Oracle Cloud Infrastucture Web Application Firewall

1y ago
16 Views
2 Downloads
3.77 MB
6 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Xander Jaffe
Transcription

Oracle CloudInfrastucture WebApplication FirewallDid you know.Challengesnot all cloud WAF solutions arecreated equal? Many providersoffer WAFs as a virtual machine(VM) that runs in a public cloudhypervisor service. But cloudbased VMs must still be patchedand updated by the customer.Customers are responsible forscaling their VMs, whereas true,cloud-native WAFs are built toscale. When evaluating WAFs, besure to look for a purely cloudbased solution that’s supported bya global cloud infrastructure.Web application security is a growing concern for enterprises.A significant portion of all cyberattacks are directed at webapplications, and that rate is increasing.Factors such as the rise of cloud computing, use of open sourcetechnologies, the increase in data processing requirements,complexity of web applications, and an increase in the overallsophistication of attackers has led to an extremely challengingenvironment for IT security leadership.When a breach occurs, it could often have been prevented.However, security budgets are not keeping up. Informationtechnology leaders struggle to keep pace with innovation andthe growing costs of breach mitigation, prevention, post-breachremediation, and cleanup.cloud.oracle.com/iaas@oracleiaaspage 1

Data Sheet Oracle Cloud Infrastructure WAFOracle Cloud Infrastructure WebApplication Firewall: Cloud-Based,Globally Distributed NetworkWell-intended security controls often end up becoming anenterprise security choke point when cyberattackers can makeuse of global networks and continuously change their threatlocations.Eventually, cybercriminals overwhelm or breach an organization’sperimeter-only defenses. A global security platform is neededto extend enterprise defenses. Organizations must embraceglobally scalable and distributed solutions as a starting point tothwart attacks.The Oracle Cloud Infrastructure (OCI) Web Application Firewall(WAF) is an enterprise-grade, cloud-based, globally deployedsecurity solution, designed to address today’s web applicationchallenges. The OCI WAF provides a suite of security servicesthat uses a layered approach to protect web applications againstcyberattacks.What the OCI WAF ProvidesThe OCI WAF is an enterprise-grade, cloud-based, globallydeployed security solution designed to protect businesscritical web applications from malicious cyberattacks. The OCIWAF provides a suite of security services that uses a layeredapproach to protect web applications against cyberattacks.This release includes over 250 predefined Open Web AccessSecurity Project (OWASP) rules, application-specific rules, andcompliance rules. The WAF also provides aggregated threatintelligence from multiple sources like Webroot BrightCloud .Administrators can add their own access controls based ongeolocation, whitelisted and blacklisted IPs, and HTTP URLand header characteristics. Bot management provides a moreadvanced set of challenges including JavaScript acceptance,CAPTCHA, device fingerprinting, and human interactionalgorithms. Onboarding your applications to OCI WAF willprotect against Layer 7 denial-of-service (DDoS) attacks.cloud.oracle.com/iaas@oracleiaaspage 2

ExecutiveDataSheetSummary Oracle CloudOracleInfrastructureDyn OverviewWAFHow OCI WAF WorksThe OCI WAF network architecture creates a protectiveshield serving as the security perimeter for HTTP, addinga critical layer of web application and API protection.All traffic flows through the OCI WAF network prior toarriving at your application server. This allows the OCIWAF to inspect the traffic and compare it to definedrules and parameters. Configured as a reverse proxy, theOCI Web Application Firewall inspects all traffic destinedto your web application origin and identifies and blocksall malicious traffic. The WAF provides a custom securityprofile for each web application under protection, basedon more than 250 rules. Developing the security profileinvolves proxying traffic to establish a baseline, tuning,and moving into block mode.Key OCI WAF ComponentsThe technical functions that are critical to deliver robustand effective security services are: Tightly integrated into the OCI console for tightcontrol and ease of use for your OCI setup Supports over 250 rulesets, as well as the OWASPrulesets to protect against SQL injection, cross-sitescripting, HTML injection, and many more threats JavaScript Challenge, CAPTCHA Challenge, andwhitelisiting capabilities work in conjunction withrulesets to further detect and mitigate bad bots andallow access to legitimate human and bot traffic User access controls can be configured on the basisof countries, IP addresses, URLs, and other requestattributes to prohibit risky traffic Multicloud support provides WAF protection for anyinternet-facing application. OCI WAF can protectworkloads in any environment: OCI, on-premises,and across hybrid or multicloud deployments OCI WAF has API, SDK, and Terraform support forevery operation and can be orchestrated with otherOCI services 24/7 security operations centers with globalresearchers and analysis capabilitiesTightly Integrated into the OracleCloud Infrastructure ConsoleThe OCI WAF leverages other capabilities availablewithin OCI, including auditing of changes to WAFpolicies and granular access controls. OCI WAFtelemetry is sent to the monitoring service for reportingand alerting. Tagging can be applied to WAF policies,just like compute, storage, DNS, and all other servicesfor cost tracking and search.cloud.oracle.com/iaas@oracleiaaspage 3

