«

»

Dec
28

App And Database Security Are Two Halves Of A Whole

From: Dark Reading

By Ericka Chickowski

The yin and yang of data security, application security and database security are two halves of a whole, different but still dependent on one another to reach true completion. When they fail together, attack methods such as SQL injection have a far greater impact on an organization. In order to limit the scope of attacks, developers and DBAs both need to acknowledge their role in the process and work together to ensure that web applications aren’t exposing sensitive databases.

This starts by understanding how much the current web app phenomenon has opened up once-closed databases.

“The days of static content web-sites are a distant memory, and every web-site or web-based application today is back-ended by some kind of database, whether it’s your bank, your cloud CRM service, your mobile device’s app-store, your favorite online shopping site, or your photo collection and blog,” says Joe Levy, CTO of Solera Networks. “The front-end application and the back-end database are inextricably bound in our current model, and one simply would not exist without the other.”

According to Levy, one of the biggest weaknesses in this model is when the pathways to the data aren’t properly controlled.

“We expect that the web-application is the sole interface for human interaction with the data, and that an API is the sole interface for machine interaction with the data,” he says. “If this is not the case, then there might be insufficient controls of the pathways to the data, and that would be one very basic potential vulnerability. Even if access methods are well-defined, there is still a virtually unlimited number of ways that applications can fail to properly defend their databases.”

The fact is that the rule of least privilege shouldn’t only be instituted for end users. It should also be applied to the applications themselves, says Chris Eng, vice president of research for Veracode.

“All too often applications are granted excessive privilege to databases that they don’t need to operate,” he says, explaining that the risks are amplified when multiple applications are granted access to databases used by other applications that they don’t necessarily need to be tied to. Those types of scenarios give patiently methodical hackers the opportunity to worm their way through a wider range of systems and data.

Eng says that developers and DBAs have to come up with a better system for tying the applications into databases.

“It makes sense to chunk it out into better granularity where this application may have only read-only rights or may only have access to this certain table,” he says. “People don’t do that now because they figure it is just easier to grant as much access as possible so you don’t impede the development cycle or application functionality.”

If they are given pushback, the DBAs do have the power to take the driver’s seat in this interaction, by not giving carte blanche to the developers.

“The DBAs can just simply not allow so much access to be granted,” Eng says.

In order to prevent the long arm of hackers from taking so much advantage out of inevitable web application vulnerabilities, DBAs also have the power to institute other mitigating controls.

“Until we achieve the lofty goal of fully homomorphic encryption–where operations can be performed on encrypted data without having to actually decrypt, and thus expose, the data–our next best bet is to move toward much broader adoption of database encryption, masking, or tokenization. Although this still often requires the data to be decrypted, it provides some defense against the wholesale theft of database contents,” says Levy, who adds that, “continuous monitoring of all application-layer and database-layer communications will help to quickly identify and resolve problems, and to accurately determine the scope of any security event.”

But as Eng puts it, the onus is not just on the DBAs.

“Developers definitely need to shoulder their share of the responsibility, too,” he says.

One of the important ways they can do that is to do a better job of scrubbing user input so that they can prevent hackers from having their way with the database information through attacks like SQL injection.

“It is simply unforgivable at this point for any application to not be providing adequate input sanitization,” Levy says. “That this is still one of the main causes of breaches a decade after the problem was well-understood is insanity.”

Levy recommends organizations start using widely available pen testing applications. And though web application firewalls are a good way to mitigate risks, he warns developers to stop using them as a crutch to excuse them from not embedding proper validations in their applications.

“Since waterboarding is neither torture nor unconstitutional, it should be considered as treatment for developers who do not properly sanitize inputs,” he says.

Leave a Reply

Please Answer: *