Zero Trust Data Protection On Endpoints (04102021c)
Zero Trust Data Protection On Endpoints (04102021c)
SECURECIRCLE.COM
Zero Trust Data Protection
O N E N D P O I N TS
Contents
Introduction ��������������������������������������������������������������������������������������������������������������������������������������������������������������������������������� 3
Protecting Cloud File Services (One Drive, Box and Google Drive) �������������������������������������������������������������������������������������� 8
Conclusion��������������������������������������������������������������������������������������������������������������������������������������������������������������������������������� 11
As enterprises invest heavily in cloud infrastructure and web hosted applications, the Operating
requirements for data security become increasingly challenging to manage. For many Systems
enterprises the focus on securing networks and server infrastructure has lost relevance
SecureCircle supports Windows,
when the most valuable data is hosted in a variety of public cloud services, web applications, Mac and Linux platforms
and online storage repositories. In this new model user endpoints are biggest risks for including desktop, server and
cloud data loss. public cloud operating systems.
This whitepaper outlines the SecureCircle approach to modern data security and how
SecureCircle can be leveraged to secure and control data as it is moved to endpoints
regardless of data type or where the data is sourced.
Businesses that implement SecureCircle can protect all types of data against modern
threats by securing the data itself as it is generated and limiting which users, devices and
processes have access to data when it is stored in unstructured files, regardless of where
that storage resides.
SecureCircle’s transparent encryption approach is implemented through a low level driver, which means any legitimate user is not
impacted by the encryption and works with the data stored within files. However, any attempts to access the data by an illegitimate
user or process will be unsuccessful, as an unencrypted version of the data will not be accessible.
Once data has been secured (encrypted) by SecureCircle, not only is access limited to legitimate users only, acces may also be
limited to specific processes and actions. For example, you can choose to restrict whether or not a privileged user is allowed to copy
content from one application to another. These security controls allow enterprises to retain control and visibility of data even when
access to content within files has been allowed, granting access does not relinquish control of data.
Transperant Encryption
SecureCircle encryption is
completely transparent to
authorized users when they are
working with secured files
Access Denied
Only allowed users, on allowed
devices, with allowed processes
can read data that is secured
by SecureCircle. Access to data
can be revoked at anytime, which
stops any user or processes
from reading the encrypted data
within secured files.
By providing process level control, SecureCircle can help protect against many modern data security threats such as accidental
dissemination, bad actors and ransomware exfiltration. Below is a visual example of how the notepad process on Windows can be
either allowed or disallowed access to secured data within a .csv file.
At SecureCircle, we help our customers protect their web-hosted application data as it moves from trusted cloud applications to
user endpoints by targeting the source cloud applications as the context for our data security policies. When data is exported from
the cloud application to a file on the endpoint the data within the file is automatically encrypted and a data policy is immediately
applied that restricts who or what can access a decrypted view of the data within. At this point, data is only consumable by allowed
users, on allowed devices, with allowed processes. If the data is moved off the device, it remains encrypted and secured regardless
of where it is stored.
Secure by Process
External Users
(Limited Access)
Secure by URL
Secure by URL
This security trigger targets data based on the originating web location that data was sourced from. More details on how this can be leveraged to secure
web app data is available in the Securing & Controlling Cloud App Data section below.
Secure by Process
This security trigger can be used to automatically secure any data that is written by a specific process on the endpoint. For example, when Microsoft
OneDrive is installed on the endpoint, all data that is written to the endpoint from a Sharepoint location in the cloud can automatically be secured as it is
written on the endpoint. This means all Sharepoint data that moves to the endpoint can be kept secure.
Secure by Location
For businesses that have folder structures either locally or on file servers (SMB), Secure by Location can be used to automatically encrypt and secure all
data in that location. The security will stay with the data even once it has been moved out of the location that was defined. In this situation, SecureCircle uses
the fact that data traverses the location as a trigger to secure the data.
To configure security for a specific web application, a single rule can be created within the “Secure Data > By URL” section of the
SecureCircle admin console. The rule includes a name (description), URL Regular expression, and a Circle. The example below
shows how a simple rule can be created to protect all data that is exported out of SalesForce.com onto a user endpoint.
