Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

How to ensure your SaaS solutions are secure

By Eric Kaasenbrood
Software-as-a-Service
October 20, 2020

In the traditional IT environment, data and applications were housed in on-premises datacenters, and IT system administrators were also company employees. But the shift toward subscription-based services under a SaaS model has been underway for years. Several years ago, a Gartner researcher predicted that by 2020, all new market entrants and 80% of legacy providers would offer products on a SaaS basis.   

Customer enthusiasm for SaaS is high because it reduces or eliminates in-house maintenance costs. The pandemic underscored another benefit: business continuity. TechCrunch reported that sales have soared at SaaS companies during the COVID-19 crisis. Revenue at Zoom increased by nearly 170% year-over-year as people used the platform to replicate in-person meetings and training sessions.

But at many businesses, the company security posture hasn’t kept pace with the volume of data flowing to and from multiple SaaS vendors. It’s an urgent issue in an environment where endpoints are proliferating and hacking techniques are getting more sophisticated. That’s why it’s never been more urgent to upgrade the security posture and reduce the risks associated with SaaS solutions.

 

Starting with the security architecture

The adoption of SaaS also requires rethinking your overall Security Architecture. Many cloud providers support whitelisting solutions to enable their customers’ employees to access the SaaS solution via their office network (to enforce security measures). But it’s increasingly common for employees to bypass the office network and use direct connections to the cloud solutions they use. They may not log into to the office network at all, so IT has to ensure that endpoints are secure even when they’re not connected to the network.

Cloud native solutions can help enforce critical controls like patch management, configuration management and endpoint protection also when end-user devices are not linked to the office network. Furthermore, the architecture should also consider a strategy for BYOD security. A modern security architecture should include cloud-based identity and access management solutions like multifactor authentication and federation with your SaaS applications. Also review the requirements to integrate logs with your SIEM solution and the use of Cloud Access Security Brokers. A strong architectural setup can help to enforce security policies while meeting business requirements.

 

Meeting governance needs in a SaaS environment

Businesses and individuals can activate SaaS applications with a single click, which presents the “Shadow IT” challenge: the application may not have been reviewed or vetted internally to ensure it conforms with company policies. There are many risks associated with unvetted SaaS solutions, including data ownership, information security risks and potential regulatory compliance issues.

A proactive governance approach requires a defined process that ensures visibility and directly addresses risks to keep exposure within acceptable levels. A multidisciplinary strategy that includes people with expertise in the business, IT architecture, procurement, legal, privacy and IT risk/security is the best way to ensure sound governance.

One of the first steps is to classify data in terms of confidentiality, integrity and availability. To find the right balance between costs and security; measures should reflect the criticality of the data being protected.

Additionally, it’s important to understand that cloud and SaaS providers have a shared responsibility to keep data safe and to understand exactly what the company will manage vs. what the SaaS vendor will oversee. To make sure nothing falls through the cracks, typically SaaS providers manage components like applications, virtual machines, databases, datacenters, etc., (the largest portion of the stack) while the company manages components like user access to the application (joiners, leavers, changers, roles, segregation of duties, etc.), end user devices, and data.

Depending on the SaaS provider, there may be multiple configuration options, like password settings or identity federations, and authorization models. Some SaaS providers offer different availability plans to meet recovery time objective and recovery point objective. The company should manage this as well to ensure these are configured in line with their requirements and risk apatite.

 

Evaluating SaaS vendors

The key to effectively assessing SaaS vendors is to keep in mind that they provide standard services to customers. That means a vendor might not meet every company’s detailed security requirement, but that can be difficult to assess on a point-by-point basis. The best approach is to evaluate the vendor at a higher level, looking at how their security measures meet your overall security goals and risk appetite. This should not be a one-time action but requires reevaluation on a periodic basis as both the threat landscape and cloud services will change over time.

There are different ways to gain insight in the security levels of a (SaaS) vendor, some examples are:  

  • Security certifications like ISO 27001 and SOC1/SOC2 assurance reports can be helpful in assessing SaaS security. Those reports are prepared by an independent auditor.  
  • Security questionnaires can be used to query information. It is recommended to use standard terminology to reduce the possibility of a misunderstanding. Documentation of the  Cloud Security Alliance can help in this.
  • Security tests provide insight in potential (technical) security weaknesses. Some vendors share the results of their own security tests or allow customers to perform penetration tests; this provides a better understanding of vendor security practices.

Also keep in mind that many SaaS applications are built on top of other cloud providers, like Microsoft Azure, AWS, Google Cloud, etc. This has a benefit as the SaaS provider can leverage the security mechanisms of the underlying cloud provider. However, it’s good to have an understanding of how the security is maintained in this chain.

The previous points are mainly about the security of the vendor; in addition, a vendor should provide sufficient capabilities for you to securely consume the service this includes the ability to define user roles, segregation of duties, identity federations or password settings. It’s also important to be able to conduct secure system-to-system integrations when necessary and to ensure compliance with any limitations on data location.

Also make sure that the company and vendor have up to date contact information so they can communicate in an urgent situation, such as a data breach. Security requirements should be documented in the contract — this is mandatory for companies that are required to comply with GDPR.

 

Ensuring safe SaaS operations

There’s no going back to a time when the in-house IT team controlled all of the data onsite. SaaS solutions are expanding capabilities and lowering costs. That’s why all of the momentum is toward an accelerated adoption of SaaS solutions. But the company still has an obligation to ensure that the business is protecting data that moves through SaaS solutions.

That’s why it’s so important for a multidisciplinary team to evaluate SaaS solutions and make a decision in line with company governance needs. By taking new realities into account and modernizing the approach to security, businesses can get all the benefits of SaaS applications while ensuring that they operate safely within that environment.

KEYWORDS: cyber security information security risk management software security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Unit 4 eric kaasenbrood 17122019 update1

Eric Kaasenbrood is CISO at Unit4.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • software visibility

    How to secure organizational SaaS and increase third-party visibility

    See More
  • SaaS-security-freepik

    Why security leaders are concerned about the SaaS sprawl, and how to get a grip on it

    See More
  • Machine Identity

    Machine identities: What they are and how to use automation to secure them

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • September 3, 2024

    From DDoS Protection to WAAP: How Layered Protection Enhances Your Cybersecurity Strategy

    ON DEMAND: By participating in the webinar, attendees will gain enhanced knowledge of cyber threats and understand the current spectrum of cyber threats facing businesses.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!