Abstract

Data breaches have gained widespread attention as businesses of all sizes become increasingly reliant on digital data, cloud computing, and workforce mobility. Cloud applications reduce costs and improve productivity. But it is equally important to monitor and protect data in a cloud environment. These are the questions that arise how to deal with lost visibility, unmanaged devices, and careless users. This paper explains how cloud access security brokers (CASBs) extend security to cloud applications, awareness for data breaches, providing visibility, threat protection, access control, and compliance. The key characteristics and benefits of cloud access security brokers (CASBs) are visibility, threat protection, access control and compliance are key components of this paper to extend data loss prevention (DLP). There is need to create the architecture of CABs having feature to deal with all types of Data Breaches. The result of the study provided a secure architecture to fulfill the security needs and tracks the complex connections between enterprise infrastructure and its cloud service provider.

Highlights

  • Cloud Access Security Broker (CASB) act as a gatekeeper, allowing the organizations to extend the reach of their security policies beyond their own infrastructure

  • CASBs differ in how many cloud applications they can access via APIs

  • A CASB deployed in proxy mode is "inline"; network traffic between users and cloud applications flows through the CASB proxy

Read more

Summary

INTRODUCTION

Cloud Access Security Broker (CASB) act as a gatekeeper, allowing the organizations to extend the reach of their security policies beyond their own infrastructure. A CASB can extend data loss prevention (DLP), network access control (NAC), and other security technologies to cloud environments They can ensure enforcement of data sharing and compliance policies. A CASB deployed in proxy mode is "inline"; network traffic between users and cloud applications flows through the CASB proxy This is achieved in one of two ways: 1. The CASB can ensure that files being uploaded are encrypted, and can block the download of sensitive files to noncompliant devices It can generate alerts in real time, allowing security teams to react immediately to security incidents, policy violations, and anomalous behaviors. Some CASBs offer a hybrid mode that combines API mode and proxy mode This allows the CASB to support a wide range of use cases with visibility, policy enforcement, and ways to deal with unmanaged devices

Visibility
Identity
Access Control
DATA PROTECTION
RECOMMENDATIONS FOR SELECTING THE RIGHT CLOUD ACCESS SECURITY BROKER
Size of the Applications
Required Security Level
Heuristics for Threat Protection
Directories and SSO solutions
Data Loss Prevention
Encryption and IRM
ENHANCING SECURITY WITH CASBS
TEST RESULTS
Recovery of Data Even If Some Number of Servers Are Damaged
Results Concluded from Different Algorithms
VIII. CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call