Mitiga Appoints Charlie Thomas as CEO READ THE RELEASE

Mitiga Announces $30M Series B Led by SYN Ventures READ THE NEWS

Generally speaking, when most CISOs think about their cloud security, they’re keyed into their cloud infrastructure held at big providers like AWS, Azure, and GCP. Their typical focus is on securing virtual machines, storage and networks that run on cloud infrastructure. All of this is hugely important.

The problem is, however, that view of cloud security is missing what is arguably a larger attack surface that also needs to be protected: Software-as-a-Service (SaaS). Try to think of an enterprise today that is not heavily reliant on vendor-hosted SaaS applications. It doesn’t seem possible.
Think of your own organization’s basic business functions: Sharing files? It's likely you're using Microsoft Sharepoint, Google Drive, Box or Dropbox. Using a Customer Relationship Management (CRM) system? Most companies today rely on Salesforce or other SaaS-based systems. Levering GitHub or GitLab for development repositories? Those rely on SaaS too.

Core aspects of IT operations management have also moved to SaaS, with many organizations using services from vendors like ServiceNow and Zendesk. What about your company's core identity server? Many organizations (and likely yours too) that rely on Microsoft Active Directory migrated to AzureAD (now being rebranded as Microsoft Entra ID).

The simple reality is that many of your enterprise business applications are now handled via SaaS providers and SaaS adoption continues accelerating as organizations shift enterprise applications to the cloud. The pain CISOs and SOC teams are starting to feel, is that security for SaaS behaves differently and can be difficult to wrangle, leaving dangerous gaps.

Security teams today that ignore the unique risks of SaaS do so at their own peril.

Security Challenges in SaaS Environments

While SaaS providers securely manage the infrastructure, infrastructure is only one component of what it takes to be secure for an organization. Are SaaS providers responsible for your users' security? The simple answer is no.

We are already familiar with the shared responsibility model for cloud services, where securing cloud infrastructure is shared between the cloud provider and the companies using it. They are responsible for the security of “the” cloud, and the customers are responsible for security “in” the cloud. Think about how that applies to SaaS, where customers can only configure items, but don’t have any “in” security controls.

Even if a SaaS provider’s platform is secure, if a user credential is compromised that is used to access the SaaS provider, that could lead to a compromise of the organization's data on the system. As organizations increasingly rely on single sign-on (SSO) to access SaaS, the risk of user compromise and the impact of overall security is significant. Additionally, each SaaS platform have different logs. Those logs vary in structure, type, content and even existence. Do you know what logs are available in your SaaS platform—or more importantly, which aren’t?

If there is a breach at the SSO provider or if it's just a single user that gets compromised, that user has single sign-on to multiple SaaS platforms. One compromised user can result in catastrophic data loss. Here's a more concrete example. At Mitiga we created a threat hunt for a major SaaS provider (Salesforce). Our hunt logic that identifies operations that look like a bad actor trying to siphon data out of Salesforce. There are lots of ways to share data from Salesforce through exports, downloads and emails. An attacker with the right access can use those methods to potentially exfiltrate an organization's entire Salesforce database.

So which aspects of SaaS can lead to security challenges?  

  • Identity system compromises provide access to SaaS environments. With single sign-on, one breach can expose multiple applications.
  • Broad internal access presents insider risks. A user can go to the SaaS platform and suck out all the data that they have access to.
  • Lack of visibility into user activity and access. Manual investigation is time-consuming and complex across SaaS platforms.
  • Inability to detect and respond to threats in real-time. Malicious insiders can exfiltrate or destroy data before it's identified.
  • Lack of logs uniformity. Different platforms offer different logs availability, and different log coverage.

Looking at these factors together, it’s easy to understand why SaaS is both a rich target for attackers, and a bit of a headache for security teams.

Bridging the SaaS Security Gap

The complexity of SaaS security requires two key things: automation and correlation. If there is something odd occurring in a SaaS platform, for example a user doing a bunch of exports, that action could be legitimate. It might be a user doing some routine cleanup. Then again it could be something malicious.

Making the determination of which bucket activity falls into requires visibility and context.
It's important to understand what the user is doing overall, across identity providers and different systems. Is the user suddenly logging in from a new location? Context really matters to determine if an action is in fact potentially a risk. Manually figuring out context is not easy, that's where automation and correlation technology comes into play, to help fill the knowledge gap.

To overcome these SaaS security challenges, CISOs must focus on three things:

  1. Proactive assessments. Validate logging and visibility coverage across SaaS apps to identify blind spots.
  2. Real-time visibility. Centralized monitoring of identity, access and activity across SaaS environments.
  3. Contextual insights. It's essential to have the automated capability to connect related identity, infrastructure and application events across an organization's digital attack surface.

Providing clear contextual visibility saves precious investigation time when responding to threats and reduces data exposure risks. As organizations continue rapidly migrating business-critical systems to SaaS, CISOs and their security teams must prioritize protecting these new environments or jeopardize business resilience. The time for action is now.

LAST UPDATED:

September 24, 2024

Want to learn how Mitiga can support your SaaS security posture? Get a demo.

Don't miss these stories:

Can vulnerabilities in on-prem resources reach my cloud environment?

What risk does this Zoho password manager vulnerability present, and could this on-prem vulnerability impact cloud environments as well?

Log4Shell - identify vulnerable external-facing workloads in AWS

Cloud-based systems should be thoroughly searched for the new Log4j vulnerability (CVE-2021-44228). But this is a daunting task, since you need to search each and every compute instance, from the biggest EC2 instance to the smallest Lambda function. This is where Mitiga can help.

How Transit Gateway VPC Flow Logs Help Incident & Response Readiness

In this blog, we will focus on the security and forensic aspects of Transit Gateway VPC flow logs and expand the way they can be used by organizations to respond to cloud incidents.

Uber Cybersecurity Incident: Which Logs Do IR Teams Need to Focus On?

On September the 16th, Uber announced they experienced a major breach in their organization in which malicious actor was able to log in and take over multiple services and internal tools used at Uber. What are some of the logs that IR teams should be focusing on in their investigation?

Viral Outbreaks: Thinking of Microsoft’s New Wormable Vulnerability in a Coronavirus Context

But today, in the midst of a pandemic outbreak of Coronavirus (COVID-19) and while governments and global organizations work to contain and eradicate the virus, we’re hearing of a new wormable vulnerability in Microsoft’s SMBv3 protocol.How can we learn from these unfortunate events to provide us with a different context and an opportunity to rethink our level of readiness for unexpected, viral cyber events?

Unlocking Cloud Security with Managed Detection and Response

See how Mitiga’s Cloud Managed Detection and Response tackles complex cyber threats with proactive threat management and advanced automation at scale.