Data breach stands for intentional as well as unintentional leakage of the secure data into the open environment which might cause a significant impact on the data resources as well as on the stakeholders. Most of the data breach has been held on sentimental fields like political fields, military fields as well as in the government sectors, thus it is essential to reduce the data breach in order to provide more security to the important information by protecting them from the external threats. According to studies the application of cloud computing has a significant impact on the organizational services. However, in the field of cloud computing security issues are still there as it has been noticed that the significance of data breach is present there. In order to mitigate the security threat by data breach the organization must opt for an authentication process by which only the authorised people will be able to utilize the information resources present in cloud network. Followed by this the organization must structure a framework by which it will differentiate the user access. Along with that the deployment of authenticate software as well as the monitoring devices can help to protect the cloud network from the data breach. Along with the protection processes it is also important to prevent the cloud network from the impact of data breach. According to studies it has been noticed that there are several techniques present in the cloud field which can mitigate the data breach possibility. Those techniques includes the process of encryption by which only the sender and the receiver will have the encoded and decoded key. Along with that implementation of API based CASB, network monitoring and warning alert process as well as the incorporation of Back up process or data recovery can effectively prevent the data breach in cloud computing. Followed by the above mentioned process the encryption process will work by encoding the information and will send those information to its sender who will have a decoder by which it will be understandable for that user only. API based CASB works with controlling the threats by alerting the network about the data leakage.