Back

Combating Shadow IT with EMS and Cloud App Security (VIDEO)

Uncover key strategies to defend against ransomware and rapid cyberattacks with Agile IT's video, highlighting Microsoft's advanced security solutions.

5 min read
Published on Jun 25, 2018
combating-shadow-it

Tech Talks are a weekly opportunity to learn how to do more with your cloud software and services. Each week, we feature a short talk from a subject matter expert, followed by a community driven Q&A where Agile IT customers can ask engineers any of their most pressing questions. This is a free service for our managed service clients. June 21st’s Tech Talk featured a discussion on Identifying Shadow IT using EMS and Cloud App Security by Kevin Martins, a Microsoft security expert.

When we talk about Shadow IT, what happens commonly is that you have a new employee, in this case the head of HR. At their last company, they were using some sort of cloud collaboration app, and when they start with your company, they also start using it with their team. Soon you discover that you have a group of 5-10 people using an un-vetted app to get work done faster, which is great in itself, but what information is going there?

  • Is there personally identifiable information (PII)?
  • Are they communicating social security numbers, or other protected data?
  • Does the service comply with the data compliance rules your company must follow, be it HIPPA, PCI or GDPR?
  • Where is the data going?
  • Where is hosted
  • Is it encrypted?

Now you have a Shadow IT problem

Using your firewall logs to identify Shadow IT

Microsoft Cloud App Security dashboardCloud App Security (CAS) can import system logs from over 20 different flavors of Firewalls, including Sonicwall, Sysco, Palo Alto Networks, Watch Guard and many more. There is also a custom log format tool in the application that allows you to set up CAS for any logs you may have. For the purpose of this demo, the data came from a fictitious Sonicwall environment used for Microsoft demos and testing.

A day’s worth of logs for a medium to large business can be parsed in a few hours. Once this is done, there is a catalog of over 16,000 cloud applications that can be checked for and analyzed. Right away, on the dashboard, you can see how many applications, how many IP addresses, how many users, and how much bandwidth use (both upload and download) has occurred.

You also get a quick overview of your top used apps, ranked by bandwidth, and grouped by type. You can see who your top bandwidth consumers are, along with total bandwidth used.  Each data point can be clicked on to drill down into the data. At the bottom of the dashboard is a locations map, that allows you to see where in the world the information is being sent. By hovering over regions, you can see how many apps are in each country. Clicking on the map lets you quickly see what apps are hosted in the country.

In this case, clicking on Russia identifies a few old installs of Kapersky that have been left behind. One click, and you get a full overview of the app including:

  • Risk level
  • Security Features (SAML, HTTPS, encryption protocol, Heartbleed patch status, and DROWN protection, etc)
  • Compliance certifications (HIPPA, GDPR ISO 27001, SOX, SOC , FINRA, etc)
  • Which of your users are using the app

Researching Shadow IT instances, including user identification

In addition to by the map, you can also pull up a list of applications in use, and filter based on the overall security score. From here, you can just click on the name to find out which users have interacted with it. This makes it very easy to identify malware, and also to track down end-users so you can investigate any suspected security incidents.

Setting alert and blocking rules for common cyber security vulnerabilities

Being able to see these things is incredibly useful, but most of us are too busy to check syslogs daily. Kevin next delves into Cloud App Security’s Policies and Templates and how to configure them to alert you to anomalous behaviors. You can create your own alerts and policies, but to get you started, there are pages of pre-defined templates that can be customized for your business, some examples are:

  • Files containing Personally Identifiable Information detected in the cloud
  • New cloud storage apps
  • Logins from risky IP addresses
  • Admin activity from a non-corporate IP address
  • Potential malware activity

In the Tech Talk, Kevin walks through the setup to detect potential malware activity. In this case, it utilizes commonly known ransomware file extensions to generate an alert. The alert can be fully customized to include method (Email or SMS) , activity, frequency and severity, keeping you from getting swamped by needless warning and allowing you to focus on the biggest potential threats. Additionally, you can choose to block many activities completely.

His next example is identifying anomalous download by a single user. This kind of activity could indicate a compromised account, or the internal theft of company information. Also  protecting from data loss are templates that can identify when information is shared with an unauthorized domain (a competitor), and even to identify when proprietary source code is shared or emailed.

Machine learning policies to detect anomalous user behavior

Kevin wraps up with a quick talk about how Cloud App Security uses machine learning to identify normal behaviors in your network so you can then create alerts or policies around anomalies. For the first two weeks the app is running it is actively learning how your users behave. When and where they login from, how much bandwidth they use and where are just a few of the behavioral data points that can then be used to create alerts. (Joe, who typically uploads 15mb per day, just uploaded 2 gigs).

In just 15 minutes, Kevin gives a great introduction to the robust security and monitoring available in Cloud App Security. However he has barely scratched the surface of what is available. If you already have a Microsoft 365 license, you probably also have access to this tool set. To find out more about configurations and managed security services, feel free to book a 30 minute consultation with one of our Cloud Service Advisors.

This post has matured and its content may no longer be relevant beyond historical reference. To see the most current information on a given topic, click on the associated category or tag.

Related Posts

Understanding DFARS Compliance

DFARS Compliance: A Guide to Federal Cybersecurity Requirements

Learn about DFARS compliance and how it ensures the security of federal data. Explore key requirements, NIST 800-171 alignment, and tips for achieving compliance.

Feb 3, 2025
7 min read
Office 365 License Comparison: Business Plans Vs. E5, E3 and E1

Master Microsoft & CIS Benchmark Best Practices to Secure Your Environment

Discover how to implement Microsoft & CIS Benchmark best practices to strengthen your business security and protect your environment from evolving threats with expert guidance.

Jan 28, 2025
7 min read
Screen Capture Protection in Windows 365

How to Enable Screen Capture Protection in Windows 365 for Enhanced Security

Learn how to enable and use screen capture protection in Windows 365 to secure sensitive information and prevent unauthorized captures, enhancing your organization's data security.

Jan 21, 2025
7 min read
Office 365 Collaboration Tools

Office 365 Collaboration Tools: Are They Right for Your Organization?

Explore how Office 365's collaboration tools can enhance your organization's productivity and security.

Jan 12, 2025
6 min read
NIST 800 171 vs NIST 800 53

NSA Cybersecurity Collaboration: No-Cost Services Available to DoD Contractors

Learn how NSA cybersecurity collaboration provides no-cost services to DoD contractors, helping enhance security and compliance with advanced cyber protections.

Jan 10, 2025
6 min read
When is a New CMMC Assessment Needed

Understanding When and Why You Need a New CMMC Assessment

Learn when to schedule a new CMMC assessment, what triggers reassessments, and how changes in scope, contracts, or compliance impact your certification process.

Jan 6, 2025
9 min read

Ready to Secure and Defend Your Data
So Your Business Can Thrive?

Fill out the form to see how we can protect your data and help your business grow.

Loading...
Secure. Defend. Thrive.

Let's start a conversation

Discover more about Agile IT's range of services by reaching out.

Don't want to wait for us to get back to you?

Schedule a Free Consultation

Location

Agile IT Headquarters
4660 La Jolla Village Drive #100
San Diego, CA 92122

Secure. Defend. Thrive.

Don't want to wait for us to get back to you?

Discover more about Agile IT's range of services by reaching out

Schedule a Free Consultation