Akamai Security Capabilities Whitepaper
Akamai Security Capabilities Whitepaper
Akamai Security Capabilities Whitepaper
EXECUTIVE SUMMARY. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
User Prioritization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
SiteShield. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
PCI Compliance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
IP Blacklisting/Whitelisting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
DNS SECURITY. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
DENIAL-OF-SERVICE MITIGATION. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
BUSINESS CONTINUITY. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
NetStorage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Site Failover. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
EdgeComputing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
PAYMENT SECURITY. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Edge Tokenization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Executive Summary
As companies continue to push their business-critical data and operations to the Internet, they must
also take appropriate measures to protect these assets from the growing threats of the online world.
From worms and viruses, to phishing and pharming, to botnets and denial-of-service attacks, the Inter-
net’s open infrastructure is an easy target for criminals looking to profit by stealing data, compromising
systems, or otherwise disrupting the increasing amounts of business transacted online. To combat this
proliferation of threats, enterprises need a multi-layered defense architecture that can protect their
increasingly porous perimeter against potential attacks that are continually growing in sophistication
and magnitude.
Situated at the entry point between end user requests and the enterprise’s core infrastructure,
the Akamai EdgePlatform can uniquely provide certain critical layers within a robust defense system.
Leveraging its vantage point as the world’s largest distributed computing platform, the EdgePlatform
offers a broad range of flexible and highly scalable security capabilities to help customers extend their
defenses out to the edges of the Internet and harden their infrastructure to the massive-scale attacks
that are possible today.
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster
the security of their Web-based assets, with capabilities ranging across the application, network,
and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and
business continuity.
Introduction
The Threat Landscape
In recent years, there has been a dramatic rise in the scale and severity of attacks launched on Web
sites and applications. Cyber crime has grown increasingly lucrative as companies migrate from main-
frame to desktop to Web, relying more and more on the Internet for mission-critical data and operations.
The Internet is now a virtual gold mine of sensitive data and valuable assets — but, unfortunately, its
security stature has not yet caught up.
In fact, the opposite is occurring: vulnerabilities have multiplied as the Web becomes an increasingly
complex and heterogeneous environment. Security plays second fiddle to the competitive pressures
that drive unending cycles of rapid application development — so weaknesses and potential attack
points are continually introduced. This means Web sites and applications are more susceptible to threats
than ever. In fact, the Web Application Security Consortium recently found that more than 87% of Web
applications carry a vulnerability classified as high risk or worse, with about half of the risks detectable
through purely automated scanning.1
To make matters worse, malware has grown increasingly dangerous, as worms and viruses leverage
ever more sophisticated techniques and become more difficult to detect and counteract. With stealthy
use of advanced rootkits, social engineering, encryption, polymorphism, and the like, malware is propa-
gating faster than ever across millions of unsuspecting hosts. As a result, botnets — the armies of infected
zombie machines that carry out many of today’s cybercrimes — have grown exponentially in recent years.
Recent estimates state that more than 100 million computers are currently part of botnet. 2 Their numbers
pose an enormous threat, because the zombie armies are both cheap and highly effective at executing
any number of different cyber crimes, including DDoS attacks, data theft, spamming, phishing,
and propagation of spyware and other malware.
No one is safe: recent, well-publicized attacks have crippled all types of establishments, from popular
social networking sites to financial firms, from government organizations to the biggest names on the
Web. With these attacks proving financially lucrative, a highly sophisticated criminal underground has
formed, complete with an active black market for specialized services and clear ties to organized crime.
While they deliberately fly under-the-radar, their impact is very real. According to a study conducted
by Ponemon Institute, cybercrime costs a business $3.8 million/year on an average and these costs can
range from $1 million to $52 million per company. 3
Akamai Security Capabilities 2
9 10 8
7 1
6
4
5
2
3
Figure 2:
Akamai’s proven EdgePlatform offers a broad
HTTP Application Layer range of highly scalable security capabilities
• Web Application Firewall • HTTP Authorization Controls that combat cyber threats at the application
• User Prioritization layer, IP network layer, and DNS layer, and
offer DDoS mitigation and Business Continuity
IP Network Layer solutions across all tiers of infrastructure.
• SiteShield • Secure Delivery (SSL & Certificate Services)
• PCI Compliance • IP-based Fraud Detection
• IP-based Rights Management • IP Backlists & Whitelists
DNS Layer
• Enhanced DNS • Global Traffic Management
DDOS Protection
• Platform Scalability • Application, IP, and DNS layer capabilities
• Traffic & Origin Health • Monitoring
Business Continuity
• Zero-Downtime Platform • SureRoute Technology
• Site Failover • NetStorage
• EdgeComputing
Payment Security
• Edge Tokenization
This trend drives the needs for firewalls and other security defenses that can understand
and analyze Web traffic payloads such as HTTP, HTTPS, and XML — and provide protection
against treacherous application-layer threats such as cross-site scripting (XSS), buffer over-
flow exploits, and SQL injection attacks. Akamai delivers this type of protection at the edge
of the network, augmenting traditional defense solutions with an unprecedented level of
built-in redundancy and scalability.
