What you need to know about Office 365 Phoenix ISACA Dede Alexiadis Imperva Skyfence
Agenda Microsoft Office 365 basics Anytime Anywhere Let the data flow Risk and Governance Deployment Considerations Q & A 2 Confidential
Types of Cloud Adoption Customer-facing Applications Moving to IaaS or PaaS providers Employee-facing Applications are SaaS and Cloud Apps Traditional Data Center 53 Confidential
Why Cloud? Faster to collaboration Ease of trying something new Leveraging other experiences Operationally efficient, focus on the business Bridge into cloud 4 Confidential
Why Microsoft Office 365 Easy to setup and manage Access to all of the same tools Expanded collaboration features Anytime and Anywhere 5 Confidential
Anytime Anywhere 6 Confidential
Implications Legitimate User Un-federated Access Multiple Devices Multiple Locations Ability to Collaborate Malicious Actor Un-federated access Multiple Devices Multiple Locations Ability to Collaborate Malicious Insider Un-federated Access Multiple Devices Multiple Locations Ability to Collaborate Privileged Users Un-federated Access Multiple Devices Multiple Locations Administrative Access Ability to circumvent controls 7 Confidential
Device Control Managed vs Un-managed devices Least privilege access Activity based MFA User Fingerprint User Ease of Use 8 Confidential
Device Control Managed vs Un-managed devices Configuration assessment Activity based MFA User Fingerprint Administrator Ease of Use 9 Confidential
Proxy Inline Real-time blocking/ remediation Performance considerations CDN Self healing defendable Elastic API Non inline Not real time, no blocking API dependency No performance considerations 10 Confidential
Market Overview Cloud Access Security Brokers CASB named #1 in top 10 technologies for IT Security in 2014 By 2017, those making a strategic decision to invest in cloud apps for mission-critical workloads will consider CASB essential The CASB market will reach $500 million by year-end 2017 Two primary use cases for IT: Risk Assessment Most of the market in 2014, enterprise customers, all verticals Offline deployment 3 rd party logs, API, or web-access Monitoring & Enforcement Rapidly catching-up, expected 100% penetration by 2017 Inline deployment Forward / reverse proxies, SWG integrations, endpoint agents 11 Confidential
Challenges of Cloud Apps and Shadow IT Corporate Employees, Mobile Workers and Hackers Cloud Applications No visibility into who is using what apps No way to assess cloud apps risks and prioritize Unable to monitor and analyze all activity No endpoint control capabilities for cloud apps Cloud apps are a prime target for hackers and malicious insiders data exfiltration 612 Confidential
Visibility and Control for Cloud Applications Corporate Employees, Mobile Workers and Hackers Cloud Applications Cloud Security Suite Cloud Discovery & Governance (Offline) Discover Shadow IT Apps & Assess Risk Review User Entitlements to Find Dormant & Orphaned Accounts Centrally Assess Security & Configuration Settings of Cloud Apps Cloud Audit & Protection (Inline) Monitor Activity of Users & Admins Push to SIEM Endpoint & Data Access Controls with Risk-based MFA Detect Anomalies & Prevent Account Takeover Attacks 13 Confidential
Common Skyfence Use Cases for the Cloud Secure Office 365 Users Endpoint access control Monitor & control uploads and downloads Prevent account takeover Control Collaboration and File Sharing Visibility over sharing of unstructured data Data security Manage AWS Console Users Discovery of AWS console users Risk-based strong authentication Blocking/controlling high-risk actions Prevent account takeover Discover Line of Business Apps Sanctioned and unsanctioned Over 5,000 apps supported (Salesforce, NetSuite, etc.) 14 Confidential
See What You Are Missing Illuminate Shadow IT Free Download for Cloud App Discovery Windows and Mac versions Scans Web Proxy, SIEM, and Firewall logs Quantify apps, users, activities, & risk Includes free online support & Knowledge Base www.skyfence.com/cloud-discovery-free Corporate Network Network 1 Scan 2 Review Results LOG Files Firewall / Web Proxy Cloud Discovery Tool Discovered Apps 15 Confidential