Web Services Security Initiatives and Organizations

The following organizations work on web services security specifications, guidelines, and tools:

Basically, the JCP, W3C, and OASIS are developing specifications related to web services security. WS-I creates profiles that recommend what to implement from various specifications and provides direction on how to implement the specifications. The following sections briefly discuss the specifications and profiles being developed by each organization.

W3C Specifications

The mission of the World Wide Web Consortium (W3C), according to its Web site at http://www.w3.org/, is to lead the World Wide Web to its full potential by developing protocols and guidelines that ensure long-term growth for the web. W3C primarily pursues its mission through the creation of Web standards and guidelines. The W3C is working on the following specifications related to web services security:

OASIS Specifications

According to its web site at http://www.oasis-open.org/, the Organization for the Advancement of Structured Information Standards (OASIS) drives the development, convergence, and adoption of e-business standards. OASIS is working on the following specifications related to web services security. At the time this document was written, OASIS standards documents are available from http://www.oasis-open.org/specs/index.php.

JCP Specifications

According to the Java Community Process (JCP) web site, the JCP holds the responsibility for the development of Java technology. The JCP primarily guides the development and approval of Java technical specifications. The JCP is working on the following specifications related to web services security. The specifications can be viewed from the JCP web site at http://www.jcp.org/en/jsr/all.

WS-I Specifications

According to the Web Services Interoperability Organization (WS-I) web site, WS-I is an open industry organization chartered to promote Web services interoperability across platforms, operating systems and programming languages. Specifically, WS-I creates, promotes and supports generic protocols for the interoperable exchange of messages between Web services. WS-I creates profiles, which recommend what to use and how to use it from the various web services specifications created by W3C, OASIS, and the JCP. WS-I is working on the following profiles related to web services security. The profiles can be viewed from the WS-I web site at http://www.ws-i.org/deliverables/Default.aspx.

Security Challenges, Threats, and Countermeasures

The WS-I document titled Security Challenges, Threats, and Countermeasures can be read in its entirety at http://www.ws-i.org/Profiles/BasicSecurity/SecurityChallenges-1.0.pdf. Table 8-1 attempts to summarize many of the threats and countermeasures as an introduction to this document.

Table 8-1 Security Challenges, Threats, and Countermeasures  
Challenge
Threats
Countermeasures
Peer Identification and Authentication
falsified messages, man in the middle, principal spoofing, forged claims, replay of message parts
-HTTPS with X.509 server authentication
-HTTP client authentication (Basic or Digest)
-HTTPS with X.509 mutual authentication of server and user agent
-OASIS SOAP Message Security
Data Origin Identification and Authentication
falsified messages, man in the middle, principal spoofing, forged claims, replay of message parts
-OASIS SOAP Message Security
-MIME with XML Signature/XML Encryption
-XML Signature
Data Integrity (including Transport Data Integrity and SOAP Message Integrity)
message alteration, replay
-SSL/TLS with encryption enabled
-XML Signatures (as profiled in OASIS SOAP Message Security)
Data Confidentiality (including Transport Data Confidentiality and SOAP Message Confidentiality)
confidentiality
-SSL/TSL with encryption enabled
-XML Signatures (as profiled in OASIS SOAP Message Security)
Message Uniqueness
replay of message parts, replay, denial of service
-SSL/TLS between the node that generated the request and the node that is guaranteeing
-Signing of nonce, time stamp

As you can see from the countermeasures that are recommended in the table and in the document, the use of XML Encryption and XML Digital Signature to secure SOAP messages and attachments is strongly recommended by this organization. Using Message Security with Java WSDP discusses some options for securing messages with Java EE.