4 Fundamentals of an Effective Cloud Access Security Broker

rso/shutterstock.com

A new type of cloud security solution can help the federal government to protect sensitive information residing in cloud environments.

George Teas is the director of federal systems engineering at Blue Coat Systems.

The federal government’s efforts to eliminate legacy systems and modernize federal IT is paying off. According to a recent Government Accountability Office report, $2.8 billion has already been saved by closing 3,125 data centers since 2011, and that’s just the data reported from 19 out of 24 agencies that participated in the Federal Data Center Consolidation Initiative. The same report also suggests another 2,078 closings will result in an additional $5.4 billion in savings by the end of fiscal 2019.

Other initiatives such as the president’s fiscal 2017 budget proposal for a $3.1 billion IT modernization fund, the Federal Risk and Authorization Management Program and the Federal Information Technology Acquisition Reform Act coupled with projections that the federal demand for cloud computing services will reach $6.2 billion in fiscal 2020, could lead to an explosion of modernized cloud-based technologies; technologies that can present significant security concerns for agencies.

As critical information is migrated to the cloud to achieve greater operational efficiencies, new risks for agencies already struggling with the current threat landscape are introduced. Traditional network perimeters are no longer sufficient and cloud environments present new opportunities for data loss and cyberattacks.

» Get the best federal technology news and ideas delivered right to your inbox. Sign up here.

The rapid adoption of cloud services is driving the need for a new type of cloud security solution—cloud access security brokers—that can help the federal government to protect sensitive information residing in cloud environments.

The Role of a CASB

CASBs play an important role within the agency environment by providing critical visibility and control of how cloud apps and services are used. These solutions can provide agencies with the tools and analytics needed to determine who is using an application, how much data is being moved and where the risks exist.

Federal IT security professionals can monitor and govern users by use and apply policies to maintain data security across all endpoints. CASBs also allow agencies to govern data by replacing sensitive data with a random tokenized or encrypted value, providing incident response, as well as forensics for monitoring, logging and capturing application activities. The risk of leaking sensitive data or personally identifiable information can be significantly mitigated by combining these factors with data loss prevention capabilities extended to applications.

CASB solutions are designed to provide visibility and control into cloud application risk, but just like cloud services, not all brokers are the same. It is important to look at specific capabilities to ensure that government funds are being invested wisely. An effective CASB solution must have these four components:

1. Cloud App Discovery and Analysis

Cloud apps are a big contributor to shadow IT or third-party IT solutions such as employee-adopted devices, apps and cloud services not sanctioned by the IT department. These can open up gaping security holes. Visibility is the first priority when determining a cloud strategy and an effective CASB should provide shadow IT discovery as well as risk analysis to include detailed cloud app ratings, usage analytics and continuous reporting. Instead of allowing shadow IT to create blind spots on agency networks, cloud app discovery and analysis can discover shadow IT, identify and block risky apps, identify inefficiencies, ensure compliance and sanction appropriate apps to be used by employees or contractors.

2. Data Governance and Protection

To prevent unwanted activity such as the inappropriate sharing of sensitive content like source code, confidential information or other important records with personally identifiable information, a CASB should provide the ability to enforce data-centric security policies. It should also support encryption and tokenization of compliance-related data to enforce privacy and security and provide an additional layer of protection.

3. Threat Protection and Incident Response

Agencies need visibility into events and tools to quickly gather and analyze information about the event. Malicious attackers are likely to gain access to a network infrastructure through user credentials that get them in through the front door and bypass protective measures. They can also use cloud apps to disseminate malware or advanced persistent threats.

If these events are not detected immediately, it is just a matter of time before an agency is infiltrated with malware. To prevent malicious activity such as data exfiltration due to account takeover, session hijacking or insider activity, continuous monitoring is needed to check on user behavior.

While no network is 100 percent immune from security incidents, a CASB can help to identify and block malware from being uploaded or shared within cloud environments and provide tools for incident response.

4. Compliance and Data Privacy

Government agencies are reluctant to hand over control of sensitive data to third-party cloud service providers. A CASB can help compliance and security professionals ensure cloud apps and services have appropriate security certifications; certain clouds are blocked from receiving specific types of regulated data; and, regulated data that needs to be placed in the cloud is secured per compliance guidelines.

The cloud empowers the federal government to be more agile, collaborative and cost-efficient. CASBs can enable agencies to be more productive and secure by providing critical visibility into, and control of, cloud applications and services.

Has your agency factored CASBs into its cloud migration strategy? If not, it’s time to consider these four fundamental components to ensure an effective cloud security posture.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.