Definitive Guide To CASB - HPE Ebook PDF
Definitive Guide To CASB - HPE Ebook PDF
Definitive Guide To CASB - HPE Ebook PDF
TM
to
Cloud Access
Security Brokers
Visibility, Security, and Compliance for
Applications and Data in the Cloud
to
Cloud Access
Security Brokers
Jon Friedman
Mark Bouchard, CISSP
Foreword by Assaf Rappaport
Definitive Guide™ to Cloud Access Security Brokers
Published by:
CyberEdge Group, LLC
1997 Annapolis Exchange Parkway
Suite 300
Annapolis, MD 21401
(800) 327-8711
www.cyber-edge.com
Copyright © 2015, CyberEdge Group, LLC. All rights reserved. Definitive Guide™ and
the CyberEdge Press logo are trademarks of CyberEdge Group, LLC in the United
States and other countries. All other trademarks and registered trademarks are the
property of their respective owners.
Except as permitted under the United States Copyright Act of 1976, no part of this
publication may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning
or otherwise, without the prior written permission of the publisher. Requests to the
publisher for permission should be addressed to Permissions Department, CyberEdge
Group, 1997 Annapolis Exchange Parkway, Suite 300, Annapolis, MD, 21401 or
transmitted via email to [email protected].
Publisher’s Acknowledgements
CyberEdge Group thanks the following individuals for their respective contributions:
Editor: Susan Shuttleworth
Designer: Debbi Stocco
Production Coordinator: Valerie Lowery
Adallom Subject Matter Experts: Chris Westphal and Danelle Au
Table of Contents
Foreword................................................................................................................ v
Introduction......................................................................................................... vii
Chapters at a Glance........................................................................................ vii
Helpful Icons................................................................................................... viii
Chapter 3: Visibility........................................................................................... 13
Data, Sources, and Output................................................................................13
Data about activities...........................................................................13
Sources and output.............................................................................15
Visibility at Work..............................................................................................15
Discovery of unsanctioned applications............................................15
Users, abusers, and imposters...........................................................17
Oversharing........................................................................................17
Zombies and super admins............................................................... 18
Compliance.......................................................................................................29
Audit trails and attestation............................................................... 29
DLP, eDiscovery, and IRM................................................................ 29
Encryption.........................................................................................30
After you read this guide we think you will agree that no
enterprise can afford to move to cloud applications without a
CASB.
Chapters at a Glance
Chapter 1, “How Cloud Applications Change the Game
for Security,” examines the challenges facing security teams
when enterprises move to cloud applications.
Helpful Icons
TIP
Tips provide practical advice that you can apply in your own
organization.
DON’T FORGET
When you see this icon, take note as the related content
contains key information that you won’t want to forget.
CAUTION
Proceed with caution because if you don’t it may prove costly
to you and your organization.
TECH TALK
Content associated with this icon is more technical in nature
and is intended for IT practitioners.
ON THE WEB
Want to learn more? Follow the corresponding URL to
discover additional content available on the Web.
Chapter 1
Lost visibility
When applications reside in corporate datacenters, enter-
prises can monitor all events and actions related to access and
activity.
But for applications hosted in the cloud, enterprises have only
as much visibility as the cloud application vendors are willing
to provide. In addition, every cloud application vendor has
its own mechanisms for authentication and access control, its
own activity monitoring capabilities, its own alerting system,
and its own audit trails.
As a result:
DON’T FORGET You may need to update your corporate and compliance poli-
cies to reflect cloud computing conditions. Educate your users
on those policies and the harm they can cause by violating
them.
Understanding Cloud
Access Security Brokers
In this chapter
Examine a conceptual view of a cloud access security broker
Understand four categories of security where CASBs provide
value
;; Control when and how files and data are shared
and downloaded
TECH TALK Figure 2-1 is a conceptual view of a CASB, but not an architec-
tural representation. CASBs can capture data from firewall
and device logs, through application APIs, and with a proxy
that scans network traffic. It is important to understand the
strengths and limitations of these methods before making
deployment and vendor selection decisions. We will discuss
architectures and deployment modes in Chapter 6.
Visibility
CASBs can provide very detailed data on which cloud-based
applications are used in the enterprise, who is accessing them,
and how they are being accessed (from what devices, when,
and where). They can also show what files are being stored,
who owns them, and how they are being accessed and shared
inside and outside the enterprise. This data can be correlated
10 | Definitive Guide to Cloud Access Security Brokers
Threat protection
Today, most IT organizations concede that attackers will
be able to capture user credentials through spear phishing
attacks and social engineering techniques. It is therefore
critical to monitor application access and usage and detect
anomalous behaviors and indicators of attacks as soon as
possible. Yet these areas are exactly where cloud application
vendors provide the least help. That is not surprising: how is a
cloud application vendor supposed to know what is normal for
your organization and your users?
