• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • About Us
  • Contact Us

iHash

News and How to's

  • The 2022 Complete Better Manager Course Bundle for $49

    The 2022 Complete Better Manager Course Bundle for $49
  • The 2022 Complete Practical Finance Course Bundle for $49

    The 2022 Complete Practical Finance Course Bundle for $49
  • The 2022 Complete Business Startup Course Bundle for $49

    The 2022 Complete Business Startup Course Bundle for $49
  • The 2022 Data-Driven Decisions Bundle for $49

    The 2022 Data-Driven Decisions Bundle for $49
  • iPad 7 2.33GHz 32GB – Space Gray (Refurbished: WiFi Only) for $333

    iPad 7 2.33GHz 32GB – Space Gray (Refurbished: WiFi Only) for $333
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

The SaaS App Admin Paradox

Aug 4, 2022 by iHash Leave a Comment

SaaS App Admin Paradox

Imagine this: a company-wide lockout to the company CRM, like Salesforce, because the organization’s external admin attempts to disable MFA for themselves. They don’t think to consult with the security team and don’t consider the security implications, only the ease which they need for their team to use their login.

This CRM, however, defines MFA as a top-tier security setting; for example, Salesforce has a “High Assurance Login Value” configuration and immediately locks out all users as a safety precaution. The entire organization hits a standstill and is frustrated and confused.

Deeply concerning, this is not a one-off event, admins for business-critical SaaS apps often sit outside the security department and have profound control. Untrained and not focused on security measures, these admins are working towards their departmental KPIs. For instance, Hubspot is usually owned by the marketing department, likewise, Salesforce is often owned by the business department, etc. Business departments own these apps because it’s what allows them to do their job efficiently. However, the paradox lies in the fact that it’s the security team’s responsibility to secure the organization’s SaaS app stack and they cannot effectively execute this task without full control of the SaaS app.

The 2022 SaaS Security Survey Report, run by CSA and Adaptive Shield, delves into the reality of this paradox, presenting data from CISOs and security professionals today. This article will explore important data points from the respondents and discuss what the solution for security teams could be.

Learn how your security teams can regain control of all SaaS apps.

SaaS Apps in the Hands of Business Departments

Across a typical organization, a wide array of SaaS apps are used (see figure 1), from cloud data platforms, file sharing and collaboration apps to CRM, project and work management, marketing automation, and a whole lot more. The need for each and every SaaS app fills a certain niche role required by the organization. Without the use of all these SaaS apps, a business could find itself lagging or taking more time to achieve its KPIs.

The 2022 SaaS Security Survey Report reports that 40% of these apps are managed and owned by non-security teams, such as sales, marketing, legal, etc. (see in figure 2). While the security and IT teams are reported to be the main destination for SaaS app management, it’s the 40% of business departments also taking part and having full access that complicates the threat landscape.

Security teams can’t take away this ownership as the business applications’ owners need to maintain a high level of access to their relevant SaaS apps for optimal use. Yet, without in-depth knowledge of security or the vested interest (a security KPI that reflects on their work product), it’s not reasonable for the security team to expect that the business owner will ensure a high level of security in their SaaS.

SaaS App Admin Paradox
Figure 2. Departments Managing SaaS apps, 2022 SaaS Security Survey Report

Unpacking the SaaS App Ownership Paradox

When asked the main reason for misconfiguration-led security incidents (figure 3), respondents of the survey report cited these at their top four: (1) There are too many departments with access to security settings; (2) Lack of visibility to security settings when they are changed (3) Lack of SaaS security knowledge; (4) Misappropriated user permissions. All of these reasons, either overtly or implied, can be attributed to the SaaS App Ownership Paradox.

The leading cause of security incidents caused by misconfigurations is having too many departments with access to security settings. This goes hand in hand with the next cause – lack of visibility when security changes are changed. A business department may make changes to an app setting to optimize its ease of use without consulting with or notifying the security department.

In addition, misappropriated user permissions can easily stem from a business department owner at the helm who is not paying careful attention to the app’s security. Often users are granted privileged permissions that they don’t even need.

How Security Teams Can Regain Control

With this shared responsibility model, the only efficient way to bridge this communication gap is through a SaaS Security Posture Management platform (SSPM). Hailed as a MUST HAVE solution to continuously assess security risks and manage the SaaS applications’ security posture in the “4 Must-Have Technologies That Made the Gartner Hype Cycle for Cloud Security, 2021”, such a solution can alert the security team on any app configuration change made by the app owner, and provide clear directions on how to fix it through a ticketing or collaboration management system.

