Documente Academic
Documente Profesional
Documente Cultură
1
Table of Contents
SECTION A: VENDOR PROFILE ........................................................................................... 4
Company ..........................................................................................................................................................5
Product and Customers ...................................................................................................................................4
SECTION B: VISIBILITY ........................................................................................................ 7
Cloud Registry..................................................................................................................................................7
Cloud Discovery ...............................................................................................................................................9
Risk and Vendor Assessment ........................................................................................................................11
Cloud Governance .........................................................................................................................................12
SECTION C: COMPLIANCE ................................................................................................ 14
Data Loss Prevention (DLP) ..........................................................................................................................14
DLP Remediation and Reporting ...................................................................................................................21
Collaboration Policies (Sanctioned Cloud Services) .....................................................................................23
SECTION D: THREAT PROTECTION.................................................................................. 24
Activity Monitoring ..........................................................................................................................................24
Anomalies and Threats ..................................................................................................................................26
Incident Workflow ...........................................................................................................................................30
Malware Controls ...........................................................................................................................................31
SECTION E: DATA SECURITY ............................................................................................ 32
Contextual Access Controls ...........................................................................................................................32
Encryption ......................................................................................................................................................34
Unsanctioned Cloud Services Control ...........................................................................................................36
SECTION F: OFFICE 365 SECURITY .................................................................................. 37
SECTION G: IAAS AND CUSTOM APPS SECURITY ......................................................... 39
Infrastructure-as-a-Service (IaaS) Security ...................................................................................................39
Custom Apps Security ...................................................................................................................................42
2
SECTION H: PLATFORM & INTEGRATION ....................................................................... 44
Reporting ........................................................................................................................................................44
Deployment ....................................................................................................................................................45
Integration ......................................................................................................................................................47
User Experience.............................................................................................................................................50
SECTION I: ADMINISTRATION ........................................................................................... 51
SECTION J: VENDOR OPERATIONS AND SECURITY INFRASTRUCTURE ................... 52
SECTION K: CUSTOMER SUCCESS & SUPPORT ............................................................ 55
SECTION L: PRICING .......................................................................................................... 57
SECTION M: CUSTOMER REFERENCES .......................................................................... 58
SECTION N: TERMS AND CONDITIONS ............................................................................ 62
3
SECTION A: VENDOR PROFILE
Company
4
Product and Customers
5
A-2-6 What is your largest deployment for the following:
• Office 365 security solution
• Box security solution
• Salesforce security solution
• IaaS
• Shadow IT solution
A-2-7 Has your product been a part of a product
evaluation by a leading analyst firm (e.g. Gartner,
Forrester)? Please provide details and a link to the
report.
6
SECTION B: VISIBILITY
Cloud Registry
7
B-1-6 What compliance certifications are being H
tracked for cloud services within the
registry? Can it assess a cloud service
against GDPR, PCI, ISO, CSA, HIPAA, and
other industry regulations?
B-1-9 M
Does the solution allow customers to add
new cloud services to registry, making it
available to all customers?
8
Cloud Discovery
9
B-2-7 Are usage logs automatically ingested from M
their source (proxies, firewalls, SIEMS)?
10
Risk and Vendor Assessment
11
Cloud Governance
12
B-4-6 Please provide 5 customer references who H
have integrated your CASB with other
firewalls/proxies in production.
13
SECTION C: COMPLIANCE
Data Loss Prevention (DLP)
14
C-1-5 Does your DLP solution support fingerprinting H
of structured data (aka exact data matching)?
15
C-1-10 Does your solution provide DLP for data H
stored in IaaS object storage services such
as AWS S3 buckets or Azure blob storage?
Can scanning be refined to specific buckets
or blobs? Please list the supported storage
platforms.
C-1-11 Does your solution provide the option to M
optimize scanning of object storage by
omitting IaaS logs from scanning, such as
AWS CloudTrail?
16
C-1-15 Can your solution enforce DLP policies in the H
following modes:
• Data uploaded to the cloud
• Data shared from cloud services
• Data downloaded from the cloud
• Data created in the cloud (e.g. Excel
online, Google Docs)
C-1-16 Can your solution target specific cloud folders M
for DLP scanning, and/or exclude folders
from scanning?
17
C-1-16 Can your solution target specific cloud folders M
for DLP scanning, and/or exclude folders from
scanning?
18
C-1-20 Can the administrator define roles that allow H
only selected users to perform the following
actions:
• Define and activate data loss prevention or
compliance policies
• Access and remediate policy violations
• Manage (access/restore/delete) the
quarantine files
C-1-21 Can your product integrate with existing on- H
premises DLP solution(s) to extend policies
and remediation workflows to the cloud?
Provide a list of on-premises DLP providers
you integrate with and the extent of their
ability to integrate the following:
• Data classifications
• DLP policies
• Incident management
C-1-22 Before pushing the file to the on-premises H
DLP for evaluation and reporting, does your
solution provide the option to perform a first
pass DLP assessment in the cloud for better
performance and efficacy?
