Artificial intelligence in the post-deep learning era
Risks of Running Enterprise at Cloud Speed & How CASB Helps
1. The Less Known Risks of
Running the Enterprise at
Cloud Speed
Sekhar Sarukkai
VP & Fellow, Cloud BU, McAfee
2. of companies experience business
acceleration from their use of cloud
services.
Source: McAfee Cloud Adoption Report: Business Growth Edition, June 2019
87%
3. 3
Customer Drivers for Cloud Adoption
Shadow SaaS
Approved SaaS IaaS/PaaS
Faster
Collaboration
Faster Time to
Market
Higher Employee
Satisfaction
4. 4
Mapping ECC To Cloud Computing
• Domain 4 Specifically Covers Cloud
Computing
• Other Domains Also Relevant
• You Need Control of Data
• To Clouds
• From Clouds
• Between Clouds
• Cloud Configuration
• Cloud Security Is A Shared Responsibility
7. 7
44%
How Companies Benefit from the Cloud
Business acceleration measures:
43% 41% 37% 33% 30% 29%
More Efficient
Collaboration
Improved
Employee
Productivity
Business
Growth
Faster Time
to Market
Higher
Employee
Satisfaction
Ability to
Launch New
Products
Expansion
to New
Markets
What benefits does your organization experience from its overall use of cloud services?
8. 8
36%
37%
36%
43%
46%
47%
51%
How Companies Benefit from the Cloud
with Infrastructure-as-a-Service (IaaS)
Business acceleration measures:
More Efficient
Collaboration
Improved
Employee
Productivity
Business
Growth
Faster Time
to Market
Higher
Employee
Satisfaction
Ability to
Launch New
Products
Expansion
to New
Markets
What benefits does your organization experience from its overall use of cloud services?
9. 9
Companies do more with the cloud when they
protect their data with a CASB
Source: McAfee Cloud Adoption Report: Business Growth Edition, June 2019
Excluding Shadow IT
10. 10
Where is enterprise
sensitive data in the
cloud?
Salesforce
Office 365
Google Docs
Slack
AWS
Custom Apps
Box
ServiceNow
High-Risk
Shadow
Med/Low-Risk
Shadow
31%
13%
11%
16%
8%
5%
5%
7%
2%
2%
11. 11
2. Traditional Solutions don’t Work
Traditional ways of identifying threats
and breaches are not sufficient
Cloud Data Breaches - Why
1. Not Malware
Cloud based data breaches are not
typically due to Malware
3. Data Loss
Cloud Speed Attacks Result in Cloud
Scale Data Loss
Collaboration
SaaS,
42%
12. 12
The Cloud (First) Enterprise Challenges
Data Creation and Access in
the Cloud Bypasses Existing
Network Security
Infrastructure
1
Network Controls
SaaS IaaS/PaaS
Cloud-to-Cloud traffic
95%
of
Network
Traffic
13. 13
Data Classification & Accountability
Client & End-Point Protection
Identity & Access Management
Application Level Controls
Network Control
Host Infrastructure
Physical Security
SaaS
PaaS
IaaS
The Cloud (First) Enterprise Challenges
Service Provider Responsibility
Customer Responsibility
Customers Are Still
Responsible for Security
2
Cloud Shared Responsibility Model
18. 18
Sensitive Data in the Cloud – When Sharing isn’t Caring
17%
18%
22%
16%
17%
18%
19%
20%
21%
22%
23%
2016 2017 2018
22% of cloud users share
files
19. 19
Sensitive Data in the Cloud – When Sharing isn’t Caring
43%
47%
48%
40%
41%
42%
43%
44%
45%
46%
47%
48%
49%
2016 2017 2018
48% of all files in the
cloud are shared with at
least one other person
20. 20
2. Advanced Threat Protection
Detect Malware, compromised
accounts, insider/privileged threats
Collab SaaS Use Cases
1. Data Protection
Prevent sensitive data from being
stored and shared externally
3. Contextual Access Control
Block sync/download of corporate
O365 data to personal devices
31%
13%
11%
16%
8%
5%
5%
7%
2%
2%
Collaboration
SaaS,
42%
22. 22
Business SaaS Use Cases
31%
13%
11%
16%
8%
5%
5%
7%
2%
2%
2. Data Exfiltration
Protect report data from being
exfiltrated and enable encryption
with customer managed keys
1. Compliance Management
Discover where your confidential
data is inside structured
applications
Business
SaaS, 24%
3. Threat Protection
Identify insider and external
threats
26. 26
Sam— Top 10 Unsecure IaaS/PaaS Configuration Problems
1. EBS Data encryption is not turned on
2. There’s unrestricted outbound access
3. Access to resources is not provisioned using IAM roles
4. EC2 security group port misconfigured
5. EC2 security group inbound access misconfigured
6. Unencrypted AMI
7. Unused security groups
8. VPC Flow logs disabled
9. Multi-factor authentication not enabled for IAM users
10. S3 bucket encryption not turned on
27. Average organization has 14 misconfigured IaaS
services running at a given time
Source: McAfee Cloud Adoption Report, Nov 2018
28. 28
3. Advanced Threat Protection
Detect compromised accounts,
privileged user threats, malware
IaaS Security Use Cases
31%
13%
11%
16%
8%
5%
5%
7%
2%
2%
2. Visibility of Confidential Data
Visibility of regulated/high-value
data stored in S3/Azure Blobs
1. Managing Drift
Identify IaaS resources with
security settings that are non-
compliant
IaaS,
24%
29. 29
Shadow IT Use Cases
31%
13%
11%
16%
8%
5%
5%
7%
2%
2%
Shadow
IT
1. Discover & Govern
Discover & Coach on use of high
risk
3. Data Loss Prevention
Prevent data exfiltration to
medium risk services
2. Conditional Access Control
Activity and Instance based
access control
31. 31
McAfee MVISION Cloud protects ALL customer data in the cloud
MVISION Cloud
Enterprise SaaS
Long Tail SaaS
32. 32
McAfee MVISION Cloud protects ALL customer data in the cloud
Common Security Services
Compliance & Risk Assessment
Shadow
Apps
Reporting Orchestration
DLP
Access Control Encryption
Config Audit Classification
Data Protection
Activity Monitoring
Malware Protection
UEBA
Threat Protection
Enterprise SaaS
Long Tail SaaS
CASB Connect APIs
Cloud Native IaaS/PaaS
Lift & Shift Apps
CASB Reverse Proxy
33. 33
Unified Cloud Edge
Unified Data and Threat Protection
DLP
SWG CASB
MVISION
ePO
DEVICES
FEATURES
CLOUD
DATA
BENEFITS
Centralized Policy Definition
For threat prevention and data protection
Unified Incident Management
Access Control
Over managed and unmanaged devices
Cloud Data and Permission Controls
Via APIs integrations
Acceptable Use Policy Enforcement
With advanced malware protection.
Other names and brands may be claimed as the property of others.
34. 34
MVISION Cloud
Unmanaged Managed
SaaS IaaS/PaaS Shadow
▪ Data Security
▪ Threat Protection
Control
▪ What: Data, Device, App
▪ Who
▪ Where
▪ When
Visibility
Adopt a CASB Platform
35. 35
Companies are more likely to experience business acceleration when
they protect their data with a CASB
Source: McAfee Cloud Adoption Report: Business Growth Edition, June 2019
+15%
+11%
+32%
+36%
+45%
+40%
+38%
With CASB
Without
CASB
37. 37
Cloud Security Recap
Cloud require new thinking and platform
for data security
Embrace a cloud native approach
Do it now!! Get a cloud security
assessment done
1
2
4