SlideShare a Scribd company logo
WHITE PAPER
Hiding in Plain Sight:
How a CASB with Built-In UBA
Unmasks Insider Threats in the Cloud
3945 Freedom Circle Suite 560 Santa Clara CA 95054 /// 650 300 5222 /// info@palerra.com /// palerra.com
2
WHITE PAPER
CISOs are concerned with data confidentiality, integrity, and
availability, also known as the CIA triad. This triad is a model
designed to guide policies for information security within an
organization. Maintaining compliance should, in theory, alleviate
the concern with data CIA. However, the sprawl of software as a
service (SaaS), rapid adoption of infrastructure as a service (IaaS),
erosion of the network perimeter caused by BYOD, and explosion
of unsanctioned cloud applications amplify the security issues
CISOs face.
With this new threat landscape brought on by cloud
pervasiveness and BYOD, many CISOs focus on external threats
and overlook the most active threat to their cloud environment –
the insider. The statistics vary, but industry experts consistently
state that a majority of threats come from insiders: employees,
contractors, consultants, and unprovisioned ex-employees.
Many of the controls put in place to mitigate cloud security
threats fail to protect the enterprise against a user with valid
credentials. What can be done?
Traditional Authentication Methods Fall Short
In addition to industry or business-specific functions, the responsibility of a CISO encompasses:
n Physical and logical access controls
n Perimeter management via security appliances – VPNs, firewalls, proxies
n Data classification, tagging, and encryption
n Security operations and incident response
n Governance and compliance monitoring and audit support
n Education programs
Controlling these fundamental areas of information security relies on a single premise: your user is who he says he is.
Traditional authentication methods, the foundation of identity management, don’t increase your assurance against a
set of compromised credentials. Educating users about security best practices is only mildly successful. CISOs need to
arm themselves with a richer set of information. They know whose credentials are being used to gain access to their
business-critical assets, virtual infrastructure, and data, but not which user is using those credentials. That is not enough.
Hiding in Plain Sight: How a CASB with Built-In
UBA Unmasks Insider Threats in the Cloud
Research Finds 74% of
Enterprises Feel Vulnerable
to Insider Threats
Malicious and unintentional insider threats
are pervasive and difficult to thwart. In fact,
74% of organizations surveyed feel vulnerable
to insider attacks, but only 42% feel that they
have the controls in place to prevent them.
Download the 2016 Insider Threat Spotlight
Report to gain more insight into the state of
insider threats and solutions for prevention.
Download the 2016 Insider Threat
Spotlight Report
3945 Freedom Circle Suite 560 Santa Clara CA 95054 /// 650 300 5222 /// info@palerra.com /// palerra.com
3
WHITE PAPER
Update Your Security Approach to Assume Insiders are a Threat
Balancing data protection and data accessibility relies on a deep understanding of your users and how they interact
with your services. The traditional approach to security focuses more on the perimeter and data than the user. The data-
centric approach to security scrutinizes technology and processes to ensure that the data, your “gold mine,” is secured.
Data-centric security relies heavily on authentication as a key control. While these controls are necessary, they are
insufficient against an insider threat. If someone already has legitimate credentials, many identity management
controls will not prevent that user from taking action, whether malicious or benign. A cloud access security broker
(CASB) with built-in user behavior analytics (UBA) turns this view sideways and adds a user-centric approach to
security, allowing CISOs to secure the “gold mine” and the “miners.”
“Trust But Verify” the Actions of Your Employees
Classifying, tagging, and encrypting your data may help you secure data at rest and in use, but it won’t protect your
organization against actions of the users who already have authorization to use that data. A CASB with built-in UBA
complements security solutions and security measures that are built into cloud services. With intelligent analysis of
user behavior, UBA can detect suspicious activities, malicious activities, and even identify risky user behavior before a
breach occurs.
Monitoring user behavior plays a critical role in your organization’s information security strategy, providing CISOs
the ability to engage in the “trust but verify” model. UBA increases the ability of security operations to view threats
from the user, separating the use of account credentials from the actor using the account credentials. User behavior
focuses on the actor and the transactions that he executes, which provides context beyond account credentials. There
is no way to detect a compromised account from your data manually. But this additional context can surface patterns
of abnormal behavior and act as a fourth factor of authentication: something you know, something you have,
something you are, and the pattern of things you do.
These controls cannot be enforced by humans reading log files and manually reviewing application transaction logs.
Identifying abnormal usage from transactional logs in a timely manner and then acting upon that information can
only be accomplished using machine learning and heuristic reviews of these massive data sets. UBA simplifies the
process of securing your assets by analyzing users’ usage patterns automatically and provides continuous threat
intelligence to enable security operations to act on the information in a timely manner.
How a CASB With Built-In UBA Enhances Security
A CASB that utilizes machine learning monitors user behavior and looks for abnormal usage patterns of cloud
applications. The CASB sets a baseline of standard user behavior per user by monitoring all user and service account
activity. Without this baseline of normal behavior, your security operations team won’t be able to detect anomalous
usage to address an insider threat. UBA within a CASB continuously compares user behavior against the baseline to
detect anomalous activity. Abnormal usage may indicate a malicious insider, a compromised account, or completely
innocuous user behavior.
In addition to comparing a user’s behavior to his historical baseline, advanced UBA models incorporate peer data,
