Overview

CASBs act as a security policy enforcement point, allowing organizations to extend their security controls to the cloud. They provide visibility into cloud usage, data protection, and threat protection.

Four Pillars of CASB

  1. Visibility: Identifying all cloud services in use (including 'Shadow IT').
  2. Compliance: Ensuring cloud usage meets regulatory requirements.
  3. Data Security: Implementing DLP and encryption in the cloud.
  4. Threat Protection: Detecting and blocking malicious activity in cloud accounts.

Deployment Modes

  • Proxy (Forward or Reverse): Intercepting traffic in real-time.
  • API-based: Connecting directly to cloud services to monitor activity and data.

Related Terms