safely enabling box: three “must-do” best practices

SAFELY ENABLING BOX:
THREE “MUST-DO” BEST PRACTICES
© Netskope 2015
Organizations seeking enterprise file sharing and collaboration solutions are rapidly standardizing on Box. Whether a Fortune
500 healthcare organization enabling productivity-enhancing medical imaging workflows, a media organization collaborating on
pre-production content, or a legal firm managing contracts and legal documents, enterprises are using Box to be more productive
and create a competitive advantage in their markets.
Box is enterprise-ready by all objective measures. It is rated “high” in the Netskope Cloud Confidence Index, a yardstick adapted
from the Cloud Security Alliance. The platform boasts key third-party certifications and has made security an utmost priority.
In today’s model of shared responsibility, in which the app vendor is responsible for inherent app enterprise-readiness and the
organization is responsible for how users interact with it, IT needs to maintain visibility and control by governing access, protecting
sensitive data, and detecting and managing threats within the platform and across its ecosystem. Here are three best practices
and their underlying details gleaned from joint Netskope and Box customers for safely enabling Box and its ecosystem in their
enterprises.
There are three “must do” best practices:
Extend your
access and usage
policies to Box
Protect data
in Box and
its ecosystem
Detect and
manage security
threats
2
1. Right-size your administrative privileges. Ensure that you know who your Box administrators
are, and employ a “least privilege” model to what they can do in the platform and its
ecosystem of integrated apps.
EXTEND
YOUR
ACCESS
AND
USAGE
POLICIES
TO BOX
Extend your best identity
and access management
practices to Box and
its ecosystem. Here are
seven that matter:
2. Extend single sign-on to Box and its ecosystem. Manage and secure access to Box and its
ecosystem with a leading single sign-on solution. This will help you provision and de-provision
users easily, ensure that only the right people have access to your most business-critical apps,
and simplify the experience for your users.
3. Consolidate redundant corporate Box instances while allowing personal Box usage. If you are
standardizing on Box, find and consolidate the corporate instances of Box while allowing users
to continue accessing personal instances. Differentiate between instances, and roll up corporate
usage onto your instance so you can more easily monitor activity, enforce policy, and enhance
collaboration.
4. Coach users to your corporate instance of Box. Find unsanctioned cloud apps that provide
similar functionality to Box, or redundant corporate instances of Box, and create an automated
workflow to send coaching messages to users guiding them to your corporate instance.
Make that workflow flexible by allowing users to report a false positive or enter a business
justification (for example, if they are collaborating with a partner in the partner’s app). By
creating transparency and enabling users to provide feedback, your program will have a much
higher chance of success.
5. Enforce access and usage policies granularly. Enforce policies granularly based on user or group,
device, geography, activity, content, and more. For example, if you want to prevent “insiders”
from sharing content outside of the company, enforce a “Don’t share outside of the company”
policy for that group. And if you want people only to upload content to Box but not to other
Cloud Storage and Collaboration apps, set a category-wide policy preventing upload, except to
Box. Remember to extend usage policies you set in Box to ecosystem apps that may share data
with the suite, such as e-signing, content management, and project management workflows.
6. Log all access and usage activity for admins and users. Provide granular, detailed audit logs for
all user and admin activity across Box and its ecosystem. Consider logging access and activities
across all cloud apps in order to identify risky behavior and security incidents involving Box
and other apps. For example, if a departing user downloads confidential content from your
corporate instance of Box, uploads it to a personal Cloud Storage app, and then shares it with
his new employer, you’ll want to identify that in your post-event audit.
7. Enforce access to corporate and personal instances of Box by device type, classification,
characteristics, and status. Provide different levels of Box access based on these device
segments. For example, offer full access for corporate-issued devices but limit to web-only for
personally-owned devices, offer access to your corporate instance of Box for corporate-issued
devices but limit to personal instances for personally-owned devices, or distinguish between
devices that have certain characteristics, such as full disk encryption enabled, and offer broader
access to those.
