Boosting RASP2.0, navigating the new track of ADR, creating a new paradigm of application security protection

Since 2023, the term digital security has been mentioned many times and has become an important topic in our life and work. Recently, the "Third Digital Security Conference" was grandly held in Beijing, co-sponsored by Digital World Consulting and CIO Times, and supported by the New Infrastructure Innovation Institute as a think tank. Discuss the dynamics and trends of risk control in the digital age. With the continuous increase of various network security threats such as hacker attacks and network fraud, innovations in the field of digital security are also constantly being carried out. It is against this background that the 2023 Digital Security Fourteen Innovation Tracks came into being. As the core part of the Digital Security Conference, the Digital Security Innovation Track has always attracted extensive attention from digital security practitioners from all walks of life. Beijing Boundary Infinite Technology Co., Ltd. (BoundaryX, BoundaryX) has won the title of leader in the Application Detection and Response (ADR) track by virtue of its technological innovation leadership and market recognition, as well as the excellent performance of its self-developed product Jingyunjia title.

insert image description here

Not limited to RASP ADR new track came into being

Through sorting out, researching and practicing the latest technological innovation fields, drawing on the experience of the supply side, demand side and a large number of security professionals in the industry, Digital World Consulting, CIO Times and New Infrastructure Research Institute officially launched the 2023 Digital Security Innovation Competition Among them, the ADR track has attracted strong attention. ADR products are based on RASP, and add continuous detection and environmental security functions such as open source risk management, API asset sorting, middleware baseline, application baseline, etc., which can be regarded as RASP2.0, and can be formed by traditional security products such as WAF The defense-in-depth system achieves the effect of "both internal and external" in application security. In the field of ADR, with years of accumulated offensive and defensive experience and continuous investment in product commercialization, Boundary Infinity has become one of the best, and has been favored and concerned by the majority of key customers.

As early as December 2022, the new track of ADR was proposed for the first time in the industry's first "ADR Capability White Paper" released by Sunshine Consulting. Through systematic research on ADR's key capabilities and usage scenarios, etc., it builds an overall solution for the majority of government and enterprise customers. The application protection system provides reference and reference. The white paper also recommends representative manufacturers in the ADR field. As a cutting-edge security company focusing on technological innovation and breakthroughs, Boundary Infinity is the only domestic company recommended by virtue of its Jingyunjia ADR, which is known as the application of "immune serum".

The white paper points out that with the advent of the cloud-native era, businesses are becoming more open and complex, security boundaries are becoming more and more blurred, and fixed defense boundaries no longer exist. It is obviously not enough to rely solely on boundary protection methods such as WAF. The defense control method based on request characteristics + rule strategy can only block some dangers. At the same time, with the normalization and actual combat of real network attack and defense drills, the intensity of attack and defense confrontation is constantly escalating. Attackers can easily bypass traditional border security devices based on rule matching. prevention mechanism.

Not only that, attackers will also use devious methods such as supply chain attacks to dig out specific 0day vulnerabilities to achieve precise strikes on target applications. Similar advanced attack methods have caused more and more security managers to pay attention to the left shift of security, such as combining DevOps and Sec to try to achieve DevSecOps, or using runtime application self-protection as a means to protect runtime applications Safe to invest more. However, similar to the limitations encountered in cloud host security, the original security capabilities of application security are lacking. On the one hand, users urgently need an effective application-specific solution to join the security operation system in order to realize security detection and response capabilities when the application is running. On the other hand, the previous Although application security technology capabilities are involved from the development stage to the production and operation stage, the capabilities are scattered, such as only focusing on application vulnerability detection (such as IAST), or only focusing on self-defense in application attack and defense scenarios (such as RASP ), rarely combine application security detection with incident response to form a closed loop.

A typical example is that more and more enterprises are beginning to move closer to the DevOps model. Rapid and continuous delivery is accelerating business expansion, but the ensuing security demands cannot be responded to in a timely manner. The R&D team often pushes the code into the production environment when there may be security risks in the code, resulting in a backlog of more vulnerabilities, and after the launch, the security appeal cannot be fixed due to scheduling and other issues. At the same time, with the normalization trend of real network attack and defense drills, the traditional method of shutting down business applications at the expense of business is gradually encountering challenges. Under the demand of "zero shutdown" or "less shutdown", the application production environment risk Detection and response are imminent. Based on this, Shushi Consulting proposed the new track of ADR.

