A cloud access security broker (CASB) is a cybersecurity solution placed between an organization’s users and cloud service providers to provide visibility, monitoring, threat and data protection, and security policy enforcement when cloud-based services and data are accessed.
Table of Contents
Cloud access security brokers combine a variety of security services and technologies into one platform to give full visibility and control into cloud-based data and services including software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), and platform-as-a-service (PaaS).
Their two key functions are:
CASBs employ enhanced cloud security with a range of capabilities such as authentication, single sign-on, authorization, credential mapping, device profiling, encryption, tokenization, logging, alerting, and malware detection and prevention.
The term “cloud access security broker” was coined by Gartner in 2012 as the firm noted a shift in how organizations stored and secured their data, devices, and apps.
Historically, companies stored applications and data in on-site data centers, but that model proved difficult to scale as data volumes grew, driving the popularity of cloud-based storage and applications. At the same time, companies started adopting remote and hybrid work models, with employees using personal devices to access the network from multiple locations. With so many unmanaged devices accessing data and applications in multiple cloud environments, IT teams lost insight into users, data, devices, and apps.
IT suddenly had a lot more to monitor with less control and access, posing new cloud security risks:
Security professionals originally used different security solutions from different vendors, but this was unwieldy and time-consuming to manage. IT teams had to run numerous tools to get a full picture and some solutions didn’t easily integrate with other platforms.
In response to this complexity, the cloud access security broker was born. It began life as on-premises hardware that functioned as a proxy solution distinct from the rest of the security infrastructure. The role of the CASB was to:
Security professionals now had a single platform to monitor and control cloud-based data, devices, and applications.
Instead of having to find, install, and manage multiple security solutions from different vendors (which might not even work well together), CASBs provide all the necessary monitoring and policy enforcement for a SaaS environment in one platform. Benefits include:
CASBs integrate with existing security infrastructure to track and control cloud-based data and applications through a process of:
When it comes to choosing a cloud access security broker, it's important to consider criteria such as the organization’s current technologies, security needs, and budget. Maybe most importantly, the CASB should satisfy Gartner’s four cornerstones (also called pillars):
There are a few ways to implement CASBs. The inline method sets up the cloud access security broker as a proxy that intercepts traffic, sitting between the device accessing information and the cloud storage location or application being accessed. In this way, it protects data in motion.
Some cloud applications lack a way to redirect traffic to a proxy-based CASB, meaning the full cloud environment may not be visible via the inline method alone. This is where an API-based implementation may be needed, protecting data at rest and providing more complete visibility. Since there isn’t a need to reroute traffic, an API-based CASB can enforce security policies across multiple SaaS and IaaS without affecting user connectivity.
In reality, a combination of both types of CASB is probably best.
Trend Vision One™ Cloud Security enhances cloud visibility, cloud risk management, and operational efficiency while empowering cloud and hybrid cloud security. Centralized dashboards provide real-time risk assessments, exposure management, monitoring, and predicted attack paths. With comprehensive visibility and control, continuous assessment and prioritization, and simplified compliance and cost management, organizations can use Cloud Security to identify and respond to threats quickly both on-premises and in the cloud.
Verizon's data breach report & unsecured cloud storage
Shared Responsibility for Cloud Security
You're One Misconfiguration Away from a Cloud-Based Data Breach
Microsoft Azure Well-Architected Framework
Using Shift-Left to Find Vulnerabilities Before Deployment
AWS Well-Architected
Safe, Secure and Private, Whatever Your Business
National Institute of Standards and Technology (NIST)