1 / 11

Comprehensive Information on CASB

A CASB (Cloud Access Security Broker) secures the data that is transmitted to and from a businessu2019 in-house IT infrastructure and its cloud vendor.

htshosting
Download Presentation

Comprehensive Information on CASB

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Comprehensive Information on CASB

  2. Table of Contents • CASB • Four Pillars of CASB • What does a CASB do? • How does CASB Augment Security? • CASB Benefits for Security Teams • Procedure for Selecting the Best CASB Solution

  3. CASB • CASB is the abbreviation for Cloud Access Security Broker. It is either an on-premises or a cloud-based software that exists between the users of cloud services and cloud applications. It monitors all activities and enforces security policies. A Cloud Access Security Broker can carry out many services, such as monitoring the activities of users, enforcing security policy compliance, issuing warnings to administrators with regard to actions that can be hazardous etc. • A CASB might deliver management or security, or both. The security function involves averting high-risk events and the management function monitors and mitigates high-risk events. CASBs that have to deliver security should be present in the path that is used for accessing data and which exists between a user and the cloud. The CASBs which are used for management might use APIs (Application Programming Interface) for the purpose of inspecting cloud data as well as activity in order to issue alerts. Additionally, a CASB inspects firewall or proxy logs. • CASB solutions add value to the existing security systems of the users of cloud services. • To digress, cloud technology is also used in cloud hosting, which is a web hosting service for rendering websites accessible over the Internet. This service is provided by web hosting companies and the most efficient service providers are usually referred to as the “Best Hosting Company”, the “Best Cloud Hosting Company”, the “Best Linux Hosting Company” etc.

  4. Four Pillars of CASB The four pillars of Cloud Access Security Broker are mentioned below, in no particular order. • Compliance- The functionality that is needed to classify data which passes through it, exists in a CASB solution. This aids in supporting compliance programs which govern data. • Visibility- Cloud Access Security Broker solutions enable visibility into the traffic between businesses and their cloud service providers. • Data Security- CASB solutions are capable of detecting sensitive data, encrypting data as well as controlling access to data. These solutions should not be considered as complete data security systems. These are designed to complement other data security solutions. • Threat Detection- CASBs have UEBA (User Entity Behaviour Analytical) capabilities which aid in detecting insider threats along with compromised accounts.

  5. What does a CASB do? • A CASB solution functions partly as a filter, partly as a proxy and partly as a firewall, between cloud systems and users. It is capable of detecting unsanctioned cloud applications along with sensitive data that is in transit. It encrypts traffic to cloud providers. Enterprises use CASB for addressing their cloud providers’ specific cases with regard to usage.

  6. How does CASB Augment Security? A user of cloud services, especially of SaaS (Software as a Service), should consider using CASB in his cybersecurity strategy as it enables the addition of specific security controls and ensures the protection of the data that is transmitted between one’s network and one’s cloud-based service provider. • CASBs enhance security through the following: • Adaptive access control • Client-facing encryption • User and entity behaviour analytics • Data loss prevention • Monitoring as well as log management

  7. 1-800-123 -8156 Whoa! That’s a big number, aren’t you proud?

  8. CASB Augment Security • BYOK (Bring Your Own key) encryption management • Pre-cloud encryption and tokenization • Threat protection • Cloud security posture management • Cloud application discovery along with risk rating

  9. CASB Benefits for Security Teams There are many advantages of using CASB for security teams. These are mentioned below, in no particular order. • Monitoring usage as well as adoption of those cloud services that have been approved. • Gaining visibility into risks associated with compliance. • Providing threat detection capabilities to one’s cloud services. • Managing device access (managed and unmanaged) to cloud services. • Enhancing approved cloud applications’ security through APIs which support the prevention of data loss, User Entity Behaviour Analytical (UEBA) along with Adaptive Access Control (AAC). • Determining the risk that is associated with unapproved cloud solutions.

  10. Procedure for Selecting the Best CASB Solution The following steps should be involved in the selection of the most appropriate CASB solution: • CASB implementation should begin with the most important cloud application in a business’ portfolio. • The next step should involve finding a CASB solution provider that provides API level support for the chosen cloud application. • It needs to be decided if one wants to integrate one’s CASB with one’s existing SSO or IAS systems. • A CASB needs to be selected which supports the chosen integrations. • The CASB modes that are required for one’s cloud applications need to be determined (Forward Proxy, Reverse Proxy or both). • Finally, the cost of the CASB solution needs to be evaluated against its benefits, with regard to one’s security profile.

  11. Thanks! ANY QUESTIONS? www.htshosting.org

More Related