No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

The Toxic Combinations Driving SaaS Security Risks

IT teams often have incomplete insight into all the SaaS tools across their organizations

by Guy Guzner
June 10, 2024
in Cybersecurity
radioactive waste sign

Software-as-a-service (SaaS) continues to become the business norm for an increasing number of use cases. As a result, a host of risks have emerged. Guy Guzner, co-founder and CEO of Savvy Security, considers the threat — and what it means for the visibility and control companies need.

Editor’s note: The author of this article, Guy Guzner, is co-founder and CEO of Savvy Security, a security provider in the SaaS industry.

SaaS risk is a growing problem. According to a recent report, 80% of employees adopt SaaS applications without IT approval, creating unrestricted associated user and app identity risks that bypass traditional security processes and solutions. The threat is significant and proves that rapidly growing SaaS adoption requires a deeper level of visibility and control than exists today.

One of the greatest challenges companies face is identifying the toxic combinations of SaaS risk that rest at the intersection of identity and access management, user behavior and business context. Individually, each of these components is part of the overall SaaS ecosystem, but together, they can create the most severe form of SaaS security risk within organizations, leading to compliance violations, data breaches, brand damage and financial loss.

Multiple factors driving SaaS security risk

The average company uses multiple SaaS apps like Slack, Dropbox and Zoom. While these applications enhance efficiency, it’s also easy for users to input proprietary information or sensitive data into these apps as part of their workflows. Not all SaaS applications are endorsed, or even known, by IT; in fact, unmanaged SaaS apps used by the workforce often surpass the “known” or “managed” average by up to four times, according to Savvy research.

Signing up for new applications to help solve a problem or complete work seems harmless to employees — say, for a member of the finance team, using an application like Canva for a presentation would appear simple and low-risk. This becomes a problem, though, if that employee uses the same credentials for Canva that they use for enterprise applications — and if those credentials have administrative privileges. 

If those credentials are compromised, that could cause massive security problems for the organization. Other examples of problematic factors include rogue administrators, compromised accounts, shadow identities, lack of multi-factor authentication (MFA), incomplete offboarding, direct sign-in instead of single sign-on (SSO) and risky or shared credentials. Any combination of these factors can open an organization to compromise, with potentially devastating impacts.

Consider a circumstance where an employee’s credentials are compromised and released on the dark web. The individual hasn’t enabled multifactor authentication or used a password manager and is reusing their password across applications, including in apps like DocuSign, which may contain highly sensitive information. The individual also has administrative privileges for important financial systems. In this situation, we have multiple factors creating a toxic combination: 1. an identity with privileged access to sensitive data; 2. an employee failing to follow company policy to set up MFA as a security control and never reuse passwords; and 3. a compromised account with risky credentials found on the dark web. 

And it’s not only active employees who can increase a company’s SaaS risk, as former employees often maintain access to SaaS tools, particularly those that aren’t being fully managed by the company’s IT experts. In the case of incomplete or insufficient offboarding, businesses can create unauthorized access points that could have legal, compliance and data-theft consequences.

shadow of hand on keyboard
Cybersecurity

How “Shadow IT” Puts a Business at Risk: 5 Hazards for GRC Professionals to Watch

by Stu Sjouwerman
March 30, 2022

Unauthorized use of unsecured business applications presents growing danger. So-called shadow IT presents GRC teams with the need to prevent end users from taking actions that while seemingly expedient, completely undermine otherwise robust cybersecurity and data protection measures. 

Read moreDetails

Eliminating SaaS risks within companies

Organizations should incorporate these tips to reduce risks posed by SaaS applications:

  1. Understand what makes a combination of risk toxic. This understanding will alert the team to potential vulnerabilities in the organization and ensure that these are rectified quickly to prevent unauthorized access.
  2. Continuously monitor employee privileges. It’s critical that security and IT teams maintain a complete and updated inventory of SaaS applications and their privileges for each employee. This is a known challenge within organizations, but it is the only way to ensure that the correct people have the correct access to sensitive information across an organization.
  3. Focus on adding visibility. Maintaining visibility into SaaS security posture, including associated user and app identities can help organizations safely embrace all the benefits of SaaS tools.
  4. Prioritize proper offboarding. Find ways to automate the process for deprovisioning access to terminated user accounts.

To successfully combat this threat within organizations, it is essential that security practitioners have visibility into both enterprise and fringe SaaS applications, and that they be able to accurately pinpoint the combinations of risks that lead to security incidents in order to prevent unauthorized access to data.


Tags: Technology
Previous Post

Navigating the Financial Edge of a Technology Investment: 6 Tips for Corporate Leadership

Next Post

NAVEX Whistleblowing & Incident Management Benchmark Report

Guy Guzner

Guy Guzner

Guy Guzner is co-founder and CEO of Savvy Security. His areas of expertise include firewalls, intrusion prevention systems, VPN, content scanning, sandboxes, data-loss prevention, secure web gateways and web application firewalls products.

Related Posts

imessage on phone

The Hidden Compliance Risks Lurking in Your iMessages

by Harriet Christie
March 3, 2025

How end-to-end encryption and lack of native archiving tools complicate regulatory compliance

remote worker not at desk

The Unseen Risks of Remote Work: Stopping Employee Fraud Before It Starts

by Prakash Santhana
February 3, 2025

From unauthorized data access to BYOD risks, hybrid work demands smarter strategies to combat employee fraud before it escalates

GAN Integrity Buyers Guide to TPRM Software

Buyer’s Guide to TPRM Software

by Corporate Compliance Insights
January 14, 2025

Simplify your third-party risk management software selection Buyer's Guide Guide to Third-Party Risk Management Software What’s in this guide from...

GAN Integrity Buyers Guide to Corporate Compliance Software

Ultimate Buyers’ Guide to Corporate Compliance Software

by Corporate Compliance Insights
November 19, 2024

Take the complexity out of compliance Buyers’ Guide Ultimate Guide to Corporate Compliance Software What’s in this guide from GAN...

Next Post
NAVEX Whistleblowing & Incident Management Benchmark Report_c

NAVEX Whistleblowing & Incident Management Benchmark Report

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights