Netskope is recognized as a Leader again in the Gartner® Magic Quadrant™ for SASE Platforms. Get the Report

close
close
Your Network of Tomorrow
Your Network of Tomorrow
Plan your path toward a faster, more secure, and more resilient network designed for the applications and users that you support.
Experience Netskope
Get Hands-on With the Netskope Platform
Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
A Leader in SSE. Now a Leader in Single-Vendor SASE.
Netskope is recognized as a Leader Furthest in Vision for both SSE and SASE Platforms
2X a Leader in the Gartner® Magic Quadrant for SASE Platforms
One unified platform built for your journey
Securing Generative AI for Dummies
Securing Generative AI for Dummies
Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
Modern data loss prevention (DLP) for Dummies eBook
Modern Data Loss Prevention (DLP) for Dummies
Get tips and tricks for transitioning to a cloud-delivered DLP.
Modern SD-WAN for SASE Dummies Book
Modern SD-WAN for SASE Dummies
Stop playing catch up with your networking architecture
Understanding where the risk lies
Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
Netskope Technical Support
Netskope Technical Support
Our qualified support engineers are located worldwide and have diverse backgrounds in cloud security, networking, virtualization, content delivery, and software development, ensuring timely and quality technical assistance
Netskope video
Netskope Training
Netskope training will help you become a cloud security expert. We are here to help you secure your digital transformation journey and make the most of your cloud, web, and private applications.

Field Insights: Countermeasures for sneaky cloud data thieves with an appetite for cookies

Sep 20 2017
Tags
Data Exfiltration
Data Loss Prevention
Identity
Instance Awareness

We regularly do Q&A pieces with Netskope field experts to share their first-hand insights from working with organizations.  Read about a common challenge Netskope Regional Sales Engineer Mike Brockney helps organizations resolve with their cloud storage provider.

Describe a common cloud security challenge organizations face?

Enterprises believe they have all the necessary perimeter controls in place. For example, they have tried to lock as much down as possible to prevent users from accessing personal instances of their cloud storage to prevent the exfiltration of their confidential data.   The only way a user can upload sensitive corporate information or customer data is if they store it in their corporate sanctioned instance of cloud storage. But then they find an easy way to bypass all controls.  Just by using a simple HTTP sniffing tool, they maneuver around these controls unknown to any perimeter tools.

How do attackers leverage HTTP tools?  

HTTP tools allow would be attackers to glean the session ID in the form of a cookie.  They could log into a personal cloud storage account outside the corporate environment, copy the session ID, and then use that same ID inside the corporate environment when accessing a corporate instance for the same storage.   By simply swapping out session IDs or cookies, a potential thief could now upload data from a locked down corporate environment to a personal instance of cloud storage.   The user now can upload sensitive corporate data to a personal cloud storage account.

Will cloud application discovery or API out-of-band access prevent this type of data exfiltration?  

They will not.  To thwart this type of data loss, you would require an inline security solution with active controls.  A system is needed that can:

  1. Understand different instances of a cloud storage application. For example, differentiate between a corporate instance vs. a personal instance.
  2. Bind the instance ID of a cloud storage app to the session ID for a user, for a particular session.

What’s your recommendation?  

Having the first two steps in place above allows a security solution to prevent users who switch their session cookie from exfiltrating data to a personal cloud storage account.   Netskope has these capabilities in place and can help you implement these controls with policies.  By directing traffic from the end user to Netskope, before the data reaches the cloud storage provider, data can be protected.  Let Netskope help you keep your users out of the cookie jar and exfiltrate your corporate data to personal cloud storage.

author image
Mike Brockney
Browse recent articles by Mike Brockney, one of the contributors at Netskope. Discover the latest trends and updates within the cloud and network space.
Browse recent articles by Mike Brockney, one of the contributors at Netskope. Discover the latest trends and updates within the cloud and network space.
Connect with Netskope

Subscribe to the Netskope Blog

Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.