Network and Cloud Security ensures secure communication and access in cloud environments by segmenting networks, encrypting remote access, and detecting intrusions. It involves technologies like VPNs, Zero Trust Network Access (ZTNA), and tools for intrusion detection and prevention. This knowledge area is crucial for minimizing the risk of breaches and maintaining secure, efficient operations.
What is Network Segmentation?
What is Microsegmentation?
Why Use These Techniques?
What is VPN?
Limitations of VPN
What is ZTNA?
What is IDS?
What is IPS?
Why Are These Important?
AWS Security Groups and Azure NSG (Network Security Groups):
WAF (Web Application Firewall):
Traffic Monitoring:
Centralized Logging:
Periodic Audits:
Deploy Virtual Firewalls
Use Microsegmentation
Perform Regular Vulnerability Scanning
Network and Cloud Security involves segmenting networks, securing remote access, and detecting intrusions to prevent unauthorized access and minimize risks. Start with foundational practices like using VPNs or ZTNA for secure connections, configuring firewalls and WAFs to protect applications, and implementing regular logging and monitoring. Tools like AWS Security Groups, Azure Bastion, and IDS/IPS systems can greatly enhance your security posture.
As organizations increasingly rely on Software-as-a-Service (SaaS) platforms such as Office 365, Salesforce, Google Workspace, and others, it becomes critical to enforce consistent security policies and visibility across these applications. Traditional perimeter-based models are no longer sufficient in SaaS-dominant environments.
SaaS Visibility refers to an organization’s ability to monitor and control usage of cloud applications.
Many users access unsanctioned SaaS apps (also known as Shadow IT), creating risk due to lack of oversight.
Tools like Cloud Access Security Brokers (CASBs) provide centralized control over sanctioned and unsanctioned cloud app usage.
"When managing SaaS security, organizations often use CASB tools to control user actions within apps like Office 365 or Salesforce. For example, you can restrict downloading confidential data to only corporate-managed devices."
App-based Access Policies:
Use CASBs or integrated proxies to apply policy enforcement at the application layer (e.g., block uploads from personal Dropbox).
URL Filtering with App Awareness:
Combine CASB + secure web gateway (SWG) functionality to block access to risky or unauthorized SaaS URLs.
Data Loss Prevention (DLP):
Prevent sensitive data from being shared or downloaded from SaaS apps.
Device-based Access Controls:
Allow full access only from compliant devices, such as those managed by MDM or enrolled in Intune.
User Behavior Analytics (UBA):
Detect anomalies in SaaS usage, such as large-scale downloads from Google Drive by a user who typically accesses only email.
Cisco Umbrella SIG + CASB integrations
Cisco Secure Access (formerly Duo + AnyConnect + Umbrella)
Cisco Cloudlock (a native CASB for SaaS apps)
The SASE (Secure Access Service Edge) model is a modern architecture that integrates networking and security functions into a cloud-delivered service model, designed to support the dynamic, distributed nature of cloud applications and remote workforces.
ZTNA (Zero Trust Network Access):
Enforces identity- and context-based access to applications—users are never “trusted by default.”
Cloud-based Firewalls (FWaaS):
Provide scalable perimeter protection without deploying on-premise appliances.
CASB and SWG:
Secure and monitor traffic to cloud applications and internet destinations.
SD-WAN Integration:
Enhances connectivity and performance for branch offices and mobile users.
"ZTNA and cloud-based firewalls can be part of a broader SASE architecture that integrates networking and security services at the edge to enforce consistent policies for remote and cloud access."
Eliminates traditional network boundaries.
Offers consistent security enforcement across users, devices, and locations.
Ensures secure and optimized access to cloud-based services.
Supports modern deployment models (e.g., hybrid work, multicloud environments).
Cisco Umbrella: Cloud-delivered SWG, DNS-layer protection, FWaaS.
Cisco SD-WAN (Viptela): Integrated with Umbrella and SecureX.
Cisco Duo + Secure Access: Implements ZTNA and MFA.
SecureX: Automates detection and response across SASE components.
| Topic | Key Points |
|---|---|
| SaaS Security | Use CASBs for app-based policy enforcement, visibility, and shadow IT control. Combine with URL filtering, DLP, and device-based access. |
| SASE | Combines networking (e.g., SD-WAN) and security (e.g., ZTNA, SWG, CASB) in a cloud-native architecture. Enforces consistent, scalable security for remote/cloud users. |
Why are SaaS access policies required when users connect to cloud applications from unmanaged networks?
SaaS access policies enforce security controls that determine which applications users can access and under what conditions.
Cloud applications are typically accessed over the internet, often outside traditional corporate networks. SaaS access policies allow administrators to control user behavior by enforcing authentication requirements, restricting risky applications, and applying data protection rules. Security platforms analyze application traffic and categorize services based on risk or business relevance. Without these controls, users could upload sensitive data to unauthorized applications or interact with unapproved services. Administrators therefore deploy SaaS policies to maintain governance across distributed environments.
Demand Score: 86
Exam Relevance Score: 91
What is the purpose of URL filtering in cloud security architectures?
URL filtering restricts access to websites based on predefined security categories, helping prevent users from accessing malicious or inappropriate content.
Security platforms classify web destinations according to categories such as malware distribution, phishing sites, or high-risk domains. Administrators create filtering policies that block or monitor traffic to these categories. When a user attempts to access a blocked domain, the secure web gateway intercepts the request and enforces the configured policy. URL filtering also supports acceptable-use policies by controlling non-business websites. It complements other security controls such as application inspection and malware scanning.
Demand Score: 83
Exam Relevance Score: 87
Why might application traffic be blocked even when the domain appears to be allowed?
Application control policies can block traffic based on application identification rather than domain name alone.
Modern security platforms inspect network traffic to determine the specific application being used. Even if the destination domain is permitted, the application itself may be categorized as high-risk or restricted by policy. For example, a cloud storage platform might host both approved and unapproved services under the same domain. Application-level inspection ensures policies are enforced according to the actual service being used rather than simply the website address. This prevents users from bypassing security restrictions through shared domains.
Demand Score: 81
Exam Relevance Score: 88
What security advantage does protocol blocking provide in cloud access environments?
Protocol blocking prevents the use of risky or unauthorized network protocols that could bypass security inspection.
Some applications attempt to tunnel data through alternative protocols to evade detection. Security platforms monitor network traffic and block protocols that are not approved by policy. For instance, administrators may allow HTTPS traffic but restrict peer-to-peer or tunneling protocols. This prevents unauthorized applications from transferring data or communicating with external servers. Protocol control is therefore an important element of enforcing consistent security policies across cloud access environments.
Demand Score: 79
Exam Relevance Score: 85
Why are secure access edge enforcement points deployed close to users?
Edge enforcement points inspect and secure user traffic before it reaches cloud applications or the public internet.
Secure access solutions often deploy distributed inspection nodes that process user traffic near the point of connection. This architecture reduces latency and ensures that security policies such as URL filtering, malware inspection, and application control are applied immediately. It also improves visibility into user behavior across remote locations. Without these distributed enforcement points, traffic might bypass corporate security controls when users connect directly to cloud services from external networks.
Demand Score: 78
Exam Relevance Score: 86