Below are the basic settings that need to be configured to create a Secure By URL rule
2. Regex Pattern - This regular expression pattern is used to identify the URLs that this rule will apply to. For example, https?://
securecircle-dev-ed\.my\.salesforce\.com/.* is an example of a from the above screenshot which will ensure
that all data exported from SecureCircle’s internal SalesForce.com account will be automatically secured as it is exported to
the endpoint
3. Circle - A Circle is a logical grouping of data. In the example above, all the data that is exported from SalesForce.com will
become encrypted and secured as part of a Circle known as “SalesForce.com”
Once data is exported onto end user systems, the above rule will ensure that if that data has been downloaded from SalesForce.
com into any type of file on the endpoint, it will be encrypted and the file and its contents will become part of the “SalesForce.com”
circle.
A circle is a logical grouping of data that requires protection, which includes an access policy. Users and Groups can be added to
a circle, which will allow them access to any data that has been secured as part of that circle.
Secure Derivatives
Security follows the data as it
moves from one file to another
regadless of file type
Securing Cloud File Services (One Drive, Box and Google Drive)
Cloud file repositories such as Google Drive, One Drive, and Box, have become widely adopted as an alternative to traditional
file services, as they provide a convenient way to share file data within organizations that doesn’t require traditional storage
infrastructure and can be accessed from anywhere.
There are 2 ways data can be accessed from most modern cloud file repositories. Firstly, data can be manually exported from the
service to the user endpoint from a web browser. Secondly, data can be automatically pushed (sync’d) back and forth between the
cloud service and the user endpoint by a software sync agent such as OneDrive, Google Drive or Box Sync.
To secure files that are manually pulled down through the browser or by an export feature in the web application itself, a “Secure
by URL” rule is used to ensure all files that move to the endpoint are kept secure.
To keep data secured that is written to the user endpoint by a software sync agent, a “Secure by Process” rule targets the sync
agent and secures all files that it writes to the user endpoint.
By combining the 2 rules outlined above, all the data that moves from the cloud file service will be kept encrypted and secured on
the end user system, and will remain secured if it is moved to an unsanctioned location.
Secure by Process
SecureCircle has specific integrated functionality that allows users to access content through the in-browser Word, Excel or
Powerpoint applications, whilst keeping the data encrypted and controlled by a given SecureCircle policy. The data within these
files can only be accessed by sanctioned users and the data is never accessible in an unencrypted format in the cloud service
itself, reducing exposure in the event the files themselves are accessed by unauthorized parties.
Open in SecureCircle
Files that have been secured with
SecureCircle can be access and
edited within the browser. The
files are always encrypted inside
Sharepoint
The ability to provide simple and effective methods to share secured data greatly increases the rate at which enterprises can
secure data, without compromising end user productivity.
Secure Send allows an internal user to send a secured file, and the recipient of that file will be able to either download the file or
access its contents. Limits can be set on which email address or domains data can be sent to, how many times the file can be
accessed, or the length of time a file can be accessed for.
In addition to the limits that can be set on access to files shared via Secure Send, it is also possible to revoke access to files at any
time. This is ideal in situations where data has been accidentally sent to the wrong party or access needs to be retracted due to
change of circumstance.
When data is accessed, the endpoint location, user, and process are all logged. Any denied event is also logged to ensure that
suspicious attempts on data are identified and can be investigated.
Conclusion
For many enterprises, legacy data security approaches have limited their ability to deliver security without impacting productivity.
SecureCircle’s focus is to deliver data security that raises protection against existing and potential future threats, without
compromising user experience or operational burden on IT and security professionals.
As cloud-based applications grow in the enterprise, securing data as it moves from cloud to endpoint becomes the simplest and
most effective solution to securing enterprise data from modern security threats.
SecureCircle.com
4701 Patrick Henry Drive | Building 19, Suite B
Santa Clara, CA 95054 | 408-827-9100
©2021 SecureCircle ® All Rights Reserved. All names, logos, and brands are property of their respective owners. All
company, product and service names used are for identification purposes only. Use of these names, logos, and brands does
not imply endorsement. SecureCircle is a registered trademark of SecureCircle LLC.