Threat protection is one area where CASBs provide services
unavailable from any other source. A CASB can observe the
activities of a user across multiple cloud applications and mul-
tiple devices, and use that data to create baselines of normal
behavior. The CASB can then generate alerts when it detects
deviations from those baselines.
The large volumes of data about applications, users, devices,
files, and activities that CASBs collect can also be extremely
valuable to incident response (IR), forensics, and risk man-
agement teams trying to reconstruct advanced, multi-stage
attacks and determine the attackers’ tactics, techniques and
procedures (TTPs).
TIP Some CASBs can be integrated with security information and
event management (SIEM) solutions. With that integration,
alerts generated by the CASB, together with related informa-
tion and “context,” are available in real time to your security
operations center (SOC) and IR teams.
Chapter 2: Understanding Cloud Access Security Brokers | 11
Access control
In the old days, access control was based on a relatively simple
question: Is this person entitled to access the corporate net-
work and the applications on it?
In a cloud computing world, the enterprise may want to base
access decisions on a more nuanced set of conditions: What
resources are safe to expose to this person (or more accu-
rately, to this set of user credentials), when requested from
this device, in this location, over this network connection?
Through “adaptive access control,” a CASB makes it feasible to
create multi-factor, granular access rules and to enforce them
consistently across a range of cloud applications.
Phased Implementation
CASB capabilities can be implemented in stages so that:
Visibility
In this chapter
Understand the types of activities that can be monitored by a
cloud access security broker
Learn about the insights that can be gained and how they can
improve security
TIP Dashboards are a good place to start when you are learning
about a CASB. The dashboard will give you a quick read on the
current status of all cloud applications being monitored and
protected.
Visibility at Work
Let’s look at some of the insights we can find in this data.
Discovery of unsanctioned
applications
A CASB can provide visibility into cloud applications that are
unsanctioned by the IT organization. These applications can
pose major security risks because they lack security features,
or simply because they are unmonitored.
16 | Definitive Guide to Cloud Access Security Brokers
Oversharing
Information sharing is immensely complicated in today’s
cloud application world. Users can store and share files in:
Users often make bad decisions when they set sharing permis-
sions for files and directories. A user might invite groups to
access a directory without knowing who is a member. Another
might select “anyone with the link” as a permission for file
access (Figure 3-2), then email that link to colleagues. The
user might expect the colleagues to keep the link confidential,
but nothing prevents them from forwarding the link to every-
one they know.
Figure 3-2: Users can share files without knowing the implications.
Threat Protection
In this chapter
See how a CASB can generate alerts for security teams
Understand how heuristics can help identify threats
Learn how cyber threat intelligence can strengthen a CASB
High-impact actions
You may decide that some actions have such great impact
or potential for damage that someone on the security team
should receive an alert every time they occur.
These actions might include:
Anomalous behaviors
A CASB can detect deviations from normal behaviors, as illus-
trated in Figure 4.1. These anomalies can take several forms:
Dynamic Analysis of
Files (Sandboxing)
A CASB can extend to the cloud the use of another key
technology for threat protection: dynamic analysis of files, or
“sandboxing.” Sandboxing detects malware by executing files
in an isolated “virtual sandbox” environment, then observing
the behavior of the file and detecting suspicious or malicious
actions.
TIP A CASB can work with a sandboxing product to test both files-
at-rest in cloud applications and files-in-motion being
uploaded and downloaded. If the test detects malware, the
CASB can send an alert to the security team, and send an anal-
ysis report of the malware to the SOC and IR teams.
Chapter 4: Threat Protection | 23
Enforcement Actions
CASBs can take a number of enforcement actions to immedi-
ately eliminate vulnerabilities and block dangerous activities.
These include:
Supporting Incident
Response and Forensics
Today most enterprises assume they will be compromised by
advanced attacks. They rely on IR and forensics teams to spot
indicators of compromise (IOCs), correlate them with other
indicators, reconstruct attack steps, clean up damage, and
improve security controls to prevent repeat incidents.
CASBs can play an important role in these activities. For
example, if the IR team detects a suspicious download from a
cloud application, the CASB can answer questions such as:
PCs and mobile devices can be checked for factors such as:
Cloud DLP
DLP technology is designed to keep sensitive information on
trustworthy systems. A DLP solution searches files, emails,
and messages for key words, expressions, patterns of charac-
ters (xxx-xx-xxxx), and other clues indicating the presences of
sensitive data such as credit card and Social Security numbers,
personally identifiable information (PII), protected health
information (PHI), intellectual property, and corporate legal
and financial information. It can prevent files and messages
containing such data from being downloaded or distributed
outside the corporate network.
