Overview
CASBs act as a security policy enforcement point, allowing organizations to extend their security controls to the cloud. They provide visibility into cloud usage, data protection, and threat protection.
Four Pillars of CASB
- Visibility: Identifying all cloud services in use (including 'Shadow IT').
- Compliance: Ensuring cloud usage meets regulatory requirements.
- Data Security: Implementing DLP and encryption in the cloud.
- Threat Protection: Detecting and blocking malicious activity in cloud accounts.
Deployment Modes
- Proxy (Forward or Reverse): Intercepting traffic in real-time.
- API-based: Connecting directly to cloud services to monitor activity and data.