You are on page 1of 18

Making SaaS Safe

7 Requirements for Securing Cloud Applications and Data


Introduction: The Reality of SaaS in the Enterprise
A D VA N TA G E S CHALLENGES

Ease of use Rapid Anywhere, Automatic Protecting Threats to Breaches of


and cost- deployment anytime access upgrades and against data loss data privacy confidentiality
effectiveness maintenance and leakage

As SaaS-first strategies become more common- When using SaaS applications without the knowl- The reality is that even when SaaS applications are
place, IT and security leaders must address the edge or approval of IT—practicing so-called “shadow vetted and sanctioned by the IT department, securi-
unique challenges of securing software-as-a-service IT”—employees often do so without the benefit of ty gaps can remain, leading to data leaks, regulatory
(SaaS) usage and corporate data stored within cloud security and governance best practices, controls, noncompliance, malware propagation, and more.
applications. The existing on-premises security stack and oversight. That could leave sensitive data at risk
Read on to learn about seven requirements for SaaS
protecting the enterprise is no longer sufficient of inadvertent public exposure or theft by cyber-
security and how they can help you protect your
when users take business-critical and/or sensitive criminals and expose the enterprise to numerous
employees, data, and company from cyberthreats
data with them into the cloud. other security risks.
when using SaaS applications.

1 Prisma by Palo Alto Networks | Making SaaS Safe: 7 Requirements for Securing Cloud Applications and Data
1 Discover Employee Use of Unvetted SaaS Applications

Scenario Why You Should Care Security Implication Best Practice


One of your company’s managers Employees can try out and self- Use of unvetted SaaS applications can As SaaS adoption expands exponen-
subscribes to a new SaaS-based provision SaaS applications in mere introduce significant blind spots for tially, manual discovery of SaaS usage
project management tool for the team minutes without needing to contact IT your security team, including data loss in the enterprise becomes rapidly
working on a confidential new prod- or request approval from the procure- and leakage, misconfigured or missing untenable. Instead, to quickly identify
uct line. The manager begins storing ment department. This gives users security controls, and noncompliance risk—and extend appropriate security
sensitive data that includes intellectual unprecedented control of software with privacy and industry regulations. controls—your organization needs
property in the application. selection, administration, and usage— an automated way to continuously
often without the IT department’s discover all SaaS applications in use
approval or oversight. by employees.

2 Prisma by Palo Alto Networks | Making SaaS Safe: 7 Requirements for Securing Cloud Applications and Data
1 Discover Employee Use of Unvetted SaaS Applications: Important Questions

What’s a CASB,
How much visibility does your team have into the use of and How Can It Help?
unsanctioned SaaS applications?
Coined by Gartner, the term “cloud
access security broker” (CASB) refers
to technology that delivers granular
visibility and precise control over the
enterprise usage of cloud applications
as well as governance and protection
Are you relying on manual review of log data to uncover for cloud-based data. Unlike other se-
usage of unsanctioned SaaS applications? curity tools your enterprise may use,
CASBs offer cloud-specific capabilities
that address security gaps in your
organization’s use of cloud services,
including identifying shadow IT risk
through visibility into application
usage across your network.
Is sensitive data stored in unsanctioned SaaS applications,
and if so, do the applications have appropriate security controls?

3 Prisma by Palo Alto Networks | Making SaaS Safe: 7 Requirements for Securing Cloud Applications and Data
2 Protect Sensitive Data in SaaS Applications

Scenario Why You Should Care Security Implication Best Practice


An employee inadvertently stores Without proper controls, SaaS users Many organizations aren’t aware that Implement advanced data loss pre-
sensitive data in a publicly shared can leak sensitive or confidential security is a shared responsibility vention (DLP) capabilities using an
folder while using a sanctioned SaaS information accidently or maliciously. with the cloud service or application API-based approach to scan for sen-
application. One simple mistake, such as a mis- provider. Although the cloud service sitive information stored within SaaS
typed email address, can lead to data provider secures the components of applications. Compared to in-line, an
ending up in the wrong hands. the cloud infrastructure, it’s the SaaS API-based approach provides deep-
customer’s responsibility to protect er context and allows for automatic
users and data. remediation of data-risk violations.

