Intelligent CIO Middle East Issue 115 | Page 23

LATEST INTELLIGENCE
In this guide, we explore the challenges inherent in SaaS security, discover how SaaS security became a top priority for most CISOs and provide nuts-and-bolts guidance on how to establish the foundations of a strong SaaS security strategy.
Why should SaaS security be a priority?
Top Use Cases
SaaS Misconfigurations
Misconfigurations are a leading cause of breaches. Each SaaS application uses its own terminology to describe its configurations, making it difficult for even experienced security professionals to know the implications of a setting. Even applications that are configured securely at the time of adoption tend to drift as users adjust settings to improve functionality.
With hundreds of applications, each with its own configuration set, monitoring application configurations manually is an impossible task.
Organizations that review application settings on a regular basis only receive a snapshot view of their security, which can be changed at any moment, leaving sensitive information unprotected until the next audit.
Weaving an identity fabric
SaaS security relies on a thick identity fabric. By layering identity tools, organizations make it more difficult for threat actors to gain access to the applications. Tools like single sign-on( SSO) and MFA, which are part of most app configuration settings, increase the complexity of access and deny access even after successful password spray or phishing attacks. p
Download whitepapers free from www. intelligentcio. com / me / whitepapers /
www. intelligentcio. com INTELLIGENTCIO MIDDLE EAST 23