White Paper Best Practices For Securing Web 2.0
White Paper Best Practices For Securing Web 2.0
White Paper Best Practices For Securing Web 2.0
Brian E. Burke
June 2009
IDC OPINION
Like it or not, Web 2.0 is quickly becoming "enterprise 2.0" as a growing number of
www.idc.com
Web applications make their way into the corporate environment, bringing with them
even more security concerns and attack vectors. It is IDC's opinion that organizations
should embrace the value of Web 2.0 tools as a way to help lower costs and increase
collaboration with little to no administrative burden on IT staff. Failed attempts to ban
F.508.935.4015
The challenge for organizations is that many Web 2.0 applications were designed for
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA
consumers, not for business users whose online activities can have dire
consequences for their organizations if the tools are used irresponsibly. This
challenge is compounded by the fact that the Web 2.0 applications that were
designed for business use were not designed for existing security frameworks,
architectures, and deployments. Moreover, virtually all of the top 100 Web sites, from
Google and Yahoo! to Wikipedia and MSNBC, rely on or host some type of user-
generated content, and the risk profile and challenge for organizations only increase.
Fortunately, a growing amount of help is available for organizations looking to allow
their workers to use Web 2.0 tools responsibly without sacrificing security and
regulatory compliance requirements. In this tough economic climate, increasing
collaboration and reducing costs are more important than ever. Web 2.0 technologies,
if used securely, can help organizations increase collaboration and productivity and
drive revenue. In response to these challenges, IDC has partnered with Websense to
further understand the current pain points organizations face in dealing with the
adoption of Web 2.0 technologies. Our research found that:
95% of organizations allow access to Web 2.0 sites, and 62% of IT managers
think Web 2.0 is necessary to their business (source: Websense's 2009
Web2.0@Work survey).
64% of IT managers permit access to social network sites primarily used for
business, but a significant 1 in 2 organizations (49%) allow access to social
network sites primarily used for personal use (source: Websense's 2009
Web2.0@Work survey).
27% of global IT managers in large organizations are not sure about the access
status of some Web 2.0 sites (source: Websense's 2009 Web2.0@Work survey).
70% of organizations view Web 2.0 as a serious concern for data loss prevention
(source: IDC's 2008 Security Survey).
METHODOLOGY
This white paper was designed with the aim of revealing, understanding, analyzing,
and presenting the predominant issues relating to the adoption of Web 2.0
technologies in the corporate environment. The paper draws on data from
Websense's 2009 Web2.0@Work survey of 1,300 IT managers at large organizations
across 10 countries and existing IDC research. Using this body of knowledge, we
describe the overall business and technical challenges that organizations face in
dealing with Web 2.0 issues and provide guidance on the types of solutions that play
a key role in addressing today's complex threat environment. This paper discusses
the limitations of traditional Web security technologies and the need for more
advanced security techniques in dealing with Web 2.0.
SITUATION OVERVIEW
Web 2.0 is not really a new technology offering; rather, it is about using existing
technologies to enhance usability, collaboration, and information sharing and
gathering over the Internet. To get a clearer picture, one must look at the different
technologies existing under the umbrella phrase of Web 2.0 as a taxonomy, as shown
in Figure 1.
The taxonomy illustrates the unique challenges associated with Web 2.0, including:
Web 2.0 sites that rely on user-generated content to compile and present content
in new ways
New client and data technologies that move beyond the HTML Web of the past
and into newer, richer mechanisms to share content
New mechanisms to share and store data and use noninternal architectures from
Salesforce to Google Apps
Social interaction and communication that are supplanting many of the traditional
modes of collaborating, communicating, and sharing information
REST
XML
JSON
IDC strongly urges organizations to create a security strategy that empowers and IDC strongly urges
organizations to
encourages workers to innovate with Web 2.0 rather than hinders such efforts. During create a security
this recession, organizations need to strengthen relationships with customers and strategy that
prospects; tap the collective wisdom of partners, customers, and others to augment empowers and
encourages workers
the knowledge of shrinking workforces; and gain a competitive advantage over firms to innovate with Web
that continue to make the mistake of saying "No we can't" to Web 2.0. 2.0.