19
C-1-24 Does your solution enforce DLP policies in H
near real-time via cloud service APIs? If yes,
provide a list of supported cloud services?
20
DLP Remediation and Reporting
21
C-2-7 When inspecting data using DLP policies, is H
information such as user name or file name
where the violation occurred stored in your
solution?
22
Collaboration Policies (Sanctioned Cloud Services)
23
SECTION D: THREAT PROTECTION
Activity Monitoring
24
D-1-5 Does the product allow investigating teams M
to deep dive into anomalies/threats through
an activity dashboard?
25
Anomalies and Threats
26
D-2-5 Can the solution detect anomalies within H
cloud services and raise alerts based on:
• User behavior (insider threats)
• Location based information
• Privileged user activity
• Data exfiltration
• Compromised accounts
• Malware
• IP Trust
27
D-2-9 Can your solution detect privileged user H
threats arising from excessive user
permissions, zombie administrator
accounts, inappropriate access to data and
unwarranted escalation of privileges and
user provisioning?
D-2-10 Is the product capable of baselining H
thresholds based on behavioral models for
each user based on time of day, week,
month, quarter, user role, department,
behavior of other users in the department?
28
D-2-14 Does the product allow you to tune H
thresholds based on your organization’s
threat detection requirements?
29
Incident Workflow
30
Malware Controls
31
SECTION E: DATA SECURITY
Contextual Access Controls
32
E-1-3 Can the solution enforce controls on both H
mobile and desktop access? Is an agent
required?
33
Encryption
34
E-2-5 Can the solution encrypt selected fields H
within cloud providers such as Salesforce
and ServiceNow?
35
Unsanctioned Cloud Services Control
36
SECTION F: OFFICE 365 SECURITY
Ref No. Requirement Priority Vendor Response
37
F-1-5 Can the solution discover all sites within H
SharePoint based on author and other
metadata parameters?
38
SECTION G: IAAS AND CUSTOM APPS SECURITY
Infrastructure-as-a-Service (IaaS) Security
39
G-1-5 Can the solution update the settings of the H
IaaS provider to auto-remediate
misconfigurations found in an audit?
40
G-1-9 Can your solution capture the audit trails of M
multiple accounts from one IaaS provider (e.g.
multiple AWS CloudTrail buckets)? Can these
audit trails be assessed separately or together?
41
Custom Apps Security
42
G-2-5 How does your solution detect threats in H
custom apps associated with insiders,
compromised accounts, and privileged users?
43
SECTION H: PLATFORM & INTEGRATION
Reporting
44
Deployment
45
H-2-6 Does your product enable cloud service H
providers, partners, or customers to build
API integration between a cloud service and
your CASB in a self-serve model?
46
Integration
47
H-3-4 Does the product allow automatic push of cloud H
service information to third party
firewalls/proxies, so that the necessary controls
(block, warn, justify, etc.) can be enforced.
• Blue Coat
• Websense
• McAfee
• Palo Alto Panorama
48
H-3-7 Can your solution integrate with Electronic M
Digital Rights Management (EDRM) solutions?
Please specify the EDRM solutions that are
supported.
49
User Experience
50
SECTION I: ADMINISTRATION
Ref No. Requirement Priority Vendor Response
51
SECTION J: VENDOR OPERATIONS AND SECURITY INFRASTRUCTURE
Ref No. Requirement Priority Vendor Response
52
J-1-6 Are your systems subjected to penetration H
testing? Is testing performed by internal
personnel or outsourced? When was the last
penetration test?
J-1-7 What is your SLA for the various deployment M
modes you support?
• Proxy
• API
• Log Collection
J-1-8 Describe your High Availability Architecture. M
53
J-1-12 Describe your disaster recovery strategy and H
frequency of testing.
54
SECTION K: CUSTOMER SUCCESS & SUPPORT
Ref No. Requirement Vendor Response
55
K-1-5 Do I have access to my local account team as an
escalation path?
56
SECTION L: PRICING
Ref No. Requirement Vendor Response
57
SECTION M: CUSTOMER REFERENCES
Please provide four customer references that [COMPANY NAME] may contact that have used the solution you are
proposing for at least 6 months:
Reference 1
Company Name
Contact Name
Contact Phone
Contact Email
Company Address
58
Reference 2
Company Name
Contact Name
Contact Phone
Contact Email
Company Address
59
Reference 3
Company Name
Contact Name
Contact Phone
Contact Email
Company Address
60
Reference 4
Company Name
Contact Name
Contact Phone
Contact Email
Company Address
61
SECTION N: TERMS AND CONDITIONS
Please describe the appropriate terms and conditions the vendor must agree to for this project including confidentiality,
insurance, compliance with applicable laws and indemnity clauses.
62