comparing the user against his peers. This means that in addition to establishing what is normal behavior for an
3945 Freedom Circle Suite 560 Santa Clara CA 95054 /// 650 300 5222 /// info@palerra.com /// palerra.com
4
WHITE PAPER
individual, based on his own interactions with the cloud applications, it will also compare other users’ behavior in the
environment to the individual to determine if usage patterns are abnormal. Functional models indicate which users
warrant further investigation to security operations.
A CASB with built-in UBA is a powerful tool in the CISO’s toolkit that can identify compromised accounts and insider
threats. Machine learning with heuristic analyses is the only way to uncover this information from the massive
quantities of data your applications produce.
Real-World Examples: CASB With Built-In UBA in Action
Here are two real-world examples in which a CASB with built-in UBA detected an insider threat in the cloud.
Example #1: Bitcoin Mining
An employee in a company with the majority of
their operations in the US, decided to leverage the
organization’s AWS environment for the purpose
of Bitcoin mining. Knowing that the organization
operates primarily within the US, the employee
turned on AWS EC2 instances in Asia at the end
of each business day and then turned them off
before the office opened each morning. No one
had a reason to check if any AWS resources were
being used outside the US, and hence, no one
was the wiser until a CASB with built-in UBA was
brought in.
Palerra LORIC™
(a CASB) was deployed to monitor
user activity and behavior in this organization.
LORIC ingested the S3 bucket logs and CloudTrail
service logs, which were enabled for all regions
and stored on a central S3 instance. Using
machine learning and heuristic analyses, the
UBA engine profiled all of the users and service
accounts accessing the company’s AWS account.
It tracked IAM, EC2, VPN, VPC, Security Group,
and Network ACL transactions from the users’
home and work laptops to establish normal
behavior for each user and service account.
Using individual profiling, it was quickly discovered
that one of the administrators was using the
company’s AWS instances to mine Bitcoins. As
an admin, this user was trusted to configure and
maintain the business-critical infrastructure and
The Cost of a Data Breach
The cost of a data breach is high whether it is from inside or
external sources. But damage caused by data breaches goes
beyond just financial implications. Damage can extend to the
tenure of the CIO and CISO as well. JPMorgan’s CSO was
re-assigned after 83 million records were breached, and the
Target breach resulted in forcing the CEO to step down and the
CIO to resign. 40% of companies reported a breach or failed a
compliance audit last year. The result of information security
breaches and audit failures is reflected in the average tenure of
a CISO as seen below.
Average Tenure
0 10 20 30 40
Months
50 60 70 80
CFO
CEO
CIO
CMO
CISO
3945 Freedom Circle Suite 560 Santa Clara CA 95054 /// 650 300 5222 /// info@palerra.com /// palerra.com
5
WHITE PAPER
assets. The financial impact resulting from additional AWS instances was significant until the theft perpetrated by
the admin was identified by the CASB. In addition to the cost of the AWS instances, there was a risk of potential legal
impact since some Asian countries ban Bitcoin. The CISO and CIO took action to engage legal counsel and terminate
the employee.
Example #2: Theft of Customer Data
Salesforce provides a cloud-based solution for all aspects of Sales and Customer Relationship Management, enabling
companies to quickly utilize functionality without requiring Information Technology resources to deploy.
One company decided to use Salesforce to manage its Sales and Account Management processes. Each week, the
VP of Sales reviewed high-value and high-probability targets with the sales team to drive targeted campaigns in an
effort to close outstanding deals.
The company deployed Palerra LORIC with built-in UBA to monitor Salesforce activity and ensure that users and
administrators were not compromising business-critical data. LORIC quickly built a profile for each member of the
sales team, which included the third-party applications that each user added from the Salesforce marketplace.
An employee in the sales department gave notice so that he could pursue employment with a competitor. The
employee then logged into Salesforce and made mass changes to customer account values. He downloaded a
custom report to capture the recently-changed customer data with the intention of following up with these prospects
in his next role. When the IT team investigated the alerts of anomalous activity, they found that the values of several
high-value prospects had been dropped to $0. Because they were $0, these prospects were no longer visible on
the custom report that the VP of Sales reviewed weekly with the sales team. It was a perfect plot that would have
gone unnoticed without LORIC. As soon as the employee made mass changes to customer data, LORIC flagged the
anomalous activity. Armed with this information, the company was able to take action.
Addressing the Insider Threat
Ensuring data confidentiality, integrity, and availability are critical responsibilities of any CISO. Yet the rapid adoption
of SaaS and IaaS, erosion of the network perimeter caused by BYOD, and the explosion of unsanctioned applications
significantly amplify security risks. Most CISOs focus on external threats, when in reality, the majority of issues in the
cloud come from insiders.
It is impossible to hire enough security resources to sort through the mountains of data on user behavior to
identify and remediate insider threats. It’s simply too much to monitor, process, and remediate manually. But the
consequences of a breach are significant – a breach could result in financial loss, tarnished brand reputation, or even
loss of a job. To address today’s insider threats impacting the cloud footprint, a CISO should implement a CASB that
includes advanced UBA to automatically detect and prioritize internal threats, enabling organizations to realize the full
benefits of the cloud.
We Invite You to Explore Palerra
Palerra is a leading cloud access security broker (CASB) with a revolutionary approach to securing your entire cloud
footprint. As the pioneer of API-based CASBs, Palerra LORIC™
is the only CASB to provide visibility and security across
SaaS, IaaS, and PaaS environments. To learn more, visit palerra.com.

