Home
%3CLINGO-SUB%20id%3D%22lingo-sub-650839%22%20slang%3D%22en-US%22%3EDiscover%20Shadow%20IT%20across%20IaaS%20and%20PaaS%20with%20Microsoft%E2%80%99s%20CASB%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-650839%22%20slang%3D%22en-US%22%3E%3CP%3EInfrastructure-as-a-Service%20(IaaS)%20initiated%20the%20decline%20of%20traditional%20data%20center%20strategies.%20Today%2C%20modern%20cloud-focused%20IT%20strategies%20enable%20organizations%20to%20implement%20new%20processes%20and%20scale%20their%20infrastructure%20up%20and%20down%20as%20needed%2C%20allowing%20them%20to%20reach%20cost%20efficiencies%20and%20high%20levels%20of%20flexibility.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhether%20organizations%20have%20chosen%20a%20single-%20or%20multi-cloud%20vendor%20strategy%2C%20they%20are%20often%20surprised%20when%20they%20find%20that%20a%20business%20unit%20has%20servers%20on%20a%20platform%20without%20any%20IT%20oversight.%26nbsp%3BPaaS%20adoption%20is%20commonly%20driven%20by%20developers%20working%20on%20custom%20applications%2C%20or%20even%20business-users.%20When%20the%20use%20of%20IaaS%20and%20PaaS%20services%20are%20leveraged%20by%20these%20user%20groups%2C%20it%20often%20happens%20without%20any%20IT%20oversight%20and%20can%20go%20unmonitored%20for%20extended%20periods%20of%20time%20-%20posing%20significant%20security%20risks%20to%20an%20organization.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETake%20for%20instance%20storage%20solutions.%20Microsoft%20Azure%20blobs%2C%20Amazon%20Web%20Services%20S3%20buckets%2C%20or%20Google%20Cloud%20Platform%20storage%20buckets%20can%20host%20business-critical%20resources%20such%20as%20documents%2C%20databases%2C%20and%20source%20code.%20A%20simple%20access%20misconfiguration%20can%20expose%20sensitive%20information%20and%20lead%20to%20malicious%20exfiltration.%20Data%20shows%20that%20organizations%20often%20have%20hundreds%20of%20custom%20apps%20running%20in%20the%20cloud%2C%20while%20our%20research%20suggests%20that%20only%20a%20fraction%20is%20managed%20with%20IT%20oversight.%26nbsp%3BTherefore%2C%20it%E2%80%99s%20important%20to%20establish%20IT%20oversight%20from%20the%20beginning%20to%20avoid%20stale.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22http%3A%2F%2Fwww.aka.ms%2FMCAS%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Cloud%20App%20Security%3C%2FA%3E%20has%20extended%20its%20Shadow%20IT%20Discovery%20capabilities%20to%20detect%20resources%20that%20are%20hosted%20on%20IaaS%20and%20Platform-as-a-Service%20(PaaS)%20solutions%20across%20Microsoft%20Azure%2C%20Amazon%20Web%20Services%20(AWS)%2C%20and%20Google%20Cloud%20Platform%20(GCP)%2C%20with%20more%20being%20added%20soon.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F116513i8A97F984922FF2E2%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22Resourcespic.png%22%20title%3D%22Resourcespic.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EThe%20new%20%E2%80%9C%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fdiscovered-apps%23discover-resources-and-custom-apps%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EDiscovered%20resources%3C%2FA%3E%E2%80%9D%20tab%20in%20the%20Microsoft%20Cloud%20App%20Security%20portal%20provides%20you%20with%20visibility%20into%20the%20custom%20apps%20that%20run%20on%20top%20of%20your%20IaaS%20and%20PaaS%20subscriptions.%26nbsp%3BYou%20can%20use%20this%20new%20capability%20to%20gain%20full%20visibility%20into%20the%20resources%20that%20exist%20within%20your%20organization%2C%20which%20users%20are%20accessing%20them%2C%20transactions%2C%20IP%20addresses%2C%20and%20how%20much%20traffic%20is%20being%20transmitted.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3EImage%201%3C%2FEM%3E%20shows%20the%20new%20%E2%80%9CDiscovered%20resources%E2%80%9D%20view%20in%20Microsoft%20Cloud%20App%20Security%20and%20the%20drill%20down%20into%20one%20of%20the%20discovered%20resources.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F116265iE5EEB4A99BDB3472%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22resourcespic1.png%22%20title%3D%22resourcespic1.png%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EImage%201%3A%20%E2%80%9CDiscovered%20resources%E2%80%9D%20view%20in%20Microsoft%20Cloud%20App%20Security%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMore%20info%20and%20feedback%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EGet%20started%20with%20our%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fcloud-app-security%2Fdiscovered-apps%23discover-resources-and-custom-apps%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Etechnical%20documentation%3C%2FA%3E%26nbsp%3Btoday.%3C%2FLI%3E%0A%3CLI%3EHaven%E2%80%99t%20tried%20Microsoft%20Cloud%20App%20Security%20yet%3F%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fmcastrial%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EStart%20a%20free%20trial%20today%3C%2FA%3E.%3C%2FLI%3E%0A%3CLI%3EAs%20always%2C%20we%20want%20to%20hear%20from%20you!%20If%20you%20have%20any%20suggestions%2C%20questions%2C%20or%20comments%2C%20please%20visit%20us%20on%20our%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-Cloud-App-Security%2Fbd-p%2FMicrosoftCloudAppSecurity%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ETech%20Community%20page%3C%2FA%3E.%3C%2FLI%3E%0A%3CLI%3EFor%20more%20resources%20and%20information%20go%20to%20our%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fenterprise-mobility-security%2Fcloud-app-security%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ewebsite%3C%2FA%3E.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%E2%84%A22019%2C%20Amazon%20Web%20Services%20logo%20is%20a%20trademark%20of%20Amazon.com%2C%20Inc.%20or%20its%20affiliates%20in%20the%20United%20States%20and%2For%20other%20countries.%3C%2FP%3E%0A%3CP%3E%C2%A92018%20Google%20LLC%20All%20rights%20reserved.%20Google%20and%20the%20Google%20logo%20are%20registered%20trademarks%20of%20Google%20LLC.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-650839%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22http%3A%2F%2Fwww.aka.ms%2FMCAS%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EMicrosoft%20Cloud%20App%20Security%3C%2FA%3E%26nbsp%3Bextends%20Shadow%20IT%20Discovery%20to%20detect%20resources%20across%20IaaS%20and%20PaaS%20solutions%20incl.%20Azure%2C%20AWS%2C%20and%20Google%20Cloud%20Platform%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-650839%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EEnterprise%20Mobility%20%2B%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Cloud%20App%20Security%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E

