Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

How to ensure your SaaS solutions are secure

By Eric Kaasenbrood
Software-as-a-Service
October 20, 2020

In the traditional IT environment, data and applications were housed in on-premises datacenters, and IT system administrators were also company employees. But the shift toward subscription-based services under a SaaS model has been underway for years. Several years ago, a Gartner researcher predicted that by 2020, all new market entrants and 80% of legacy providers would offer products on a SaaS basis.   

Customer enthusiasm for SaaS is high because it reduces or eliminates in-house maintenance costs. The pandemic underscored another benefit: business continuity. TechCrunch reported that sales have soared at SaaS companies during the COVID-19 crisis. Revenue at Zoom increased by nearly 170% year-over-year as people used the platform to replicate in-person meetings and training sessions.

But at many businesses, the company security posture hasn’t kept pace with the volume of data flowing to and from multiple SaaS vendors. It’s an urgent issue in an environment where endpoints are proliferating and hacking techniques are getting more sophisticated. That’s why it’s never been more urgent to upgrade the security posture and reduce the risks associated with SaaS solutions.

 

Starting with the security architecture

The adoption of SaaS also requires rethinking your overall Security Architecture. Many cloud providers support whitelisting solutions to enable their customers’ employees to access the SaaS solution via their office network (to enforce security measures). But it’s increasingly common for employees to bypass the office network and use direct connections to the cloud solutions they use. They may not log into to the office network at all, so IT has to ensure that endpoints are secure even when they’re not connected to the network.

Cloud native solutions can help enforce critical controls like patch management, configuration management and endpoint protection also when end-user devices are not linked to the office network. Furthermore, the architecture should also consider a strategy for BYOD security. A modern security architecture should include cloud-based identity and access management solutions like multifactor authentication and federation with your SaaS applications. Also review the requirements to integrate logs with your SIEM solution and the use of Cloud Access Security Brokers. A strong architectural setup can help to enforce security policies while meeting business requirements.

 

Meeting governance needs in a SaaS environment

Businesses and individuals can activate SaaS applications with a single click, which presents the “Shadow IT” challenge: the application may not have been reviewed or vetted internally to ensure it conforms with company policies. There are many risks associated with unvetted SaaS solutions, including data ownership, information security risks and potential regulatory compliance issues.

A proactive governance approach requires a defined process that ensures visibility and directly addresses risks to keep exposure within acceptable levels. A multidisciplinary strategy that includes people with expertise in the business, IT architecture, procurement, legal, privacy and IT risk/security is the best way to ensure sound governance.

One of the first steps is to classify data in terms of confidentiality, integrity and availability. To find the right balance between costs and security; measures should reflect the criticality of the data being protected.

Additionally, it’s important to understand that cloud and SaaS providers have a shared responsibility to keep data safe and to understand exactly what the company will manage vs. what the SaaS vendor will oversee. To make sure nothing falls through the cracks, typically SaaS providers manage components like applications, virtual machines, databases, datacenters, etc., (the largest portion of the stack) while the company manages components like user access to the application (joiners, leavers, changers, roles, segregation of duties, etc.), end user devices, and data.

Depending on the SaaS provider, there may be multiple configuration options, like password settings or identity federations, and authorization models. Some SaaS providers offer different availability plans to meet recovery time objective and recovery point objective. The company should manage this as well to ensure these are configured in line with their requirements and risk apatite.

 

Evaluating SaaS vendors

The key to effectively assessing SaaS vendors is to keep in mind that they provide standard services to customers. That means a vendor might not meet every company’s detailed security requirement, but that can be difficult to assess on a point-by-point basis. The best approach is to evaluate the vendor at a higher level, looking at how their security measures meet your overall security goals and risk appetite. This should not be a one-time action but requires reevaluation on a periodic basis as both the threat landscape and cloud services will change over time.

There are different ways to gain insight in the security levels of a (SaaS) vendor, some examples are:  

  • Security certifications like ISO 27001 and SOC1/SOC2 assurance reports can be helpful in assessing SaaS security. Those reports are prepared by an independent auditor.  
  • Security questionnaires can be used to query information. It is recommended to use standard terminology to reduce the possibility of a misunderstanding. Documentation of the  Cloud Security Alliance can help in this.
  • Security tests provide insight in potential (technical) security weaknesses. Some vendors share the results of their own security tests or allow customers to perform penetration tests; this provides a better understanding of vendor security practices.

Also keep in mind that many SaaS applications are built on top of other cloud providers, like Microsoft Azure, AWS, Google Cloud, etc. This has a benefit as the SaaS provider can leverage the security mechanisms of the underlying cloud provider. However, it’s good to have an understanding of how the security is maintained in this chain.

The previous points are mainly about the security of the vendor; in addition, a vendor should provide sufficient capabilities for you to securely consume the service this includes the ability to define user roles, segregation of duties, identity federations or password settings. It’s also important to be able to conduct secure system-to-system integrations when necessary and to ensure compliance with any limitations on data location.

Also make sure that the company and vendor have up to date contact information so they can communicate in an urgent situation, such as a data breach. Security requirements should be documented in the contract — this is mandatory for companies that are required to comply with GDPR.

 

Ensuring safe SaaS operations

There’s no going back to a time when the in-house IT team controlled all of the data onsite. SaaS solutions are expanding capabilities and lowering costs. That’s why all of the momentum is toward an accelerated adoption of SaaS solutions. But the company still has an obligation to ensure that the business is protecting data that moves through SaaS solutions.

That’s why it’s so important for a multidisciplinary team to evaluate SaaS solutions and make a decision in line with company governance needs. By taking new realities into account and modernizing the approach to security, businesses can get all the benefits of SaaS applications while ensuring that they operate safely within that environment.

KEYWORDS: cyber security information security risk management software security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Unit 4 eric kaasenbrood 17122019 update1

Eric Kaasenbrood is CISO at Unit4.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • software visibility

    How to secure organizational SaaS and increase third-party visibility

    See More
  • SaaS-security-freepik

    Why security leaders are concerned about the SaaS sprawl, and how to get a grip on it

    See More
  • Machine Identity

    Machine identities: What they are and how to use automation to secure them

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing