Cloud

6/5/2017
04:35 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Oracle Brings Machine Learning to its CASB Service

Machine learning is a next step for cloud systems, as Oracle integrates new capabilities into its CASB offering to discern and leverage user behavior.

Oracle and other companies are integrating new technologies into their cloud access security broker (CASB) offerings to ratchet up security.

Database giant Oracle today announced that it has integrated machine learning, artificial intelligence, and contextual awareness in its CASB service. The idea is to address the growth of security incidents targeting privileged and end-user credentials.

Cloud vendors are competing to address two important issues, says Andy Smith, senior director of product development for Oracle's security portfolio. They are trying to figure out how to bring their products to the cloud, and how to develop the tech to secure their own clouds.

CASB providers are under pressure to create new technologies for better cloud management. These systems sit between cloud service customers and cloud providers to consolidate the enforcement of security policies.

In the past, mostly large businesses demanded CASB systems. "The larger you are, the more complex you are, you have hundreds of cloud services," says Cloud Security Alliance CEO Jim Reavis.

However, as more information and key data assets are moved off-premise, small- and medium-sized businesses are looking into CASB adoption for greater visibility into their organizations.

Oracle's new approach uses supervised and unsupervised machine learning for advanced threat detection. The system detects and stores user actions and compares them with established patterns to determine abnormal activity on each cloud service.

The user behavior analytics (UBA) engine sets historical baselines for each user and service (Box, Office 365, etc.). When it finds behavior derives from the norm, it launches incident response options such as incident management systems and automated remediation.

Unsupervised machine learning compares users' behavior with their previous actions to determine risk. "It creates its own normal" by using algorithms to verify whether activity is anomalistic, says Smith. This "normal" continuously changes based on data it receives.

Supervised machine learning is more customizable: Administrators can specify personal attributes or CRM activity they want to analyze, and create a correlation to look for actions that are against policy. The system had always integrated unsupervised machine learning, but now users can identify what they want to look for, he says.

Say an employee has been put on notice and the business is worried about data theft, for example, he says. Admins can monitor correlations between when someone is put on notice and whether they attempt to steal data before they leave the company.

"They can use it for any kind of risky behavior and apply it to any types of threats," says Smith. "The main one we always think about is compromised accounts," or those that people are concerned about because of phishing or credential theft."

To better monitor risk, the company is bringing what it calls adaptive access to its Identity-Based Security Operations Center (SOC). This new approach to access control will use machine learning to combat fraud across cloud applications by analyzing each login attempt and data on location, device, and time of day.

"The concept of adaptive access isn't new," says Smith. "Doing it where it's built into the cloud service and integrated into other risk services -- that's what's new."

Oracle's CASB is introducing security monitoring and threat detection for several applications, including its own Oracle Human Capital Management (HCM) Cloud, Oracle Enterprise Resource Planning (ERP) Cloud, and Oracle Customer Experience (CX) Cloud Suite. This is in addition to tools like Slack, Office 365, Box, Google G-Suite, AWS, ServiceNow, GitHub, and Rackspace.

Smith emphasizes the importance of ensuring the CASB integrates with the rest of the security fabric. For him, the key is making sure the system covers SaaS, PaaS, and IaaS so the business isn't using multiple CASB systems to get full security coverage.

Related Content:

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada, July 22-27, 2017. Click for information on the conference schedule and to register.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Well, at least it isn't Mobby Dick!
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2016-10743
PUBLISHED: 2019-03-23
hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.
CVE-2019-9947
PUBLISHED: 2019-03-23
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.2. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string or PATH_INFO) follo...
CVE-2019-9948
PUBLISHED: 2019-03-23
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
CVE-2019-9945
PUBLISHED: 2019-03-23
SoftNAS Cloud 4.2.0 and 4.2.1 allows remote command execution. The NGINX default configuration file has a check to verify the status of a user cookie. If not set, a user is redirected to the login page. An arbitrary value can be provided for this cookie to access the web interface without valid user...
CVE-2019-9942
PUBLISHED: 2019-03-23
A sandbox information disclosure exists in Twig before 1.38.0 and 2.x before 2.7.0 because, under some circumstances, it is possible to call the __toString() method on an object even if not allowed by the security policy in place.