How does Cloud Access Security Broker (CASB) fit into the SASE paradigm?

Posted on December 8, 2020

Gartner included the Cloud Access Security Broker (CASB) technology as a core element in its Secure Access Service Edge (SASE) paradigm. This makes sense because CASB is most effectively deployed as a proxy that inspects application traffic, thus serving one of SASE’s fundamental purposes in the process. It’s also timely because of the underlying changes in work, computing and security that are driving SASE adoption.
These include the need for local internet access breakouts to support exponentially growing SaaS traffic. A comprehensive CASB service provides one of the only effective capabilities to secure this traffic. However, it can be difficult for SASE adopters to monitor and effectively respond to CASB-related security alerts. Unless they can detect malicious activity quickly and respond decisively, damages will rapidly mount. Thus, a managed approach to CASB is a more suitable, effective, and economical approach for many organizations that don’t have the resources to build an in-house 24/7 security monitoring capability.

SASE and CASB: How they work together

It’s worth taking a moment to review some basics about SASE and CASB, pronounced “Sassy and Casbee,” which sounds like the title of a children’s book. Far from child’s play, Gartner coined the SASE acronym last year to describe a confluence of technologies the analysts felt were necessary for securing access at the network’s edge. More of a construct than a product at this point, SASE comprises a design strategy for security and networking architecture. The SASE stack creates a high performing and easy to deploy, unified service that offers users and edge devices a variety of essential network and security-related capabilities, e.g. Software-Defined Wide Area Networks (SD-WANs), Web Application Firewalls (WAFS), Zero Trust Network Access (ZTNA), Virtual Private Networks (VPNs) and CASB, among others.

What is CASB?

CASBs are software applications that sit in between end users and cloud resources. As their name suggests, they broker secure access to the cloud. Thus, CASBs perform access control, Software-as-a-Service (SaaS) security policy enforcement, monitor user activity and so forth. IT leaders use CASB for secure access to SaaS applications like Cloud ERP software, Salesforce.com, Microsoft Office 365, or any number of other mainstream cloud apps that handle intellectual property or sensitive customer or patient data.

Forces driving SASE and CASB adoption

Interest in SASE and CASB is on the rise, driven by the evolution of consumer and corporate technology, coupled with significant market forces. People and devices are increasingly moving away from the core data center and toward “The Edge” of the Internet and corporate networks. The growth is striking, with the global edge computing market set to reach $43 billion 2027 while growing at a rate of 37.4% per year. SaaS use is growing in parallel. According to Deloitte research, 94% of technical professionals in small and large organizations use cloud SaaS. The SaaS market itself is growing at the annual rate of 18%.
This year, we have also witnessed a stunning but entirely necessary shift to mass remote work. The COVID-19 pandemic led to many people working from home on personal devices—at the edge. What’s also remarkable is that at least 16% (and likely more) of companies expect to continue with work-from-home policies after the pandemic has subsided. This looks to be a permanent shift of information workers away from the core and to the edge, and this too calls for edge network and cloud security technologies.

Security risks of remote work and edge computing

The growth of the edge is exciting, but it comes with increased risk exposure. Each force moving computing out to the edge amplifies existing vulnerabilities. The following is a list of some of the highest-impact threats affecting users in each area:

  • Edge compute—Devices at the edge tend to be more vulnerable to attacks than their counterparts inside the data center. This is partly a matter of architecture. They’re sitting outside of multi-layered defenses. It’s also about incomplete endpoint protection and the poor security design of Internet of Things (IoT) devices. Data breach is another heightened threat at the edge, as is the takeover of edge devices as a pathway for hackers to enter the core of the network.
  • SaaS—SaaS solutions tend to contain a great deal of sensitive data, such as customers’ personally identifiable information (PII) and financial records. Thus, a data breach of a SaaS solution can be a major security event. Furthermore, if hackers are able to compromise SaaS accounts, they can engage in phishing attacks that truly appear as if they are coming from inside the organization. Alternatively, if hackers are inside a SaaS application, they can distribute malware back out to other users’ endpoints.
  • Remote work—When people work remotely, especially on personal devices and home broadband connections, they are vulnerable to phishing attacks. Hackers can more easily impersonate coworkers when everyone’s at home. And, once a hacker has taken over a remote worker’s device, he or she can penetrate the network, generally more easily than has been possible before. Remote workers may also insecurely share confidential information outside the network, perhaps by accident.

