EMAIL SUPPORT

dclessons@dclessons.com

LOCATION

US

Securing Cloud Application with Cisco Umbrella - Introduction

Securing Cloud Application with Cisco Umbrella - Introduction

Cloud Application Security Overview

Traditionally, organizations routed internet traffic from branch offices back to a central location to apply security. Yet, this centralized security approach has become impractical in today's branch offices with high cloud application use due to the performance limitations of backhauling traffic.

You must adopt a new approach for cloud security and solution such as a SIG to:

  • Improve security coverage.
  • Centralize (consistent) policies across remote locations.
  • Achieve better performance and user satisfaction.

SASE combines networking and security functions in the cloud to deliver secure access to applications anywhere users work. The core functions include Cisco Software-Defined WAN (SD-WAN), firewall as a service, secure web gateway, Cisco Cloud Access Security Broker (CASB), and Zero Trust network access (ZTNA). 

SASE helps organizations to:

  • Combine networking and security functions to deliver secure connectivity as a service.
  • Connect users seamlessly to the applications and data in any environment and from any location.
  • Control access and enforce the proper security protection at any workplace.

Cloud Governance Policies

Implement the best security-related practices in cloud governance policies to:

  • Enforce authentication standards.
  • Establish hardening standards for virtual machines, containers, and approved repositories.
  • Include strong access management: clearly defined roles and rules (for example, who has access to what and why).

Cloud Data Protection

Cloud computing allows the sharing of folders and files among multiple users. IT network security teams must be proactive in enabling the right cloud security policies around file sharing and sensitive data.

To be proactive, security engineers can take these actions:

  • Identify sensitive data: Network security teams must plan which data or application access management is required. Sensitive data includes customer data, organizational policies, and other information, such as keys and hardcoded passwords. Sensitive data requires protection, and it would be great to store it in a separate folder with limited access.
  • Categorize and protect files: Categorize data in a different section and apply encryption or other protective mechanisms to ensure that only the intended audience can view it.

Real-Time Session Controls

A network administrator can create a session policy to improve visibility and ensure secure collaboration in the cloud environment. The session policy enables tracking each session between internal and external users and, more importantly, limit specific activities against application security and compliance standards.

It is possible to monitor potentially risky or suspicious users when they sign into applications and log their actions into the session. The network administrator can further evaluate these session logs and analyze user behavior to detect violations of its security policies.

Malware Threat Protection

To address malware threats in the cloud, consider these application security activities:

  • Organizations should stack up endpoint protection to the highest application security standards possible. This approach will help network administrators to detect most malware coming from endpoints, such as laptops and desktops.
  • Create a BYOD protection policy to ensure secure upload and download of files from unmanaged endpoints.
  • Ensure the use of advanced threat protection tools and processes to limit the spread of malware to other networks in the enterprise.
  • Add a cloud-specific protective layer to all cloud-based email applications to secure infrastructure hosted on Gmail or Microsoft.

DNS Layer Security

Many sophisticated attacks, for example, malware, ransomware, phishing, and other scams, often use Domain Name System (DNS) to stage the internet infrastructure used to support each stage of their attacks.

These attacks often use:

  • DNS tunneling: deliver payloads encoded in DNS queries and responses, exfiltrate data from compromised networks, and execute command and control attacks.
  • DNS beaconing: establishing communication with a command-and-control server using only DNS, which is almost always allowed in a network

Cisco Umbrella protects by starting with DNS layer security. Cisco Umbrella proactively blocks requests to malicious destinations before establishing a connection or downloading a malicious file.

GENERAL FAQ

Backhauling traffic from the internet to a central website increases the amount of latency and slows down performance. When cloud applications are used heavily in branches, this method doesn't scale well.

Cisco Umbrella with Secure Internet Gateway (SIG) can help you reduce network complexity and reduce risk exposure. Also, it can help to improve performance with a single cloud-delivered service that deploys quickly and scales with your business.

Advantages of Cisco Umbrella with SIG include:

Deliver secure access anywhere, anytime.

Move access control to the edge.

Gain efficiencies with an as-a-service model.

Make your business more agile.

It makes security more accessible to users by providing security and networking services via the cloud. This improves performance, makes policies standardized, and helps protect users no matter where they are.

Here are some of the best cloud security practices IT departments should adopt to discover and assess cloud applications:

Use cloud discovery to analyze traffic logs collected by Microsoft Defender Application Traffic Policies (ATP) and evaluate identified applications against a set catalog to verify the security and compliance requirements.

Configure application discovery policies to identify insecure, non-compliant applications that could pose a security threat.

Monitor the cloud application permissions authorized by users to manage OAuth applications and identify potentially risky or suspicious ones.

Additional cloud application security steps that network security engineers could take are:

Ensure that users possess minimal privileged access to the cloud resources to fulfill their job responsibilities.

Give provision access to a resource instead of providing a fixed set of credentials to ensure that compromised credentials do not lead to unauthorized access to the cloud.

Implement multifactor authentication for every user and limit the number of users with administrator privileges.

Cloud governance policies establish security standards for access, access rules, and practices for hardening. They make sure only the authorized users and systems have access to cloud resources.

Implement the best security-related practices in cloud governance policies to:

Enforce authentication standards.

Establish hardening standards for virtual machines, containers, and approved repositories.

Include strong access management: clearly defined roles and rules (for example, who has access to what and why).

Teams should be able to identify sensitive data and limit access to the data, and keep it in a separate location when feasible. Access controls and encryption help ensure that data is visible only to authorized users.

Cloud computing allows the sharing of folders and files among multiple users. IT network security teams must be proactive in enabling the right cloud security policies around file sharing and sensitive data.

To be proactive, security engineers can take these actions:

Identify sensitive data: Network security teams must plan which data or application access management is required. Sensitive data includes customer data, organizational policies, and other information, such as keys and hardcoded passwords. Sensitive data requires protection, and it would be great to store it in a separate folder with limited access.

Categorize and protect files: Categorize data in a different section and apply encryption or other protective mechanisms to ensure that only the intended audience can view it.

Session control monitors user activity during cloud-based application sessions. They assist in identifying unsafe behaviour, as well as enforce compliance regulations and provide better insight into the actions of users.

DNS layer security blocks connection to malicious websites prior to the connection being established. This prevents threats like malware, phishing, as well as Command-and-Control traffic in the early stages.


Comment

    You are will be the first.

LEAVE A COMMENT

Please login here to comment.