SlideShare a Scribd company logo
CASB – Architecture & Deployment
Gaurav Bhatia
gaurav@palerra.com
Palerra
Aug 2015
Full Lifecycle Approach to Security
Effective threat analytics is an
important element of the security
lifecycle
But it is ineffective without
incident response – the yin and
the yang
For security architectures to be
effective, threat analytics and
incident response must be tightly
coupled to prevent any gaps
Chase breach affects 76 million accounts, raises
questions about detection failure
SC Magazine – Oct 3, 2014
Target did not respond to FireEye security
alerts prior to breach, according to report
“We often see organizations ignoring alarms like this because they've
become numb to them, receiving too many false positives, or because
they're understaffed,” Chiu said. “You can have all the alarms you want, but
unless you put security in a prominent position in the company and have
enough staff to review them, those alarms don't mean anything.”
Aug 2015
The Yin: Threat Analytics for the Cloud
Challenges with performing threat analytics for cloud services
 Static threat models cannot be applied to on-demand cloud infrastructure
 Non-uniform transparency across cloud providers for event logs and security metadata
 Consolidation of security data across SaaS, PaaS and IaaS is required for a holistic view
 Correlation of data across all cloud services is challenging due to the sheer volume of cloud usage
A combination of approaches to threat analytics is required
 Detection: Define static rules and baselines to match known threats
 Prediction: Use data science and machine learning to discover unknown threats
Automation of threat detection and prediction is necessary to keep up
with the rapidly evolving threat landscape
Aug 2015
The Yang: Incident Response for the Cloud
Comprehensive incident response entails
 Logging: ensures that all incidents are tracked
 Remediation: ensures that all incidents are addressed
 Two approaches to remediation
 Changes are made directly to the cloud service
 Changes are made via integrations with existing IT investments
Automation of incident response is necessary to ensure that no
incidents are lost in the shuffle
Aug 2015
CASB Deployment models
Aug 2015
Forward Proxy
Aug 2015
Forward proxy
Pros
 Can be used for all app types, incl client-server with hard-coded host names
Cons
 Difficult to deploy especially for BYOD shops
 End-user privacy concerns as both corporate and personal traffic are sent via proxy
 Requires self-signed certificates at each point of use.
 CASB becomes SPOF
Aug 2015
Reverse Proxy
Aug 2015
Reverse proxy
Pros
 Works for any device (managed and unmanaged) and from any location
 End-user privacy is intact – only corporate traffic is proxied
 Simple deployment – no configuration on mobile devices or firewalls
Cons
 SSL/TLS is hard to handle
 CASB becomes SPOF
Aug 2015
API Mode
Aug 2015
API
Pros
 Non-intrusive & light touch solution
 Can provide content based controls
 Supports BYOD
 Reliable information on what data is in the cloud, its permissions and the activity logs
Cons
 Not all SaaS applications offer API support
Aug 2015
Thanks!

More Related Content

PPTX
5 Highest-Impact CASB Use Cases
PDF
63 Requirements for CASB
PDF
Cloud Security 101 by Madhav Chablani
PPTX
CASB: Securing your cloud applications
PDF
CSA SV Threat detection and prediction
PDF
CASB — Your new best friend for safe cloud adoption?
PDF
How Zero Trust Changes Identity & Access
PDF
Cloud Security Governance
5 Highest-Impact CASB Use Cases
63 Requirements for CASB
Cloud Security 101 by Madhav Chablani
CASB: Securing your cloud applications
CSA SV Threat detection and prediction
CASB — Your new best friend for safe cloud adoption?
How Zero Trust Changes Identity & Access
Cloud Security Governance

What's hot (20)

PDF
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
PDF
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
PPTX
Zero trust for everybody: 3 ways to get there fast
PDF
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
PDF
Introduction to Cloud Security
PPTX
Secure your cloud applications by building solid foundations with enterprise ...
PPTX
Cloud Access Security Brokers - CASB
PDF
Global Mandate to Secure Cloud Computing
PDF
How VPNs and Firewalls Put Your Organization at Risk
PDF
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
PPTX
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
PDF
CSA Standards Development Summary
PPTX
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
PPTX
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
PDF
Trust No One - Zero Trust on the Akamai Platform
PDF
PPTX
Service Organizational Control (SOC 2) Compliance - Kloudlearn
PPTX
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
PDF
Workshop: Threat Intelligence - Part 1
PDF
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Zero trust for everybody: 3 ways to get there fast
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Introduction to Cloud Security
Secure your cloud applications by building solid foundations with enterprise ...
Cloud Access Security Brokers - CASB
Global Mandate to Secure Cloud Computing
How VPNs and Firewalls Put Your Organization at Risk
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
CSA Standards Development Summary
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
Trust No One - Zero Trust on the Akamai Platform
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Workshop: Threat Intelligence - Part 1
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Ad

Similar to Workshop on CASB Part 2 (20)

