Skip to main content

What is CASB - Oracle CASB Cloud Service

What is CASB:

Cloud Access Security Brokers is a term coined by Gartner to describe cloud solutions centered around these four main pillars: visibility, compliance, data security, and threat protection. As per Gartner Cloud access security brokers (CASBs) are on-premises, or cloud-based security policy enforcement points, placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as the cloud-based resources are accessed. CASBs consolidate multiple types of security policy enforcement. Example security policies include authentication, single sign-on, authorization, credential mapping, device profiling, encryption, tokenization, logging, alerting, malware detection/prevention and so on. 

To Summarize CASB is a service which is used to secure and monitor Cloud and On-Prem applications and to respond with remediation in case of Threats or suspicious events are detected. Key is the analysis of events generated in the application and intelligence on those events to map it to a threat.Remediation of CASB's can be of various degrees starting from generating a ticket to step up authentication for user and blocking the access eventually.

Broadly CASB's can be classified in two categories: API based CASB and Proxy based CASB.
API based CASB's use API provided by applications to monitor and secure applications while Proxy based CASB's use a agent on the network to monitor the user access. Pros and cons of these CASB's are a topic of another discussion.

Oracle CASB Cloud Service:

Oracle CASB cloud service is a API based CASB service. Oracle CASB can monitor Iaas, Pass and SaaS applications which is unique in nature as most of the CASB vendors are focused around SaaS applications. The model on which Oracle CASB works is based on four pillars : Discover, Secure, Monitor, Respond.
Oracle CASB connects to applications using API and detects the events in the applications like login activities, user access, security controls. Discovery in Oracle CASB is of two types: 'Shadow IT discovery' which is from the top view what applications user are accessing and Deep Dive discovery which is from the event and audit logs of application about what users are accessing within. Oracle CASB can also monitor and push standard compliance control to the applications.
Once events are gathered from the applications they are processed in the analytics engine of Oracle CASB and run through the policy engine, threat engine and machine learning. Based on the analytics user behavioral profiling is done and events are categorized as Policy alerts, threats and controls. User activities are also verified against IP reputation lists and location feeds. Below is the view of the Dashboard:


After the events are analysed, re-mediate actions are taken based on the severity of the event. Oracle CASB can be integrated with an Incident management tool in the organization and a incident can be raised for the suspicious activities. Oracle CASB also has a built in light weight ticketing tool where Incidents can be assigned and owners will be notified by the email about the assignment and status. Oracle CASB can also be integrated with SIEM (security information and event management) tools to gather the activities in other enterprise applications. Data provided by SIEM solutions are then analysed in CASB.


Comments

  1. Excellent blog on Cloud Computing where I can see some unknown facts about cloud computing. Please update your thoughts frequently.
    Cloud Computing Certification in Chennai
    Cloud Certification in Chennai

    ReplyDelete

  2. Cloud Access Security Broker is a secure application designed to protect the cloud and associated information from vulnerabilities. To get Cloud Access Security Broker Services in India, Securium Solutions is one of the best companies for giving cyber security services.

    ReplyDelete

Post a Comment

Popular posts from this blog

Adding UDF (User Defined Field) on create user page OIM 11g R2 PS1:-

    Login to Sysadmin console and create a Sandbox and activate it. Click on Form Designer and search for user form. 2.      Create a new field of desired type. 3.      Provide the Required Values for UDF creation and click save and close. UDF field will be added then publish the sand box. 4.      Login to Identity console now and create another sandbox and activate it. After sandbox is activated click on users link and the click on create user. 5.      Provide the mandatory values on the form and then click the customize button on top. Select source from the view. 6.      Select the panel where the field has to be added. Select panel form lay out click add content. Select Data component Catalog from the box. 7.      Select UserVO from the bottom. ...

OIM Tuning

Application Module tuning is a critical setting which will affect the UI performance. Following are the recommended application module settings for OIM and these are already set out-of-box (OOB) in later releases of OIM 11g R2. Ensure that these settings are implemented as recommended in your environment. -Djbo.ampool.doampooling=true -Djbo.ampool.minavailablesize=1 -Djbo.ampool.maxavailablesize=120 -Djbo.recyclethreshold=60 - Djbo.ampool.timetolive=-1 -Djbo.load.components.lazily=true - Djbo.doconnectionpooling=true -Djbo.txn.disconnect_level=1 - Djbo.connectfailover=false -Djbo.max.cursors=5 - Doracle.jdbc.implicitStatementCacheSize=5 - Doracle.jdbc.maxCachedBufferSize=19 open DOMAIN_HOME/bin/setDomainEnv.sh file for the WebLogic Server instance.find these lines: JAVA_OPTIONS="${JAVA_OPTIONS}" export JAVA_OPTIONS and change it to: JAVA_OPTIONS="-Djbo.ampool.doampooling=true -Djbo.ampool.minavailablesize=1 -Djbo.ampool.maxavailablesize=120 -D...

OIM Reports : PS3

Oracle Business Intelligence Publisher is Oracle's primary reporting tool for authoring, manag-ing, and delivering all your highly formatted reports. BI Publisher is shipped with Oracle Identity Manager 11g Release 2 PS3. BI Publisher is deployed and configured as a separate managed server within the same Oracle Identity Manager domain. You have the choice of either leveraging the embedded BI Publisher or a standalone BI Publisher. It is recommended that you use the embedded BI Publisher if there are no other reporting requirements and you only need reporting for Oracle Identity Manager. After BI Publisher configuration, you can take advantage of the standard features of BI Publisher, such as:  Access Policy Reports  Request and Approval Reports  Password Reports  Resource and Entitlement Reports  User Reports  Certification Reports  Identity Audit Reports  Exception Reports The Screenshot of all the reports can be seen below: Every Report uses a Da...