Secure Access Service Edge (SASE)

Qu'est-ce que SASE ?

Secure Access Service Edge (SASE), pronounced “sassy,” is a cloud-based architecture that delivers network and security services meant to protect users, applications, and data. This term was coined by Gartner in 2019 and has quickly risen through the ranks to become one of the top aspirational security concepts of the current decade so far. Given that many users and applications no longer live and operate on a corporate network, access and security measures can’t depend on conventional hardware appliances in the corporate datacenter.

SASE promises to deliver the necessary networking and security capabilities in the form of cloud-delivered services. Done properly, a SASE model eliminates perimeter-based appliances and legacy solutions. Instead of delivering the traffic to an appliance for security, users connect to the SASE cloud service to safely access and use web services, applications, and data with the consistent enforcement of security policy.

Where is the “edge” in Secure Access Service Edge?
The “edge” in SASE refers to the cloud provider’s global systems that exist on their hardware (data centers and devices). Users access cloud services by logging in and authenticating their identities, from any location, and are passed through this “edge” into the cloud environment.

sase meaning


White Paper: SASE and the Seven Forces Shaping Security Transformation
Blog: A CISOs View of SASE


 

Why is SASE important?

Les mesures de sécurité conventionnelles partaient du principe que les applications et les utilisateurs se trouveraient à l'intérieur du périmètre réseau ; or, ce n'est de nos jours plus le cas. Les données des entreprises sont migrées dans le cloud, les employés travaillent de plus en plus à distance et les initiatives en matière de transformation numérique exigent que les services informatiques fassent preuve d'agilité afin de pouvoir tirer profit des nouvelles opportunités commerciales.

As a result, the traditional network perimeter is dissolving, and new models for access controls, data protection, and threat protection are necessary. In light of these changes, organizations are finding that their existing collection of standalone point products such as firewalls, secure web gateway, data loss prevention (DLP), and cloud access security brokers (CASB), are no longer applicable in a cloud-first world.

SASE : les prédictions du cabinet Gartner

 

20% of enterprises will adopt SWG, CASB, ZTNA and branch FWaaS by 202340% of enterprises will develop strategies to adopt SASE by 2024
 

des entreprises adopteront des technologies SWG, CASB, ZTNA et FWaaS d'ici 2023

 

des entreprises mettront au point des stratégies d'adoption de l'architecture SASE d'ici 2024

Source : rapport Gartner « The Future of Network Security Is in the Cloud »
(L'avenir de la sécurité des réseaux réside dans le Cloud)

 

À quoi ressemble une architecture SASE ?

Secure Access Service Edge, or SASE, unifies networking and security services in a cloud-delivered architecture to protect users, applications, and data everywhere. Given that users and applications are no longer on a corporate network, security measures can’t depend on conventional hardware appliances at the network edge.

SASE diagram

There are two sides of SASE architecture: Security and Networking

Instead, SASE promises to deliver the necessary networking and security as cloud-delivered services. Done properly, a SASE model eliminates perimeter-based appliances and legacy solutions. Instead of delivering the traffic to an appliance for security, users connect to the SASE cloud service to safely use applications and data with the consistent enforcement of security policy.


Blog: How to Securely Manage Your Shift to the Cloud
Blog: Gartner et son guide stratégique pour le modèle de convergence SASE


 

SASE Includes the Following Technologies and Capabilities

Une architecture SASE est en mesure d'identifier les utilisateurs et les périphériques, d'appliquer des contrôles de sécurité basés sur des politiques et de fournir un accès sécurisé aux données et applications appropriées. Le SASE permet de fournir un accès sécurisé, quel que soit l'emplacement des utilisateurs, des données, des applications ou des périphériques.