However, many organizations are struggling with balancing the business value of
Web 2.0 technologies with the risks and security implications of many nonsecure and
uncontrolled Web 2.0 environments. IT is feeling pressure from users and executives
alike to allow greater access to Web 2.0 technologies and at the same time protect
against malware and information leaks over this pervasive environment for new
content usage, information sharing, and communication. The Web2.0@Work survey
found that 86% of IT managers feel pressure to allow access to Web 2.0 sites and
applications from within their organization and that 30% of this pressure is coming
from C-level and director-level staff. It's clear that IT cannot say no to C-level
executives. Organizations need the tools to embrace Web 2.0 technologies while
ensuring security and compliance.
IDC believes a growing number of consumer-oriented Web 2.0 technologies will The boundaries
between consumer
continue to saturate the corporate environment. The boundaries between consumer and corporate Web
and corporate Web 2.0 environments are blurring. Even the use of the top 100 Web 2.0 environments are
blurring.
properties transitions from static content to dynamic and interactive user-generated
Web 2.0 content. Many employees now use interactive content portals and social
networking applications such as Facebook to communicate with a mix of friends,
coworkers, and customers. This is creating a complex security challenge for
organizations of all sizes. These environments create both a risk of data leaks and
new channels for malware.
Lines are clearly blurring between professional life and personal life, and in such
"consumerization," security policies must be flexible, extensive, and pervasive. Trade-
offs must be found between the user's comfort and global security. Forbidding
personal use of the computer was the best practice some years ago, but it is not
possible anymore due to users' skills and needs.
Web 2.0 also presents a significant data loss prevention (DLP) challenge for many Given that Web 2.0
exposes
enterprises. Message boards, blogs, tweets, and other types of social networking organizations to both
sites are becoming pipelines for information leakage and compliance violations. In inbound and
outbound security
fact, a recent IDC survey showed that 37% of confidential information leaks occurred threats, IDC believes
via the Web. The same survey also showed that almost 70% of organizations believe that future Web
that monitoring employee use of the Web to prevent data leaks and compliance security solutions
must analyze traffic
violations is a major concern (see Figure 2). Given that Web 2.0 exposes bidirectionally.
organizations to both inbound and outbound security threats, IDC believes that future
Web security solutions must analyze traffic bidirectionally.
100
90
(% of respondents)
80
70
60
50
40
30
20
10
0
Small (fewer than Medium sized Large (1,000+
100 employees) (100–999 employees) employees)
5 (extremely important)
4
3
2
1 (not at all important)
n = 433
Source: IDC's Security Survey, 2008
Spam has risen back up the list and is number three among the top threats to
enterprise security. The pure volume of spam continues to rise at a rapid pace,
and malicious attacks are becoming more sophisticated (e.g., blended threats
that combine spam, spyware, viruses, and other malware in their attacks).
Spammers are increasingly using spam to lure users to malicious Web sites.
Spam
Hackers
Insider sabotage
Spyware
Application vulnerabilities
Wireless LANs
0 10 20 30 40 50 60 70 80 90 100
(% of respondents)
n = 433
Source: IDC's Security Survey, 2008
The advances in Web 2.0 technologies in recent years require a new generation of
Web security tools that go well beyond traditional URL filtering.
IDC has identified 10 best practices that organizations should consider when
choosing a Web security solution to address the risks of Web 2.0:
1. Dynamic Web 2.0 defenses. Threats in today's Web 2.0 world incorporate the
worst of Web 1.0 threats with some new variations mixed in for good measure.
Traditional known threats such as file-based antivirus attacks still exist along with a
new generation of script-based attacks that are designed to compromise the Web
3. Employee access. Employee education is the cornerstone for effective Web 2.0
risk management. IDC believes employees must understand both the benefits of
Web 2.0 technologies and the threats and risks. Web 2.0 technologies are used
in a wide variety of sites, ranging from mission critical to harmless. A mature Web
2.0 security solution must allow access to mission-critical SaaS Web sites (e.g.,
Salesforce.com) while enabling safe and controlled access to nonbusiness sites
such as social networking or interactive media. In the past, simply blocking all
nonbusiness sites might have been an option, but today most employees expect
some limited and controlled access to personal Web sites. A mature Web 2.0
solution can provide safe but time-limited access to sites for personal use. An
organization, for example, may want to allow up to 60 minutes per day of access
to personal Web sites (Web-based email, social networking, etc.). A Web 2.0
security solution must allow this kind of rationed access.