WAF is unique in its highly distributed architecture, which enables both instantaneous scal-
ing of defenses as needed as well as filtering of corrupt traffic as close to the attack source
as possible. Moreover, unlike a centralized firewall, WAF does not create any performance
chokepoints or single points of failure that often prove to be easy targets for attackers.
Akamai Security Capabilities 4
When the U.S. Citizen and Immigration Servers (USCIS) wanted to both streamline
its infrastructure and provide cost-effective protection against denial-of-service
attacks, it choose Akamai, leveraging both the Dynamic Site Accelerator and
SiteShield solutions. According to Stephen Schillinger, Chief of Web Services
Branch, USCIS, “SiteShield provides us with peace of mind. With it, we know
our Web infrastructure will be safe from attack, and will remain available despite
any issues that may happen within the USCIS environment.”
“Akamai guarantees that our site is always available and that our users will have
as good an experience as possible.”
Digital Certificates. In order to facilitate secure and trusted transactions, Akamai provides
a number of SSL certificate options to meet different customer business requirements.
These include single hostname, wildcard, and Extended Validation certificates, as well
as a seal option that displays a trust logo on the secure Web site or application.
Cipher Strength. Akamai edge servers can be configured to require a minimum cipher
strength in any SSL connection request. Requests that do not meet the minimum can
be denied or sent to an alternate page with upgrade requirements.
PCI Compliance
The Akamai SSL network is certified to the Payment Card Industry Data Security Standard
(PCI DSS) Level 1 Service Provider guidelines. The Akamai SSL network is scanned quarterly
by an Approved Scanning Vendor (ASV), plus assessed and audited annually by an indepen-
dent Qualified Security Assessor (QSA). PCI compliance is required of all systems worldwide
that process, store, or transmit credit card data. Akamai’s PCI certification allows customer
organizations to streamline their own certification process and ensure protection of their
sensitive user transaction data.
DDoS mitigation spans all the tiers of an application’s infrastructure, including the application,
network, and DNS layers. Thus, many of the services we have already covered — including
Web Application Firewall, SiteShield, Enhanced DNS, and Global Traffic Manager — provide
specific DDoS mitigation capabilities as mentioned in their descriptions above. The Edge-
Platform’s other DDoS capabilities include:
• Blocking or redirecting requests based on • Limiting the rate at which requests are forwarded
characteristics like IP address, originating to the origin server in order to safeguard its health
geographic location, or query string patterns
• Quarantining suspicious traffic to a small set of servers
• Black-holing attack traffic through
DNS responses • Serving customized error pages during the attack
(cached on the Akamai network)
• Using slow responses (tarpits) to shut down
attacking machines while minimizing effects • Cookie-checking to identify abnormally high levels
on legitimate users of new users, which may indicate an attack
• Directing traffic away from specific servers • Directing illegitimate traffic back to the requesting
or regions under attack machine via a DNS response.
On
July 4th, 2009, the U.S. government faced the largest DDoS attack in its history, with
the top-targeted site receiving nearly 8 billion page views in a day, resulting in traffic levels
that peaked to nearly 600 times normal. The attack came in several waves and lasted more
than a week, with 48 sites targeted in all. Despite the unprecedented scale of the attack, all
of the U.S. government sites delivered via Akamai — including sites for the White House and
13 of the 15 Federal Cabinet level agencies — remained online, thwarting the attacker’s goals.
At the peak of the attack, Akamai absorbed more than 200 Gbps of attack traffic targeted
at the government sites. At the same time, Akamai continued serving traffic to legitimate users
and maintained 100% availability for all of its customers, delivering traffic at over a Terabit per
second for the rest of its customer base.
Akamai Security Capabilities 8
40.00
20.00
Origin Transaction Performance
0.00 Akamai Transaction Performance
0 0 0 0 0 0 0 0 0 0 0 0 : 00 :00 00 0 0 0 0 0 0
0:
0
2:
0
4:
0
0:
0
2:
0
4:
0
0:
0
2:
0
4:
0
0:
0
2:
0
4:
0
20 12 4: 0:
0
2:
0
4:
0
0:
0
2:
0
4:
0
2 1 6 2 1 6 2 1 6 2 1 6 6 6 07 2 1
07
2 1
07
06 06 /0 06 06 /0 06 06 /0 06 06 /0 /0 /0 1/ 07 07 3/ 07 07 5/
2/ 3/ /24 4/ 5/ 26 6/ 7/ 28 8/ 9/ 30 30 31 1/ 1/ 2/ 1/ 3/ 4/ 1/
2/
2
2/
2
12 2/
2
2/
2
12
/
2/
2
2/
2
12
/
2/
2
2/
2
12
/
12
/
12
/ 1/ 1/ 1/ 1/
1 1 1 1 1 1 1 1
Akamai Security Capabilities 9
• F ailover to edge servers. Customers can opt to either have Akamai’s edge servers
serve a default failover page or serve the most recent (expired) content in cache.
