Over the previous few years, SaaS has developed into the spine of company IT. Service companies, reminiscent of medical practices, legislation companies, and monetary companies companies, are virtually solely SaaS primarily based. Non-service companies, together with producers and retailers, have about 70% of their software program within the cloud.
These purposes comprise a wealth of information, from minimally delicate basic company data to extremely delicate mental property, buyer information, and worker information. Risk actors have famous this shift, and are actively working to breach apps to entry the information.
Listed here are the highest traits influencing the state of SaaS Safety for 2024 — and what you are able to do about it.
Democratization of SaaS
SaaS apps have remodeled the best way organizations buy and use software program. Enterprise models buy and onboard the SaaS instruments that finest match their wants. Whereas that is empowering for enterprise models which have lengthy been pissed off by delays in procuring and onboarding software program, it does require organizations to rethink the best way they safe information.
Safety groups are being pressured to develop new methods to safe firm information. Missing entry and visibility into an software, they’re positioned within the function of advising a enterprise unit that’s utilizing SaaS purposes. To additional complicate issues, each SaaS software has totally different settings and makes use of totally different terminology to explain safety features. Safety groups cannot create a one-size-fits-all steerage doc due to the variations between the apps.
Safety groups should discover new methods to collaborate with enterprise models. They want a instrument that provides visibility and steerage for every software setting in order that they – and the enterprise unit – perceive the dangers and ramifications concerned within the configuration selections that they make.
ITDR Kinds a Important Security Web
If a risk actor good points entry to a high-privilege account, they achieve unfettered entry throughout the software. Organizations are actually understanding that id is the de facto perimeter for his or her SaaS purposes.
When risk actors take over a certified consumer account, they usually comply with frequent techniques, strategies and procedures (TTP) as they work their approach by way of the app towards the information they need. They depart behind indicators of compromise (IoC), which may be primarily based on actions taken throughout the app or logs.
As we transfer into the brand new yr, we’re going to see extra organizations adopting an Id Risk Detection & Response (ITDR) strategy. ITDR mitigates that concern. As a key element in Id Safety Posture Administration, ITDR capabilities can detect TTPs and IoCs, after which ship an alert to the incident response crew. By way of ITDR, risk actors who’ve managed to breach the id perimeter can nonetheless be stopped earlier than they steal vital information or insert ransomware into the applying.
Find out about how ITDR might help you deal with these SaaS Safety traits at this time
Cross-Border Compliance Means Extra Tenants to Safe
World firms are more and more dealing with totally different regulatory necessities from one nation to the subsequent. Consequently, 2024 will see a rise within the variety of geo-specific tenants as a part of the trouble to maintain information segmented in accordance with the totally different laws.
This modification can have a restricted affect on software program prices as most SaaS app pricing is predicated on subscribers somewhat than tenants. Nevertheless, it should have a major affect on safety. Every tenant will should be configured independently, and simply because one occasion of the applying is safe doesn’t suggest that every one tenants are safe.
To safe all these tenants, safety groups ought to search for a safety resolution that enables them to set app benchmarks, examine tenants, and show safety settings side-by-side with out charging additional for every further tenant. By making use of finest practices all through the group, firms can preserve all their tenants safe.
![]() |
| Determine 1: Adaptive Protect’s platform monitoring and presenting all Salesforce tenants |
Misconfigured Settings Are Resulting in New Exploits
A default misconfiguration in ServiceNow triggered widespread panic in October. The setting, which was a part of the applying’s Entry Management Lists, allowed unauthorized customers to extract information from information. The misconfiguration impacted 1000’s of firms. An identical misconfiguration in Salesforce Neighborhood again in Might also impacted a major variety of firms and led to information breaches.
Misconfigurations like these have the potential to trigger main harm to firms. They result in information leaks that break the belief between firms and their stakeholders, and have the potential to show into onerous fines, relying on the character of the information that leaked.
Securing misconfigurations is a company’s finest likelihood at stopping these exploits from impacting their operations and hurting their backside traces.
See find out how to automate SaaS misconfigurations and regain management of your SaaS stack
Elevated Reliance on Third-Social gathering Purposes Provides to SaaS Danger
Third-party purposes add actual worth for finish customers. They enhance processes, lengthen performance, and join information between a number of purposes. Customers join these SaaS apps with the press of button, and immediately start enhancing their workflows.
In March 2023, Adaptive Protect launched a report exhibiting that organizations utilizing Google Office with 10,000-20,000 customers averaged 13,913 third-party apps linked to Google Office alone. An astonishing 89% of those requested both high- or medium-risk permissions. Many of those high-risk apps are used as soon as and forgotten about, or utilized by a small variety of workers. Nevertheless, even these dormant or flippantly used purposes have vital permissions and can be utilized to compromise or breach a SaaS software.
Using third-party purposes is barely rising, as extra apps are developed and workers use their very own judgment – somewhat than checking with their safety crew – when integrating third-party purposes into their stack. Safety groups should develop visibility into all their built-in apps, and achieve insights into the permissions requested, the worth the app contributes to the group, and the chance it poses.
![]() |
| Determine 2: Adaptive Protect’s platform exhibits built-in third-party apps, their danger rating, and the scopes granted |
A number of Units to Safe as Working from Residence Is not Going Wherever
In 2023, practically 40% of all workers labored from dwelling a minimum of a part of the time. Based on WFHResearch, roughly 12% of workers work completely of their properties, whereas one other 28% have hybrid roles.
These figures ought to give pause to safety personnel involved about customers logging in to their work accounts from private units. One of many largest considerations safety groups have is when high-privileged customers log into their accounts utilizing an unmanaged or unsecured system. These units could have vital vulnerabilities, and create a brand new assault vector. For a lot of groups, there may be virtually no solution to inform which units are used to entry the SaaS app or see whether or not these units are safe.
Organizations Are Turning to SSPM to Safe SaaS
Whereas all these traits level to official SaaS safety considerations, SaaS Safety Posture Administration (SSPM) instruments coupled with ITDR capabilities, like Adaptive Protect, can absolutely safe the SaaS stack. SSPMs are designed to routinely monitor configurations, on the lookout for configuration drifts that weaken an app’s posture. In SaaS Safety Survey, 2024 Plans & Priorities by Cloud Safety Affiliation and Adaptive Protect, 71% of respondents stated their firm had elevated their funding into SaaS safety instruments over the previous yr, and 80% had been both already suing SSPM or deliberate to spend money on one throughout the subsequent 18 months.
SSPMs can present baselining instruments for a number of tenants of the identical app, and allow customers to ascertain finest practices, examine settings from totally different cases, and enhance the general posture of the SaaS stack.
SSPMs additionally detect and monitor third-party purposes, alerting customers if their built-in apps are requesting an excessive amount of entry and updating the safety crew when built-in apps are dormant. It tracks customers, and screens the units getting used to entry purposes to stop the usage of unmanaged or unsecured units on company SaaS apps. Moreover, their built-in communication instruments make it straightforward for enterprise models to collaborate with safety personnel in securing their purposes.
SaaS apps have grown in recognition for good purpose. They permit organizations to scale as wanted, subscribe to the apps they want in the intervening time, and restrict funding in some IT. With SSPM, these purposes will be secured as nicely.
See reside in a ten-minute demo how one can begin securing your SaaS stack


