Cloud Access Security Broker (CASB)
A CASB is a visibility and control point that secures cloud applications, delivering data protection and threat protection services to prevent leakage of sensitive data, stop malware, and other threats, discover and control shadow IT, and ensure regulatory compliance.
CASBs are the cloud-hosted or on-premises applications, which sit in between cloud application users and the cloud services. CASBs can monitor traffic and user activity, automatically block threats and risky sharing, and enforce security policies such as authentication and alerting.
CASBs can apply policy to provide shadow IT control, cloud data loss prevention (DLP), SaaS security posture management (SSPM), and advanced threat protection.
Four Pillars of CASB
An effective CASB solution is constructed with four core features:
1. Visibility
Detects all the cloud services of shadow IT and tracks the live status of user activity with the sanctioned cloud programs.
2. Compliance
Capability of determining confidential items stored in cloud and enforces data loss prevention policies for meeting the requirements of data residency and compliance.
3. Data Security
Security practices like tokenization, encryption, access control, and information rights management are enforced for being safe and secure on the cloud.
4. Threat Protection
Instantly determines and responds to the negligent or harmful insider threats, compromised accounts, and privileged user threats.
CASB Deployment Models
CASB is easy to deploy, although deployment can be automated and many CASB policies are generated from risk assessments, administrators still need to build a model with the right deployment strategy to maintain efficiency.
Administrators can choose from three different CASB deployment models:
- API control: Use an API to make calls to CASB procedures, which reduces the overhead for deployment.
- Reverse proxy: Best for organizations with remote users and must make data available to only authorized users connected to the cloud.
- Forward proxy: For organizations that need endpoint protection, a forward proxy will obfuscate user device information and protect it from attackers. It also works well with VPN connections.
CASB Use Cases
- Applications running on personal devices.
- Data loss prevention.
- Block malware and ransomware.
- Monitor and handle suspicious user behaviors.
- Encryption.
- Validate authenticated users.
- Identify misconfiguration.
- Stop shadow IT and unauthorized applications.
Top 10 CASB Solutions
- Palo Alto Networks Aperture
- Fortinet FortiCASB
- Cisco Cloudlock
- Proofpoint CASB
- Forcepoint CASB
- Censornet CASB
- Microsoft Cloud App Security (MCAS)
- CloudSOC CASB
- Netskope Security Cloud
- Symantec Cloud Data Protection