More Related Content

What's hot

SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
Cheer Chain Enterprise Co., Ltd.
 
5 things it should be doing (but isn't!)
5 things it should be doing (but isn't!)5 things it should be doing (but isn't!)
5 things it should be doing (but isn't!)
Mike Egli
 
Super User or Super Threat?
Super User or Super Threat?Super User or Super Threat?
Super User or Super Threat?
ObserveIT
 
Adallom_Cloud_Risk_Report-Nov14
Adallom_Cloud_Risk_Report-Nov14Adallom_Cloud_Risk_Report-Nov14
Adallom_Cloud_Risk_Report-Nov14
Isaac BOCCARA
 
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Enterprise Management Associates
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 security
PowerSaturdayParis
 
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection SystemQuery Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Simran Seth
 
IDERA Live | Mitigating Data Risks from Cloud to Ground
IDERA Live | Mitigating Data Risks from Cloud to GroundIDERA Live | Mitigating Data Risks from Cloud to Ground
IDERA Live | Mitigating Data Risks from Cloud to Ground
IDERA Software
 
W verb68
W verb68W verb68
W verb68
James1280
 
Enterprise Biometric Solution
Enterprise Biometric SolutionEnterprise Biometric Solution
Enterprise Biometric Solution
Tanvir Ahmed
 
WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)
Jeremiah Grossman
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
sukiennong.vn
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET Journal
 
Clearswift f5 integration
Clearswift f5 integrationClearswift f5 integration
Clearswift f5 integration
Marco Essomba
 
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaper
Alan Rudd
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
IOSR Journals
 
Heartland
HeartlandHeartland
Heartland
grimesjo
 
Security Breaches from Compromised User Logins
Security Breaches from Compromised User LoginsSecurity Breaches from Compromised User Logins
Security Breaches from Compromised User Logins
IS Decisions
 
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thCYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
United Technology Group (UTG)
 
Account Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full ProtectionAccount Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full Protection
Kalin Hitrov
 

What's hot (20)

SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
 
5 things it should be doing (but isn't!)
5 things it should be doing (but isn't!)5 things it should be doing (but isn't!)
5 things it should be doing (but isn't!)
 
Super User or Super Threat?
Super User or Super Threat?Super User or Super Threat?
Super User or Super Threat?
 
