This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Category:OWASP XML Security Gateway Evaluation Criteria Project Latest

From OWASP
Revision as of 23:23, 18 June 2007 by 1raindrop (talk | contribs) (New page: '''XML Security Gateway Evaluation Criteria''' Version 0.2 (June 14, 2007) OWASP (http://www.owasp.org) Content is available under a Creative Commons 2.5 License Table of C...)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

XML Security Gateway Evaluation Criteria

  Version 0.2 (June 14, 2007)
  OWASP (http://www.owasp.org)
  Content is available under a Creative Commons 2.5 License 
  Table of Contents
  Introduction
       Contributors
       Contact

Categories

       Section 1 - Authentication
       Section 2 - Authorization
       Section 3 - Audit Logging
       Section 4 - Deployment Architecture
       Section 5 - Content Validation
       Section 6 - Management & Metrics
       Section 7 - Transformation
       Section 8 - Tools
  A. License

Introduction

The OWASP XML Security Gateway Evaluation Criteria Project (XSGEC) defines an open standard for evaluating XML Security Gateways, such as thosed used to protect and provide security services for Web services applications. This criteria provides the OWASP community a set of standard evaluation guidance to assess the functionality and quality of XML Security Gateways. The main drivers for this project is to add clarity to the process of assessing the XML Security Gateway strengths and weaknesses, and enlightening the community as to the utility of XML Security Gateways to deliver a number of valuable security services for distributed systems.

The XML Security Gateway Evaluation Criteria (XSGEC) Project's Guiding Principles were created in order to express the intentions of its contributors when designing the criteria.

* Create evaluation criteria supporting a transparent, level playing field for XML Security Gateway solutions to define their solution's key value proposition

* Where practical, attempt to standardize nomenclature and metrics

* Educate the community on the design considerations for XML security

XML Security Gateways (XSG) may serve as both service providers and service requesters, so the evaluation criteria seeks to assess the tool's capabilities in delivering security and assurance services to inbound and outbound service requests.

Contributors

The following people have contributed their time and expertise to the project: * Sebastien Deleersnyder, Ascure * Muthu Meyyappan, United Healthcare * Mark O'Neill, Vordel * Gunnar Peterson, Arctec Group * Ivan Ristic, Breach Security * Brian Roddy, Cisco * Philippe Bogaerts, NetAppSec * Paul Lesov, Wells Fargo

Contact

  Participation in the XML Security Gateway Evaluation Criteria
  project is open to all. If you wish to comment on the evaluation
  criteria or join the team mailing list please contact Gunnar Peterson via
  email [email protected].

Categories

Section 1 - Authentication This section describes the authentication support at the service level and message level for inbound and outbound communication to the XSG.

1.1 Inbound authentication How does the XSG perform authentication for inbound services requests?

  • Mutual SSL
  • HTTP Basic Authentication
  • HTTP Digest Authentication
  • WS-Security Username Token Authentication
  • WS-Security X.509 Certificate Based Authentication
  • WS-Security: Kerberos Token
  • SAML Authentication assertion

1.2 Outbound authentication What capabilities does the XSG have to perform outbound assertion for authenticating the XSG's request to the service? What token types are supported for insertion?

  • Mutual SSL
  • HTTP Basic Authentication
  • HTTP Digest Authentication
  • WS-Security Username Token
  • WS-Security X.509 Certificate
  • WS-Security: Kerberos Token
  • SAML Authentication assertion

1.3 Proxy Functionality What capabilities does the XSG have mapping attributes on behalf of service requesters and service providers?

Consider the following scenario

Service Requester --> Guard 1 --> Guard 2 --> Resources/Service Provider

Using the Secure Proxy patterns defined by Blakley and Heath (http://www.opengroup.org/bookstore/catalog/g031.htm) define which proxy functions (trusted proxy, delegate, authz proxy, and so on) the XSG supports and how they are implemented.


passwd to guard1

userid to guard2

guard2 authn

guard2 authz

sso

delegation protocol

ideal

no

yes

user

user

yes

no

trusted proxy

no

no

guard1

guard1

yes

no

authn impersonation

yes

yes

user

user

yes

no

id-assert impersonation

no

yes

no

user

yes

no

delegate

no

yes

user

user

yes

yes

authz proxy

no

no

no

no

yes

no

login tunnel

no

yes

user

user

no

no


What tokens and protocols are supported for these scenarios? How is identity and attribute mapping handled?

Section 2 - Authorization

2.1 Describe XSG support for standards-based authorization:

  • XACML
  • SAML

2.2 Describe how Policy Enforcement Point (PEP) and Policy Decision Point (PDP) implement authorization workflow rules.


2.3 Describe how out bound messages are marked as authorized so that service providers and service consumers can verify that policy has been applied to the message


Section 3 - Audit Logging

3.1 Describe the audit logging input and output options

3.2 Describe log analysis tools

3.3 Describe security event notification options

3.4 Where and how is logging integrated into XSG?

3.4.1 How are the logs secured? Describe support for

  • Access control model for logs
  • Log sanitization
  • Log Signing (XML Signature)

3.5 Does the XSG support correlation for end to end transaction logging? How is this implemented?

Section 4 - Deployment Architecture

4.1 Describe the physical deployment for the XSG:

  • Standalone hardware device
  • Software only
  • Both

4.2 Describe the options for fail over, scalability and high availability

4.3 Describe integration with messaging systems, such as JMS and MQ Series


Section 5 - Content Validation

5.1 Describe security model support for positive (whitelist) and negative (blacklist) security models

5.1.1 Positive security model (default deny) define whitelist for all allowed requests. Does the XSG support learning mode? How is the whitelist configured?

5.1.2 Negative security model (default allow) define blacklist for unallowed requests. Is the blacklist signature based or rules based?

5.2 Describe schema validation support

5.3 Describe content validation, including injection attack, external entity attack, buffer overflow prevention

5.4 Describe message and request security analysis

5.5 Describe SOAP attachment analysis

Section 6 - Management & Metrics

6.1 Describe the available management tools for the XSG

6.2 Describe the available system metrics and reporting available including diagnostics, alerts, and warnings, e.g. SNMP, email, Syslog

6.3 How are upgrades accomplished for hardware, OS, and software?

6.4 Describe how policy is managed, versioned, and stored.


Section 7 - Transformation

7.1 Describe how the XSG supports XML transformation, e.g. XPath, XQuery


Section 8 - Tools

8.1 Describe any security testing tools that work with the XSG

8.2 Describe any development tools that work with the XSG


A. Licence

This work is licensed under the Creative Commons Attribution License. To view a copy of this license, visit http://creativecommons.org/licenses/by/2.5/ or send a letter to: Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA.

This category currently contains no pages or media.