Infrastructure-as-a-Service (IaaS) initiated the decline of traditional data center strategies. Today, modern cloud-focused IT strategies enable organizations to implement new processes and scale their infrastructure up and down as needed, allowing them to reach cost efficiencies and high levels of flexibility.

 

Whether organizations have chosen a single- or multi-cloud vendor strategy, they are often surprised when they find that a business unit has servers on a platform without any IT oversight. PaaS adoption is commonly driven by developers working on custom applications, or even business-users. When the use of IaaS and PaaS services are leveraged by these user groups, it often happens without any IT oversight and can go unmonitored for extended periods of time - posing significant security risks to an organization.

 

Take for instance storage solutions. Microsoft Azure blobs, Amazon Web Services S3 buckets, or Google Cloud Platform storage buckets can host business-critical resources such as documents, databases, and source code. A simple access misconfiguration can expose sensitive information and lead to malicious exfiltration. Data shows that organizations often have hundreds of custom apps running in the cloud, while our research suggests that only a fraction is managed with IT oversight. Therefore, it’s important to establish IT oversight from the beginning to avoid stale.

 

Microsoft Cloud App Security has extended its Shadow IT Discovery capabilities to detect resources that are hosted on IaaS and Platform-as-a-Service (PaaS) solutions across Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP), with more being added soon.

Resourcespic.png

The new “Discovered resources” tab in the Microsoft Cloud App Security portal provides you with visibility into the custom apps that run on top of your IaaS and PaaS subscriptions. You can use this new capability to gain full visibility into the resources that exist within your organization, which users are accessing them, transactions, IP addresses, and how much traffic is being transmitted.

 

Image 1 shows the new “Discovered resources” view in Microsoft Cloud App Security and the drill down into one of the discovered resources.

 

resourcespic1.pngImage 1: “Discovered resources” view in Microsoft Cloud App Security

 

More info and feedback

 

™2019, Amazon Web Services logo is a trademark of Amazon.com, Inc. or its affiliates in the United States and/or other countries.

©2018 Google LLC All rights reserved. Google and the Google logo are registered trademarks of Google LLC.