By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Sécurité Helvétique News | AmyrisSécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
  • Home
  • Compliance
    Compliance
    Show More
    Top News
    Shifting Sands: Leaders Are Feeling the Pressure of an Uncertain, Dynamic Risk Landscape
    23 February 2023
    How to Stay Ahead of Mobility Tax & Compliance Trends
    23 January 2024
    The Long and Winding Road to Custom-AI Compliance
    2 August 2024
    Latest News
    US Finalizes CMMC Rule: Cybersecurity Verification Now Determines Contract Eligibility for Defense Contractors
    13 December 2025
    Top 10 Risk & Compliance Trends for 2026
    7 December 2025
    How 2025 Redefined Telemarketing Compliance
    1 December 2025
    Advice for the AI Boom: Use the Tools, Not Too Much, Stay in Charge
    25 November 2025
  • Cyber Security
    Cyber Security
    Show More
    Top News
    FBI Seizes Bot Shop ‘Genesis Market’ Amid Arrests Targeting Operators, Suppliers – Krebs on Security
    4 April 2023
    Lazarus Sub-Group Labyrinth Chollima Uncovered as Mastermind in 3CX Supply Chain Attack
    12 April 2023
    How to expedite your investigations with a DFIRent approach
    18 April 2023
    Latest News
    North Korean Hackers Target Developers with Malicious npm Packages
    30 August 2024
    Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack
    29 August 2024
    Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32
    29 August 2024
    2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit
    29 August 2024
  • Technology
    Technology
    Show More
    Top News
    Mark Hamill voices air raid warnings in Ukraine as Luke Skywalker
    29 March 2023
    Just Make an ‘Andor’ Movie, You Cowards!
    8 April 2023
    Watch Live as SpaceX Attempts First Launch of Starship Megarocket
    17 April 2023
    Latest News
    Why XSS still matters: MSRC’s perspective on a 25-year-old threat  | MSRC Blog
    9 September 2025
    Microsoft Bug Bounty Program Year in Review: $13.8M in Rewards | MSRC Blog
    28 August 2025
    Microsoft Bounty Program Year in Review: $16.6M in Rewards  | MSRC Blog
    27 August 2025
    postMessaged and Compromised | MSRC Blog
    26 August 2025
  • Businness
    Businness
    Show More
    Top News
    Latest AI derivative play Micron is surging more than 15%. What happens next
    21 March 2024
    Saudi Aramco chief executive defends China’s role in green transition amid closer ties
    22 April 2024
    Google’s AI search tool tells users to ‘eat rocks’ for your health
    24 May 2024
    Latest News
    Blue Owl Technology Finance stock initiated with Buy rating by B.Riley
    16 December 2025
    Client Challenge
    15 December 2025
    At least 2 killed and 8 injured hurt in shooting at Brown University with suspect still at large
    14 December 2025
    Thailand vows to keep fighting Cambodia, despite Trump's ceasefire claim
    13 December 2025
  • ÉmissionN
    Émission
    Cyber Security Podcasts
    Show More
    Top News
    Cyber Security Today, Week in Review for the week ending Friday, April 21, 2023
    22 April 2023
    Microcast: Smart Phone Risks. Use With Caution. Adam Levin, Cybersecurity Expert.
    30 April 2023
    Cybersecurity Elevator Pitch: Cyber Risk Monitoring. Developed By Black Kite.
    8 May 2023
    Latest News
    Stream episode Cybercrime Magazine Update: Cybercrime In India. Sheer Volume Overwhelming Police Forces. by Cybercrime Magazine podcast
    3 March 2025
    Autonomous SOC. Why It’s A Breakthrough For The Mid-Market. Subo Guha, SVP of Product, Stellar Cyber
    2 March 2025
    Cyber Safety. Protecting Families From Smart Toy Risks. Scott Schober, Author, "Hacked Again."
    2 March 2025
    Cybercrime News For Feb. 25, 2025. Hackers Steal $49M from Infini Crypto Fintech. WCYB Digital Radio
    2 March 2025
Search
Cyber Security
  • Application Security
  • Darknet
  • Data Protection
  • network vulnerability
  • Pentesting
Compliance
  • LPD
  • RGPD
  • Finance
  • Medical
Technology
  • AI
  • MICROSOFT
  • VERACODE
  • CHECKMARKX
  • WITHSECURE
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Reading: Uncovering (and Understanding) the Hidden Risks of SaaS Apps
Share
Sign In
Notification Show More
Font ResizerAa
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Font ResizerAa
  • Home
  • Compliance
  • Cyber Security
  • Technology
  • Business
Search
  • Home
    • Compliance
    • Cyber Security
    • Technology
    • Businness
  • Legal Docs
    • Contact us
    • Disclaimer
    • Privacy Policy
    • About us
Have an existing account? Sign In
Follow US
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique par Amyris Sarl.
Sécurité Helvétique News | Amyris > Blog > Cyber Security > Uncovering (and Understanding) the Hidden Risks of SaaS Apps
Cyber Security

Uncovering (and Understanding) the Hidden Risks of SaaS Apps

webmaster
Last updated: 2023/04/19 at 1:51 PM
webmaster
Share
8 Min Read
SHARE

Recent data breaches across CircleCI, LastPass, and Okta underscore a common theme: The enterprise SaaS stacks connected to these industry-leading apps can be at serious risk for compromise.

