CASB explained, and the stealth required to test it

CASB explained, and the stealth required to test it

Show Video

Hello, I'm Michael Mintz, and welcome to "CASB explained, and the  stealth required to test it". So, this is going to combine  two of the worlds that I'm in, which is the cybersecurity  world, and the automation world. So, here's a simple diagram  that explains what CASB is: So, without CASB, the user  connects to a cloud service, and data is exchanged freely between them so that any data between the user and the  cloud service is strictly between them.

Whereas with the CASB service,  there's an MITM proxy, which stands for "Man-in-the-Middle", that basically intercepts all that data  going back and forth between the two, and therefore the CASB  service can process that data, put it inside a database, display it in an event log, and there's also usually an admin app  where the CASB service can be configured. And this green part here is the CASB service and it usually belongs to  the company paying for it, and the user is generally a member or  employee of that particular company. So, "What is CASB?", and "What can CASB do?" So, CASB stands for "Cloud  Access Security Broker". It's a software tool that monitors and enforces  security policies for cloud applications.

CASBs can be deployed on premise or in the cloud. So, how does CASB work? So a CASB acts as an intermediary between  cloud users and cloud service providers. It monitors all activity between  users and cloud applications. It enforces an organization's security policies.

It provides visibility into cloud app activity. It helps organizations comply  with cybersecurity regulations. And there are lots of benefits such as  being able to control sensitive data, and being able to monitor and  detect suspicious activity. So, this diagram should make  a little more sense now. The CASB service basically comes in  between the user and the cloud service, intercepting all the data, and  then processing it, in summary. So, let's talk about CASB in the news! So recently, Tulsi Gabbard, the Director of  National Intelligence for the United States, basically fired more than 100  intelligence officers from the CIA over messages that appeared in a chat tool.

And those discussions went beyond work  to sexual themes and political messages. So basically, the CIA employees were doing  things that they shouldn't have been doing, and they got fired for it. Here's another example in  the news for that same story: "Tulsi cracks down on Deep State sex chat". So there you have that. And there's also another  article in the New York Post: Tulsi Gabbard says she's firing  more than 100 intel employees who took part in obscene sex chat rooms.

So, how did these employees get caught? Well, there was a CASB service between them and  the chat platform that they were using, and all the data was intercepted, and it was basically configured so that  if maybe people said something bad, that then, that data would  appear in the event log, and then someone appointed by Tulsi Gabbard would  probably go through the event log, and be like: Oh, wow, these employees were saying things they  shouldn't have been saying, on company time. Very inappropriate stuff... So then, they  could be fired for that particular behavior. So, that's just a quick example of how CASB works. So, CASB can catch bad employees in the act, just like that example there you saw in the news, and here's just a simple photo  from a TV show called Mr. Robot, where bad employees might be up to no good. So, CASB can detect and monitor online activity, and that includes inappropriate online activity such as the reason for firing those CIA employees.

So, CASB can also fight crime. Here's a... just another stock photo, of perhaps  a malicious actor about to do something bad. So CASB can prevent cybercrimes, cyberbullying,  DDOS, hacking, data theft, data loss, and all those things, because  you know hackers are out there, and hackers have to be stopped from doing the  malicious activities that they intend on doing. So, CASB also helps schools... So, CASB can prevent students from  cheating in class or on exams, for instance, if a student was trying to use  ChatGPT in order to do their homework for them, then the CASB service would  be able to intercept that, and then the teacher would be able  to see that the student was cheating.

It'll also prevent students from  visiting inappropriate websites, such as porn sites while they're at school, and also maybe prevent them from playing  computer games on school computer labs when they should be studying for  their exams or doing homework. So yes, it will prevent students from  doing things that they shouldn't be doing. So, CASB can also save lives. So for instance, CASB can prevent: planned attacks, terrorist attacks,  school shootings, and self-inflicted harm, and by self-inflicted harm, perhaps a student  is researching ways to harm him or herself, and therefore, those keywords  would appear inside the event log, and then the teacher would be able  to identify students with problems and then maybe do something before it's too late. Another stock photo of a hacker.

So, where does one get CASB? Well, the market leader in the  space is a company called iboss, which provides CASB, as well as a lot  of other powerful cybersecurity services such as ZTNA, SWG, SD-WAN, Browser Isolation, etc, which basically allows  organizations to secure their data. And iboss is trusted by lots  of organizations worldwide, such as ADP, Verizon, and Comcast. And also, schools use iboss in order to secure   internet access for their  students and their staff. So, schools might use iboss in order  to install CASB on students Chromebooks so that students can be prevented from cheating or also catch students that may  be planning malicious activities.