Adallom_Cloud_Risk_Report-Nov14
Adallom_Cloud_Risk_Report-Nov14Adallom_Cloud_Risk_Report-Nov14
Adallom_Cloud_Risk_Report-Nov14
 
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
 
Power Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 securityPower Saturday 2019 E1 - Office 365 security
Power Saturday 2019 E1 - Office 365 security
 
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection SystemQuery Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
 
IDERA Live | Mitigating Data Risks from Cloud to Ground
IDERA Live | Mitigating Data Risks from Cloud to GroundIDERA Live | Mitigating Data Risks from Cloud to Ground
IDERA Live | Mitigating Data Risks from Cloud to Ground
 
W verb68
W verb68W verb68
W verb68
 
Enterprise Biometric Solution
Enterprise Biometric SolutionEnterprise Biometric Solution
Enterprise Biometric Solution
 
WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
 
Clearswift f5 integration
Clearswift f5 integrationClearswift f5 integration
Clearswift f5 integration
 
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaper
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
Heartland
HeartlandHeartland
Heartland
 
Security Breaches from Compromised User Logins
Security Breaches from Compromised User LoginsSecurity Breaches from Compromised User Logins
Security Breaches from Compromised User Logins
 
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thCYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
 
Account Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full ProtectionAccount Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full Protection
 

Viewers also liked

The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
Bitglass
 
Exploring the Hybrid Cloud by Jeff Malkin of Encoding.com
Exploring the Hybrid Cloud by Jeff Malkin of Encoding.comExploring the Hybrid Cloud by Jeff Malkin of Encoding.com
Exploring the Hybrid Cloud by Jeff Malkin of Encoding.com
ETCenter
 
Security and Cooperation in Northeast Asia: the Russian-South Korean Experts ...
Security and Cooperation in Northeast Asia: the Russian-South Korean Experts ...Security and Cooperation in Northeast Asia: the Russian-South Korean Experts ...
Security and Cooperation in Northeast Asia: the Russian-South Korean Experts ...
Russian Council
 
Executive Master Risorse Umane Edizione 2016
Executive Master Risorse Umane Edizione 2016Executive Master Risorse Umane Edizione 2016
Executive Master Risorse Umane Edizione 2016
Alma Laboris
 
Francesco Paolo Micozzi: Anticorruzione, trasparenza e privacy, quale equilib...
Francesco Paolo Micozzi: Anticorruzione, trasparenza e privacy, quale equilib...Francesco Paolo Micozzi: Anticorruzione, trasparenza e privacy, quale equilib...
Francesco Paolo Micozzi: Anticorruzione, trasparenza e privacy, quale equilib...
Francesco Paolo Micozzi
 
Arm cortex-m4 programmer model
Arm cortex-m4 programmer modelArm cortex-m4 programmer model
Arm cortex-m4 programmer model
Mohammed Gomaa
 
What's casb for cloud first age ?
What's casb for cloud first age ?What's casb for cloud first age ?
What's casb for cloud first age ?
Takeo Sakaguchi ,CISSP,CISA
 
Hybrid Cloud example for SlideShare
Hybrid Cloud example for SlideShareHybrid Cloud example for SlideShare
Hybrid Cloud example for SlideShare
Hewlett-Packard
 
Hybrid cloud computing explained
Hybrid cloud computing explainedHybrid cloud computing explained
Hybrid cloud computing explained
PMOfficers PMOAcademy
 
7 Reasons your existing SIEM is not enough
7 Reasons your existing SIEM is not enough7 Reasons your existing SIEM is not enough
7 Reasons your existing SIEM is not enough
CloudAccess
 
6 t h_ua_2014
6 t h_ua_20146 t h_ua_2014
6 t h_ua_2014
Agent Plus UK
 
Carat: Top 10 Trends 2017
Carat: Top 10 Trends 2017Carat: Top 10 Trends 2017
Carat: Top 10 Trends 2017
Dentsu Aegis Network
 
#Pnsd 2016 Innovare! La scuola dei nuovi cittadini digitali #1
#Pnsd 2016 Innovare! La scuola dei nuovi cittadini digitali #1#Pnsd 2016 Innovare! La scuola dei nuovi cittadini digitali #1
#Pnsd 2016 Innovare! La scuola dei nuovi cittadini digitali #1
Ministry of Public Education
 
Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB) Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB)
rkulandaivel
 
