Cloud Access Security Broker (CASB)
Read this topic to learn how to configure CASB on SRX Series Firewalls to enable inline activity control for the selected set of cloud applications.
CASB Overview
Cloud Access Security Broker (CASB) serves as a critical security checkpoint positioned between enterprise users and cloud service providers. Its primary role is to enforce security policies to protect and control access to cloud applications.
CASB is a new Layer 7 service on SRX Series Firewalls which provides inline application activity control. CASB's policy engine allows you to refine access conditions. You can specify rules for accessing, downloading, and uploading files for a set of cloud applications for use within your organization.
Benefits
- CASB empowers security teams with comprehensive visibility and control over SaaS applications and activities.
- CASB enables fine-grained control through customized policy rules tied to specific applications and activities.
- CASB validates through domain validation that the SaaS applications your organization uses are legitimate and not maliciously impersonated.
To use CASB on your firewalls, you must configure CASB policies and apply CASB policy rules in a security policy.
Steps to configure CASB functionality:
- Configure CASB policy.
Set CASB policy rule with one of the matching conditions:
Application such as Dropbox, Google Docs, OneDrive or application group such as FileSharing, chat, email.
Activities such as login, download, and upload. However, not all applications support every activity. When configuring an application, ensure that you only select activities that are supported by that specific application. For a comprehensive view of the mapping between applications and their associated activities, see Table 1.
Table 1: Mapping of Application and Activities Supported Applications
Supported Activities
Box Login, Upload, Download, Share Dropbox Login, Upload, Download, Share Google Docs Login, Upload, Download, Share Salesforce Login, Upload, Download, Share OneDrive Login, Upload, Download, Share SharePoint Login, Upload, Download, Share Slack Login, Chat, Audio/Video, File Transfer Gmail Login, Read, Compose, Send, Upload Attachment, Download Attachment You can configure activity-parameters for share-activity option. You can configure this optional statement to have even more granular control over traffic.
Create an application instance for CASB. For CASB, to differentiate between corporate and non-corporate SaaS application instances, administrators need to configure access policies using the instance parameter. To identify an instance, CASB requires instance ID, domain, and type (optional). Table 2 provides application instance setting options.
Table 2: Application Instance Settings Setting
Guideline
Name
(Required) Application instance name. For example, dropbox123.
Application instance ID
(Required) Application instance ID. It refers to unique URL to access SaaS service
Each application can have its own instance ID. For the following example URLs, common string acmecorp07 as the instance ID taken from application's SaaS URLs:
Box URL—acmecorp07.app.box.com
OneDrive or SharePoint URL—acmecorp07ms-my.sharepoint.com
- Salesforce URLs—acmecorp07.my.salesforce.com and acmecorp07.lightning.force.com
Slack—Slack URL is acmecorp-zoy8730.slack.com and instance ID is acmecorp-zoy8730.
Following applications have generic URLs and instance ID is not applicable.
Dropbox—dropbox.com
Google Docs—docs.google.com
Gmail—mail.google.com
Domain
(Required) Enter the domain address. It refers to email domain.
For example, acmecorp07.com is an organization domain. Box, Dropbox, Google Docs, Salesforce, Gmail, and Slack uses the same domain for all the users.
OneDrive and SharePoint domain value is acmecorp07ms.onmicrosoft.com.
Type
(Optional) Enter one of the following values to map a type with an application instance:
Work
Personal
You must configure the type of value for Dropbox. For other applications, this configuration is optional.
Tag
(Optional) Enter one of the following values to map a tagging with an application instance:
Sanctioned—Application instances sanctioned by your organization.
Unsanctioned—Application instances unsanctioned by your organization.
Define policy action. Each policy has a set of actions (allow/deny and log-action) that the system performs upon success of all matching conditions.
Configure a default rule. The default rule is matched if none of the other rules are matched, or if there are no other rules in the policy. Configuring a default rule is mandatory.
Apply CASB policies in the security policy as application services for the permitted traffic.
Note the followings for CASB rules:
-
Arrange your CASB rules in sequential order to handle specific match criteria for applications or activities.
-
Set up a default CASB policy for the unified policy configuration. This default policy applies to the session until a dynamic application match occurs. Once the final application match is available for the security policy, the corresponding CASB policy will be applied. If no CASB policy is explicitly configured in the final firewall policy, the CASB service disengages for the session.
- You can configure up to 64 CASB policies for SRX300, SRX320, SRX325, SRX340, SRX550M, and SRX1500. You can configure up to 256 policies for SRX4000-line and SRX5000-line Firewalls.
Sample CASB Policy Configuration
To configure CASB, you must:
-
Install Junos OS Release 24.2R1 on your SRX Series Firewall.
-
Install a valid application identification feature license on your SRX Series Firewall. See Managing Junos OS Licenses.
-
Download and install the Junos OS application signature package. Downloading and Installing the Junos OS Application Signature Package.
The following sample shows configuration of CASB policy to allow users to share to SharePoint application with given domain only.
- Configure CASB policy
parameters.
[edit] user@host# set security casb instance is1 application SharePoint user@host# set security casb instance is1 instance-id acmecorp07 user@host# set security casb instance is1 domain acmecorp07ms-my.sharepoint.com user@host# set security casb instance is1 tag sanctioned user@host# set security casb instance is1 type work user@host# set security casb casb-policy casb-policy-1 rules rule1 match application SharePoint activity Share param-name share-domain param-value acmecorp07 user@host# set security casb casb-policy casb-policy-1 rules rule1 match application SharePoint instance is1 user@host# set security casb casb-policy casb-policy-1 rules rule1 then allow user@host# set security casb casb-policy casb-policy-1 rules rule1 then log-action user@host# set security casb casb-policy casb-policy-1 default-rule allow user@host# set security casb casb-policy casb-policy-1 default-rule log-action
Note:In the process of configuring a CASB policy, both application and activity are required components, whereas param-value is an optional element that allows you to specify finer-grained options within the policy.
Apply CASB policies in the security policy as application-services.
[edit] user@host# set security policies from-zone trust to-zone untrust policy policy-name then permit application-services casb-policy casb-policy-1
The following CASB policy denies downloads from all file sharing applications.
- Configure CASB policy
parameters.
[edit] user@host# set security casb casb-policy casb-policy-2 rules rule1 match application-group FileSharing application any activity deny user@host# set security casb casb-policy casb-policy-2 rules rule1 then deny user@host# set security casb casb-policy casb-policy-2 default-rule allow
Apply CASB policies in the security policy as application-services.
[edit] user@host# set security policies from-zone trust to-zone untrust policy policy-name then permit application-services casb-policy casb-policy-2
You can also perform following activities for the CASB policy:
-
Log activity.
[edit] set security casb casb-policy <policy-name> log-activity [login upload download]
-
Change the order of rule.
[edit] insert security casb casb-policy <policy-name> rule <rule-name> [before | after]
-
Set a default policy.
[edit] set security casb default-policy <casb-policy-name>
The default policy is required for unified policies. In case, if no default policy configured, the system displays an error message during commit.
ERROR: default-policy is not configured which is must with unified multi policy configuration
Verification Options
Use the following commands to verify your CASB policy configuration:
- Use the show security casb casb-policies to display
all CASB policies configured on your device.
user@host> show security casb casb-policies Casb Policies: 1 Policy Name ID cp1 1
- Use the show security casb casb-policies
policy-name to display the details of
a CASB policy.
user@host> show security casb casb-policies cp1 PIC : FPC 0 PIC 0 Policy Name: cp1 Policy ID: 1