EZ Profile picture
Nov 8 7 tweets 3 min read Read on X
IAM = Identity AND ACCESS management.

When you use a CASB, you are delegating ACCESS management to the CASB.

What is a CASB?
- Sanctioning (determining ACCESS to apps)
- ACCESS management (a component of IAM)
- Session management (Data in Motion DLP)
- Labeling data and determining ACCESS
- UEBA (threat policies)
- Governance (monitoring and actioning API and app deprecation and determining risk)
- SSPM (SaaS Posture Management)

When you have a CASB AND you are using it, you have delegated ACCESS management (of IAM) to the CASB.

How is this achieved? Oauth.
For those who like pictures, we are talking about here: Image
When you create an ACCESS or SESSION policy of any type, it's required to be present in the Conditional Access App Control settings. Image
Most orgs do not have full Defender XDR unless they are E5 tenants. But, mant orgs have addons that include Defender for Cloud Apps. I have the standalone addon. It costs about 6$ per user per month. Image
For you to be able to have CASB functionality, it requires the Apps to be listed here: Image
If your apps already exist in Entra AND are being used, they will show up automagically in Conditional Access App Control Settings (above post). Nothing else needs to be done. However, if you use other IdPs, you have to create an app in the other IdP to bring in their catalogue OR you can onboard them manually, your choice depending on OOB solutions for your IdP. For example, with Okta, Ping One, ADFS, you can just bring in the catalog.

If you bought Defender for Cloud Apps standalone product or bundled with another addon, this is the functionality you bought. If you have E5, you already have all of this. If you're in GCCH, be cognizant that the the Defender for Cloud Apps service is hosted in Azure commercial cloud and data is cached there. It's not stored at rest though in the commercial service in Azure.

The only reason the CAP is required for session and access control is to tell entra to do the reverse proxy with Defender for Cloud Apps. That is all. If you have a 3rd party IdP where you are onboarding the catalogue, you don't need this cap because the session and access control happens in the reverse proxy configured in the 3rd party IdP.Image
This thread demonstrated why you need IAM experience to implement CASB

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with EZ

EZ Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @IAMERICAbooted

Sep 14
Let's play a game: How do you hold an M365 tenant hostage?

So, the attacker got Global Admin. Let's play scorched earth.

1. Lock out all the admins except yourself with CAPs.
2. Change all the client secrets and certs+keys.
3. Block everyone from using Exchange, Sharepoint, and Teams with CAPs.
4. Enable customer lockbox
5. Configure all the sensitivity labels with BYOK :p
6. Unassign all Enterprise applications and revoke API permissions :p
7. Disable any B2B trusts
8. In all the admin centers, remove all admin roles not in Entra.

What else?
9. Disable any partner access/ gdap
ok here's what we've got so far for scorched earth m365:

1. Lock out all the admins except yourself with CAPs.
2. Change all the client secrets and certs+keys.
3. Block everyone from using Exchange, Sharepoint, and Teams with CAPs.
4. Enable customer lockbox
5. Configure all the sensitivity labels with BYOK :p
6. Unassign all Enterprise applications and revoke API permissions :p
7. Disable any B2B trusts
8. In all the admin centers, remove all admin roles not in Entra.
9. Disable any partner access/ gdap
10. Disable private domains.
11. Create an autolabing policy to label all data with a Sensitivity Label with BYOK :P
12. Disconnect from on-prem AD
13. Write a scheduled task to delete all new Global Admins and run it every second
14. Delete Azure HSM
Read 9 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(