Microsoft CAS - Top 20 USe Cases - Sept2019 PDF
Microsoft CAS - Top 20 USe Cases - Sept2019 PDF
Top 20
use cases
for CASBs
Contents
03 / 04 / 05 /
Introduction A uniquely integrated CASB Architectural considerations
06 / 09 / 12 /
Discover Shadow IT Protect your information Detect and protect
in your organization in the cloud against cyberthreats
15 / 17 / 18 /
Assess and protect your Getting started Resources
IaaS environment
2
Introduction
Moving to the cloud requires a new Cloud Access Security Brokers (CASBs) are cloud-based security solutions that
approach to security. As you enable provide a new layer of security to enable oversight and control of activities and
information across public and custom cloud SaaS apps and IaaS services. CASBs
employees to work from virtually
are broken down into four key capability areas including Shadow IT Discovery,
anywhere and from any device of their Information Protection, Threat Protection and Compliance, and provide a central
choice, your organizational access control plane for governance and policy enforcement across all of your cloud apps
perimeters and boundaries change. Your and services.
new security controls need to adapt to
this dynamic environment and be able to In this guide we share the top 20 use cases for CASBs that we recommend as a
baseline for a successful implementation to improve your cloud security.
quickly respond to the constantly evolving
threat landscape.
The use cases can be leveraged as a starting point during a proof of concept,
or as you’re getting ready to deploy your CASB solution and want to prioritize
your deployment.
3
A uniquely integrated Cloud Access Security Broker
Microsoft Cloud App Security (MCAS) is a Our unique approach ensures that we deliver a powerful security solution that
multimode Cloud Access Security Broker. enables a higher level of security and compliance for heterogeneous cloud
environments— across all your cloud apps and services.
It provides rich visibility, control over
data travel, and sophisticated analytics to
One example is how Microsoft Cloud App Security delivers the only native Identity
identify and combat cyberthreats across and Access Management (IAM) + CASB solution in the market, by integrating with
all your cloud services. Azure Active Directory (AAD) conditional access. This enables selective routing via
our reverse proxy infrastructure, and thereby minimizes end user impact, while
MCAS is designed with security professionals ensuring the highest level of control under risky conditions. AAD conditional access
in mind. It is built as a state-of-the-art concept allows you to specify when traffic is routed via the reverse proxy using conditions
of native integrations to provide a simple such as device state, user, cloud app, location, and network, allowing for an
deployment experience, centralized management, unprecedented balance of cloud security and end user productivity.
and innovative automation capabilities—while
still allowing you to integrate non-Microsoft
solutions from your existing environment such as
a SIEM or Secure Web Gateway.
Endpoint Detection & Response Security Workflow automation
4
Architectural considerations
When implementing the various CASB use Integrations with other enterprise solutions are important for an effective and
cases that are outlined in this document, sustainable management of the CASB solution and the organization’s processes
and workflows. Microsoft Cloud App Security supports all of the implementation
organizations need to ensure a seamless
scenarios listed above and integrates with Microsoft native solutions, as well other
integration with their existing architecture market leading solutions in the previously listed categories.
and software solutions.
5
Addressing Shadow IT in your organization
A CASB enables you to identify which cloud apps and Microsoft’s CASB can help you assess the risk and compliance of any
services are being used across your organization. Whether discovered cloud app or service against more than 70 risk factors,
these cloud services are being accessed on or beyond the including general security — for example whether the app captures
corporate network, managed or unmanaged by IT—all data is an admin audit trail — regulatory compliance such as ISO 27018
captured. The discovery report includes all relevant information and legal factors including GDPR. These allow your IT team to
based on users, IP addresses and machines. make informed decisions about which apps should be supported
in the organization, and which require additional governance
Deployment mode: Log collection or need to be blocked entirely.
Native integrations: Microsoft Defender Advanced
Threat Protection, Azure Sentinel Deployment mode: Log collection
Other integrations: SIEM, Firewall, Secure Web Gateway Native integrations: Microsoft Defender Advanced
Threat Protection, Azure Sentinel
Technical implementation Other integrations: SIEM, Firewall, Secure Web Gateway
Technical implementation
6
Addressing Shadow IT in your organization
7
Addressing Shadow IT in your organization
8
Protect your information in the cloud
Technical implementation
9
Protect your information in the cloud
10
Protect your information in the cloud
Technical implementation
11
Detect and protect against cyberthreats
Technical implementation
12
Detect and protect against cyberthreats
Technical implementation
13
Detect and protect against cyberthreats
Technical implementation
14
Assess and protect your IaaS environment
A CASB’s Cloud Security Posture Management capabilities enable Microsoft Cloud App Security captures and analyzes activity
you to conduct a security configuration assessment across your within the IaaS platform, including custom applications.
IaaS environments. It enables you identify key data leak sources These activities are analyzed with a highly sophisticated UEBA
such as publicly exposed AWS S3 buckets and provides specific engine to detect anomalous usage associated with compromised
recommendations to improve your overall security configuration. accounts, insiders, and privileged users. It will alert you to events
Common suggestions include enabling multi-factor authentication such as an unusual deletion of virtual machines, indicating
(MFA) to accounts with owner permissions on your IaaS subscription, an attempt to manipulate your environment in near real-time
applying disk encryption, or alerting you to a lack of endpoint to ensure that you quickly remediate any impacts.
protection on your virtual machines.
Deployment mode: API Connector, Reverse Proxy
Deployment mode: API Connector Native integrations: Azure Security Center,
Native integrations: Azure Security Center Azure Advanced Threat Protection
15
Assess and protect your IaaS environment
A CASB can help you monitor and act on various activities across
these apps in your organization in real-time, to ensure that
you have awareness and control of the location, and actions
taken on sensitive resources. Furthermore, by leveraging
integrations with Azure Active Directory, Microsoft Cloud
App Security enables you to achieve this deep visibility and parity
across your cloud apps, custom apps, and on-premise apps.
Technical implementation
16
Getting started with your proof of
concept and prioritizing your deployment
We understand that many organizations We’ve created a prioritized list of the use cases in the document that will allow you
need to prioritize their deployment when to improve your overall cloud security posture within a few hours and with very
little configuration, due to a seamless UI-based deployment experience and many
implementing a Cloud Access Security Broker.
out-of-the-box capabilities of Microsoft Cloud App Security.
2. Detect threats from users 6. Discover all cloud apps and services
inside your organization used in your organization
17
Resources
Visit our website
aka.ms/mcas
Technical documentation
aka.ms/mcastech
© 2019 Microsoft Corporation. All rights reserved. This material is provided for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESSED OR IMPLIED. 18