Cloud services can become a vulnerability to an organization’s threat protection and data security strategy if mishandled. Although identity and access management (IAM) programs protect the front door of sanctioned applications, they do not protect against unsanctioned applications. This is where cloud access security brokers (CASBs) can bridge the gap.
CASBs add security where traditional IAM cannot
“CASBs add security where traditional IAM cannot,” Erik Wahlstrom, research director at Gartner, says. “They don’t replace IAM, but do provide visibility and control back to IAM.” Technical professionals must integrate the two and use their combined strengths when onboarding, securing, monitoring and managing cloud services. At the most basic level, CASBs add an extra layer of protection to the components of IAM systems. They enable organizations to track user behavior, apply consistent security policies across multiple applications and enforce policies (e.g., session termination) in the event applications are misused.
Identity is likewise a foundational piece of information for CASBs
Identity is likewise a foundational piece of information for CASBs. IAM and CASBs work together to provide heightened discovery, monitoring and protection of your organization’s services in order to make informed decisions when protecting cloud applications.