AST Digital Magazine August 2017 Digital-Aug | Page 46

Volume 15 August 2017 Edition orous security assessment by weighing the built- in security capabilities and risks of the cloud ser- vice before sanctioning it for corporate-wide use. Defending against Shadow IT with Cloud Security Best Practices With so much sensitive data in the cloud, the re- cent rise of insider threats is even more troubling. This is a problematic risk to many companies, as these insider threats are often times based on negligence and are difficult to detect. An important element of these threats relates to the use of Shadow IT, which is when employees procure unapproved cloud services without the knowledge of their IT department. While Shadow IT is nothing new, the advent of cloud-based shadow IT and its negligent use has certainly made life difficult for IT security depart- ments. However, with proper cloud governance strate- gies, organizations can unlock the full benefits of the cloud without having to worry about putting corporate data at risk. 1. Visibility It is estimated that 90% of cloud service usage falls into this mysterious category. While using unauthorized cloud services may seem harmless, Shadow IT poses a threat be- cause the average employee does not apply the same level of scrutiny when analyzing the secu- rity of a cloud application. Effective cloud security and governance begins with having complete visibility over which servic- es are being used by employees. This can be achieved by understanding how many cloud services are in existence (not an easy task), what their URLs are, and using a combination of security tools, block/allow their use based on their security risk rating. (Over 500 enterprises including Aetna, DIRECTV, General Mills, HP, and Western Union use Skyhigh to gain visibility, manage threats, ensure compliance and protect corporate data across shadow and sanctioned cloud services. Courtesy of Skyhigh, the leading cloud access security broker (CASB) and YouTube) IT security departments preform a much more rig- The security risk rating should take into account things like whether the cloud service provides data encryption at rest, whether it takes owner- ship of the data uploaded to its cloud, whether it deletes user data upon account termination, etc. Aside from providing transparency into the cloud services used within an organization, gaining granular visibility also has the benefit of acceler- ating cloud service adoption. 46