Tel: (+61) 422 933 319

Email: [email protected]

Client Access Security Broker (casb)

CSF framework: 1. Identify; 2. Protect; 3. Detect; 4. Respond. Cyber Maturity Level:⭐️⭐️⭐️

A Client Access Security Broker is a an important component in an enterprise organisation. A Client Access Security Broker or CASB for short provides: 1. Identify; 2. Protection; 3. Detection capabilities for the organisation on the NIST CSF framework model. How it does this is by inspecting traffic that is being sent to and from the Internet, either just the source and destination or through deeper inspection of the contents of the data being transmitted between source and target.

A CASB can be used to monitor or to enforce corporate policies, for example what services can connect with what services (Between On-premise and cloud), protect an organisation from Shadow IT – this is business units purchasing their won SaaS solutions potentially exposing the organisation to risk of Data loss etc. A CASB can often also be integrated with a Data Loss Prevention Solution (DLP) to inspect data for compliance with the Corporate Data Use policies.

Gartner defines the cloud access security broker (CASB) market as products and services that address security gaps in an organization’s use of cloud services. This technology is the result of the need to secure cloud services which are being adopted at a significantly increased rate and access to them from users both within and outside the traditional enterprise perimeter, plus growing direct cloud-to-cloud access. They deliver differentiated, cloud-specific capabilities generally not available as features in other security controls such as web application firewalls (WAFs), secure web gateways (SWGs) and enterprise firewalls. CASB vendors understand that for cloud services the protection target is different: it’s still your data but processed and stored in systems that belong to someone else. CASBs provide a central location for policy and governance concurrently across multiple cloud services for both users and devices and granular visibility into and control over user activities and sensitive data.



One response

Leave a Reply

Your email address will not be published. Required fields are marked *


Forgotten Password?