Web

Using CDNs to Improve Website Security

The Internet has become the main way that we interact with organizations. Instead of visiting physical locations or speaking on the phone, consumers have become accustomed to visiting an organization’s website to make purchases or contact customer support.

As organizations grow, they need to be able to scale their web infrastructure to handle larger numbers of geographically distributed customers. A Content Delivery Network (CDN) can help with this by bringing an organization’s web presence closer to the customer. However, the benefits of a CDN are not limited to website availability. A CDN node can help to increase the security of an organization’s web presence.

Traditional Applications of CDNs

CDNs have been around for a long time; however, the earliest CDNs had only a fraction of the functionality of modern offerings. In the beginning, CDNs were relatively expensive and were only capable of handling static content, which limited their utility. Modern CDNs can handle static and dynamic content and mobile and rich media.

CDNs work by caching a copy of a website in a location closer to a cluster of users. For example, a US-based company with targeting English-speaking customers may have their main web servers within the US but also have CDN nodes deployed in the UK, Australia, and other English-speaking markets.

The geographic distribution of CDNs is designed to minimize web page latency or in other words, the time it takes a web page to load. A one-second delay in loading can cause a 70% reduction in conversions, so connecting customers to a web server close to them can have a significant positive impact on an organization’s bottom line.

The geographic distribution of CDN nodes also has other benefits. By directing visitors to their local CDN node, an organization can provide location-specific content to different audiences. Additionally, a load-balanced, geographically distributed CDN network can be more resilient as multiple nodes are unlikely to be affected by natural disasters or other business-interrupting events, and other CDN nodes can be configured to take on the load dropped by an unavailable webserver.

CDNs for Security

While CDNs are primarily used to improve the speed and availability of an organization’s web presence, they can also be used to increase network security. The nature of the CDN means that it is commonly deployed at the furthest reaches of an organization’s network.

As a result, it makes a good first line of defense in a multi-layer cybersecurity strategy. Two ways in which the use of CDNs can improve an organization’s web security are scanning user input for attempted exploitation of common vulnerabilities and protecting the organization’s network against automated attacks.

  • Common Exploit Scanning

Since CDNs are the primary point of interaction between a user and the organization’s network, they are an ideal location to deploy security scanning functionality. Before anything is forwarded to an organization’s internal network infrastructure, the CDN nodes can scan user input for indicators of common attacks included on the OWASP Top Ten List like SQL injection or cross-site scripting (XSS). By removing these potential threats before traffic even reaches an organization’s primary network infrastructure, the CDN dramatically decreases an organization’s exposure to cyber threats.

  • Automated Attack Identification

CDN infrastructure is especially effective in protecting against automated attacks. As the number of insecure Internet of Things (IoT) devices on the Internet increases and cloud computing becomes cheaper, the difficulty of building large botnets is dramatically reduced. As a result, Distributed Denial of Service (DDoS), brute force password guessing, and other automated attacks are becoming increasingly common.

The use of CDNs can significantly decrease an organization’s exposure to and the possible impacts of automated attacks. Distributed and load-balanced CDN nodes can distribute the traffic generated by a DDoS attack, making it much more difficult for an attacker to generate the volume of traffic necessary to degrade or destroy the functionality of an organization’s web presence. Bot detection solutions can also be deployed on CDN nodes so that automated attacks are detected and remediated with little or no impact on an organization’s core network infrastructure.

Improving Security with CDNs

The use of a Content Delivery Network is a must for many large enterprises. A widely distributed client base and the need to quickly respond to massive amounts of traffic means that a single web server is often insufficient to meet an organization’s needs. By caching content on several geographically-distributed CDN nodes, an organization can ensure that customers experience low latency and have access to content tailored to their geographic region.

The benefits of CDNs are not limited to ensuring the functionality and accessibility of an organization’s web presence. The location of CDN nodes on the very edges of an organization’s network make them an ideal first line of defense in a multi-layer cybersecurity deployment. Using CDN nodes to identify and eliminate potentially malicious traffic dramatically decreases the threat that cybercriminals can pose to an organization’s core infrastructure.

However, caching an organization’s web content on multiple CDN nodes also expands the organization’s attack surface. An attacker could target specific CDN nodes for an attack in the hopes that an organization does not have the visibility necessary to detect an attempt to gain a foothold on the fringes of their network. Effectively and securely using CDNs to maximize the security and usability of an organization’s web presence involves using a security solution that can scale to protect all components of an organization’s web presence.

Be the FIRST to Know - Join Our Mailing List!

Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

Thank you for subscribing.

Something went wrong.

Previous ArticleNext Article
Thanks for reading this article. If you're new here, why don't you subscribe for regular updates via RSS feed or via email. You can also subscribe by following @techsling on Twitter or becoming our fan on Facebook. Thanks for visiting!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Send this to a friend