Modern businesses increasingly rely on SaaS applications like Google Drive, Box, Dropbox, and Slack to facilitate daily exchanges of sensitive data and files. Although these tools allow for real-time collaboration that drives business enablement, their lack of granular access and security controls presents serious material risks for the businesses that use them. This blog outlines ten of the most significant risks associated with unmanageable data access within SaaS applications that your organization should be aware of.
Here's our top 10 list, with explanations below. Let us know what you think!
Files stored in SaaS applications retain their sharing permissions indefinitely. For example, third-party vendors and internal employees will retain access to sensitive documents – and the ability to download or share – via old sharing links, which remain active unless permissions are manually changed. It’s not commonplace for employees to retroactively remove permissions for external collaborators when access is no longer needed, and even IDP solutions cannot remove data access permissions across all SaaS apps, meaning access to information stored in SaaS applications often remains long after it is needed. This is not only bad business practice – it significantly increases the amount of sensitive data vulnerable to exfiltration by malicious actors.
Any personal information shared to public locations within a company – such as public Slack channels, shared Drive folders, or Salesforce opportunities – will remain exposed forever, allowing anyone with high-level internal access to see, download or otherwise use the information. Traditional data loss prevention (DLP) solutions’ PII scanning tools do not effectively extend to data stored within SaaS applications, so PII shared in these locations must be manually discovered and deleted – an undertaking for which most security teams do not have time or resources.
Third-party collaborators with access to your data hosted within SaaS applications can share it with fourth parties such as their own vendors, exposing your data to unauthorized personnel who have not passed any security risk assessments. It’s extremely complex to implement consistent policies that prevent fourth-party sharing across all SaaS applications, so this added layer of access often goes unnoticed and unremediated.
Technical personnel may share encryption codes such as AWS keys via SaaS communication streams – such as public Slack channels or Microsoft Teams chats – to aid collaboration during the development process. It’s impossible to prevent this kind of sharing using only the controls native to each SaaS application, and Dev teams often use these channels for convenience even if it is strongly discouraged. Individual SaaS applications offer no straightforward means for targeting these privileged credentials for removal, which creates opportunities for unauthorized personnel to find them and access the production environment.
While many SaaS applications do have built-in security controls and features to help users proactively manage access, the depth and granularity of each app’s controls vary greatly, which makes managing and scaling a strong security policy across a large, cloud-first organization incredibly difficult.
Basic sharing permissions within SaaS collaboration apps allow for added sharing with fourth-parties, such as personal email accounts. This gives anyone with access to sensitive data the freedom to exfiltrate it to personal accounts for their own unmonitored use. To make matters worse, most personal emails will not have security measures like multi-factor authentication (MFA) enabled, which further increases exposure.
When HR managers initiate employment status changes for departing employees, security teams should be alerted so they can closely monitor these high-risk individuals for insider threats – but HR and security platforms are often disconnected in a way that makes this process overly complex. Without a centralized view of user activity across all SaaS applications, or the ability to automate any part of the permissions-cleanup process, data exfiltration by leaving employees is difficult to prevent, especially for large organizations.
Security teams are inundated with alerts for suspicious user activity across the SaaS environment, but lack the business context to quickly determine which activity presents actual risk. Security teams must manually query internal and external users on a regular basis to understand their business needs and adjust access accordingly. This process creates unnecessary interactions between security teams and business users and increases mean time-to-repair (MTTR) for actual threats to the business.
OAuth connections provide SaaS applications with access tokens that authorize specific account information to be shared without exposing the user's password. While OAuth connections provide a convenient intermediary between applications and end users, they can also be used in phishing campaigns: Hackers create OAuth URLs that appear legitimate, but are actually modified to produce errors in the authentication flow and redirect to landing pages that attempt to steal login credentials.
When users are prompted to approve an OAuth connection, they often accept before closely examining the URL or reviewing the details in the prompt. It’s difficult to implement security policies that prevent users from authorizing OAuth connections across all the disparate SaaS applications used by the business. This creates an attractive landscape for attackers to conduct supply chain-based attacks by breaching trusted third-party apps.
When employees create new documents in SaaS applications such as Google Drive or DropBox, they often set permissions so that “anyone with a link” can view, edit or share. This is a convenient option for group collaboration, but when links are shared via open internal channels (i.e public Slack channels accessible to all employees), these entry points to sensitive data remain open and overexposed indefinitely. Without a way to auto-expire sharing links, there is no way to ensure they won’t be found and used by unauthorized personnel.
Remaining conscious of these risks and encouraging employees to take preventative measures is best practice for any organization; however, it’s incredibly complex to ensure adherence across every single SaaS application used by the business. DoControl provides a crucial tool in the form of a centralized dashboard for visibility into all end-user activity within SaaS applications, and customizable security workflows that allow for the implementation of consistent security policies across the entire SaaS estate.
This stat comes from the industry report we published earlier this year: The Immense Risk of Unmanaged SaaS Data Access. It’s a great read. We recommend you check it out.
DoControl is named as a Representative Vendor in 2022 Gartner® Market Guide for Insider Risk Management Solutions. Gartner recently published the market guide which assists in understanding and implementing a comprehensive insider risk management program. Gartner describes how “the increase in a hybrid or remote workforce, compounded with additional vendor integration, has prioritized insider risk management as a focus area for security and risk management leaders.”
In today’s hybrid work environment, SaaS security has never been more important. Understanding your existing risks is a critical step to choosing the right security tool, but few SaaS apps provide the visibility necessary to perform a proper assessment.