Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » The Tradeoffs of Deploying Software-as-a-Service Solutions
Cybersecurity

The Tradeoffs of Deploying Software-as-a-Service Solutions

Chris HughesBy Chris HughesMarch 22, 2022Updated:April 13, 20234 Mins Read
Facebook Twitter LinkedIn Email
SaaS
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Cloud adoption continues to grow at a rapid pace, with no cloud service model experiencing more growth than SaaS. There’s no denying the transformative impact Software-as-a-Service (SaaS) has had on businesses of every shape, size, and industry.

Whether you’re talking about collaborative tools like Zoom, Slack, or Workday, or storage services such as Box and Snowflake, SaaS has become key to how modern organizations operate and do business. This is supported by economic metrics such as spending and has been further accelerated with COVID and the widespread adoption of remote working paradigms. SaaS has also allowed organizations to outsource many traditional IT and administration activities and instead consume applications that let them focus on their core competencies that drive revenue or mission outcomes. SaaS also allows organizations to maximize the Shared Responsibility Model of cloud computing. This means organizations don’t have to be concerned with things such as physical security, host infrastructure, networking, and even application-level controls in the traditional sense.

However, all of these benefits aren’t without their own tradeoffs, concerns, and ramifications either. In the case of SaaS, organizations still need to be concerned with key things such as data, access control, configuration management, and cybersecurity supply chain risk management.

If you’re utilizing a SaaS provider, you’re still responsible for access control at the application layer. This means you need to have rigor around who is accessing the applications, the data stored internally and how are you managing the identities associated with these applications. Organizations are also still responsible for data governance and security. What data are you placing in these SaaS applications? Do you have an acceptable level of assurance that the SaaS provider has security controls in place to safeguard said data?

Building on the topic of configuration management, just because the underlying infrastructure and platforms may be secure, there are still ample opportunities to implement configurations that can place your data and organization at risk. Each of the SaaS applications being consumed come with its own myriad of potential configurations that can be modified, for better or for worse, which can introduce significant risk. Keep in mind, one of the leading causes of cloud security breaches is customer misconfiguration, and this is no different in the context of SaaS, and if nothing else, it could be amplified.

Each organization is using 2-3 Infrastructure-as-a-Service (IaaS) Cloud Service Providers (CSP)’s such as AWS, Microsoft Azure or Google Cloud. This is exponentially increased in the context of SaaS, with large enterprises using up to 200 SaaS apps. The problem is only amplified by realities such as the IT/Security team only controlling 20% of SaaS apps and organizations adding on average 10 SaaS apps per month.

There are also significant cybersecurity supply chain considerations when it comes to the case of SaaS providers (and service providers in general). Software supply chain attacks are increasingly on the rise, as malicious actors realize they can target a single entity and have a cascading impact across many consumers and customers of the target. This is far more efficient, and far more damaging than targeting a single consumer organization alone.

This all isn’t to say organizations shouldn’t use SaaS, but they should certainly implement a SaaS Security and Governance program. This includes key activities such as discovering what SaaS applications are in use, remember one of the top security controls involves asset management. Secondly, it involves managing the SaaS you consume, meaning you need a process to review and approach requested SaaS applications, such as verifying their compliance and certifications with frameworks like SOC2 and FedRAMP as well as reviewing penetration testing reports, application security maturity, and more. Lastly, organizations should begin implementing SaaS security activities such as using tooling like Cloud Access Security Brokers (CASB)’s and potentially more importantly SaaS Security Posture Management (SSPM) tooling which can help you scan your SaaS footprints for misconfigurations, vulnerabilities, exposed data, and more.

Doing the activities discussed above can help you continue to utilize SaaS as the key business enabler it is, but do so in a fashion that doesn’t introduce your organization to undue risk and put your data or reputation at risk. As organizations mature in their Cloud and SaaS adoption, SaaS Security and Governance programs will become more of the norm rather than an outlier, and organizations will be safer because of it.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cloud featured SaaS security
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

Workday Dismisses Agentic AI Arms Race, Focuses on Business Impact

May 16, 2025

Workday Lone Wolf: Focuses on 8 AI Agents vs. Competitors’ Hundreds

May 16, 2025

C-Suite Perspective: What the AI-Powered Org Looks Like, Today and in The Future

May 15, 2025

AI Maturity Declines Year Over Year, But Leaders Push Ahead on Innovation, AI Skills

May 15, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Workday Dismisses Agentic AI Arms Race, Focuses on Business Impact
  • Workday Lone Wolf: Focuses on 8 AI Agents vs. Competitors’ Hundreds
  • C-Suite Perspective: What the AI-Powered Org Looks Like, Today and in The Future
  • AI Maturity Declines Year Over Year, But Leaders Push Ahead on Innovation, AI Skills
  • Microsoft’s Mission to Make Your Company AI First

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.