Security Manager: First task is to tighten up SaaS security

Our manager's new company uses over 30 SaaS apps, which opens many doors to potential data compromise.

After just a couple of weeks at my new post, I'm already finding plenty of things to do.

Trouble Ticket

At issue: Early tasks at the new job include evaluating the security of the company's many software-as-a-service relationships.

Action plan: Identify all the weak points and then write a remote-access policy that will address most of them.

First up is following up on a plan to implement a SIEM (security incident and event management) tool. While my new company was looking for a replacement for its security manager, it hired a consultant to fill in. This interim manager initiated a SIEM proof of concept. I'm not keen on inheriting this selection, the problem being that a SIEM tool is only as good as the logs that are fed into it, but I don't want to risk losing an opportunity to enhance the security posture of the organization. I need to make sure we get full value from this investment, which will probably exceed $300,000. I will also be contacting references and negotiating the price. I'll probably have more to tell you about this project as it progresses.

Another issue vying for my attention early on is the company's heavy use of software as a service (SaaS). At my last company, we used four SaaS vendors. This company far exceeds that number, because it tends to choose a SaaS option ahead of either building applications in-house or buying them. As a result, we currently use more than 30 SaaS offerings. It's a nightmare from a security perspective, for many reasons.

For example, each SaaS relationship requires connecting some aspect of our trusted network infrastructure with the vendor's network. In doing this, security has been an afterthought. We're using a VPN, but that only addresses encryption. The associated firewall rules are pathetically weak, and in some cases the connections are wide open.

I also have a problem with single sign-on (SSO), since many of the SaaS tools that we are using can be accessed freely from the public Internet. I want access to be restricted to the company's trusted network. As it is, employees can access many of our SaaS applications from, say, an Internet kiosk in Moscow. People from outside of the security realm think I'm being paranoid when I say that I want more restrictions on things like survey tools and corporate travel sites. But it's not all about the content of the sites. With SSO, credentials that are compromised while accessing some innocuous SaaS site can put a good deal of our infrastructure and data at risk. And employees often do things that make compromise all too easy, such as clicking "remember my username and password" on a public computer or simply neglecting to sign off.

Tools of Compromise

But even if employees are well trained about security risks and don't do those sorts of things, there are still keyloggers, sniffers, screen-capture tools, cameras and other methods of capturing domain credentials. For example, we currently, change passwords every 90 days. That means that if someone were to capture an employee's enterprise credentials, the hacker would have as long as three months to figure out what other SaaS applications he could access. He would only need to do a quick query of our external DNS to discover our Outlook Web Access site, which currently isn't protected with two-factor authentication. What's more, many people these days (including me) use e-mail as a complete data repository, leaving all of that data -- and their calendars, contact lists and personal notes -- wide open to hackers who have the proper credentials.

Over the course of the next few weeks, I will write a policy on remote access that will include two-factor authentication and other ways of safeguarding access to our SaaS-based applications. If you have some advice, I would love to hear from you.

This week's journal is written by a real security manager, "Mathias Thurman," whose name and employer have been disguised for obvious reasons. Contact him at mathias_thurman@yahoo.com.

Join in the discussions about security! computerworld.com/blogs/security

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags securitycloud computingSoftware as a serviceinternet

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Mathias Thurman

Computerworld (US)
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Matthew Stivala

HP OfficeJet 250 Mobile Printer

The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?