Top Banner
webinar march 22 2016 CASBs for IaaS
19

Securing IaaS Applications

Apr 11, 2017

Download

Technology

Bitglass
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Securing IaaS Applications

webinarmarch 22

2016

CASBs for IaaS

Page 2: Securing IaaS Applications

STORYBOARDS

enterprise

end-user devicesvisibility & analytics

data protectionidentity & access control

applicationstorageserversnetwork

the data blind spotcloud app vendors don’t control cloud usage

app vendor

Page 3: Securing IaaS Applications

STORYBOARDS

key security challengesIaaS apps introduce new risks

■ IaaS management consoles and VMs

■ Connected cloud applications (e.g. data visualization tools)

■ Access to connected apps

■ Data-at-rest in the cloud

Page 4: Securing IaaS Applications

STORYBOARDS

security must evolve to

protect data in the cloud

ungoverned access to

corporate data in the cloud

data-at-rest in the cloud

sensitive cloud data on

unmanaged devices

Page 5: Securing IaaS Applications

STORYBOARDS

cloud security must strike the balance between agility and security

data protection for all user devices – managed and unmanaged

fast and flexible agentless deployments

user privacy and mobility

Page 6: Securing IaaS Applications

poll:what are your

biggest challenges in

protecting IaaS apps?

Page 7: Securing IaaS Applications

STORYBOARDS

challenge 1: protecting management consoles

■ AWS, Azure, and Google Cloud management consoles are a gateway

■ Spinning up VMs, killing existing instances, and more

■ Limited native access controls

Page 8: Securing IaaS Applications

STORYBOARDS

challenge 2: secure data at rest

■ Data stores like S3 contain sensitive data

■ PII, PHI, PCI subject to strict regulatory mandates

○ Visibility and control necessary for compliance

■ Enterprises must encrypt or at minimum tokenize sensitive fields

Page 9: Securing IaaS Applications

STORYBOARDS

challenge 3: secure access to connected apps

■ Connected data crunching and visualization apps have full access to data stores

■ Typical use case is

■ Protecting connected apps requires access controls, DLP, more

Page 10: Securing IaaS Applications

poll:what capabilities

are you looking to leverage to protect data?

Page 11: Securing IaaS Applications

STORYBOARDS

critical capabilities for IaaS security

identity

tokenization

access control

audit + visibility

Page 12: Securing IaaS Applications

STORYBOARDS

cloud tokenizationprotect data-at-rest while retaining app functionality

■ Useful for PII and PCI, subject to stringent regulatory mandates

■ Tokenize just those fields that are most sensitive

■ Protects PII as it moves from data stores to connected apps (e.g. S3 to RDS to Tableau)

Page 13: Securing IaaS Applications

STORYBOARDS

audit and visibility

■ User behavior analytics & alerting - identify suspicious behavior

■ Detailed logs required to prove appropriate controls are in place

○ Access control policies

○ Sensitive data at rest

○ Risky external shares

Page 14: Securing IaaS Applications

STORYBOARDS

data-centric protectionaccess controls and real-time cloud dlp

■ Outright blocking forces users to work around IT

■ Granular context-based controls extend access while applying appropriate protections

■ DLP protects data at access and after download

Page 15: Securing IaaS Applications

STORYBOARDS

identity

■ Cloud app identity management should maintain the best practices of on-prem identity

■ Cross-app visibility over suspicious logins can help to prevent a breach

Page 16: Securing IaaS Applications

STORYBOARDS

casb securitya data-centric approach

a new security architecture for the new data reality

■ tokenize data as it moves between IaaS apps

■ apply granular access controls

■ protect data at download with cloud DLP

■ detailed logging for compliance

Page 17: Securing IaaS Applications

our mission

total data

protectionoutside the

firewall

17

#1 CASB real-time data protection

founded 2013 tier 1 funding

award-winning

tech leader3 patents,3 pending

Page 18: Securing IaaS Applications

resources:more info about cloud security

■ technical overview: bitglass for aws

■ solution brief: bitglass cloud security

Page 19: Securing IaaS Applications

STORYBOARDS

bitglass.com@bitglass