{"id":345,"date":"2021-06-18T16:22:28","date_gmt":"2021-06-18T16:22:28","guid":{"rendered":"https:\/\/thecloudmarathoner.com\/?p=345"},"modified":"2021-08-09T16:38:03","modified_gmt":"2021-08-09T16:38:03","slug":"what-is-mcas-and-why-would-you-need-it","status":"publish","type":"post","link":"https:\/\/elyusubov.com\/index.php\/2021\/06\/18\/what-is-mcas-and-why-would-you-need-it\/","title":{"rendered":"What is MCAS and why would you need it?"},"content":{"rendered":"\n<p>Hello cloud marathoners,<\/p>\n\n\n\n<p>The MCAS (Microsoft Cloud App Security) \ud83d\udee1\ufe0f\ud83d\udd10  &#8211; helps to identify and combat cyberthreats across all your cloud services. This is  a cloud access security broker (CASB) that provides multifunction visibility, control over data travel, and sophisticated analytics.<\/p>\n\n\n\n<p>Here is a high level architecture diagram from <a href=\"https:\/\/docs.microsoft.com\/en-us\/cloud-app-security\/what-is-cloud-app-security\">Microsoft docs<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"987\" height=\"894\" src=\"\/wp-content\/uploads\/2021\/06\/mcas-proxy-architecture.png\" alt=\"\" class=\"wp-image-347\" srcset=\"\/wp-content\/uploads\/2021\/06\/mcas-proxy-architecture.png 987w, \/wp-content\/uploads\/2021\/06\/mcas-proxy-architecture-300x272.png 300w, \/wp-content\/uploads\/2021\/06\/mcas-proxy-architecture-768x696.png 768w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are the main benefits of this cloud service?<\/h2>\n\n\n\n<p>Here are the main three benefits ot brings alone:<br>\u2714\ufe0f Discovery &amp; Manage your apps<br>\u2714\ufe0f Govern access to apps and resources<br>\u2714\ufe0f Check compliance on your cloud apps<\/p>\n\n\n\n<p>Check out this detailed level architecture of\u00a0<a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=appsecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6796043041137336320\">#appsecurity<\/a>\u00a0in\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/microsoft-dynamics-azure-cloud\/\">Microsoft Azure \u2122<\/a>\u00a0\ud83d\udc4d<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"578\" src=\"\/wp-content\/uploads\/2021\/06\/1620302924479-1024x578.jpg\" alt=\"\" class=\"wp-image-346\" srcset=\"\/wp-content\/uploads\/2021\/06\/1620302924479-1024x578.jpg 1024w, \/wp-content\/uploads\/2021\/06\/1620302924479-300x169.jpg 300w, \/wp-content\/uploads\/2021\/06\/1620302924479-768x433.jpg 768w, \/wp-content\/uploads\/2021\/06\/1620302924479-1200x677.jpg 1200w, \/wp-content\/uploads\/2021\/06\/1620302924479.jpg 1280w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><figcaption>MCAS &#8211; Microsoft Cloud App Security.<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><br>What are the main use cases for your business?<\/h2>\n\n\n\n<p>\u2714\ufe0f Shadow IT Discovery &amp; Control<br>\u2714\ufe0f Secure Access<br>\u2714\ufe0f Security Poster Management<br>\u2714\ufe0f Threat Protection<br>\u2714\ufe0f Information Protection<br>\u2714\ufe0f User &amp; Entity Behavioral Analytics<\/p>\n\n\n\n<p>Another beauty of above architecture lies in a fact that you could easily integrate this model with third party SaaS apps, all listed on a diagram.<\/p>\n\n\n\n<p>Thank you\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/ACoAAADT4qcBT0XFxpQ7W5OEMscGQ9jvysKAark\">Matt Soseman<\/a>\u00a0for bringing this diagram \u00a0<a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=sharingiscaring&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6796043041137336320\">#SharingIsCaring<\/a>\u2764\ufe0f\ufe0f<\/p>\n\n\n\n<p>F\u1d0f\u029f\u029f\u1d0f\u1d21 \u1d0d\u1d07 \ud83c\udfaf \u1d00\u0274\u1d05 become \u1d00\u00a0<a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=cloudmarathoner&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6796043041137336320\">#cloudmarathoner<\/a>\u00a0\u26c5\ud83c\udfc3\u200d\u2642\ufe0f\ud83c\udfc3\u200d\u2640\ufe0f &#8211; \ud835\udc0b\ud835\udc04\ud835\udc13&#8217;\ud835\udc12 \ud835\udc02\ud835\udc0e\ud835\udc0d\ud835\udc0d\ud835\udc04\ud835\udc02\ud835\udc13 \ud83d\udc4d<br><br><a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=microsoftazure&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6796043041137336320\">#microsoftazure<\/a><br><a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=mcas&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6796043041137336320\">#MCAS<\/a><a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=securitymanagement&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6796043041137336320\">#securitymanagement<\/a><br><a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=oauth&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6796043041137336320\">#OAuth<\/a><a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=secureaccess&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6796043041137336320\">#secureaccess<\/a><a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=appsec&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6796043041137336320\"> #appsec<\/a><br><a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=threatprotection&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6796043041137336320\">#threatprotection<\/a><br><a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=securityengineering&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6796043041137336320\">#securityengineering<\/a><br><a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=bestpractices&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6796043041137336320\">#bestpractices<\/a><br><a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=continuouslearning&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6796043041137336320\">#continuouslearning<\/a><\/p>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_345\" class=\"pvc_stats all  \" data-element-id=\"345\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Hello cloud marathoners, The MCAS (Microsoft Cloud App Security) \ud83d\udee1\ufe0f\ud83d\udd10 &#8211; helps to identify and combat cyberthreats across all your cloud services. This is a cloud access security broker (CASB) that provides multifunction visibility, control over data travel, and sophisticated analytics. Here is a high level architecture diagram from Microsoft docs. What are the main &hellip; <a href=\"https:\/\/elyusubov.com\/index.php\/2021\/06\/18\/what-is-mcas-and-why-would-you-need-it\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;What is MCAS and why would you need it?&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,20,16,18,15],"tags":[],"class_list":["post-345","post","type-post","status-publish","format-standard","hentry","category-architecture","category-azure-cloud-adoption-framework","category-cloud-101","category-azure","category-security-governance"],"_links":{"self":[{"href":"https:\/\/elyusubov.com\/index.php\/wp-json\/wp\/v2\/posts\/345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/elyusubov.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/elyusubov.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/elyusubov.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/elyusubov.com\/index.php\/wp-json\/wp\/v2\/comments?post=345"}],"version-history":[{"count":2,"href":"https:\/\/elyusubov.com\/index.php\/wp-json\/wp\/v2\/posts\/345\/revisions"}],"predecessor-version":[{"id":397,"href":"https:\/\/elyusubov.com\/index.php\/wp-json\/wp\/v2\/posts\/345\/revisions\/397"}],"wp:attachment":[{"href":"https:\/\/elyusubov.com\/index.php\/wp-json\/wp\/v2\/media?parent=345"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/elyusubov.com\/index.php\/wp-json\/wp\/v2\/categories?post=345"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/elyusubov.com\/index.php\/wp-json\/wp\/v2\/tags?post=345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}