DON’T FORGET A CASB should give you the option of extending to cloud
applications DLP rules you have already defined for your on-
premises data stores. You shouldn’t be forced to re-create and
manage separate DLP policies for cloud and on-premises
environments.
28 | Definitive Guide to Cloud Access Security Brokers
Compliance
Many government regulations and industry standards
require access audit trails, access controls, and encryption of
protected data. You can find these capabilities in most cloud
applications, but trying to implement them separately and
document compliance across multiple applications can be a
nightmare. Here we look briefly at some of the ways a CASB
can simplify compliance.
Encryption
Several of the most important regulations and standards
have very strong requirements for encrypting data in the
cloud, on endpoint devices, and in transit between the two. In
addition, the Health Insurance Portability and Accountability
Act (HIPAA) and several US state breach notification laws
provide that if enterprises can prove that data on lost or stolen
devices was encrypted, they do not need to notify customers
or employees of the breach. This safe harbor clause can save
millions of dollars in breach notification costs and avoid
humiliating publicity. A CASB can ensure that file encryption
policies are followed consistently, and quickly produce data
that demonstrates compliance.
Implementing a Cloud
Access Security Broker
In this chapter
Examine how a cloud access security broker can interface with
cloud applications and existing security solutions
Understand the basics of API and proxy mode deployments,
and review a phased approach to implementation
Figure 6-1: CASBs can be deployed in API mode and proxy mode
Chapter 6: Implementing a Cloud Access Security Broker | 33
API mode
A CASB deployed in API mode is “out of band”; users com-
municate directly with cloud applications, and the CASB
obtains data from the applications through their APIs. This
approach provides very detailed visibility into data at rest and
user activities, including logins and logouts, file uploads and
downloads, information sharing, and administrative actions.
CASBs deployed in API mode can also perform administrative
tasks and enforce governance policies. For example, if a user
violates policies by publicly sharing files containing sensitive
information, administrators can use the CASB to change the
access permissions on the files, or to take file ownership away
from the offending user.
A major advantage of API mode is speed: a CASB can be
implemented literally in minutes because no changes to net-
works, endpoint devices, or applications are needed.
Proxy mode
A CASB deployed in proxy mode is “inline”; network traffic
between users and cloud applications flows through the CASB
proxy. This is achieved in one of two ways:
Hybrid mode
Some CASBs offer a hybrid mode that combines API mode
and proxy mode. This allows the CASB to support a wide
range of use cases with visibility, policy enforcement, and
ways to deal with unmanaged devices.
ON THE WEB We have only touched on a few of the key issues related to
CASB deployment modes. Gartner has a useful report that
goes into more depth. To purchase a copy of Select the Right
CASB Deployment for Your SaaS Security Strategy, connect
to: https://www.gartner.com/doc/3004618/
select-right-casb-deployment-saas.
Cloud NAC
A CASB can work with third-party cloud network access control
(NAC) solutions. Endpoints that are unmanaged or non-com-
pliant with corporate standards can be blocked from accessing
cloud applications, or can be given restricted access and limited
ability to download or share files.
Sandboxing
A CASB can work with a sandboxing product to test files in
motion and files residing in cloud applications for malware.
TECH TALK Experts debate the relative merits of encrypting all data, or
encrypting data at the field level or file level. For CASBs, file-
level encryption tends to be the best option. Encrypting and
decrypting all data creates excessive processing overhead.
Encrypting data at the field level often breaks application func-
tionality. For example, using a third-party solution to encrypt
Salesforce fields can interfere with searching, as well as dis-
rupting integration with other applications such as Marketo.
36 | Definitive Guide to Cloud Access Security Brokers
SIEM
All alerts generated by a CASB, together with related informa-
tion (the context for the alert), can be pushed to security
information and event management (SIEM) solutions. That
allows the security operations center (SOC) and incident
response (IR) teams to see CASB-created alerts immediately,
correlate them with on-premises activities, prioritize them
alongside other alerts, and respond to them using established
workflows. It also gives them instant access to the contextual
information collected by the CASB.
Phased Implementation
A CASB can be implemented in phases. A phased approach
allows the enterprise to begin receiving a return on their
investment immediately (usually on the first day) and evolve
over time toward a comprehensive set of capabilities. Table
6-1 describes one possible sequence.
Deployment Modes
As we discussed in Chapter 6, there are trade-offs between
deployment modes. Most importantly: