With organizations increasingly turning towards cloud-based services, the need for cloud security has never been more important. When the use of cloud applications goes beyond the view of IT, organizational data is no longer bound by the governance, risk, and compliance policies of the organization. Companies have to find a solution to enforce strict security policies and protect sensitive data when it is being shared in cloud applications. Cloud access security broker (CASB) solutions can help organizations gain visibility and control over the cloud applications that their employees access.
Whether deployed in the cloud or on premises, CASBs provide visibility into the use of cloud applications, control access to cloud applications and data, help meet compliance regulations, prevent data loss, detect and remediate threats with UEBA technology, and more. With the help of a CASB solution, employees can use cloud services without risking the security of the organization. Authentication, authorization, encryption, single sign-on, tokenization, and device profiling are some examples of security policies that can be implemented using CASBs.
CASBs can be deployed in two modes: proxy-based and API-based. This article explains the proxy-based deployment mode of CASBs.
Proxy-based deployment is often called inline deployment as it sits between the user and SaaS application traffic. This deployment mode inspects content to and from the cloud and enforces real-time security policies to control access. It can block user traffic to cloud applications, stop a file upload to a SaaS application, block a file download to an unmanaged device, and more. Because of the various functionalities and coverage provided, this deployment mode is often used in various CASB tools.
Let's take a look at how a proxy-based CASB monitors and exercises control over cloud traffic. When users try to access a cloud application, they initiate an access request. Before the request is addressed by the cloud service provider, the traffic is first directed to the proxy. This proxy, i.e., CASB tool, knows the users' requirements and details. At this point, the CASB tool can exercise control and add security-relevant functionality, such as blocking the users' access or preventing them from performing certain actions.
Proxy-based CASB tools use two different modes of proxy deployment: forward proxy and reverse proxy.
In this mode, the proxy sits closer to the user. The user's device or network routes the traffic to the proxy. The forward proxy uses SSL man-in-the middle techniques to route the user's traffic to CASB proxy. This traffic route is initiated through:
A forward proxy CASB implemented by configuring PAC files or by deploying agents cannot monitor unmanaged devices. On the other hand, a forward proxy CASB implemented by configuring the customer's DNS can monitor both managed and unmanaged devices.
A forward proxy CASB deployment can:
Normally called the last mile technology, in this mode, the proxy sits closer to the cloud service providers. The cloud service or resource routes the traffic to the CASB proxy.
Being more seamless than forward proxy technology, it can integrate with Identity as a Service (IDaaS) used by the organization, authenticate users, and reroute traffic from SaaS applications to users.
Also, unlike forward proxy, you will not have to worry about security concerns related to SSL man-in-the-middle techniques. You also needn't deploy any agents to reroute the traffic.
However, reverse proxy technology does not offer visibility into shadow IT.
A reverse proxy CASB deployment can:
It is imperative to choose the CASB solution that is best-suited for your organization's requirements. Each approach has its pros and cons. A preferable option would be a hybrid approach: a blend of API and modes of proxy deployment. A hybrid solution can provide more flexibility, access control, visibility, and coverage of use cases.
Zoho Corporation Pvt. Ltd. All rights reserved.