use APIs to Delight Customers & Win
PPTX
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
PDF
5 steps end to end security consumer apps
PPTX
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
PDF
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
PPTX
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
PDF
Using APIs to Create an Omni-Channel Retail Experience
Api architectures for the modern enterprise
Mastering Digital Channels with APIs
Takeaways from API Security Breaches Webinar
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API Monetization: Unlock the Value of Your Data
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Enabling the Multi-Device Universe
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
Adapting to Digital Change: Use APIs to Delight Customers & Win
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
5 steps end to end security consumer apps
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Using APIs to Create an Omni-Channel Retail Experience

Recently uploaded (20)

PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Architecture types and enterprise applications.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
STKI Israel Market Study 2025 version august
PDF
August Patch Tuesday
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
Univ-Connecticut-ChatGPT-Presentaion.pdf
CloudStack 4.21: First Look Webinar slides
Architecture types and enterprise applications.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
O2C Customer Invoices to Receipt V15A.pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Chapter 5: Probability Theory and Statistics
Group 1 Presentation -Planning and Decision Making .pptx
Web Crawler for Trend Tracking Gen Z Insights.pptx
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Getting Started with Data Integration: FME Form 101
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Getting started with AI Agents and Multi-Agent Systems
A review of recent deep learning applications in wood surface defect identifi...
A contest of sentiment analysis: k-nearest neighbor versus neural network
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
STKI Israel Market Study 2025 version august
August Patch Tuesday
NewMind AI Weekly Chronicles – August ’25 Week III

