Guest Steve Zalewski and the hosts discuss the challenges of securing SaaS applications, the need for a specific strategy, gaining visibility in SaaS environments, and strategies for securing SaaS applications including DNS for app discovery and operationalizing security practices.
SaaS security requires a separate architectural strategy, considering both application design and non-security group involvement.
Continuous monitoring and sharing of security information are crucial for maintaining resilience in SaaS security.
Deep dives
The Importance of Building a Security Program for SaaS Apps
In this podcast episode, the hosts discuss the need for a specific security strategy for SaaS apps. They highlight the challenges of business-led IT and the increasing complexity of the SaaS ecosystem. It is emphasized that both the architecture of the applications and the involvement of non-security groups contribute to the security concerns. The discussion revolves around the idea that SAS should be treated as a separate environment. The hosts also mention the importance of continuous monitoring and sharing of security information by SAS vendors.
Addressing the Risks and Challenges in SaaS Security
The podcast delves into the risks and challenges associated with SaaS security. The concept of third-party risk management and vendor security assessments is explored as a way to determine the level of risk involved with different SaaS applications. The hosts discuss the need for visibility into the SAS ecosystem and the difficulty in maintaining consistent security controls across multiple SAS applications. The role of CASB (Cloud Access Security Broker) solutions is outlined, highlighting their limitations in preventing misconfigurations. The importance of telemetry and continuous monitoring is emphasized.
Mitigating Risks and Ensuring Resilience in SaaS Security
The podcast concludes with a focus on mitigating risks and ensuring resilience in SaaS security. The hosts discuss the need for technical controls to prevent and address breaches in SAS applications. The significance of having a business impact analysis and a clear understanding of the organization's critical processes is highlighted. The importance of data integrity and the role of sim (security information and event management) solutions in limiting the blast radius of a breach are also mentioned. The discussion emphasizes the need for a specific SaaS security strategy and the integration of preventive and detective controls.
Do you know which 3rd party apps are connected to your SaaS platforms? After all, one compromised 3rd party app could put your entire SaaS ecosystem at risk. Get visibility to all 3rd party apps — and their level of data access — with AppOmni. Visit AppOmni.com to request a free risk assessment.
In this episode:
With the growth of business-led IT, does SaaS security need to be a specific focus in a CISO’s architectural strategy?
Is the problem the architecture of the applications themselves or the fact that a non-security group is bringing these applications online? Is it both?
Is this problem solvable?
What technical controls can you put in place to mitigate risk from apps you deem risky?
Get the Snipd podcast app
Unlock the knowledge in podcasts with the podcast player of the future.
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode
Save any moment
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Share & Export
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
AI-powered podcast player
Listen to all your favourite podcasts with AI-powered features
Discover highlights
Listen to the best highlights from the podcasts you love and dive into the full episode