8 geo a_ru
8 geo a_ru8 geo a_ru
8 geo a_ru
4book
 
Cloud computing hybrid architecture
Cloud computing   hybrid architectureCloud computing   hybrid architecture
Cloud computing hybrid architecture
Abhijeet Singh
 
Hybrid Cloud Computing (IBM System z)
Hybrid Cloud Computing (IBM System z)Hybrid Cloud Computing (IBM System z)
Hybrid Cloud Computing (IBM System z)
IBM Danmark
 
500 and 1000 notes banned in india
500 and 1000 notes banned in india500 and 1000 notes banned in india
500 and 1000 notes banned in india
vipin chawla
 
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - FinalOPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
mdesai005
 
What Worries the World? November 2016
What Worries the World? November 2016What Worries the World? November 2016
What Worries the World? November 2016
Ipsos UK
 

Viewers also liked (20)

The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
 
Exploring the Hybrid Cloud by Jeff Malkin of Encoding.com
Exploring the Hybrid Cloud by Jeff Malkin of Encoding.comExploring the Hybrid Cloud by Jeff Malkin of Encoding.com
Exploring the Hybrid Cloud by Jeff Malkin of Encoding.com
 
Security and Cooperation in Northeast Asia: the Russian-South Korean Experts ...
Security and Cooperation in Northeast Asia: the Russian-South Korean Experts ...Security and Cooperation in Northeast Asia: the Russian-South Korean Experts ...
Security and Cooperation in Northeast Asia: the Russian-South Korean Experts ...
 
Executive Master Risorse Umane Edizione 2016
Executive Master Risorse Umane Edizione 2016Executive Master Risorse Umane Edizione 2016
Executive Master Risorse Umane Edizione 2016
 
Francesco Paolo Micozzi: Anticorruzione, trasparenza e privacy, quale equilib...
Francesco Paolo Micozzi: Anticorruzione, trasparenza e privacy, quale equilib...Francesco Paolo Micozzi: Anticorruzione, trasparenza e privacy, quale equilib...
Francesco Paolo Micozzi: Anticorruzione, trasparenza e privacy, quale equilib...
 
Arm cortex-m4 programmer model
Arm cortex-m4 programmer modelArm cortex-m4 programmer model
Arm cortex-m4 programmer model
 
What's casb for cloud first age ?
What's casb for cloud first age ?What's casb for cloud first age ?
What's casb for cloud first age ?
 
Hybrid Cloud example for SlideShare
Hybrid Cloud example for SlideShareHybrid Cloud example for SlideShare
Hybrid Cloud example for SlideShare
 
Hybrid cloud computing explained
Hybrid cloud computing explainedHybrid cloud computing explained
Hybrid cloud computing explained
 
7 Reasons your existing SIEM is not enough
7 Reasons your existing SIEM is not enough7 Reasons your existing SIEM is not enough
7 Reasons your existing SIEM is not enough
 
6 t h_ua_2014
6 t h_ua_20146 t h_ua_2014
6 t h_ua_2014
 
Carat: Top 10 Trends 2017
Carat: Top 10 Trends 2017Carat: Top 10 Trends 2017
Carat: Top 10 Trends 2017
 
#Pnsd 2016 Innovare! La scuola dei nuovi cittadini digitali #1
#Pnsd 2016 Innovare! La scuola dei nuovi cittadini digitali #1#Pnsd 2016 Innovare! La scuola dei nuovi cittadini digitali #1
#Pnsd 2016 Innovare! La scuola dei nuovi cittadini digitali #1
 
Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB) Cloud Access Security Broker (CASB)
Cloud Access Security Broker (CASB)
 
8 geo a_ru
8 geo a_ru8 geo a_ru
8 geo a_ru
 
Cloud computing hybrid architecture
Cloud computing   hybrid architectureCloud computing   hybrid architecture
Cloud computing hybrid architecture
 
Hybrid Cloud Computing (IBM System z)
Hybrid Cloud Computing (IBM System z)Hybrid Cloud Computing (IBM System z)
Hybrid Cloud Computing (IBM System z)
 
500 and 1000 notes banned in india
500 and 1000 notes banned in india500 and 1000 notes banned in india
500 and 1000 notes banned in india
 
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - FinalOPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
OPEN_GROUP_HYBRID_CLOUD_CASE_MGMT2 - Final
 