PDF
Presd1 10
PDF
Cloud Security by CK
PDF
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
PDF
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
PDF
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
PDF
Peering Through the Cloud Forrester EMEA 2010
PDF
Cloud Security: Perception Vs. Reality
PDF
Who owns security in the cloud
PDF
Cloud Security - Made simple
PPTX
SAM05_Barber PW (7-9-15)
PPTX
Charting the Course Through Disruption with CSA Research
PPT
Cloud Computing Security Issues
PPTX
Chapter_5_Security_CC.pptx
PPTX
Security in the cloud Workshop HSTC 2014
PPTX
Building a Secure Cloud with Identity Management
PPTX
SAP Concur’s Cloud Journey
PDF
A Cloud Security Ghost Story Craig Balding
PDF
Cloud servers-new-risk-considerations
PPTX
security and compliance in the cloud
PDF
Architecting cybersecurity to future proof smart cities against emerging cybe...
Presd1 10
Cloud Security by CK
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Peering Through the Cloud Forrester EMEA 2010
Cloud Security: Perception Vs. Reality
Who owns security in the cloud
Cloud Security - Made simple
SAM05_Barber PW (7-9-15)
Charting the Course Through Disruption with CSA Research
Cloud Computing Security Issues
Chapter_5_Security_CC.pptx
Security in the cloud Workshop HSTC 2014
Building a Secure Cloud with Identity Management
SAP Concur’s Cloud Journey
A Cloud Security Ghost Story Craig Balding
Cloud servers-new-risk-considerations
security and compliance in the cloud
Architecting cybersecurity to future proof smart cities against emerging cybe...
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
System and Network Administraation Chapter 3
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
medical staffing services at VALiNTRY
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Introduction to Artificial Intelligence
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PPTX
history of c programming in notes for students .pptx
PPTX
Odoo POS Development Services by CandidRoot Solutions
PPTX
Online Work Permit System for Fast Permit Processing
DOCX
The Five Best AI Cover Tools in 2025.docx
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
System and Network Administration Chapter 2
PDF
top salesforce developer skills in 2025.pdf
PDF
Softaken Excel to vCard Converter Software.pdf
VVF-Customer-Presentation2025-Ver1.9.pptx
2025 Textile ERP Trends: SAP, Odoo & Oracle
System and Network Administraation Chapter 3
L1 - Introduction to python Backend.pptx
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
medical staffing services at VALiNTRY
How Creative Agencies Leverage Project Management Software.pdf
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PTS Company Brochure 2025 (1).pdf.......
Introduction to Artificial Intelligence
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
history of c programming in notes for students .pptx
Odoo POS Development Services by CandidRoot Solutions
Online Work Permit System for Fast Permit Processing
The Five Best AI Cover Tools in 2025.docx
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
System and Network Administration Chapter 2
top salesforce developer skills in 2025.pdf
Softaken Excel to vCard Converter Software.pdf

Workshop on CASB Part 2

  • 1. CASB – Architecture & Deployment Gaurav Bhatia gaurav@palerra.com Palerra
  • 2. Aug 2015 Full Lifecycle Approach to Security Effective threat analytics is an important element of the security lifecycle But it is ineffective without incident response – the yin and the yang For security architectures to be effective, threat analytics and incident response must be tightly coupled to prevent any gaps Chase breach affects 76 million accounts, raises questions about detection failure SC Magazine – Oct 3, 2014 Target did not respond to FireEye security alerts prior to breach, according to report “We often see organizations ignoring alarms like this because they've become numb to them, receiving too many false positives, or because they're understaffed,” Chiu said. “You can have all the alarms you want, but unless you put security in a prominent position in the company and have enough staff to review them, those alarms don't mean anything.”
  • 3. Aug 2015 The Yin: Threat Analytics for the Cloud Challenges with performing threat analytics for cloud services  Static threat models cannot be applied to on-demand cloud infrastructure  Non-uniform transparency across cloud providers for event logs and security metadata  Consolidation of security data across SaaS, PaaS and IaaS is required for a holistic view  Correlation of data across all cloud services is challenging due to the sheer volume of cloud usage A combination of approaches to threat analytics is required  Detection: Define static rules and baselines to match known threats  Prediction: Use data science and machine learning to discover unknown threats Automation of threat detection and prediction is necessary to keep up with the rapidly evolving threat landscape
  • 4. Aug 2015 The Yang: Incident Response for the Cloud Comprehensive incident response entails  Logging: ensures that all incidents are tracked  Remediation: ensures that all incidents are addressed  Two approaches to remediation  Changes are made directly to the cloud service  Changes are made via integrations with existing IT investments Automation of incident response is necessary to ensure that no incidents are lost in the shuffle
  • 7. Aug 2015 Forward proxy Pros  Can be used for all app types, incl client-server with hard-coded host names Cons  Difficult to deploy especially for BYOD shops  End-user privacy concerns as both corporate and personal traffic are sent via proxy  Requires self-signed certificates at each point of use.  CASB becomes SPOF
  • 9. Aug 2015 Reverse proxy Pros  Works for any device (managed and unmanaged) and from any location  End-user privacy is intact – only corporate traffic is proxied  Simple deployment – no configuration on mobile devices or firewalls Cons  SSL/TLS is hard to handle  CASB becomes SPOF
  • 11. Aug 2015 API Pros  Non-intrusive & light touch solution  Can provide content based controls  Supports BYOD  Reliable information on what data is in the cloud, its permissions and the activity logs Cons  Not all SaaS applications offer API support