4 Prisma by Palo Alto Networks | Making SaaS Safe: 7 Requirements for Securing Cloud Applications and Data
2 Protect Sensitive Data in SaaS Applications: Important Questions

How the Right


Have you educated your IT and security teams on the Shared CASB Can Help
Responsibility Model for security in the cloud?
Choose an offering that can scan and
classify all data stored within SaaS
applications. Some CASB vendors
take advantage of supervised machine
learning algorithms to categorize data
and identify files containing sensitive
Do you have insight into which SaaS applications have sensitive
information. Once the information
or company confidential data stored in them? is discovered, the CASB should
check the information assets for any
incidents or exposures as well as com-
pliance with regulations or corporate
policies.

Can you control the types of data that employees are uploading,
storing, and sharing in the cloud?

5 Prisma by Palo Alto Networks | Making SaaS Safe: 7 Requirements for Securing Cloud Applications and Data
3 Secure Your Weakest Link—SaaS Users

Scenario Why You Should Care Security Implication Best Practice


A cybercriminal uses a phishing email Cybercriminals focus on compro- Just as it’s your responsibility to Start with user training and interactive
to steal the credentials of an employ- mising user credentials because it’s protect your data in SaaS applications, coaching to identify and help change
ee with administrative access to a often easier than trying other attack you also need to protect your com- risky behavior. Then, give your secu-
SaaS application where sensitive data methods to get access to your cloud pany’s users. Managing access rights rity team tools to help them monitor
is stored. applications and data. With the right to numerous SaaS applications is and govern SaaS application permis-
credentials in hand, an attacker can complex, leading to mistakes such as sions. Look for a product with robust
use them to exfiltrate data for mali- employees being given higher access access controls, including:
cious purposes or sale on the black rights than they need.
• Multi-factor authentication (MFA)
market.
to strengthen access control
• Role-based access control
• Protection for administrative accounts
• User access monitoring that can
detect malicious or risky behavior

6 Prisma by Palo Alto Networks | Making SaaS Safe: 7 Requirements for Securing Cloud Applications and Data
3 Secure Your Weakest Link—SaaS Users: Important Questions

Are you following least-privileged access best practices, How the Right
whereby users only have access to the functionality and CASB Can Help
data required for their roles? Look for a CASB with simple-to-man-
age policies that let you control access
to SaaS applications at a granular
level, defining which applications are
allowed as well as the acceptable
behaviors permitted within each one.
Do you require strong authentication for privileged activities? With the right CASB, you can create
security policies that establish access
and usage controls at the network,
device, and user levels. Finally, the
CASB should alert you when there
are anomalous activities that could
indicate stolen credentials or malicious
intent.

Can you monitor user activity and alert on suspicious behavior?

7 Prisma by Palo Alto Networks | Making SaaS Safe: 7 Requirements for Securing Cloud Applications and Data
4 Enforce Compliance Requirements in the Cloud

Scenario Why You Should Care Security Implication Best Practice


A member of your human resourc- Personal health information (PHI), To maintain compliance with regula- Create and enforce a consistent,
es staff uploads employee data to including health insurance account tions, enterprises must know where granular security policy for compliance
a shared folder within a sanctioned numbers, is regulated by the Health compliance-related data is being used, that covers all SaaS applications used
SaaS application. The data happens Insurance Portability and Accountabil- stored, and potentially shared. With- by your enterprise. This includes auto-
to include the health plan account ity Act of 1996 (HIPAA). Inappropriate out deep visibility into SaaS usage, mating compliance and reporting for
number for each employee. storage or sharing of this type of your security and governance teams all relevant regulatory requirements
content could mean your company is can’t enforce or prove compliance across your SaaS applications. Ideally,
noncompliant with the regulation and with mandatory regulations. you should have the compliance
subject to fines. report ready at the push of a button
when auditors request it.