What Worries the World? November 2016
What Worries the World? November 2016What Worries the World? November 2016
What Worries the World? November 2016
 

Similar to Palerra_CASB_UBA_WhitePaper

Data Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud eraData Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud era
David De Vos
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
Michelle Singh
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
Chirag Joshi, CISA, CISM, CRISC
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
CloudMask inc.
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASB
Kyle Watson
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdf
Chinatu Uzuegbu
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
RuchikaSachdeva4
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
Steven Aiello
 
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
Amazon Web Services
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
Intronis MSP Solutions by Barracuda
 
Short story about your information processing - cloud part
Short story about your information processing -  cloud partShort story about your information processing -  cloud part
Short story about your information processing - cloud part
Artur Marek Maciąg
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
Kumar Goud
 
Cloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime WhitepaperCloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime Whitepaper
Martin Ruubel
 
here has been an increase in the number of cybersecurity incident re.docx
here has been an increase in the number of cybersecurity incident re.docxhere has been an increase in the number of cybersecurity incident re.docx
here has been an increase in the number of cybersecurity incident re.docx
simonithomas47935
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
Kim Cook
 
Cst 630 project 2 incident response
Cst 630 project 2 incident responseCst 630 project 2 incident response
Cst 630 project 2 incident response
persons20ar
 
o-palerra-ROI-QuantifyCASB-WP
o-palerra-ROI-QuantifyCASB-WPo-palerra-ROI-QuantifyCASB-WP
o-palerra-ROI-QuantifyCASB-WP
Eric Opp
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
Happiest Minds Technologies
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
CloudMask inc.
 

Similar to Palerra_CASB_UBA_WhitePaper (20)

Data Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud eraData Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud era
 
The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASB
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdf
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
 
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
ThreatStack Workshop: Stop Wasting Your Time: Focus on Security Practices tha...
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
Short story about your information processing - cloud part
Short story about your information processing -  cloud partShort story about your information processing -  cloud part
Short story about your information processing - cloud part
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Cloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime WhitepaperCloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime Whitepaper
 
here has been an increase in the number of cybersecurity incident re.docx
here has been an increase in the number of cybersecurity incident re.docxhere has been an increase in the number of cybersecurity incident re.docx
here has been an increase in the number of cybersecurity incident re.docx
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
Cst 630 project 2 incident response
Cst 630 project 2 incident responseCst 630 project 2 incident response
Cst 630 project 2 incident response
 
o-palerra-ROI-QuantifyCASB-WP
o-palerra-ROI-QuantifyCASB-WPo-palerra-ROI-QuantifyCASB-WP
o-palerra-ROI-QuantifyCASB-WP
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 