Layer 7 Technologies: What Is An Xml Firewall

  • 1. What are XML Firewalls Adam Vincent, Layer 7 Technologies Federal Technical Director Prepared for Institute of Electrical and Electronics Engineers (IEEE) Given at IEEE Chapter Meeting on April 17th, 2008 in Mclean, VA
  • 2. Firewalls Overview Traditional Firewalls do very little to mitigate XML vulnerabilities since they are normally configured to allow all ASCII traffic through port 80, and XML is ASCII. XML firewalls are devices for implementing security policies, as specifically applied to XML messages. The following slides review XML firewalls, with a focus on how they are used to mitigate security risks. The focus of this section will be on boundary protection, although when you look at an SOA it is important to look at the entirety of the architecture. Providing boundary protection is a necessary step to providing end-to-end security. What is an XML Firewall?
  • 3. What is an XML Firewall? What is a Firewall? Firewall Policies Definition: Limits access between networks in accordance with local security policies .
  • 4. Firewall Implements a Policy The policy specifies all the factors that must be considered when making a decision what actions should be taken upon making a decision The firewall implements the policy What is an XML Firewall?
  • 5. Two Categories of Firewalls Network firewalls (a.k.a. IP/port firewalls): Decisions are made based purely upon factors relating to the packet’s origin and destination: Where did the packet come from? Who originated the packet? Where is its destination? What time did the packet arrive? Application firewalls: Decisions are made based upon the content of the message: Is the content of the message acceptable? Is the content of a high-value transaction? Is the content of a low-value transaction? Is the content of the message structured appropriately? What is an XML Firewall?
  • 6. Two Categories of Firewalls What is an XML Firewall? Check IP/port Network firewalls Check message content Application firewalls Note: many routers already do this checking
  • 7. What is an XML Firewall? What is an XML Firewall? XML Firewall What should I do with this XML document/message? Policies Definition: An XML firewall is a tool that takes as input an XML document/message and enforces security policies XML
  • 8. Example Deployment What is an XML Firewall?
  • 9. XML Firewalls can do IP/Port checking and content checking What is an XML Firewall? Stateful Inspection: Analysis of data within the lowest levels of the protocol stack in order to compare the current session with previous ones for detection of suspicious activity Deep Packet Inspection: Analysis of content of a thru-passing packet, searching for illegal statements to decide if the packet can pass. Check IP/port Packet firewalls Check message content Application firewalls XML Firewalls Note: many routers already do this checking Stateful Inspection Deep Packet Inspection
  • 10. What Factors Enter into an XML Firewall's Decision? Decisions can be made based upon countless factors, e.g., Package-based factors: Where did the connection/message come from? Who originated the connection/message? Where is its destination? What time did the connection/message arrive? What time was the connection/message sent? Content-based factors: Is the content of the message acceptable? Is the content a high-value transaction? Is the content a low-value transaction? Is the content of the message structured appropriately? Is the XML security header formatted correctly? What is an XML Firewall?
  • 11. What Actions can an XML Firewall Take? If the firewall decides the message/document is not acceptable for propagation, it may: log the document return the document discard the document Etc. If the firewall decides the message/document is acceptable for propagation, it may: simply forward it along route it along a special path delay sending it along for a period of time Etc. What is an XML Firewall?
  • 12. What is an XML Firewall? Example of a Check that an XML Firewall may Perform "Does the XML conform to the data business rules, i.e., does it validate against a XML Schema defining the business rules?” “ Does the XML contain malicious code” “ Does the Message Level Security component of the message comply with the DoD/IC requirements” “ Authentication/Authorization of the sender/message creator”
  • 13. Policy Enforcement Point (PEP) It enforces that the message adheres to the policy and may per policy take input from one or more external resources to use in its enforcement process XML Firewalls provide centralized management and enforcement when acting as a PEP What is an XML Firewall? This is analogous to the PEP.
  • 14. Policy Decision Point (PDP) Makes a decision based upon destination resource and calling entity. It sends the decision to a PEP, which carries out Enforcement XML Firewalls can utilize inputs from a PDP, or can act as a PDP when one is not available. What is an XML Firewall? PEP PDP
  • 15. Attribute Services (AS) Provides attributes about resources and/or entities as inputs to a PDP XML Firewalls can utilize inputs from an Attribute Service, or can act as a AS when one is not available What is an XML Firewall? PDP AS PEP
  • 16. What is an XML Firewall? Firewalls and PEP/PDP/AS A firewall can act as either a PEP, a PDP, or an AS. When a firewall is acting as a PEP, it "consults" a PDP service (externally or internally) and gives it information about what it knows, and asks "What should I do?" Thus, a firewall must always have both a PEP and a PDP. A firewall may provide a PEP, PDP, and a AS PDP Traffic inputs Firewall Firewall AS
  • 17. What is an XML Firewall? Firewall acting as a PEP only Firewall (acting as a PEP only) PDP service "Do this" ” Bob wants to Send a message To Service A" Attribute service ” Tell me about Bob” ” Bob is in the Army” Threat Protection, Verify Message Security, Audit, and Call out to PDP Policies doc Policies
  • 18. What is an XML Firewall? More Realistic use of an XML Firewall XML Firewall PDP service Attribute service Threat Protection, Verify Message Security, Audit, Authenticate/Authorize via ABAC Attribute Repository (LDAP) PEP Policies doc
  • 19. XML Acceleration (1 of 2) XML is verbose and processing can be time consuming XML Firewalls provide mechanisms to accelerate XML processing: Utilize hardware-based mechanisms to accelerate XML processing Utilize low-level software processing capabilities and pipelining to accelerate XML processing What is an XML Firewall? XML Firewall Policies Back-end applications are relieved from doing all of this XML processing Policy Verified Policy Un-verified Back-end applications XML New XML
  • 20. XML Acceleration (2 of 2) Here’s some XML processing which can be done very quickly with an XML Firewall: Validate XML Message against an XML Schema Transform using XSLT an XML input for output to a back-end service Verify message conforms to WS-Security Specification XPATH Processing and Content Based Routing What is an XML Firewall?
  • 21. Threat Detection An XML Firewall can perform detection and mitigation of malicious code using XML as a vector of attack What is an XML Firewall? XML Firewall Malicious Code Policy Malicious code is not allowed to pass Entity A Entity B XML Purchase Order (with Malicious Code)
  • 22. Access Control An XML Firewall can perform fine grained Authentication and Authorization of a sending, and receiving entity What is an XML Firewall? XML Firewall Access Control Policy is allowed to send purchase orders to (B) Entity A Entity B XML Purchase Order
  • 23. Complex Access Control What is an XML Firewall? Organization Green Michelle Dimitri Program X Organization Blue Policy Enforcement Point Secure Token Server (STS) for Federation Policy Application Point WS-MetadataExchange of WS-Policy Documents WS-Trust Token Requests WSS secure SOAP messages with bound SAML tokens Policy Administration
  • 24. XML Schema Validation An XML Firewall can determine whether an XML message/document conforms to an XML Schema What is an XML Firewall? XML Firewall XML Schema Entity A Entity B XML Document XML Document
  • 25. XSL Transformation An XML Firewall can change XML messages/documents through an integrated XSLT processor What is an XML Firewall? XML Firewall XML Schema Entity A Entity B XML Document New XML Document
  • 26. XML Filtering An XML Firewall can filter incoming XML traffic based on message size, disallowed content, other metadata, etc. What is an XML Firewall? XML Firewall Policies Message Size Limit Exceeded Entity A Entity B LARGE XML Document
  • 27. Dynamic Routing An XML Firewall routes a request based on content, network parameters or other metadata What is an XML Firewall? Firewall Where should I route this document? Policies Busy Not busy. Document is routed here. Entity A $1,000,000 Purchase Order
  • 28. Service Virtualization/Abstraction Mask back-end resources from external probing What is an XML Firewall? XML Firewall Policies “ I’m Service (A)” This is the actual service (A) The XML Firewall shields the actual service from external attacks by acting as a virtual stand-in to the service. Message to Service (A)
  • 29. Quality of Service (QoS) Enables you to provide service priorities A $1,000,000.00 transaction will get expedited service, a $2.00 transaction will get regular service What is an XML Firewall? Firewall On arrival, priority goes to $1,000,000 Purchase Order Policies $1,000,000 Purchase Order $2.00 Purchase Order
  • 30. Auditing Provides service level auditing capabilities Number of requests Types of requests Where requests originate What is an XML Firewall? Firewall Audit Data Service 2 Service 1
  • 31. Virus Detection (1 of 2) Many XML Firewalls offer virus detection capabilities Viruses in attachments (MIME and DIME Messages) Viruses in XML content What is an XML Firewall? Firewall Virus Detected! Virus
  • 32. Virus Detection (2 of 2) How XML Firewalls offer Virus Protection What is an XML Firewall? Firewall External Virus Engine Symantec/Other Scanner Virus Def Update
  • 33. Conclusions Whew…. You now know everything  …Just kidding Keep in mind that SOA is a moving target and changes by the Day! Questions & Comments: Adam Vincent [email_address] 703-965-1771 What is an XML Firewall?