• F ailover to alternate site. Akamai will direct users to a backup site, which may
have reduced functionality or otherwise be different from the original site
Failover to Akamai NetStorage. Customers can host a full backup version of their site
•
on Akamai’s high-availability NetStorage service. In case of origin server failure, Akamai will
direct end users to the customer site on NetStorage, so that, companies are guaranteed
a robust Web presence regardless of origin server availability or Internet conditions.
EdgeComputing
Akamai’s EdgeComputing service allows companies to deploy J2EE applications onto the
zero-downtime EdgePlatform network, bringing unmatched performance, scalability, and
reliability to Web applications. Both the presentation layer and application business logic
are executed on the Akamai network, so applications that are backend-light or are based
on infrequently changing data — such as product catalogs, store locators, contests and
giveaways, user registration, and site search — can be run with only minimal, occasional
roundtrips to an origin database, or without any origin infrastructure at all.
Payment Security
Edge Tokenization
Processing customer credit card information electronically comes with extremely high risks and
requirements. Meeting the stringent Payment Card Industry (PCI) compliance standards takes
repeated efforts, significant investment, and regular maintenance. That translates to high costs
to any corporation handling credit card data and PCI audit requirements create a routine impact
on IT resources. Akamai is pioneering value-added offload of payment security, assisting with
removing its customers from PCI scope and related liability with its Edge Tokenization offering
for online transactions. By leveraging Edge Tokenization, corporations never process or store
their consumer’s credit credentials, replacing them instead with a non-reversible and random
token identifier. Seamlessly and without disrupting existing infrastructure, Akamai’s EdgePlatform
network identifies these critical transactions in eCommerce and web-enabled call centers and
instantly removes personal credit data. Through direct partnerships with leading payment gateway
providers, Akamai redirects this high-risk data without ever storing it locally. Once replaced with
an anonymous token, the traffic continues to origin infrastructure, without impacting flow or
system functionality. The result is merchant customers processing and storing only unique tokens,
rather than consumer credit data, thereby reducing PCI scope or potentially removing merchant
customer from PCI compliance scope for online transactions. Additional benefits of Edge
Tokenization include:
• Enables web retailers to transact securely and at scale, without sacrificing performance
• Integrates into existing workflow, without needing externally hosted sites or form
fields – guaranteeing look, feel, and flow remain consistent
For this reason, highly distributed, cloud-based protections have become a necessary layer within any defense architecture. These
types of solutions help overcome the challenges posed by the inherently distributed nature of the Internet. They offer unprecedented,
on-demand scalability, flexibility, and performance, as well as the power to mitigate attacks at their source, before those attacks have
a chance to reach the company’s core infrastructure.
Akamai has spent the last decade making the Internet a better, faster, and more secure place to transact business. With thousands
of companies depending on its EdgePlatform to securely and reliably deliver an aggregate of 1 trillion Web interactions each day,
security is never a secondary priority at Akamai. Instead, it is comprehensively integrated into every aspect of Akamai’s network and
operations, from hardened servers and a self-healing architecture to the rigorous physical and operational security policies in place. 7
Organizations looking to lock down their perimeter at the edge of the Internet can leverage Akamai’s proven expertise and unique
global platform through its broad array of security solutions and capabilities. These capabilities, along with Akamai’s integrated,
flexible, and comprehensive set of content and application services, will continue to help enterprises across all industries achieve
their business goals, by delivering their mission-critical Web applications — securely, responsively, and reliably.
1
http://projects.webappsec.org/Web-Application-Security-Statistics
2
http://www.mobileactivedefense.com/faq/
3
http://www.riskandinsurancechalkboard.com/uploads/file/Ponemon%20Study(1).pdf
4
http://www.dasient.com/dasient-solution/threatscape/
5
http://www.arbornetworks.com/report Arbor Networks Worldwide Infrastructure Security Report, Volume VI. Feb 2010
6
http://www.arbornetworks.com/report Arbor Networks Worldwide Infrastructure Security Report, Volume VI. Feb 2010
7
For more information, see the Akamai Information Security Management System Overview, which discusses Akamai’s comprehensive network and operational
security policies in greater detail
www.akamai.com