A cloud administrator is tasked with implementing a security solution to discover and control the use of unapproved SaaS applications by employees, a phenomenon known as 'Shadow IT'. The solution must provide visibility into cloud application usage, enforce data security policies, and protect against cloud-based threats. Which of the following cloud security controls is BEST suited for this purpose?
-
A
Cloud Workload Protection Platform (CWPP)
-
B
Security Information and Event Management (SIEM)
-
C
Cloud Access Security Broker (CASB)
-
D
Data Loss Prevention (DLP)