Apps seen in Cloud app security but not on firewall

%3CLINGO-SUB%20id%3D%22lingo-sub-128084%22%20slang%3D%22en-US%22%3EApps%20seen%20in%20Cloud%20app%20security%20but%20not%20on%20firewall%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-128084%22%20slang%3D%22en-US%22%3E%3CP%3EHi%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAccording%20to%20our%20cloud%20app%20security%20we%20have%20a%20number%20of%20apps%20graded%203-%204%20level%20security%20level%2C%20so%20since%20i%20have%20no%20user%20info(as%20the%20logs%20come%20from%20a%20checkpoint%20firewall%20and%20are%20not%20that%20integrated)%20I%20deciided%20to%20look%20at%20the%20firewall.%3C%2FP%3E%3CP%3ECannot%20identify%20the%20app%20concerned%20at%20all%2C%20how%20does%20the%20cloud%20app%20security%20CASB%20read%20these%20apps%20...%20should%20i%20just%20assume%20its%20correct%20and%20ask%20the%20user%20if%20he%2Fshe%20has%20used%20this%20app%20but%20then%20find%20they%20no%20nothing%20about%20them%3F%3C%2FP%3E%3CP%3ECan%20anyone%20enlighten%20me%20%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESteve%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-128084%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20App%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECloud%20Discovery%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EThreat%20protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-128269%22%20slang%3D%22en-US%22%3ERe%3A%20Apps%20seen%20in%20Cloud%20app%20security%20but%20not%20on%20firewall%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-128269%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20Steve%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ECloud%20App%20Security%20uses%20your%20traffic%20logs%20to%20dynamically%20discover%20and%20analyze%20the%20cloud%20apps%20that%20your%20organization%20is%20using.%26nbsp%3BThe%20discovery%20of%20apps%20in%20achieved%20by%20comparing%20the%20destination%20URL%2FIP%20to%20a%20set%20of%20apps'%20signatures.%20Specifically%20for%20Checkpoint%20Firewall%2C%20the%20identification%20is%20based%20on%20the%20destination%20IP%20(as%20Checkpoint%20does%20not%20log%20the%20destination%26nbsp%3BURL).%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EThe%20signatures%20database%20is%20continuously%20updated%20to%20accurately%20capture%20the%20latest%20URLs%20and%20IP%20on%20known%20Cloud%20Apps%2C%20and%20to%20cover%20new%20apps%20that%20were%20published.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EWe%20often%20see%20cases%20where%20apps%20are%20discovered%20in%20Cloud%20App%20Security%20but%20not%20in%20customers'%20FW%2FProxy%26nbsp%3Bdue%20to%20outdated%20signatures%20held%20by%20the%20FW%2FProxy.%20The%20accurate%20and%20updated%20signature%20database%2C%20also%20known%20as%20the%20Cloud%20App%20Security%20Application%20Catalog%2C%20is%20one%20on%20the%20key%20benefits%20of%20using%20the%20product%20for%20Shadow%20IT%20discovery.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EThanks%2C%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ENiv%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Occasional Contributor

Hi

 

According to our cloud app security we have a number of apps graded 3- 4 level security level, so since i have no user info(as the logs come from a checkpoint firewall and are not that integrated) I deciided to look at the firewall.

Cannot identify the app concerned at all, how does the cloud app security CASB read these apps ... should i just assume its correct and ask the user if he/she has used this app but then find they no nothing about them?

Can anyone enlighten me ?

 

Steve

1 Reply

Hi Steve,

 

Cloud App Security uses your traffic logs to dynamically discover and analyze the cloud apps that your organization is using. The discovery of apps in achieved by comparing the destination URL/IP to a set of apps' signatures. Specifically for Checkpoint Firewall, the identification is based on the destination IP (as Checkpoint does not log the destination URL).

The signatures database is continuously updated to accurately capture the latest URLs and IP on known Cloud Apps, and to cover new apps that were published.

We often see cases where apps are discovered in Cloud App Security but not in customers' FW/Proxy due to outdated signatures held by the FW/Proxy. The accurate and updated signature database, also known as the Cloud App Security Application Catalog, is one on the key benefits of using the product for Shadow IT discovery.

 

Thanks,

Niv