Cloud/next-generation gateway security

What you need to know to use the cloud securely

Expanding Cloud Utilization through Telework ~SaaS/IaaS/PaaS~

By promoting DX, companies are aiming to break away from existing businesses and are working to develop new businesses that utilize digital technology. As telework has become common these days, the use of the cloud has become an essential element for business, and the following use cases are being created.

[Part of cloud utilization cases]
  • Development and provision of applications utilizing IaaS/PaaS to provide customers and employees with new successful experiences
  • Introduction of SaaS applications (online meetings, online storage, CRM, etc.) to increase employee productivity

Important Data Gathered in the Cloud - Careful Understanding of Scope of Responsibility, Usage and Management -

These cloud usage examples show that critical data such as confidential information and customer data are concentrated in the cloud.
As described below, regardless of the type of cloud, important data and access management to them are the responsibility of the cloud user. When implementing security operations, administrators of companies using the cloud must understand this scope of responsibility before responding.

Incident Cases and Issues -Thinking about Security Operations-

Let's think about what kind of security operation is necessary based on specific incident cases and the issues that can be seen from them.

  • A large amount of personal information leaked from a large file transfer service in the cloud in Japan

[Issues that can be seen from here]

  • Is there a way to check the usage status of each cloud service within the company?
  • Is it possible to control access to unauthorized cloud services?
  • How to perform a security assessment of the cloud you use
  • More than 100,000 files managed by a transportation service company were accessible on Amazon S3

[Issues that can be seen from here]

  • Are IaaS/PaaS security settings (access rights, etc.) properly enforced?
  • Can you follow and understand IaaS/PaaS settings that are updated daily?
  • Are each workload on the compute instance properly managed?
  • Customer information managed on a SaaS that provides customer information management was made public due to improper access authority settings on the user side.

[Issues that can be seen from here]

  • Setting monitoring for SaaS as well as IaaS/PaaS is an important consideration

In order to securely utilize the cloud while protecting the important data owned by the company, and to provide new successful experiences to customers and employees, it is necessary to manage the settings of the cloud, operate the security of each workload (VM, etc.), and Various measures such as visualization and control of usage status are essential.

Enhancing "Cloud Security" -Four Solutions for Realization-

We will introduce four solutions for strengthening "cloud security" in response to the issues raised so far.

CASBs
CASBs

Cloud Access Security Broker

It is possible to visualize and analyze user access to the cloud, and to understand the status of access to unauthorized cloud services and the security level of each cloud service. Functions such as data protection, behavior detection, and threat defense are provided by linking with each cloud and proxy via API.

CSPM
CASBs

Cloud Security Posture Management

By collecting and diagnosing the settings of multi-cloud environments (mainly IaaS and PaaS) using APIs, etc., we automatically and continuously visualize configuration errors that lead to information leaks and data breaches. By implementing CSPM, we will be able to centrally manage policies and comply with various international security standards and guidelines, which will strengthen cloud governance.

SSPM
SSPM

SaaS Security Posture Management

It provides the same functions as CSPM, but the diagnostic target is SaaS applications. It mainly collects the settings of SaaS applications using APIs, etc., and automatically and continuously diagnoses setting errors that lead to information leaks and data breaches. Recently, important cloud-type storage services, customer data such as CRM, etc., are aggregated in SaaS, and depending on the settings of SaaS applications, there is a risk of unexpected data leakage, so it is attracting attention as a countermeasure. ing.

CWPP
CWPP

Cloud Workload Protection Platform

Provides various security functions such as visualization of workloads (VMs, containers, applications, etc.) running on the cloud, vulnerability management, network segmentation, application control, and workload behavior monitoring. Protect your workloads from a wide variety of threats in multi-cloud environments.