Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Why SaaS Security Requires a Foundation Built on Standards and Zero Trust
Data

Why SaaS Security Requires a Foundation Built on Standards and Zero Trust

Wayne SadinBy Wayne SadinFebruary 2, 2023Updated:February 3, 20235 Mins Read
Facebook Twitter LinkedIn Email
SaaS security
Share
Facebook Twitter LinkedIn Email

There’s a dangerous assumption that can be made to justify a migration from on-premise information technology (IT) to hyperscale cloud: “The cloud provider’s massive investments in security will keep us safe from evildoers.” Nothing could be further from the truth! To quote the great management theorist Mark Twain, “It’s not what you don’t know that gets you killed; it’s what you know that just ain’t so.”

It’s obvious that an infrastructure-as-a-service (IaaS) deal, where you license server, storage, and network capacity from a cloud vendor and use this infrastructure to craft your own solutions, leaves your internal IT and security on the hook for cybersecurity (while the vendor handles physical security within their facilities).

It’s perhaps less obvious that licensing software tools from your cloud vendor in addition to infrastructure (called PaaS or platform-as-a-service) still leaves your CIO and CISO on the hook. Having your infrastructure vendor also provide and maintain products like databases and other utilities has benefits to be sure: The tools are compatible with the cloud infrastructure, and they’re maintained for you by the cloud vendor. While that improves time to value and reduces technical debt, it does nothing to help with your security. To quote an actual computer scientist, Grady Booch, “A fool with a tool is still a fool.”

So, what about the top level of the cloud abstraction pyramid, software-as-a-service (SaaS)?

The Elements of Proper SaaS Security

In the SaaS model, you license applications, or even suites of applications, from the cloud vendor without any responsibility for overseeing where the applications actually run. SaaS apps are typically licensed by the seat (or named user), by the transaction, or by the device — in other words, SaaS is less focused on inputs (i.e., speeds and feeds) and more focused on business value. Does that makes SaaS a cybersecurity paradise where the vendor just “makes it so”? Hardly!

But the good news is that a well-designed SaaS application should provide a careful CIO and CISO with the tools necessary to create an adequately secured application stack. However, the two earlier quotes still apply!

So, let’s consider the elements of proper SaaS security.

Element #1: A Secure Foundation

I have a T-shirt that reads, “There is no cloud; it’s just someone else’s computers.” It’s funny, but true. The SaaS applications you license are run atop a complex web of interacting components, from the discrete central processing units (CPUs) and solid state drives (SSDs) and network switches, to the physical data centers that house the components, to the processes by which the data centers are operated, to the people recruited and trained and overseen to maintain and operate the datacenters. A hyperscale cloud environment is an amazingly complex assembly of hardware, software, and process components: millions of servers spread across dozens of data centers worldwide.

Since you, as a client, can’t vet the interconnected whole, start by identifying independent certifications relevant to your industry, geographic footprint, regulators, clients, and investors (and increasingly to your insurance underwriters). I can’t list every standard that might apply to you, but here are a few standard certs: Service Organization Control (SOC) 1/2/3; Statement on Standards for Attestation Engagements (SSAE) 18; International Organization for Standardization (ISO) 27001; Health Insurance Portability and Accountability Act (HIPAA); Payment Card Industry Data Security Standard (PCI DSS), National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) and other NIST standards, and on and on.

Conclusion #1: Picking the relevant standards isn’t the SaaS vendor’s job: That’s on you. Be sure you include all relevant stakeholders and obtain their buy-in.

Element #2: Zero Trust

SaaS application suites like enterprise resource planning (ERPs) and electronic health records (EHRs) operate on the organization’s most valuable commodity: data. Accidental or unauthorized addition, deletion, alteration, or disclosure of information can be anything from annoying to embarrassing to expensive to ruinous. So, security design must make it easy for appropriate/approved operations while making it difficult/expensive for anything else to be done. That’s the essence of “zero trust”: If something isn’t explicitly permitted, it just can’t happen.

When designing your SaaS structure, it’s vital to define two concepts and their interactions:

  • Roles: Defining operations allowed by each class of users (subsets of employee, partner, customer, even device and — someday soon — artificial intelligence) when doing a particular function (inputting a new customer, loading a truck, paying an invoice, etc.)
  • Data elements and data sets: Classifying every kind of data in terms of sensitivity (access level) and allowed operations (e.g., can we delete the collection of data that defines an employee vs. changing an employee’s status)

In traditional security models, a named user (“Wayne”) might have access to specified data (“payroll”). That allows lots of room for mischief and mistakes because a) every employee is defined individually and b) their access to data is far too broad.

Example: Wayne may do several tasks. As a “timekeeper,” Wayne can input hours for existing employees. As a “project manager,” Wayne can create and modify project steps but not delete existing steps. Using zero trust allows us to define roles and assign them to people (or things), where a role has just enough access to data to accomplish the specified task.

Conclusion #2: A SaaS product should be built to implement zero-trust concepts. More importantly, your organization must do the work (and it’s serious work!) to implement and maintain your specified zero-trust rules.

Final Thoughts

A well-designed SaaS product running on a secure foundation allows the CIO and CISO — along with the rest of your risk-identification and mitigation experts — to design and operate a secure yet productive application. Leave out either step and you put the organization at risk!


See the Data Modernization Top 10 shortlist

Cloud cloud migration cloud security data featured Featured Post IaaS infrastructure PaaS SaaS security
Share. Facebook Twitter LinkedIn Email
Analystuser

Wayne Sadin

CIO, PriceSmart
Cloud Wars Advisory Board Member

Areas of Expertise
  • Board Strategy
  • Cybersecurity
  • Digital Business
  • Website
  • LinkedIn

Wayne Sadin, a Cloud Wars analyst focused on board strategy, has had a 30-year IT career spanning logistics, financial services, energy, healthcare, manufacturing, direct-response marketing, construction, consulting, and technology. He’s been CIO, CTO, CDO, an advisor to CEOs and boards, Angel Investor, and independent director at firms ranging from start-ups to multinationals.

  Contact Wayne Sadin ...

Related Posts

The AI Economy: Oracle More Valuable than Disney, Goldman Sachs, and Uber Combined

June 26, 2025

Microsoft Delivers In-Depth View of Security, Governance Functions in Copilot Control System

June 26, 2025

The AI Economy: Oracle More Valuable than Disney + Uber + Goldman Sachs Combined!!!

June 26, 2025

Agentic AI in Government: Salesforce Achieves FedRAMP High for Agentforce and More

June 25, 2025
Add A Comment

Comments are closed.

Recent Posts
  • The AI Economy: Oracle More Valuable than Disney, Goldman Sachs, and Uber Combined
  • Microsoft Delivers In-Depth View of Security, Governance Functions in Copilot Control System
  • The AI Economy: Oracle More Valuable than Disney + Uber + Goldman Sachs Combined!!!
  • Agentic AI in Government: Salesforce Achieves FedRAMP High for Agentforce and More
  • Snowflake Ventures Invests in Diskover to Tackle Unstructured Data at Scale

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.