Fortinet black logo

Deployment overview

21.4.0
Copy Link
Copy Doc ID 3677d8f1-3541-11ed-9d74-fa163e15d75b:891466
Download PDF

Deployment overview

This document is a deployment guide for Fortinet’s Cloud Access Security Broker (FortiCASB).

This guide is intended to guide you through basic setup and deployment of a cloud workload on FortiCASB for monitoring user access and day-to-day operations. This guide uses Google Workspace and Microsoft Office 365 as the example cloud workloads or applications to illustrate this process.

FortiCASB's goal is to act as a mediator between the cloud provider and the user to implement preconfigured or customized security policies of the organization on cloud application usage.

FortiCASB offers an API-based approach by obtaining data directly from SaaS cloud applications using REST API queries with OAuth2.0 authentication. Therefore, FortiCASB can essentially perform deep inspection of cloud traffic, providing advanced monitoring, analysis, and reporting providing notifications when suspicious activity is triggered.

Since FortiCASB performs out-of-band communication with SaaS applications, there is no performance impact on user SaaS application traffic.

FortiCASB provides insights on suspicious activity on past and current cloud user activity and relies on the network administrator to review and act upon these insights after they have occurred.

Audience

Cloud security administrators and auditors should find this guide helpful for setting up FortiCASB with cloud workloads.

About this guide

This deployment guide describes steps in deploying one type of cloud application or workload on FortiCASB, namely, Google Workspace and Microsoft Office 365. First evaluate your organization workload to determine whether this deployment guide suits your organization's needs. Reviewing the FortiCASB online help is recommended for deploying other cloud applications or workloads and related configurations.

Deployment overview

This document is a deployment guide for Fortinet’s Cloud Access Security Broker (FortiCASB).

This guide is intended to guide you through basic setup and deployment of a cloud workload on FortiCASB for monitoring user access and day-to-day operations. This guide uses Google Workspace and Microsoft Office 365 as the example cloud workloads or applications to illustrate this process.

FortiCASB's goal is to act as a mediator between the cloud provider and the user to implement preconfigured or customized security policies of the organization on cloud application usage.

FortiCASB offers an API-based approach by obtaining data directly from SaaS cloud applications using REST API queries with OAuth2.0 authentication. Therefore, FortiCASB can essentially perform deep inspection of cloud traffic, providing advanced monitoring, analysis, and reporting providing notifications when suspicious activity is triggered.

Since FortiCASB performs out-of-band communication with SaaS applications, there is no performance impact on user SaaS application traffic.

FortiCASB provides insights on suspicious activity on past and current cloud user activity and relies on the network administrator to review and act upon these insights after they have occurred.

Audience

Cloud security administrators and auditors should find this guide helpful for setting up FortiCASB with cloud workloads.

About this guide

This deployment guide describes steps in deploying one type of cloud application or workload on FortiCASB, namely, Google Workspace and Microsoft Office 365. First evaluate your organization workload to determine whether this deployment guide suits your organization's needs. Reviewing the FortiCASB online help is recommended for deploying other cloud applications or workloads and related configurations.