Cloud Access Security Broker (CASB) solutions and Data Loss Prevention (DLP) are both aging technologies and markets, but conceptually are both very relevant for security and risk leaders. The need for controls to prevent the loss of sensitive data is obviously important when you consider the negative outcomes associated with a data breach, as well as the stringent compliance requirements for protecting sensitive data such as proprietary information and personal data.
What is CASB?
CASB solutions first entered the market as organizations initially started to adopt cloud technologies. Initially they were a great conduit to extend on-premises security policies into the cloud. Fast forward to today, traditional CASB policy enforcement points placed between cloud service consumers and providers are often hardcoded, and limited in terms of granularity to effectively interject data access security controls that work. There are many different modes and deployment options, that of course carry with them varied pros and cons.
Out-of-band mode lacks real-time context and features high latency. Inline mode bypasses larger files as they lack the ability to scan them in a timely manner. Both deployment modes are complex, difficult to deploy and manage, and provide a less than ideal end user experience. A modern approach is API-based and event-driven, allowing for granular data access policies to be orchestrated and initiated in a simple way; preventing data overexposure and exfiltration to sensitive company data.
What is DLP?
Well first of all it’s a dinosaur, as a technology it's been around longer than I’ve been alive. As its unambiguous name suggests it is essentially a preventative control that aims to prevent the loss of sensitive information and data.
A lot of traditional approaches to DLP create too many false positives, resulting in alert fatigue for security operations teams. Organizations will benefit from a more targeted, more actionable response – through the business context that is collected and tracked – in preventing the loss of sensitive data. By focusing on the applications that foster collaboration and productivity, organizations will drive the business forward in a secure way; closing the gap on sensitive data from being exposed to unauthorized parties and ultimately exfiltrated.
As mentioned above, while these technologies are in the twilight of their career, the need for controls to prevent data loss are still very much a high priority. Technology moves fast. There is now a need to modernize the approach to both of these solutions in order to be able to address the use cases modern businesses are challenged with.
CASB and DLP: A Marriage of Convenience of the New Power Couple?
Securing sensitive data and files within SaaS applications should be achieved through a combination of data access prevention and detection controls. Modern businesses today demand strong visibility throughout their IT estate for both sanctioned and unsanctioned cloud applications. They need to be able to continually assess and expose cloud application risk as well as remediate risk and support stringent compliance requirements involving access to sensitive data. CASB and DLP are very much hinged on one another, they should be intertwined and not siloed as one of the primary outcomes trying to be achieved through a CASB is to prevent data loss.
The Pillars for a Modern Approach to CASB
Strong visibility throughout all business-critical SaaS applications being utilized by internal and external entities is table stakes. You need to know what’s out there in order to protect it. Beyond users and assets you also need to understand which applications are installed, including all sanctioned and unsanctioned apps. Creating a comprehensive inventory exposes potential data access risks, and enables security teams to monitor all SaaS user and data activities and take appropriate action to remediate threats.
Automation is critical, but there should always be room for manual intervention (not everything should be automated!). Self-service remediation capabilities are needed to take immediate action against known threats as well as automated remediation without agents or inline proxies with the ability to orchestrate and initiate intervention workflow policies that aid in the prevention of sensitive data from becoming overexposed or exfiltrated.
Today, there are a number of industry and regulatory frameworks that organizations of all sizes and types need to comply with (as well as internal organizational policy). The controls and processes required to secure access to sensitive data and files are more stringent now than ever before. SaaS applications are a critical e-gress channel that is often out of the jurisdiction with a lot of traditional technologies in trying to prevent the loss of sensitive data. Organizations need to be able to classify the data, and have the right controls in place to protect sensitive data such as Personally Identifiable Information (PII), Protected Health Information (PHI), and Payment Card Industry (PCI) information.
The Pillars for a Modern Approach to DLP
A completely event-driven solution that leverages metadata to help better understand risk across the SaaS environment is the foundation for a next-gen DLP. You should be able to define enterprise data usage policies, report on policy violations, and implement secure data access controls that automatically prevent data exfiltration. You need to be able to report on internal and external user activity paired with anomaly-detection technology that way Security teams can quickly identify and respond to threats.
Implementing technologies such as natural-language processing (NLP) to scan files stored in cloud applications and analyze the text within to extract key phrases, entities and sentiment for classification. Being able to control who has access to certain data, redact sensitive information, and use a policy engine to create dynamic DLP policies that help remediate threats and satisfy stringent compliance and regulatory requirements.
Every interaction within your SaaS applications should be tracked and monitored, and a baseline of “normal” activity should be established for each individual user. This provides you the context to distinguish between “trusted” business activities and those that pose a risk of data loss, and any threat indicators are automatically detected and blocked. All data access anomalies that are detected should be redirected into SIEM/SOAR technologies and correlated with other detections for a more holistic view of security events.
Access to data should be provided and revoked on-demand. The principle of least privilege should be enforced beyond the identity layer, to better protect sensitive data and files within the SaaS estate. Policies need to be flexible, fully customizable, and triggered by the hundreds of various SaaS event types. This will help enforce consistent and granular data access controls that address an unlimited number of DLP use cases. Security teams need to be able to apply specific policies to groups, domains, and individuals based on risk.
Bringing it All Together with DoControl
DoControl integrates with business-critical SaaS applications via APIs and webhooks to expose every SaaS event user and data activity within the environment. Known and unknown threats are prevented in real-time through data access control policies, and detected high risk anomalies can also be addressed manually via self service tooling. There are no agent installations, inline redirections, or slow API response times that impact the end user experience. DoControl leverages SaaS metadata as sources and extracts the business context of each event to enable granular data access policies to be orchestrated and initiated consistently across disparate application environments.
DoControl exposes the entire API of the SaaS application, allowing for conditions/actions and workflow policies to be set based on any event within the application. DoControl’s low-code no-code platform enables IT and Security teams to create policies from a centralized control point in a simple, and easy way. DoControl is here to partner with organizations pursuing a cloud-first strategy to secure their business-critical applications and the sensitive data that resides within them. Request a demo to see how we are taking a modern approach to CASB and DLP.
Cloud Access Security Broker (CASB): CASB solutions act as an intermediary between end users and cloud hosted services. These tools help identify data and files stored within applications, which end users have access, and allow security teams to implement data protection policies.
Data Loss Prevention (DLP): DLP tools and processes aim to prevent sensitive data from becoming lost, misused, or accessed by unauthorized users. DLP solutions aim to proactively detect data breaches and/or data ex-filtration attempts, and respond by monitoring user activities and blocking sensitive data – both in use, in motion, and at rest.
Software as a Service (SaaS) Governance: SaaS governance solutions are typically a combination of preventative and reactive measures to enable secure access to business-critical applications and data. SaaS governance tools should enforce the principle of least privilege at the SaaS application and data layer to secure sensitive files.
What are some of the common deployment methods for CASB solutions? What are some of the shortcomings? Traditional CASB policy enforcement points placed between cloud service consumers and providers are often hardcoded, and limited in terms of granularity to effectively interject data access security controls that work. Out-of-band mode lacks real-time context as well as high latency. Inline mode bypasses larger files as it lacks the ability to scan them in a timely manner. Both deployment modes are complex, difficult to manage, and lack real-time propagation to detect and block unauthorized access to sensitive data.
How does DLP work in Software as a Service (SaaS) environments? Most traditional DLP solutions do not effectively extend into SaaS/cloud environments, which is why organizations lok to CASB tools better enforce security and compliance policies into the cloud.
This stat comes from the industry report we published earlier this year: The Immense Risk of Unmanaged SaaS Data Access. It’s a great read. We recommend you check it out.