Comprehensive Information on CASB - PowerPoint PPT Presentation

About This Presentation
Title:

Comprehensive Information on CASB

Description:

A CASB (Cloud Access Security Broker) secures the data that is transmitted to and from a business’ in-house IT infrastructure and its cloud vendor. – PowerPoint PPT presentation

Number of Views:47
Slides: 12
Provided by: htshosting
Category: Other
Tags: casb

less

Transcript and Presenter's Notes

Title: Comprehensive Information on CASB


1
Comprehensive Information on CASB
2
Table of Contents
  • CASB
  • Four Pillars of CASB
  • What does a CASB do?
  • How does CASB Augment Security?
  • CASB Benefits for Security Teams
  • Procedure for Selecting the Best CASB Solution

3
CASB
  • CASB is the abbreviation for Cloud Access
    Security Broker. It is either an on-premises or a
    cloud-based software that exists between the
    users of cloud services and cloud applications.
    It monitors all activities and enforces security
    policies. A Cloud Access Security Broker can
    carry out many services, such as monitoring the
    activities of users, enforcing security policy
    compliance, issuing warnings to administrators
    with regard to actions that can be hazardous etc.
  • A CASB might deliver management or security, or
    both. The security function involves averting
    high-risk events and the management function
    monitors and mitigates high-risk events. CASBs
    that have to deliver security should be present
    in the path that is used for accessing data and
    which exists between a user and the cloud. The
    CASBs which are used for management might use
    APIs (Application Programming Interface) for the
    purpose of inspecting cloud data as well as
    activity in order to issue alerts. Additionally,
    a CASB inspects firewall or proxy logs.
  • CASB solutions add value to the existing security
    systems of the users of cloud services.
  • To digress, cloud technology is also used in
    cloud hosting, which is a web hosting service for
    rendering websites accessible over the Internet.
    This service is provided by web hosting companies
    and the most efficient service providers are
    usually referred to as the Best Hosting
    Company, the Best Cloud Hosting Company, the
    Best Linux Hosting Company etc.

4
Four Pillars of CASB
  • The four pillars of Cloud Access Security Broker
    are mentioned below, in no particular order.
  • Compliance- The functionality that is needed to
    classify data which passes through it, exists in
    a CASB solution. This aids in supporting
    compliance programs which govern data.
  • Visibility- Cloud Access Security Broker
    solutions enable visibility into the traffic
    between businesses and their cloud service
    providers.
  • Data Security- CASB solutions are capable of
    detecting sensitive data, encrypting data as well
    as controlling access to data. These solutions
    should not be considered as complete data
    security systems. These are designed to
    complement other data security solutions.
  • Threat Detection- CASBs have UEBA (User Entity
    Behaviour Analytical) capabilities which aid in
    detecting insider threats along with compromised
    accounts.

5
What does a CASB do?
  • A CASB solution functions partly as a filter,
    partly as a proxy and partly as a firewall,
    between cloud systems and users. It is capable of
    detecting unsanctioned cloud applications along
    with sensitive data that is in transit. It
    encrypts traffic to cloud providers. Enterprises
    use CASB for addressing their cloud providers
    specific cases with regard to usage.

6
How does CASB Augment Security?
  • A user of cloud services, especially of SaaS
    (Software as a Service), should consider using
    CASB in his cybersecurity strategy as it enables
    the addition of specific security controls and
    ensures the protection of the data that is
    transmitted between ones network and ones
    cloud-based service provider.
  • CASBs enhance security through the following
  • Adaptive access control
  • Client-facing encryption
  • User and entity behaviour analytics
  • Data loss prevention
  • Monitoring as well as log management

7
1-800-123 -8156
  • Whoa! Thats a big number, arent you
    proud?

8
CASB Augment Security
  • BYOK (Bring Your Own key) encryption management
  • Pre-cloud encryption and tokenization
  • Threat protection
  • Cloud security posture management
  • Cloud application discovery along with risk
    rating

9
CASB Benefits for Security Teams
  • There are many advantages of using CASB for
    security teams. These are mentioned below, in no
    particular order.
  • Monitoring usage as well as adoption of those
    cloud services that have been approved.
  • Gaining visibility into risks associated with
    compliance.
  • Providing threat detection capabilities to ones
    cloud services.
  • Managing device access (managed and unmanaged) to
    cloud services.
  • Enhancing approved cloud applications security
    through APIs which support the prevention of data
    loss, User Entity Behaviour Analytical (UEBA)
    along with Adaptive Access Control (AAC).
  • Determining the risk that is associated with
    unapproved cloud solutions.

10
Procedure for Selecting the Best CASB Solution
  • The following steps should be involved in the
    selection of the most appropriate CASB solution
  • CASB implementation should begin with the most
    important cloud application in a business
    portfolio.
  • The next step should involve finding a CASB
    solution provider that provides API level support
    for the chosen cloud application.
  • It needs to be decided if one wants to integrate
    ones CASB with ones existing SSO or IAS
    systems.
  • A CASB needs to be selected which supports the
    chosen integrations.
  • The CASB modes that are required for ones cloud
    applications need to be determined (Forward
    Proxy, Reverse Proxy or both).
  • Finally, the cost of the CASB solution needs to
    be evaluated against its benefits, with regard to
    ones security profile.

11
Thanks!
  • ANY QUESTIONS?
  • www.htshosting.org
Write a Comment
User Comments (0)
About PowerShow.com