With an SSPM solution, owned and managed by the organization’s security team, the security team can gain complete visibility of all the company’s SaaS apps and their security settings, including user roles and permissions. W

Organizations can take it one step further and have the app owners join the SSPM platform so they can actively control and oversee all configurations in their owned apps. By using a scoped admin capability (figure 4) the security team can grant the app owners access to the apps they own and can remediate security issues, with their supervision and direction.

There’s no way to eliminate business departments’ access to SaaS app security settings, and while users across the organization should be educated on basic SaaS security in order to reduce the risk that may occur from business departments, it doesn’t always happen or it’s just not enough. Organizations need to implement a solution that helps avoid these situations by enabling visibility and control for the security team, alerting on configuration drifts, audit logs that provide insight into actions within the SaaS apps and scoped admins.

Get a 10-minute demo of how Adaptive Shield’s SSPM solution helps security teams regain control.

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: Admin, app, computer security, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, data breach, hacker news, hacking news, how to hack, information security, network security, Paradox, ransomware malware, SaaS, software vulnerability, the hacker news

Special Offers

  • The 2022 Complete Better Manager Course Bundle for $49

    The 2022 Complete Better Manager Course Bundle for $49
  • The 2022 Complete Practical Finance Course Bundle for $49

    The 2022 Complete Practical Finance Course Bundle for $49
  • The 2022 Complete Business Startup Course Bundle for $49

    The 2022 Complete Business Startup Course Bundle for $49
  • The 2022 Data-Driven Decisions Bundle for $49

    The 2022 Data-Driven Decisions Bundle for $49
  • iPad 7 2.33GHz 32GB – Space Gray (Refurbished: WiFi Only) for $333

    iPad 7 2.33GHz 32GB – Space Gray (Refurbished: WiFi Only) for $333

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

E-mail Newsletter

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Climate Change is an Existential Threat, and Businesses Need Data to Fight It

Aug 6, 2022 By iHash

Hackers Exploit Twitter Vulnerability to Exposes 5.4 Million Accounts

Aug 6, 2022 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news Cyber Security cybersecurity cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone iPhone 6 Malware microsoft network security Privacy ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

What is search-powered technology and why do 84% of execs say it's the key to digital transformation?

What is search-powered technology and why do 84% of execs say it’s the key to digital transformation?

We all know that too much of a good thing can quickly backfire. In today’s business world, many companies are finding that they’re hitting a tipping point in terms of data.  Data creates the potential for informed business decisions that drive speed, productivity, and digital transformation, but not without introducing a series of challenges. Managing […]

The 2022 Complete Better Manager Course Bundle for $49

Expires August 06, 2122 23:59 PST Buy now and get 67% off KEY FEATURES Learn everything you need to know about business leadership, management, and human resources. The 2022 Complete Better Manager Course Bundle is designed to give you a strong foundation in the areas of operations, financial strategy, people development, and leadership. This bundle […]

The 2022 Complete Practical Finance Course Bundle for $49

Expires August 06, 2122 23:59 PST Buy now and get 67% off KEY FEATURES Get the most out of your portfolio by learning how to make use of it more effectively. This 12-course bundle includes specific courses on how to value a business, prepare a business plan, and more. From investing in a business to […]

Iranian Hackers likely Behind Disruptive Cyberattacks Against Albanian Government

A threat actor working to further Iranian goals is said to have been behind a set of disruptive cyberattacks against Albanian government services in mid-July 2022. Cybersecurity firm Mandiant said the malicious activity against a NATO state represented a “geographic expansion of Iranian disruptive cyber operations.” The July 17 attacks, according to Albania’s National Agency […]

The Conceptual Data Model’s Unwavering Role in Data Governance 

In an age in which data governance has become all but synonymous with data privacy and data protection, there are numerous aspects of data management that are regarded much differently than how they traditionally were. Data modeling, for example, is frequently considered a dimension of data engineering or data science. From this perspective, data models […]

Apple and MLB announce September “Friday Night Baseball” schedule

Apple and Major League Baseball (MLB) today announced the September 2022 “Friday Night Baseball” schedule. Scheduled games continue to be available to watch for free, only on Apple TV+. Game assignments for “Friday Night Baseball” broadcasters will be announced on a weekly basis. “Friday Night Baseball” is now also available in Colombia, the Dominican Republic, […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2022
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT