Simple And Recommended SaaS Security Tips

SaaS Security Tips

Most people and companies are now using a significant amount of SaaS solutions. Companies are running sales support software, they are file sharing, collaborating and using e-mail programs and a lot more in the cloud. However, that usage also leads to concerns about the security of those solutions. How safe are they? What risks do we run?

Here are a couple of tips to increase the security of SaaS applications.

By far, the biggest risks to using SaaS are leaking data and losing control. The top way to control these risks is simple: watch your passwords, and know how to survive a cloud provider exit. If you look at famous data breaches in the past year, of which the iCloud celebrity hack, (However, still may be dangers) is probably the most well-known, you will see that most breaches were caused by weak passwords and weak password reminders.

Improving the protection that passwords offer is often fairly easy. Security experts recommend using so-called two-factor (or two-step) authentication. This means that you use more than one way to prove your identity at log in. Examples include security tokens, dongles, and fingerprint scanners.

This used to be inconvenient for the user, but in the past few years a number of usable scenarios have been developed. It does not have to be a daily hassle, and you don’t have to fear being locked out.

For example, you can configure your Dropbox account to ask you for an SMS confirmation when you access it on a computer you have not used before. Check it out, they have thought this out well, and there is absolutely no excuse not to use it. You will find it under Account -> Settings -> Security.

Gmail too allows you set up security in this way and once set up, it will alert you to suspicious activity on your account. Like Dropbox, the easiest option is to use your mobile phone, but they also support other methods so there is no need to be concerned if you lose your phone. Other SaaS services that you use might have some of these features as well.

Go explore…

The Administrator

admin-issues

If you are the administrator of a cloud service this is even more important because you will be the prime target of any hacker.  As a cloud service administrator there’s a few other basic things to do. If feasible you should first create a secondary administrator account for day to day work. If that account gets compromised, you will have the first account to fall back on.

Another basic administrator task is to apply hygiene to your user list. Regularly review if users are still active in your company or project, and that they don’t have more rights than they need to have. (In larger organizations this is better done by identity federation, so you don’t have to do this on a service by service basis.) As an administrator, you don’t want former employees or contractors to still have access to your systems.

Access Level

 

I ran into a simple example the other day on a Google Docs document. It was not mine, but I had full editing access. The person who shared it with me did not need to give me this level of access. It would have been much better just to give me Comment or Review access.

Losing the provider or the data that is stored on the service is the other big risk. And preparing for losing all your data can also protect you against losing some of your data. There are so many reasons why a provider may stop servicing you. They could have any number of technological hiccups, they could suffer a disaster, they could go out of business or they could go in a direction that you don’t like. In all cases it makes sense to have an exit plan or a plan B, such as a plan to move to a different provider.

Backup Is Your Friend

If you don’t have an exit plan, you are basically saying that you accept the risk of losing the data that is with that provider, and the capability to use that data. This could be a valid decision. I am not that interested in my Doodle archive for example, so making a backup of that is not a big concern. At its most basic, an exit plan describes how your most valuable data is stored in a secondary place. For example, my Gmail mail archive is also stored on my laptop as it is automatically downloaded by Outlook, my mail program. I have not spent too much time thinking about changing my mail provider. However,  because my mail and contacts are safely stored elsewhere, I am confident that a new provider will help me to do the migration and that the process will be fairly simple.

For my customer management system I make regular copies of the entire customer database and contact details. Again, moving to a different provider will be a hassle, but not impossible. If your business really depends on it, you may want to have a cloud system on hot standby. However, most of the time, this is not very easy with SaaS because no two SaaS providers are alike.  You are better off to first think about which data to save to a secure location. If and when you want to move, your functional requirements will have changed anyway, and there are likely to be new SaaS providers at that time as well.

For a deeper dive into cloud security issues and controls, have a look at the research that the Cloud Security Alliance is doing.

By Peter HJ van Eijk

Rakesh Soni
Businesses now see the cloud as a standard, and they are always on a hunt for ways to leverage the cloud to its full potential. And if enterprises need to be competitive in the ever-expanding ...
Gary Bernstein
Using Data to Gain Advantages Data collection is now omnipresent in every sector of the global economy. Several aspects of modern economic activity would not be possible without it, just as it would not be ...
Alex Dean
Enabling Privacy and Personalization Most businesses today rely on data collected online to better understand their customers and deliver more personalized products, services and experiences. These insights can be transformative for an organization, especially when ...
Adam Cole
Mitigating Regulatory Risk Some of the great business opportunities for Unified Communications as a Service (UCaaS) integrators and Value-Added Resellers (VARs) have been the emergence of cloud, telephony and Unified Communications (UC) technologies such as ...
Rajesh Khanna
Implement Hyperautomation to Scale Automation Programs by 3X Most Digital Service Providers (DSPs) struggle to accelerate their path to Hyperautomation due to the complex processes with legacy systems and applications. Although Robotic Process Automation (RPA) plays a ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.