Organizations at risk from misconfigured SaaS installations

Half of security teams delegate SaaS security to users, survey finds

Saas on a blue screen with a finger stretching to touch it

Misconfigured SaaS deployments are putting organizations at risk of cyber threats, according to a new study.

The research — carried out by IT security firm Adaptive Shield — found that 85% of companies see SaaS misconfigurations as a top security threat, putting it in the top three challenges for today's enterprises.

The SaaS Security Survey Report 2021 surveyed IT security professionals from North America and Western Europe in companies of 500 or more employees. According to the report, despite SaaS misconfigurations being a top threat, the more apps a company has, the less they check security settings and permissions for misconfigurations. Only 12% of companies with 50 to 99 applications check them weekly.

The research found that despite 60% of survey respondents reporting high concern with more than 25% of their SaaS app configurations, their frequency of reported checks remained low. 

The report found that one big problem for security teams is configuring the settings of all internal SaaS apps. Each app has different settings, a different user interface, its terminology, and its distinct complexities. According to the report, manually configuring settings for these disparate apps for hundreds to thousands of users is an impossible task.

SaaS owners in corporate marketing, sales, and product departments have found themselves, not the business’s security teams, responsible for the security of such code in 52% of organizations. The situation was better in companies with over 5,000 employees where the IT department is responsible for monitoring the security settings in 53% of companies.

The report said that one in four companies allows department owners (e.g., sales, marketing) to access SaaS security settings.  

“Any human error by the SaaS owner, who is often not trained in security, can lead to an increase in SaaS security misconfigurations, a reported high concern of CISOs and security professionals,” the report said.

Related Resource

The secure cloud configuration imperative

The central role of cloud security posture management

The secure cloud configuration imperativeWatch now

The report said that unlike the other cloud security solutions in the market today, there are no widely used tools that enable security teams to have complete and continuous visibility of SaaS security settings and configurations. The survey shows that SaaS Security Posture Management (SSPM) has become the top priority for 48% of companies in 2021. 

“These findings present a clear view of an urgent need to secure the SaaS landscape," said Maor Bin, CEO of Adaptive Shield.

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

Graylog launches new cyber security solution to address legacy issues
cyber security

Graylog launches new cyber security solution to address legacy issues

21 Oct 2021
US to ban surveillance software exports to authoritarian governments
cyber security

US to ban surveillance software exports to authoritarian governments

21 Oct 2021
A quarter of all malicious JavaScript is obfuscated
hacking

A quarter of all malicious JavaScript is obfuscated

20 Oct 2021
Almost 70% of CISOs expect a ransomware attack
ransomware

Almost 70% of CISOs expect a ransomware attack

19 Oct 2021

Most Popular

Alibaba unveils custom Arm-based server chip
components

Alibaba unveils custom Arm-based server chip

19 Oct 2021
What is cyber warfare?
Security

What is cyber warfare?

15 Oct 2021
HPE wins networking contract with Birmingham 2022 Commonwealth Games
Network & Internet

HPE wins networking contract with Birmingham 2022 Commonwealth Games

15 Oct 2021