Palerra_CASB_UBA_WhitePaper

  • 1. WHITE PAPER Hiding in Plain Sight: How a CASB with Built-In UBA Unmasks Insider Threats in the Cloud
  • 2. 3945 Freedom Circle Suite 560 Santa Clara CA 95054 /// 650 300 5222 /// info@palerra.com /// palerra.com 2 WHITE PAPER CISOs are concerned with data confidentiality, integrity, and availability, also known as the CIA triad. This triad is a model designed to guide policies for information security within an organization. Maintaining compliance should, in theory, alleviate the concern with data CIA. However, the sprawl of software as a service (SaaS), rapid adoption of infrastructure as a service (IaaS), erosion of the network perimeter caused by BYOD, and explosion of unsanctioned cloud applications amplify the security issues CISOs face. With this new threat landscape brought on by cloud pervasiveness and BYOD, many CISOs focus on external threats and overlook the most active threat to their cloud environment – the insider. The statistics vary, but industry experts consistently state that a majority of threats come from insiders: employees, contractors, consultants, and unprovisioned ex-employees. Many of the controls put in place to mitigate cloud security threats fail to protect the enterprise against a user with valid credentials. What can be done? Traditional Authentication Methods Fall Short In addition to industry or business-specific functions, the responsibility of a CISO encompasses: n Physical and logical access controls n Perimeter management via security appliances – VPNs, firewalls, proxies n Data classification, tagging, and encryption n Security operations and incident response n Governance and compliance monitoring and audit support n Education programs Controlling these fundamental areas of information security relies on a single premise: your user is who he says he is. Traditional authentication methods, the foundation of identity management, don’t increase your assurance against a set of compromised credentials. Educating users about security best practices is only mildly successful. CISOs need to arm themselves with a richer set of information. They know whose credentials are being used to gain access to their business-critical assets, virtual infrastructure, and data, but not which user is using those credentials. That is not enough. Hiding in Plain Sight: How a CASB with Built-In UBA Unmasks Insider Threats in the Cloud Research Finds 74% of Enterprises Feel Vulnerable to Insider Threats Malicious and unintentional insider threats are pervasive and difficult to thwart. In fact, 74% of organizations surveyed feel vulnerable to insider attacks, but only 42% feel that they have the controls in place to prevent them. Download the 2016 Insider Threat Spotlight Report to gain more insight into the state of insider threats and solutions for prevention. Download the 2016 Insider Threat Spotlight Report
  • 3. 3945 Freedom Circle Suite 560 Santa Clara CA 95054 /// 650 300 5222 /// info@palerra.com /// palerra.com 3 WHITE PAPER Update Your Security Approach to Assume Insiders are a Threat Balancing data protection and data accessibility relies on a deep understanding of your users and how they interact with your services. The traditional approach to security focuses more on the perimeter and data than the user. The data- centric approach to security scrutinizes technology and processes to ensure that the data, your “gold mine,” is secured. Data-centric security relies heavily on authentication as a key control. While these controls are necessary, they are insufficient against an insider threat. If someone already has legitimate credentials, many identity management controls will not prevent that user from taking action, whether malicious or benign. A cloud access security broker (CASB) with built-in user behavior analytics (UBA) turns this view sideways and adds a user-centric approach to security, allowing CISOs to secure the “gold mine” and the “miners.” “Trust But Verify” the Actions of Your Employees Classifying, tagging, and encrypting your data may help you secure data at rest and in use, but it won’t protect your organization against actions of the users who already have authorization to use that data. A CASB with built-in UBA complements security solutions and security measures that are built into cloud services. With intelligent analysis of user behavior, UBA can detect suspicious activities, malicious activities, and even identify risky user behavior before a breach occurs. Monitoring user behavior plays a critical role in your organization’s information security strategy, providing CISOs the ability to engage in the “trust but verify” model. UBA increases the ability of security operations to view threats from the user, separating the use of account credentials from the actor using the account credentials. User behavior focuses on the actor and the transactions that he executes, which provides context beyond account credentials. There is no way to detect a compromised account from your data manually. But this additional context can surface patterns of abnormal behavior and act as a fourth factor of authentication: something you know, something you have, something you are, and the pattern of things you do. These controls cannot be enforced by humans reading log files and manually reviewing application transaction logs. Identifying abnormal usage from transactional logs in a timely manner and then acting upon that information can only be accomplished using machine learning and heuristic reviews of these massive data sets. UBA simplifies the process of securing your assets by analyzing users’ usage patterns automatically and provides continuous threat intelligence to enable security operations to act on the information in a timely manner. How a CASB With Built-In UBA Enhances Security A CASB that utilizes machine learning monitors user behavior and looks for abnormal usage patterns of cloud applications. The CASB sets a baseline of standard user behavior per user by monitoring all user and service account activity. Without this baseline of normal behavior, your security operations team won’t be able to detect anomalous usage to address an insider threat. UBA within a CASB continuously compares user behavior against the baseline to detect anomalous activity. Abnormal usage may indicate a malicious insider, a compromised account, or completely innocuous user behavior. In addition to comparing a user’s behavior to his historical baseline, advanced UBA models incorporate peer data, comparing the user against his peers. This means that in addition to establishing what is normal behavior for an