How CASB, within SASE, mitigates these risks

A CASB solution is able to mitigate the risks to the cloud at the edge. CASB solutions come in a range of architectural designs and feature depths, but most are able to provide threat protection, data protection, identity policy enforcement and visibility into cloud activities. Collectively, these capabilities enable a robust SASE security stack for the cloud. With SaaS applications, for example, the CASB prevents data leakage and intrusions by acting as an application security proxy between the cloud app and the user.
A CASB solution should also conduct user behavior analytics. This is useful for detecting malicious activities by attackers as well as risky employee behaviors. CASB offerings even provide discovery of “Shadow IT,” those SaaS services utilized by the business without IT’s knowledge. These accounts can be a major source of risk exposure.

Why managed CASB makes sense for many organizations

Some organizations may find value in a managed CASB option. Needs will vary greatly by company, of course, but in certain cases, the security operations team may want someone outside the department to handle the rigor and nuances of CASB management. One issue is the role of SASE and its CASB component in the context of the bigger SD-WAN picture. The main goal of SASE, after all, is to enable high-performing, reliable and flexible network connectivity across the enterprise.
Any security countermeasure, such as CASB, should be viewed through the perspectives of IT, network and security operations. Matters of people, budget and agility are therefore relevant. If doing CASB in-house inhibits SecOps or NetOps, or strains existing human resources, then a managed CASB becomes a requirement. SASE, in general, requires personnel in order to be an effective closed-loop process of both threat detection and response.
A managed CASB service enables an organization to strike a balance between SD-WAN performance, cost, security and agility. Managers get visibility into what their sensitive data is doing in their cloud apps—without using up their teams’ time. They can similarly enact proactive security controls on demand. Things can move a lot faster this way. Organizations can accelerate their cloud and SaaS strategies, securely rolling out new remote work and digital transformation programs

SASE and CASB from Masergy

SASE is rapidly gaining traction as the dominant edge security and network operating paradigm. CASB has a critical role to play in the resulting SASE technology stack. With an effective CASB in place, organizations can protect their growing list of SaaS applications, along with users and other systems that connect with them.
Masergy offers a complete managed SASE solution which includes CASB technology from Bitglass, a “Leader” in the Gartner Magic Quadrant for CASBs. Bitglass, as the integrated CASB part of the Masergy SASE stack, provides protection for any SaaS app, any user and any device. Users derive value from its rapid deployment and scalability for ever-growing SaaS environments. Sold as a standalone solution or as part of a SASE or SD-WAN solution package, CASB is typically paired with Masergy’s managed Security Operations Center (SOC) offering, an innovation that liberates IT, security teams for more valuable work.

Learn more about Masergy’s CASB capability and SASE offering.

Read more articles in the SASE Straight Talk series:

Engage in the SASE conversation online. Don’t forget to follow us on Twitter!

Jay Barbour

Jay brings more than 17 years of security experience to Masergy as Director of Security Product Management. He is responsible for the product vision of Masergy’s managed security services and leads the product team on execution. Previously, Jay was Director of Security Advisory Services for BlackBerry where he advised large enterprises and government agencies on mobile security. Other positions he has held include Vice President of Marketing at Intrusion, and Vice President of Product Management at Scansafe (now Cisco). Jay holds a degree in Engineering Physics from Queen’s University, Canada, an MBA from INSEAD, France, and is a Certified Information Systems Security Professional (CISSP).

Related Content