8 Prisma by Palo Alto Networks | Making SaaS Safe: 7 Requirements for Securing Cloud Applications and Data
4 Enforce Compliance Requirements in the Cloud: Important Questions

How the Right


Do your sanctioned SaaS applications have the appropriate,
CASB Can Help
relevant, or required security certifications for compliance?
Using advanced DLP capabilities, the
right CASB lets you set and enforce
granular policies to identify, monitor,
and automatically protect regulated
data. Look for a CASB that offers
preconfigured policy and report-
How do you currently protect compliance-related content
ing templates to help you maintain
in the cloud? compliance with common industry
standards and regulations.

Do you know whether users are uploading data that includes


personally identifiable information (PII), payment card numbers,
PHI, or other sensitive information to SaaS applications?

9 Prisma by Palo Alto Networks | Making SaaS Safe: 7 Requirements for Securing Cloud Applications and Data
5 Reduce the Risk from Unmanaged Devices

Scenario Why You Should Care Security Implication Best Practice


An employee downloads data from Unmanaged devices create blind spots Many SaaS applications don’t Deploy a security product that dif-
a sanctioned SaaS application onto a and increase security risks, including have granular security controls ferentiates access between managed
personal, unmanaged device. The data everything from the introduction of that can recognize managed (cor- and unmanaged devices to protect
is then stolen and sold to a competitor. malware to data leakage. porate-owned) versus unmanaged against the increased security risks
devices and enforce access rules inherent with personal devices. For
accordingly. Although some recognize instance, you could allow downloads
and block unmanaged devices, they to managed devices but block them
don’t have the ability to selectively for unmanaged ones while enabling
allow access to certain functionality. access to core functionality.
Completely blocking users from using
their personal devices to access the
SaaS applications and data they need
to do their jobs effectively is not a
viable option.

10 Prisma by Palo Alto Networks | Making SaaS Safe: 7 Requirements for Securing Cloud Applications and Data
5 Reduce the Risk from Unmanaged Devices: Important Questions

How the Right


Do you enforce MFA for logins from unknown or unmanaged
CASB Can Help
devices?
When deployed using an in-line
approach, some CASBs offer both a
forward proxy (forwarding cloud traffic
to a security appliance or service) and
a reverse proxy (rerouting traffic to an
in-line security appliance or service)
Have you created separate access policies for managed and
mode. With reverse proxy capabilities,
unmanaged devices? you can use single sign-on to seam-
lessly reroute users on unmanaged
devices to the in-line security gateway
to enforce policies. This functionality
lets you secure access from any un-
managed or personal device that uses
an internet browser to access SaaS
Do you have full visibility and precise control of the content that applications.
users are uploading to and downloading from unmanaged devices?

11 Prisma by Palo Alto Networks | Making SaaS Safe: 7 Requirements for Securing Cloud Applications and Data
6 Control Data Sharing from SaaS Applications

Scenario Why You Should Care Security Implication Best Practice


One of your sales managers stores Because many SaaS applications make Without deep visibility and granular Use an in-line approach to gain visi-
customer information, some of which it easy for users to collaborate and control over data-sharing activities in bility into sensitive data flowing into
is confidential, in a SaaS application. share, they become highly susceptible SaaS applications, the risks of inadver- high-risk, unsanctioned applications.
To collaborate with a third-party to employees oversharing or inadver- tent or malicious data leakage grow as Create and enforce DLP policies that
company on sales efforts, he shares tently sharing sensitive content. The users share sensitive data, sometimes control data-sharing activities in the
the data by sending the third party a recipients of shared data may reshare to untrusted users or applications. SaaS applications employees use.
link to the file containing the customer the sensitive content, which further
data. increases the risk of data loss.

12 Prisma by Palo Alto Networks | Making SaaS Safe: 7 Requirements for Securing Cloud Applications and Data
6 Control Data Sharing from SaaS Applications: Important Questions

How the Right


Can you track data-sharing activity within and between the
CASB Can Help
SaaS applications employees use?
A robust CASB with integrated DLP
capabilities can enforce granular,
context-aware policies based on
keywords, file characteristics, and
other content patterns. The CASB can
Can you block or limit external data sharing based on the user, also quarantine users and data should
group or department, role, data type, application, or other violations occur. Complementing an
characteristics? in-line approach, a CASB using API
mode can inspect existing data stored
in the cloud as well as remediate
existing DLP violations and threats.

