GUIDE TO SECURE WEB SERVICES
Table of Contents
Executive Summary..............................................................................................................ES-1
1. Introduction ......................................................................................................................1-1
1.1 Authority...................................................................................................................1-1
1.2 Purpose and Scope .................................................................................................1-1
1.3 Audience..................................................................................................................1-1
1.4 Document Structure .................................................................................................1-2
2. Background to Web Services and Their Relationship to Security ..............................2-1
2.1 Introducing Web Services ........................................................................................2-1
2.1.1 Web Service Discovery ................................................................................2-1
2.1.2 Web Service Messaging...............................................................................2-2
2.1.3 Web Portals..................................................................................................2-3
2.1.4 Web Service Roles, Modes, and Properties.................................................2-3
2.1.5 Coordination: Orchestration and Choreography...........................................2-5
2.2 Elements of Security ................................................................................................2-7
2.3 Web Services Security Dimensions .........................................................................2-8
2.3.1 Secure Messaging........................................................................................2-8
2.3.2 Protecting Resources ...................................................................................2-8
2.3.3 Negotiation of Contracts ...............................................................................2-9
2.3.4 Trust Relationships.....................................................................................2-10
2.3.5 Requirements for Secure Software ............................................................2-11
2.4 Meeting the Requirements for Securing Web Services .........................................2-11
2.4.1 Secure Web Service Standards Stack .......................................................2-11
2.4.2 Relationship of Web Service Security Requirements to Standards............2-13
2.5 Core Services ........................................................................................................2-13
2.6 Threats Facing Web Services................................................................................2-15
2.7 Common Risks Facing Web Services....................................................................2-17
2.8 Web Services’ Interfaces with Network/Infrastructure Security Architectures........2-19
2.9 Summary................................................................................................................2-20
3. Web Service Security Functions and Related Technologies.......................................3-1
3.1 Service-to-Service Authentication............................................................................3-1
3.1.1 Service Chaining ..........................................................................................3-1
3.1.2 WS-Security for Authentication.....................................................................3-2
3.1.3 Security Concerns of WS-Security ...............................................................
3-3
3.2 Identity Management ...............................................................................................3-4
3.2.1 Identity Management Architectures..............................................................3-6
3.2.2 Laws of Identity.............................................................................................3-6
3.2.3 Identity Management and Web Services......................................................3-7
3.3 Establishing Trust between Services .......................................................................3-8
3.3.1 Federation of Trust .......................................................................................3-9
3.3.2 Trust Federation Frameworks ......................................................................3-9
3.4 Describing Web Services Policies (WS-Policy)......................................................3-11
3.5 Distributed Authorization and Access Management ..............................................3-14
3.5.1 Authorization Models..................................................................................3-14
3.5.2 Enforcing Least Privilege for Services........................................................3-17
3.5.3 SAML..........................................................................................................3-18
iv