In the ever-evolving landscape of cybersecurity, the collaborative effort between the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) in issuing five joint Cybersecurity Information Sheets (CSIs) marks a significant milestone in guiding organizations towards secure cloud adoption. These documents serve as a testament to the critical nature of securing cloud services in an era where digital transformation is not just an option, but a necessity. As the Director of Security Transformation at Netskope, I find these guidelines not only timely but closely aligned with our mission to provide comprehensive security solutions in the cloud, data, and cyber realms. In fact, we are helping customers secure data in the cloud in even more clever ways than the baseline recommendations in these information sheets. Let me walk through how these recommendations map onto Netskope’s approach and technology.
1. Secure Cloud Identity and Access Management Practices
The first CSI emphasizes the importance of secure cloud identity and access management practices. With the rise of sophisticated attacks targeting cloud identities, the adoption of robust mechanisms like multi-factor authentication (MFA) and stringent credential storage practices is paramount. At Netskope, we resonate with this approach through our Adaptive Access Control and seamless integration with cloud identity providers.
The key advantage of incorporating user confidence scores is the ability to continuously adapt security measures based on granular insights into the changing behaviors of user identities. When a user starts exhibiting behaviors that deviate from their usual pattern or resemble those of a threat actor—such as accessing sensitive data at unusual times or from unusual locations—Netskope’s policies can automatically adjust.
By leveraging more than 100 User and Entity Behavior Analytics (UEBA) policies, organziations can generate unique user confidence scores for each of an organization’s users, then integrate this into the Netskope real-time protection policies. Doing so allows Netskope to dynamically assess the risk associated with each user’s actions, and then deliver the right access control policy for your organization’s risk appetite.
2. Secure Cloud Key Management Practices
The second CSI focuses on the critical aspect of key management in cloud environments, underscoring the importance of understanding and documenting shared security responsibilities. Netskope gives its customers full control over encryption keys by supporting third-party hardware security modules (HSM) in these ways:
- Storing the key that corresponds to a certificate which in turn signs generated certificates used for inspecting TLS traffic
- Storing keys generated for encrypting structured and unstructured data
As many industries are subject to strict regulatory requirements regarding data protection and privacy, using an HSM to manage encryption keys helps organizations comply with these regulations by ensuring that the keys are securely managed and not exposed to third-party cloud providers.
The logical security measures provided by HSMs protect against a wide range of attacks, including tampering and exploitation attempts. This ensures that encryption keys remain secure, even in the event of a breach elsewhere in the IT environment.
In the current digital age, where data breaches and cybersecurity threats are increasingly common, securing sensitive data in the cloud has become paramount. Netskope’s support for hardware security modules empowers organizations to take control of their encryption key management, offering a secure, compliant, and flexible solution that aligns with the NSA and CISA’s recommendations for secure cloud key management practices. This approach not only enhances an organization’s cloud security posture but also builds trust with customers and stakeholders by demonstrating a commitment to protecting sensitive information.
3. Network Segmentation and Encryption in Cloud Environments
Implementing network segmentation and encryption in cloud environments is the focus of the third CSI. Netskope’s secure access service edge (SASE) is a comprehensive cloud security service that delivers network segmentation and encryption in all cloud and on-premise environments. With the rise of cloud services exponentially increasing the complexity of managing and securing enterprise networks, and with 74% of data theft coming from the movement of corporate data to personal instances of approved cloud applications, this complexity underscores the need for robust solutions like Netskope’s Next Gen Secure Web Gateway (NG-SWG) with instance awareness.
Instance awareness allows Netskope’s NG-SWG to distinguish between different instances of the same cloud application. For example, it can differentiate between an organization’s official instance of a cloud storage application and personal or third-party instances accessed by the user.
By leveraging instance awareness, Netskope NG-SWG can enforce policies that prevent users from accessing unauthorized, third-party, or personal instances of cloud applications. This capability is crucial for preventing data exfiltration and ensuring that sensitive corporate data remains within sanctioned environments. When a user attempts to access an unsanctioned instance, the NG-SWG can block access or redirect the user to an approved instance, significantly reducing the risk of data theft or leakage.
Netskope Borderless SD-WAN (BWAN) extends the concept of network segmentation beyond traditional network perimeters, catering to the needs of a modern workforce that operates from varying locations and uses a multitude of devices. Netskope BWAN ensures network segmentation for any device by encapsulating each session in a secure and encrypted tunnel. This segmentation extends to all applications and data, whether hosted in the cloud or on-premises, effectively isolating critical resources from unauthorized access.
4. Secure Data in the Cloud
The fourth CSI addresses the vital aspect of securing data in the cloud. Netskope’s Data Loss Prevention (DLP) capabilities are at the forefront of this challenge, offering comprehensive protection across SaaS, IaaS, private applications, and more, as well as the ability to support the huge variance in regional and sector DLP requirements.
Netskope DLP includes over 3,000 industry and region-specific data profiles so are tailored to meet the unique compliance requirements and business needs of various organizations. This vast library of data profiles enables businesses to quickly identify and protect sensitive information relevant to their specific industry or geographic location, facilitating faster return on investment and ensuring compliance with regional data protection laws and regulations. This capability aligns with the NSA and CISA’s advice on securing data from unauthorized access and adhering to legal and regulatory requirements.
Going one step further, Netskope’s DLP also leverages 27 machine learning classifiers, exact data matching, and a customizable classifier engine. This advanced technology allows for organizations to create data classifiers unique to them, allowing the precise detection and protection of sensitive data, reducing the risk of false positives and ensuring that security measures do not hinder legitimate business processes. The ability to train your own classifier further aligns Netskope DLP with each customer’s specific data protection needs.
Netskope DLP also provides extensive coverage across a variety of environments, including software-as-a-serv