And here's just a huge overview of all  the various things that are provided with the educational package that iboss provides. Basically, you can monitor students  activities when they go to YouTube, and there's also classroom management, a parent portal, just various ways of enforcing safe  policies on students Chromebooks. And of course there's also  the government category, where there's lots of various services  that iboss can provide to governments. So, a little about me: I'm Michael Mintz, and I created  the SeleniumBase framework.

And I also lead the automation team at iboss. Nice photo of me there. Here's a photo of me on the job. And here's another great action shot. And here's a fun fact: My wife and I once got to meet  Tulsi Gabbard at a house party.

And this combines the cybersecurity  worlds cuz I work in cybersecurity and Tulsi Gabbard is the Director  of National Intelligence. So, cybersecurity people  meet, without even knowing it. Closeup, of that. So now, let's talk about configuring CASB.

So, depending on the service  provider that you're using, there's probably going to be  a menu with advanced controls where you can configure various things. So, for instance, with iboss, there  might be a security policies tab where you can set Resource Policies,  Routed Policies, (you know), maybe set Web Categories to block  certain categories from Chromebooks, etc. You could set Allow Lists, Block Lists, etc, so that maybe you don't want  certain sites to be allowed at all, or maybe you do want to  always allow certain sites.

You can set Policy Layers. There's a YouTube Manager. You can set Keywords. There's just lots of different  settings that can be configured in order to fully configure the CASB service. So, for instance, there might be  a GenAI chat protection switch so that you can basically  prevent data loss prevention, and other things from happening when an  employee is using ChatGPT for a query.

So, for instance, that is part of the  ChatGPT Risk Module that iboss provides, where it can monitor ChatGPT interactions and also detect risky behavior and block activity and monitor and report all that to administrators. So, for instance, in this example here, a user tried to input email  addresses into ChatGPT, but due to the CASB service  setting that was set via iboss, you'll see that an error occurred because it detected that email  addresses were in the message and therefore it was going to  block the content directly. So, once content is blocked  or maybe something is filtered there's going to be an incident report and there's going to be an  Incidents tab that you can check on where administrators can go in and see what  exactly was blocked or reported on and triggered. So, for instance here, incidents were  triggered via an AI Risk incident because someone was sending data into ChatGPT  that they shouldn't have been sending. And here you can see it contained email addresses, and you can click in to get more details, but essentially, this  thorough report is generated, and then this basically provides important  details so that people can take action.

So here's a more detailed  view of a specific incident, where you can see all the  various details that occurred. And you can go in, you can see email addresses that came in, IP addresses involved, the time when things occurred, etc. You can see that it'll show the vendor as ChatGPT. It'll show the username, and the trigger message, which includes the email addresses that  tried to be sent, but then were blocked. So this is exactly- probably the  case of what happened with the NSA, where Tulsi Gabbard fired intelligence officers because there was probably an event triggered when people were using inappropriate  language inside their chat tool, and then those messages all  appeared in an incident report, and then via the incident report, an  administrator could go in and see- okay, these people are taking part in something  that they shouldn't be on company time, and therefore Tulsi Gabbard came  in and fired those employees.

So that's all part of the Alerting, Auditing,  Logging, and Reporting feature of iboss. So essentially, any business,  government, school, etc, can have access to all these different features such as the ChatGPT Risk Module  that was described earlier. There's also plenty of other  different capabilities that you have such as Detailed Logging and Reporting, Risk and Threat Reports, Digital Experience Management, etc. There's a lot of different tools  that are available to customers. So that all comes back to this  diagram that I showed you earlier, where the CASB service essentially comes in, connects between the user and the cloud  service to intercept all the data, and then, all that data can  be processed, in the database, and get sent to the event log so that the  system administrator can view the data and take appropriate actions as necessary. And of course, there's going to be an admin  app where everything is going to be configured, and there'll be lots of switches where  you can (you know) turn something on, disable this feature, turn on this feature, different tabs where you can  set different settings, etc, so, it's a very powerful tool.

So now, let's talk about automating CASB testing. So, as you saw before in the diagram, there are cloud services out  there, such as chat platforms. And sometimes, testing is going to occur  with real cloud services such as ChatGPT. So, these cloud services can include:  search engines, email platforms, AI chat platforms, streaming platforms, etc. And many cloud services are  protected by anti-bot services, making test automation tricky because the  test automation would possibly get blocked unless it was modified to get  around the anti-bot defenses. So, in order to fully test CASB, it may be necessary to bypass the  anti-bot services that are there so that automated testing can work accordingly.

And that's how I personally got involved  with making automation stealthy. And that's also called "anti-bot bypass"  to make your automation get through so that you can access websites  without being restricted. So, here's the test automation  framework that I built: It's called "SeleniumBase".  You can find it on GitHub. And, basically, the description as it shows here: "Python APIs for web automation,  testing, and bypassing bot detection."