4. Data loss prevention. Web 2.0 presents a significant DLP challenge for many
enterprises. Message boards, blogs, and social networking sites are becoming
pipelines for information leakage and corporate compliance violations. As we
open the doors to Web 2.0 applications that we might have simply blocked in the
past, we have to ensure that sensitive information is not leaked over Web-based
email, posted to Internet message boards, or shared over social networking Web
sites. A Web 2.0 user may inadvertently post confidential information on blogs or
post other data that is business critical. An integrated DLP-Web solution adds the
identity and location context to the access, making sure that confidential data is
not leaked out of the organization.
6. Remote access. The growing number of mobile and remote users is creating a
complex distributed workplace. Many corporate applications are being moved to
the Web 2.0 environment to allow remote employees to work more efficiently.
Users don't simply sit in their office and work anymore — today's mobile employees
are almost as likely to be connected from home or from a public WiFi hotspot as
they are to be sitting in the corporate office. An effective Web 2.0 solution should
provide the customer with choices on how to support the remote user while
ensuring the application of a consistent policy throughout the organization.
7. Unified policy management. Policy management is the point at which all of the
different technologies used to enforce a policy should come together. The focus
of a policy should be the user or group of users to which the policy applies and
the threats and behaviors that the business wishes to address. Web 2.0 requires
a policy to address multiple technology stacks, everything from malware
protection to objectionable content and application control. This complexity can
lead to errors in translating a corporate policy into reality unless the policy
management engine is designed to pull all of these items together into a single
policy that can be applied on a global basis.
Enable Web 2.0 benefits: Use drill-down reports to gain visibility into which
users and groups most consistently try to access Web 2.0 technology and create
a policy to enable the safe and appropriate use of these tools.
Get full visibility: Decrypt and examine the content, including data for all
HTTPS traffic to Web 2.0 sites and for applications like Webmail for inbound
threats and outbound risks.
Protect your data: Monitor and report on sensitive and regulated data sent over
or posted via the Web by users, intended destinations, and the category of site or
Web application. Then, create the appropriate enforcement policy that protects
and enables the organization.
WEBSENSE OVERVIEW
Company Overview
Websense Inc. (NASDAQ: WBSN) is a global leader in integrated Web, data, and
email security, providing Essential Information Protection for more than 42 million
employees at more than 50,000 organizations worldwide. Headquartered in San
Diego, California, Websense distributes its solutions through a global network of
channel partners. Websense software and hosted security solutions help
organizations block malicious code, prevent the loss of confidential information, and
enforce Internet use and security policies. Websense has its roots in Web filtering
CHALLENGES/OPPORTUNITIES
With Web 2.0 applications the challenge is to imagine threats where no perceived
threats exist today. As conditions change and companies use Web 2.0 for large
enterprise projects that involve sensitive data, security will need to be applied to this
environment. The tolerance for simply applying security after a problem will be seen
as increasingly poor, legally deficient, and ignorant of emerging threat environments.
Still, changing behaviors and perceptions requires an incremental approach. The first
step is monitoring so that IT understands the issues and can prepare solutions. The
next step is reporting on the findings in such a way that senior executives and
business unit managers can understand the benefits of controlled collaboration where
customer information and intellectual property (IP) are protected from mistaken,
mischievous, and malicious exposure. This phased approach is slow and
cumbersome to implement, but necessary. In concert, technologies must support
gradual migration while also offering the flexibility to deal with monitoring, reporting,
and enforcement. The policy enforcement aspect must be flexible enough to handle
both draconian and laissez-faire attitudes toward these environments.
Copyright Notice
External Publication of IDC Information and Data — Any IDC information that is to be
used in advertising, press releases, or promotional materials requires prior written
approval from the appropriate IDC Vice President or Country Manager. A draft of the
proposed document should accompany any such request. IDC reserves the right to
deny approval of external usage for any reason.