3
2
PROTECT
DATA IN BOX
AND ITS
ECOSYSTEM
Protect sensitive content like
personally- identifiable information
(PII), protected health information
(PHI), payment card information
(PCI), and source code in Box and
across the ecosystem. Here are five
considerations:
1. Find and secure sensitive content in Box. Perform a retroactive scan and
identify sensitive content at rest in Box whether it was uploaded yesterday
or two years ago. Use best-in-class DLP that includes content fingerprinting,
exact content matching, and, if you do business in foreign countries,
international support. Classify that content according to your sensitive
content profiles. Once you understand what content is there and who’s
got access, take action to secure it by disallowing public access, reducing
sharing permissions, filtering and limiting access for certain individuals,
encrypting it, quarantining it for review or further analysis on-premises,
making a copy for legal hold, and so on.
2. Find and secure sensitive content en route to or from Box. Identify sensitive
content on its way to or from Box, and block, alert, require user justification,
encrypt, or quarantine that content based on user, group, location, device,
etc. For example, allow download of sensitive content from Box but disallow
upload to another app and/or a personal instance of Box, allow download
of sensitive content to corporate-issued devices but not personallyowned ones, or allow download of sensitive content by employees but not
contractors.
3. Protect data across your Box ecosystem. When you enforce your DLP
policies in Box, extend those policies across all of the apps that integrate
and share data with Box. Apps such as e-signing, content management, and
project management workflows are prime candidates. For example, if you’re
enforcing a “Don’t download to unmanaged mobile devices” policy in Box,
consider enforcing it in a workflow app that may route that same content
to users outside of Box. Take similar action (block, quarantine, etc.) on DLP
violations in those apps.
4. Integrate with on-premises DLP and incident management solutions. If
you have on-premises DLP and incident management solutions, enable
automated workflows to shuttle suspected DLP violations from the cloud to
your on-premises solution via secure ICAP for further analysis. This reduces
false positives, increases accuracy, and enhances the value of your existing
DLP investments. Also, enable automated incident management workflows
such remediation ticketing when a cloud DLP violation occurs.
5. Alert and coach users. Except in certain situations (e.g., certain types of
legal hold), it is always a good idea to alert users. If you are quarantining
files containing suspected DLP violations, alert file owners or collaborators.
If you are blocking an activity, say why. Give users an opportunity to
provide feedback, such as reporting a false positive or entering a business
justification.
4
DETECT AND
MANAGE
SECURITY
THREATS
Identify and remediate internal
and external security threats
surrounding Box and its
ecosystem. Here are three
things to remember:
1. Protect Box from risky users. Institute protections against
risky users, including ones who have had their account
credentials compromised in a data breach. According to
Netskope, 13.6 percent of enterprise users have had their
credentials stolen in a breach outside of their organization.
Know who those users are and make sure they have
updated their Box passwords. Better yet, if you have a
single sign-on program, initiate an automated workflow to
change those users’ login credentials automatically.
2. Quarantine content uploaded by risky users. Quarantine
content uploaded by risky users, including those whose
account credentials have been compromised. From there,
you can conduct a workflow to verify the authenticity of
the content and ensure that the action is intended by the
user and not malicious.
3. Detect anomalous behavior in Box and its ecosystem.
Detect anomalies
that could signal security threats,
data leakage, or even the presence of malware.
Prioritize anomalies from highest to lowest risk.
Focus on activity-
based anomalies such as excessive
downloading
or sharing, users logging in from multiple
locations or devices, and failed logins. View activity trails
surrounding anomalies in context (e.g., user, group, device,
location, app, content) to understand how the anomaly
happened, determine remediation, and report on it for
security and compliance. Use this information to enhance
your policies.
5
By extending the best practices you employ in your environment
today to Box, its ecosystem, and your other business-critical apps,
you can safely enable the cloud for
your enterprise.
Want to learn more? Contact
us to see a Netskope for
Box demo today!
GET STARTED
© Netskope 2015 all rights reserved. 08/15 EB-83-1
6