Abstract
Data breaches have gained widespread attention as businesses of all sizes become increasingly reliant on digital data, cloud computing, and workforce mobility. Cloud applications reduce costs and improve productivity. But it is equally important to monitor and protect data in a cloud environment. These are the questions that arise how to deal with lost visibility, unmanaged devices, and careless users. This paper explains how cloud access security brokers (CASBs) extend security to cloud applications, awareness for data breaches, providing visibility, threat protection, access control, and compliance. The key characteristics and benefits of cloud access security brokers (CASBs) are visibility, threat protection, access control and compliance are key components of this paper to extend data loss prevention (DLP). There is need to create the architecture of CABs having feature to deal with all types of Data Breaches. The result of the study provided a secure architecture to fulfill the security needs and tracks the complex connections between enterprise infrastructure and its cloud service provider.
Highlights
Cloud Access Security Broker (CASB) act as a gatekeeper, allowing the organizations to extend the reach of their security policies beyond their own infrastructure
CASBs differ in how many cloud applications they can access via APIs
A CASB deployed in proxy mode is "inline"; network traffic between users and cloud applications flows through the CASB proxy
Summary
Cloud Access Security Broker (CASB) act as a gatekeeper, allowing the organizations to extend the reach of their security policies beyond their own infrastructure. A CASB can extend data loss prevention (DLP), network access control (NAC), and other security technologies to cloud environments They can ensure enforcement of data sharing and compliance policies. A CASB deployed in proxy mode is "inline"; network traffic between users and cloud applications flows through the CASB proxy This is achieved in one of two ways: 1. The CASB can ensure that files being uploaded are encrypted, and can block the download of sensitive files to noncompliant devices It can generate alerts in real time, allowing security teams to react immediately to security incidents, policy violations, and anomalous behaviors. Some CASBs offer a hybrid mode that combines API mode and proxy mode This allows the CASB to support a wide range of use cases with visibility, policy enforcement, and ways to deal with unmanaged devices
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have