  • 4. 3945 Freedom Circle Suite 560 Santa Clara CA 95054 /// 650 300 5222 /// info@palerra.com /// palerra.com 4 WHITE PAPER individual, based on his own interactions with the cloud applications, it will also compare other users’ behavior in the environment to the individual to determine if usage patterns are abnormal. Functional models indicate which users warrant further investigation to security operations. A CASB with built-in UBA is a powerful tool in the CISO’s toolkit that can identify compromised accounts and insider threats. Machine learning with heuristic analyses is the only way to uncover this information from the massive quantities of data your applications produce. Real-World Examples: CASB With Built-In UBA in Action Here are two real-world examples in which a CASB with built-in UBA detected an insider threat in the cloud. Example #1: Bitcoin Mining An employee in a company with the majority of their operations in the US, decided to leverage the organization’s AWS environment for the purpose of Bitcoin mining. Knowing that the organization operates primarily within the US, the employee turned on AWS EC2 instances in Asia at the end of each business day and then turned them off before the office opened each morning. No one had a reason to check if any AWS resources were being used outside the US, and hence, no one was the wiser until a CASB with built-in UBA was brought in. Palerra LORIC™ (a CASB) was deployed to monitor user activity and behavior in this organization. LORIC ingested the S3 bucket logs and CloudTrail service logs, which were enabled for all regions and stored on a central S3 instance. Using machine learning and heuristic analyses, the UBA engine profiled all of the users and service accounts accessing the company’s AWS account. It tracked IAM, EC2, VPN, VPC, Security Group, and Network ACL transactions from the users’ home and work laptops to establish normal behavior for each user and service account. Using individual profiling, it was quickly discovered that one of the administrators was using the company’s AWS instances to mine Bitcoins. As an admin, this user was trusted to configure and maintain the business-critical infrastructure and The Cost of a Data Breach The cost of a data breach is high whether it is from inside or external sources. But damage caused by data breaches goes beyond just financial implications. Damage can extend to the tenure of the CIO and CISO as well. JPMorgan’s CSO was re-assigned after 83 million records were breached, and the Target breach resulted in forcing the CEO to step down and the CIO to resign. 40% of companies reported a breach or failed a compliance audit last year. The result of information security breaches and audit failures is reflected in the average tenure of a CISO as seen below. Average Tenure 0 10 20 30 40 Months 50 60 70 80 CFO CEO CIO CMO CISO
  • 5. 3945 Freedom Circle Suite 560 Santa Clara CA 95054 /// 650 300 5222 /// info@palerra.com /// palerra.com 5 WHITE PAPER assets. The financial impact resulting from additional AWS instances was significant until the theft perpetrated by the admin was identified by the CASB. In addition to the cost of the AWS instances, there was a risk of potential legal impact since some Asian countries ban Bitcoin. The CISO and CIO took action to engage legal counsel and terminate the employee. Example #2: Theft of Customer Data Salesforce provides a cloud-based solution for all aspects of Sales and Customer Relationship Management, enabling companies to quickly utilize functionality without requiring Information Technology resources to deploy. One company decided to use Salesforce to manage its Sales and Account Management processes. Each week, the VP of Sales reviewed high-value and high-probability targets with the sales team to drive targeted campaigns in an effort to close outstanding deals. The company deployed Palerra LORIC with built-in UBA to monitor Salesforce activity and ensure that users and administrators were not compromising business-critical data. LORIC quickly built a profile for each member of the sales team, which included the third-party applications that each user added from the Salesforce marketplace. An employee in the sales department gave notice so that he could pursue employment with a competitor. The employee then logged into Salesforce and made mass changes to customer account values. He downloaded a custom report to capture the recently-changed customer data with the intention of following up with these prospects in his next role. When the IT team investigated the alerts of anomalous activity, they found that the values of several high-value prospects had been dropped to $0. Because they were $0, these prospects were no longer visible on the custom report that the VP of Sales reviewed weekly with the sales team. It was a perfect plot that would have gone unnoticed without LORIC. As soon as the employee made mass changes to customer data, LORIC flagged the anomalous activity. Armed with this information, the company was able to take action. Addressing the Insider Threat Ensuring data confidentiality, integrity, and availability are critical responsibilities of any CISO. Yet the rapid adoption of SaaS and IaaS, erosion of the network perimeter caused by BYOD, and the explosion of unsanctioned applications significantly amplify security risks. Most CISOs focus on external threats, when in reality, the majority of issues in the cloud come from insiders. It is impossible to hire enough security resources to sort through the mountains of data on user behavior to identify and remediate insider threats. It’s simply too much to monitor, process, and remediate manually. But the consequences of a breach are significant – a breach could result in financial loss, tarnished brand reputation, or even loss of a job. To address today’s insider threats impacting the cloud footprint, a CISO should implement a CASB that includes advanced UBA to automatically detect and prioritize internal threats, enabling organizations to realize the full benefits of the cloud. We Invite You to Explore Palerra Palerra is a leading cloud access security broker (CASB) with a revolutionary approach to securing your entire cloud footprint. As the pioneer of API-based CASBs, Palerra LORIC™ is the only CASB to provide visibility and security across SaaS, IaaS, and PaaS environments. To learn more, visit palerra.com.