ExecutiveDataSheetSummary Oracle CloudOracleInfrastructureDyn OverviewWAFWhat kinds of rulesets does OCI WAF support?The WAF’s rulesets protect critical web applications fromcyberattacks and malicious actors. These rules are comparedagainst incoming requests to determine if the request containsan attack payload. If it’s determined that a request is an attack,the WAF will then block or send an alert about that request.These attacks are many and varied and include threats such as:SQL injection, cross-site scripting, HTML injection and manymore—all of which can be detected and blocked by the OCIWAF rulesets.Top OWASP 10 vulnerability groups include: A1 – Injections (SQL, LDAP, OS, etc.) A2 – Broken Authentication and Session Management A3 – Cross-site Scripting (XSS) A4 – Insecure Direct Object References A6 – Sensitive Data Exposure A7 – Missing Function-Level Access ControlEach type of vulnerability ruleset is shown within the OCIControl Center, with granular controls for each specific rule.Each client can create custom rules. We work with clients tocreate unique rules during the onboarding process. OCI includesthe capability to create custom rules, both for all applicationsand at any time that custom rules are required by the e 4

Data Sheet Oracle Cloud Infrastructure WAFChallenges and whitelisiting capabilitiesUse the additional JavaScript challenge, CAPTCHA challenge,and whitelisting capabilities in conjunction with the WAFrulesets to further detect and block bad bots while allowinggood bots through. Customize challenge parameters, such asnumber of failed attempts, expiration times, messages andmore. Pick and choose which bots you want to deny and allowusing bot whitelisting.JavaScript Challenge: After receiving an HTTP request, apiece of JavaScript is sent back to the browser of every client,attacker, and real user. It instructs the browser to perform anaction. Legitimate browsers will pass the challenge withoutthe user’s knowledge, while bots—which are typically notequipped with JavaScript—will fail and be blocked. This isa fast and efficient way to block a large percentage of botattacks.CAPTCHA Challenge: If a specific URL should be accessed onlyby a human, you can control it with CAPTCHA protection. Youcan customize the comments for the CAPTCHA Challenge foreach url.Whitelisting: Allows you to manage which IP addresses appearon the IP whitelist. Requests from the whitelisted IP addressesbypass all challenges, such as DDoS policies and WAF rulesets.cloud.oracle.com/iaas@oracleiaaspage 5

Data Sheet Oracle Cloud Infrastructure WAFUser Access ControlsAPI Support for IntegrationUse the access controls to restrict or control access toyour critical web applications, data and services. Asan example, regionally-based access aligns to GDPRcompliance requirements. In some cases, an offeringmay need to stay within a specific country. Regionalaccess control can be used to restrict users from certaingeographies. For instance, you may not do business withcountries located in Asia, so you can completely blockaccess from these countries.If you are an OCI customer, partner, or managed serviceprovider who wants to integrate the OCI WAF directly intoyour existing management system or SIEM, WAF logs canbe consumed via RESTful APIs. The log format is easy toparse and rich with request metadata. Future releases willmake log files available in OCI buckets. Control access, based on HTTP header information.Block requests if the HTTP header contains specificnames or values or allow traffic with proper HTTPregular expression.Industry-Leading ExpertiseOracle provides 24/7 security operations centers with globalresearchers and analysis capabilities.Control access based on URL address matchingor partial matching or match proper URL regularexpressions.Multicloud SupportMany cloud providers restrict their WAF protection toapplications that reside within their own clouds. This isnot the case with the OCI WAF. In addition to providingWAF protection for OCI workloads the OCI WAF willalso protect on-premises and multicloud environments.Having this single OCI WAF to protect your workloadsin any environment is extremely important as you moveto OCI. This will provide protection for your entireenvironment and each phase of your OCI migration thatincludes cloud testing, migration, and ramp-up.Oracle Cloud Infrastructure is an enterprise infrastructure-as-a-service (IaaS) platform. Companies of all sizes rely on Oracle Cloud to run enterpriseand cloud-native applications with mission-critical performance and core-to-edge security. By running both traditional and new workloads on acomprehensive cloud that includes compute, storage, networking, database, and containers, Oracle Cloud Infrastructure can dramatically increaseoperational efficiency and lower total cost of ownership. For more information, visit cloud.oracle.com/iaas.Copyright 2019. Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracleand/or its affiliates. Other names may be trademarks of their respective owners. 1020dyn.com@dynpage 6