What actions are taken when a violation of your company


data-sharing policy is detected?

13 Prisma by Palo Alto Networks | Making SaaS Safe: 7 Requirements for Securing Cloud Applications and Data
7 Stop SaaS-Borne Malware Threats

Scenario Why You Should Care Security Implication Best Practice


A file containing malware is uploaded SaaS applications are particularly SaaS applications are often the first Implement threat prevention tech-
to a shared folder on one your enter- vulnerable to malware threats, making insertion points for malware and the nology that works with your SaaS
prise’s sanctioned SaaS applications. them effective distribution media for last exfiltration points for data loss, security to block malware and stop
The SaaS application then automati- cybercriminals. Features such as auto- and as such, they need to be protect- threats from spreading through SaaS
cally syncs across devices and users, matic syncing make it easy to instantly ed from malware threats. applications, eliminating a new inser-
which deploys the malicious payload distribute malware. tion point for malware.
to everyone using the application in
your enterprise.

14 Prisma by Palo Alto Networks | Making SaaS Safe: 7 Requirements for Securing Cloud Applications and Data
7 Stop SaaS-Borne Malware Threats: Important Questions

How the Right


Can you detect zero-day threats or unknown malware originating
CASB Can Help
from SaaS applications?
To prevent an insertion point and
the further spread of malware across
your organization, choose a CASB
with integrated malware prevention
capabilities. These capabilities should
Do you have malware analysis capabilities in place for content in block known malware as well as iden-
tify and block unknown malware in
SaaS applications? content stored in SaaS applications.

Can you quarantine suspicious content or infected devices?

15 Prisma by Palo Alto Networks | Making SaaS Safe: 7 Requirements for Securing Cloud Applications and Data
Your SaaS Security Checklist
As your company evaluates CASB offerings for securing SaaS applications and data, use
the seven requirements presented in this e-book to guide your assessment and define
your criteria. Look for an offering that gives your security team the ability to:

Discover employee use of unvetted SaaS applications

Protect sensitive data in SaaS applications

Secure your weakest link—SaaS users

Enforce compliance requirements in the cloud

Reduce the risk from unmanaged devices

Control data sharing from SaaS applications

Stop SaaS-borne malware threats

16 Prisma by Palo Alto Networks | Making SaaS Safe: 7 Requirements for Securing Cloud Applications and Data
Next Steps

Most enterprises will agree that the benefits of About Prisma™ by Palo Alto Networks
SaaS applications—improved agility, faster time to Governed access, plus pervasive protection for data,
market, greater productivity, easier collaboration, applications, hosts, containers, and serverless—this is
and more—outweigh the challenges of managing the proper foundation for the journey to the cloud. With
their usage for proper security and governance. a comprehensive cloud security suite, Prisma helps our
However, with employees using more SaaS applica- customers secure every step of their journey.
tions every day and storing company information,
Prisma provides unprecedented visibility into assets and
including sensitive data, in the cloud, IT and security
risks, consistently securing access, data, applications, and
leaders must take immediate steps to protect their
modern workloads, regardless of location. The suite helps
enterprises from data loss, malware threats, non-
customers deploy and adapt quickly with speed and agility
compliance, and other serious risks to the business.
as well as control operational costs and reduce complexity
A CASB that addresses the seven requirements with a radically simple architecture.
introduced here is the best way to bridge the SaaS
Prisma is the most complete cloud security suite for today
security gap and protect the business while en-
and tomorrow.
abling it to enjoy the benefits of SaaS applications.
Learn how Prisma can help provide data protection,
governance, and compliance to safely enable organizations
to adopt SaaS.

3000 Tannery Way Main: +1.408.753.4000 © 2019 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks. A list of
Santa Clara, CA 95054 Sales: +1.866.320.4788 our trademarks can be found at https://www.paloaltonetworks.com/company/trademarks.html. All other marks
Support: +1.866.898.9087 mentioned herein may be trademarks of their respective companies. Making-SaaS-Safe-ebook-111819
www.paloaltonetworks.com

You might also like