And as you can see here, there  are a lot of GitHub Stars, so it's quite a popular tool. So, SeleniumBase already has over  25 million downloads from PyPI, which is the Python Packaging Index where  people go in order to download Python packages. So here's a view of SeleniumBase  from the GitHub page directly: You can see all the data  and details for it such as: Stars, Forks, number of people  watching, the number of tags, etc. And if you scroll down from there,  you'll see a powerful ReadMe with lots of details and tools  that SeleniumBase provides such as (you know) a recorder for  instantly generating your tests, or a dashboard so you can view test results, but more importantly, since we're  about to cover anti-bot bypass, there are two special modes  called: UC Mode and CDP Mode, which are used to provide stealth. So with UC Mode, that allows bots to appear human, which lets them evade detection from  anti-bot services that try to block them or trigger CAPTCHAs on various websites.

And I have a few different  YouTube videos about that. And the successor to UC Mode is CDP Mode, and that's a special mode inside of  UC Mode that lets bots appear human while controlling the browser with the CDP Driver. And CDP stands for the "Chrome Devtools Protocol".

Now, although regular UC Mode  can't perform WebDriver actions while the driver is disconnected from the browser, the CDP Driver can because it's  using the Chrome Devtools Protocol in order to perform the various actions such as: typing text into text fields, and clicking  buttons while remaining undetected. Alright, it's live demo time! So let's back out of that and go over to here, where there's a lot of SeleniumBase  examples in the CDP Mode folder. So, for instance, if I want to  have a test that queries ChatGPT, I'm going to run a simple  test: `python raw_chatgpt.py`,

and I'm going to run that. It's going to go in to the ChatGPT website, and it's going to type in a query: "Compare Playwright to  SeleniumBase in under 178 words", and then it's going to grab the results there, and then print that out to the  console when it's done, like here. So this is just an example of an automated  test going into a website and grabbing data where normally there's anti-bot protection.

So the same can be done with a Google website. So, for instance,   if we type: "python raw_google.py"  from the SeleniumBase examples folder, we're going to do a Google search.

You can see here it's searching for SeleniumBase, and going into the SeleniumBase GitHub page. Now, you might not realize that  SeleniumBase is bypassing bot-detection unless I turn off the stealth ability. So let's go into the script  and make a modification. Going to open "raw_google.py", and I'm going to remove the  part that says: `uc=True`, and now I'm going to run the script again so you can see exactly what happens when you're not trying to use  stealth mode to bypass bot-detection. So let's do: "python raw_google.py",

we're going to go into Google, and immediately, you can see that  you're getting a reCAPTCHA appearing because the system detected  unusual traffic from the computer. So, this is an example showing that if you don't  have the SeleniumBase stealth mode enabled, then you will get blocked by Google, or any other websites that try  to block standard automation. So I'm going to put the `uc=True` right back here, and then I'm going to run the  script: "python raw_google.py", and this time, since I put it back,  I am now able to do the Google search and go straight to the GitHub page. You can see that the "raw_google" example worked. So, this is just one of many examples  where we're bypassing bot-detection so that test automation can properly go  in- to the cloud service, and get the data, and that's just one component of testing CASB, because if there's a cloud service involved, you need to be able to bypass that bot-detection so that you can thoroughly test the CASB platform.

So that is that, and let's jump right  back in to the presentation that we had. So let's go back and click... So in conclusion, CASB is powerful, and it needs to be carefully tested, because if you have the government using  your software as a paying customer, then you had better be certain  that your software works well, because if the government isn't  satisfied with the results, then you'll be in the hot seat...  just like Zelenskyy is here... being grilled by Trump because he didn't  accept the deal that he was offered.

And I certainly don't want to  be in that tough situation. That's why I got to make sure  I have 100% test coverage, or else it'll be me in that hot seat! So that concludes this presentation. Visit iboss for CASB, and all the other cybersecurity  services that you may need, such as: ZTNA, SWG, SD-WAN,  Browser Isolation, etc.

There's a larger list here. For instance with "Security,  Authorization & Access Controls" you've got Malware Defense,  you've got Data Loss Prevention, you've got Browser Isolation, Device  Posture Checks, SSL Decryption, etc, there's just so many different capabilities that are extremely important for  businesses, governments, schools, etc, in order to safely and properly  secure the data that you have, and basically make everything  secure for your users, your customers, and everyone else involved. And also, be sure to visit SeleniumBase on  GitHub for all your web automation needs, and it's quite popular, and there's  a lot of documentation in the ReadMe, so be sure to check all that out. And I'll see you all next time!

2025-03-23 15:29

Show Video

Other news

Datacom CISO Collin Penman on AI-powered threats and cyber fatigue 2025-04-11 05:50
Future-Ready Tech: AI and accessibility 2025-04-07 18:15
Strange Tech from the Quantum Realm! 2025-04-04 17:45