OCI Web Application Firewall inspects all traffic destined to your web application origin and identifies and blocks all malicious traffic. The WAF provides a custom security profile for each web application under protection, based on more than 250 rules. Developing the security profile involves proxying traffic to establish a baseline, tuning,

Related Documents:

Visit cloud.oracle.com for information on our free 30-day trial, and visit our Oracle Data Visualization Cloud Service web page. Connect. Oracle Events Oracle Blog Get Social. Twitter: Oracle Cloud Zone Facebook: Oracle Cloud Computing LinkedIn: Oracle Cloud Solutions YouTube: Oracle Cloud Computing Qualogy Leverages Data Storytelling

Oracle Cloud Infrastructure Data Integration 5D992.c NLR Oracle Cloud Watch Dog EAR99 NLR Oracle Compute Cloud Service Bare Metal VMI EAR99 NLR Oracle Container Cloud Service 5D992.c NLR Oracle Container Registry Cloud Service 5D992.c NLR Oracle DataFox Cloud Service 5D992.c NLR Oracle

Oracle e-Commerce Gateway, Oracle Business Intelligence System, Oracle Financial Analyzer, Oracle Reports, Oracle Strategic Enterprise Management, Oracle Financials, Oracle Internet Procurement, Oracle Supply Chain, Oracle Call Center, Oracle e-Commerce, Oracle Integration Products & Technologies, Oracle Marketing, Oracle Service,

Oracle is a registered trademark and Designer/2000, Developer/2000, Oracle7, Oracle8, Oracle Application Object Library, Oracle Applications, Oracle Alert, Oracle Financials, Oracle Workflow, SQL*Forms, SQL*Plus, SQL*Report, Oracle Data Browser, Oracle Forms, Oracle General Ledger, Oracle Human Resources, Oracle Manufacturing, Oracle Reports,

E-Business Suite and HCM Cloud E-Business Suite and ERP/SCM Cloud E-Business Suite and CX Cloud 10 Oracle E-Business Suite and Practical Coexistence Scenarios Extend with SaaS –Hybrid is the New Normal 1.EBS ERP to Oracle HCM Cloud 2.EBS Payroll with Oracle HCM Cloud 3.EBS HCM to Oracle Taleo Cloud 4.EBS HCM to Oracle Talent Management Cloud .

7 Messaging Server Oracle Oracle Communications suite Oracle 8 Mail Server Oracle Oracle Communications suite Oracle 9 IDAM Oracle Oracle Access Management Suite Plus / Oracle Identity Manager Connectors Pack / Oracle Identity Governance Suite Oracle 10 Business Intelligence

Advanced Replication Option, Database Server, Enabling the Information Age, Oracle Call Interface, Oracle EDI Gateway, Oracle Enterprise Manager, Oracle Expert, Oracle Expert Option, Oracle Forms, Oracle Parallel Server [or, Oracle7 Parallel Server], Oracle Procedural Gateway, Oracle Replication Services, Oracle Reports, Oracle

APS 240 Interlude Ð Writing Scientific Reports Page 5 subspecies of an organism (e.g. Calopteryx splendens xanthostoma ) then the sub-species name (xanthostoma ) is formatted the same way as the species name. In the passage above you will notice that the name of the damselfly is followed by a name: ÔLinnaeusÕ. This is the authority, the name of the taxonomist responsible for naming the .