
10
Securing Outsourced Applications Example
More and more critical services are being provided by partners, often over the Internet and secured by SSL. Be it order
entry, fulfillment, human resources, or sales management, organizations are dependant on fast and reliable access to these
outsourced applications. Until recently, however, that critical traffic was opaque to IT management because it was tunneled
through SSL. The SSL forward proxy allows the organization to make sure no malware gets through from even trusted sources,
like outsourced sites, and provides an audit/tracking mechanism for these outsourced applications.
The ProxySG can be used to secure communications with known outsourced applications, such as Salesforce.com, or services
such as hosted email providers. The flexibility of the SSL forward proxy functionality allows you to control – or not control –
based on a variety of criteria (e.g., user, application, source, etc.), so you can:
Pass-through SSL traffic untouched,>-
Make some initial judgments about where the traffic is coming from and going to, then pass it through, Or>-
Fully proxy control of the SSL connection.>-
These three options are represented in the three diagrams in Figure 9.
Internet
Web Applications
Web Applications
Web Applications
Users
TCP
SSLSSL
TCP
Internet
Web Applications
Web Applications
Web Applications
Users
TCP
SSLSSL
TCP
Internet
Web Applications
Web Applications
Web Applications
Users
TCP
SSLSSL SSLSSL
TCP
Figure 9 – Blue Coat enables IT organizations to apply varying levels of SSL proxy management,
from simply passing through traffic to full proxy enabling policy-based SSL control.
In the latter two of the above scenarios, organizations can also warn end-users what is going on; for example, a splash
page that lets users know that some monitoring is going on, and reminds them of the acceptable use policy. This flexibility
extends to caching, logging, and administrative functions as well. Using the Blue Coat ProxySG SSL forward proxy capabilities,
organizations can be selective about what they cache – perhaps only caching certain elements that do not contain sensitive
data (for example, GIFs and JPEGs). Similarly, logging can be equally selective, and organizations can send the encrypted
Technology Primer: Secure Sockets Layer (SSL)
Comentários a estes Manuais