  • Microservices cloud-native réunis en une seule et même plateforme
  • Possibilité d'inspecter le traffic chiffré SSL/TLS dans le cloud
  • Inline proxy capable of decoding cloud and web traffic (Next-Generation Secure Web Gateway/NG SWG)
  • Firewall and intrusion protection for all ports and protocols (Firewall as a Service/FWaaS)
  • Managed cloud service API integration for data-at-rest (Cloud Access Security Broker/CASB)
  • Public cloud IaaS continuous security assessment (Cloud Security Posture Management/CSPM)
  • Advanced data protection for data-in-motion and at-rest (Data Loss Prevention/DLP)
  • Protection contre les menaces avancées, notamment IA/ML, UEBA, sandboxing, etc. (ATP)
  • Threat intelligence sharing and integration with EPP/EDR (Endpoint Protection Platform/Endpoint Detection and Response), SIEM (Security Information and Event Management), and SOAR (Security Orchestration, Automation, and Response)
  • Software-defined perimeter with zero trust network access, replacing legacy VPNs (SDP, ZTNA)
  • Protection for the branch, including support for branch networking initiatives such as SD-WAN (Software-Defined Wide Area Network)
  • Carrier-grade, hyper-scale network infrastructure with a global POP (Point of Presence) footprint

Blog: Where CASB and SWG and Headed
Blog: Don’t Strangle Your SASE


 

What are the Benefits of SASE?

1. Flexibility:
Allows for direct-to-net or direct-to-cloud access from anywhere for easy adoption of new digital business models

2. Cost savings:
Élimine les dépenses d'investissement pour les infrastructures locales, et génère des dépenses d'exploitation réduites et prévisibles en raison de son modèle Security-as-a-Service

3. Reduced complexity:
Consolidated services into a cloud-delivered model eliminates complex stack of legacy point solutions and simplifies operational effort

4. Increased performance:
Enhances and accelerates access to internet resources via a global network infrastructure optimized for low-latency, high-capacity, and high-availability

5. Zero trust network access:
Offre un accès sécurisé et contextuel aux applications privées dans des clouds publics/privés

6. Threat protection:
Bloque les attaques cloud et Web telles que le cloud phishing, les malwares, les ransomwares et les comportements internes malveillants

7. Data protection:
Protège les données où qu'elles aillent, à l'intérieur comme à l'extérieur de l'entreprise, y compris dans les clouds publics ainsi qu'entre les instances d'entreprise et les instances personnelles des applications cloud

 

What are the Four Questions to Ask When Adopting SASE?

1. How does your current web or cloud security give you full visibility and context across all web and cloud traffic?

Tâchez de combiner votre passerelle Web sécurisée (SWG) et votre agent de sécurité des accès au cloud (CASB). Vous bénéficierez alors d'une visibilité et d'un contrôle critiques sur vos dispositifs DLP (protection contre la perte de données) et ATP (protection contre les menaces avancées), qui sont hébergés sur la même plateforme, dans le cloud. Après avoir abandonné vos anciennes appliances SWG, optez pour un accès réseau zéro-confiance (ZTNA) afin de remplacer vos appliances VPN obsolètes et de moderniser votre stratégie globale en matière d'accès sécurisé.

2. What level of cloud-scale does your current security solution provide?

La majorité du trafic cloud est chiffrée, ce qui amène de plus en plus de pirates à exploiter le cloud pour échapper aux contrôles réseau traditionnels. L'inspection SSL/TLS à l'échelle du cloud vous permet de réduire votre exposition à ces nouvelles menaces.

3. Does your current network support high performance and consistent availability?

Users expect high performance with low latency, because if the SASE is slow, unhappy users will look for ways around your system. In order to deliver great user experience, make sure that your SASE solution is engineered for high performance and located in the places that your users are.

4. How many consoles and policies do you currently have to use to manage your existing security stack?

Many vendors are adapting or virtualizing their software and calling it a cloud-based solution. If it isn’t designed to be a SASE, you may end up with multiple administrative consoles, complex policies that are hard to manage, and time-wasting tools for conducting investigations. Choose a solution that has a single management console, single client, and a single policy engine to streamline operations and effectiveness for network and security teams.


For more information on SASE, download Netskope’s SASE Resource Pack and SASE Adoption Guide.

 

Become a SASE Expert

Sponsored by Netskope, The SASE Accreditation is an introductory training on Secure Access Service Edge (SASE), an architectural framework for security and networking that addresses the security challenges modern organizations face as they embrace cloud applications, protect data, and unify networking and security services.

 

In this two-day accreditation, you will learn how SASE helps networking and security professionals gain greater visibility and real-time actionable information about cloud services, activity, traffic, and data while also simplifying your security stack.

Ressources

Subscribe for the latest cloud security insights

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.