In the era of application security 2.0, the frontier is infinitely ahead

The outbreak of "nuclear bomb-level vulnerabilities" such as Log4j2 has rapidly heated up RASP technology, filling the gap in the market in application layer protection. On the basis of RASP technology, Boundary Infinity launched Jingyunjia ADR, which is committed to the updated form of application security protection, taking into account compliance and attack and defense, as well as runtime protection and supply chain security management. It can form an in-depth defense system with WAF to achieve dynamic Defense, both internal and external, has upgraded application security from the previous 1.0 era that focused on border protection to the 2.0 era that combines internal and external, continuous detection and response, creating a precedent in the industry, and can be said to be a leader in the new ADR track.

Boundary Unlimited Jingyun Jia ADR application detection and response system is based on RASP technology, takes cloud native as the scenario, takes data link as the core, takes traffic security, API security and data security as the entry point of security capabilities, and introduces a number of forward-looking technologies The concept, through continuous detection of application risks and rapid response to security risks, helps enterprises cope with many new challenges in application security arising from business growth, technological innovation, and changes in the infrastructure environment.

In terms of traffic security, ADR is based on grid-based traffic collection. By linking application endpoint data and application access data, it can efficiently and accurately defend against various security threats such as 0day vulnerability exploitation and memory horse injection. Mining and other security technologies can effectively control the data security risk situation. While providing comprehensive application security guarantees for enterprises, ADR effectively improves the incident handling efficiency of security operations through virtual patches, vulnerability threat intelligence, access control and other operational means. This conforms to the current trend of popular security technology, and also meets the actual security needs of the majority of government and enterprise customers.

Compared with international manufacturers, Boundary Unlimited Jingyunjia ADR has the advantages of precise and detailed asset inventory, follow-up security research, massive and reliable vulnerability operations, and light-weight and insensitive performance loss, especially in application asset management and supply chain In terms of security and API asset learning, its performance is excellent. Jingyunjia ADR counts application assets across IT architecture, realizes synchronous management and control of security capabilities, and provides security risk assessment for applications; dynamically collects component loading status during application operation, quickly perceives asset dynamics, and comprehensively and effectively obtains supply chain asset information; self-learning Traffic plus application framework, specifically, Jingyunjia ADR will collect API methods and application traffic defined by the internal framework of the application through stub insertion, and use the AI ​​​​detection engine to request traffic for continuous analysis, and automatic analysis will expose outdated and sensitive data. data and other key issues.

In terms of localization, Boundary Unlimited Jingyunjia ADR has also made good progress. Jingyunjia ADR has successively completed cross-tests in CPU environments such as Galaxy Kirin and Zhaoxin, Loongson, and Kunpeng, and all of them can run stably and efficiently. In the field of domestic middleware, Jingyunjia ADR has successively completed the compatibility tests for Baoland BES and Dongfang Tongweb, and all functions and protection capabilities can run stably and efficiently.

At the customer level, a large number of government and enterprise customers have stepped up research and introduction of RASP technology. Among them, the demand for the financial industry is the first to explode, and operators, energy and power, large central enterprises and Internet companies are also rapidly following up.

Continue to deepen application security and cloud native security

Boundary Unlimited is an innovative cloud security manufacturer driven by both offense and defense and technology. It is also a cutting-edge network security company that provides full-link cloud security protection products and practical offensive and defensive system construction in China. The innovator is committed to helping government and enterprise customers build a safer and more flexible network and a more dynamic and valuable defense-in-depth system by restoring real attack and defense. Boundary Infinity's RASP-based Jingyunjia ADR is a disruptive solution for application runtime security protection. It is also the starting point and strategic fulcrum for Boundary Infinity to build an overall protection platform for cloud-native applications, providing real-time protection for application security in the cloud era.

In the future, Unlimited Boundaries will closely follow the national development strategy and the general trend of security industry technology, continue to deepen the fields of application security and cloud-native security, continue to consolidate the technical advantages in the field of application security protection and improve the functions and performance of the cloud-native overall protection platform, and polish the compliance The application security and cloud-native security products required by users help Guanji customers make better use of application security and cloud-native technologies, products and solutions, and create a more efficient, safer and more reliable overall application security protection system for my country Digital security construction builds a solid security foundation.

Guess you like

Origin blog.csdn.net/weixin_54164365/article/details/131411993