CircleCI, for example, plays an integral, SaaS-to-SaaS role for SaaS app development. Similarly, tens of thousands of organizations rely on Okta and LastPass security roles for SaaS identity and access management. Enterprise and niche SaaS apps alike have effectively introduced multitudes of unmonitored endpoints into organizations of all sizes.

While spending for SaaS security is trending up, it lags behind categories such as cloud infrastructure protection and network security. According to Statista, the average organization employs 100+ SaaS apps, many of which are unsanctioned by IT, creating a glaring gap in SaaS security.

Why Users Flock to SaaS Apps — And Often Bypass IT in the Process

As productivity tools for tasks such as marketing automation, document signature, and sales forecasting have shifted from installed software to SaaS, so have the behaviors of end-users. Employees find SaaS solutions to help them accomplish more in less time, especially with the increasing decentralization of the IT function.

Employees will always seek ways to increase their productivity with tools of their choice. This behavior is nothing novel or in and of itself malicious, but it poses significant security risks. In the era of installed software, organizations added endpoint security to work machines and devices to ensure their employees couldn’t download harmful software or fall victim to malware-based attacks. This approach remains a key facet of overall endpoint security, but it doesn’t reflect the evolution of the way people are now working: outside the purview of corporate networks, and often on personal devices.

Rather than approaching Security or IT to understand policies for onboarding new SaaS solutions — and facing the likelihood of red tape, delays, or denial for their requests — they break out the credit card or opt for a 30-day free trial of the SaaS apps. Workers rarely consider the security implications of the shadow IT they’ve introduced into the ecosystem as they authorize connecting their new apps to enterprise SaaS systems such as Microsoft 365, Salesforce, Workday, or ServiceNow.

These connections, coupled with the users’ inherited permission settings, could touch the organization’s most sensitive data, with no ability to monitor or control this attack surface risk. And it happens every day.

How SaaS Apps Inherit Permissions via OAuth Tokens

In many organizations, the SaaS apps (and SaaS-to-SaaS connections) capitalize on OAuth access tokens both at the point of initial connection and throughout their lifecycle. The process typically follows these steps:

  • A user has been authenticated into an enterprise SaaS app, whether via simple authentication or strong zero trust authentication. They’re now in the SaaS cloud.
  • That user wants to save time toggling between their project management tool and documents, spreadsheets, and emails. Accordingly, they search for ways to streamline their work. That search leads to a popular project management SaaS plug-in, perhaps with a free trial, and the user decides to try it.
  • The user begins the installation and clicks on “Yes” to a prompt authorizing read-write access to data in a major SaaS platform like an office productivity suite, and the data associated with it. There are no tiers of different permission rights for the user to select.
  • An OAuth token is created by the office productivity suite. This token allows the project management app and office productivity suite to maintain API-based cloud-to-cloud communication without the user having to log in and authenticate regularly.

From this point forward, the project management app is continually connected after the initial strong authentication. CASBs and SWGs will not detect this SaaS-to-SaaS connectivity.

Figure 1: A breakdown of how a SaaS-to-SaaS connection interacts with an OAuth token.

These application tokens are valuable because they make the project management app easily accessible for the user. Unfortunately, they’re equally, if not more, valuable for attackers seeking an easily exploitable entry point into an enterprise SaaS system.

The Reach — and Risk — SaaS Apps and SaaS-to-SaaS Connections Present

If threat actors can successfully hijack OAuth tokens, they can gain entry into CRMs, code repos, and more. One compromised SaaS-to-SaaS connection can provide valid, authorized API access into a multiplicity of different production SaaS environments and data.

Security and IT teams are overburdened with monitoring and maintaining the configuration settings and growth of their enterprise SaaS platforms, let alone unauthorized SaaS apps. Without any security review, SaaS-to-SaaS connections create potentially vulnerable endpoints.

The prevalence of these SaaS-to-SaaS connections is substantial and frequently underestimated by IT organizations. According to SaaS security provider AppOmni:

  • The average enterprise organization has more than 42 distinct SaaS-to-SaaS apps connected into live SaaS environments within an enterprise. Nearly 50 percent of these apps were connected directly by end-users, not by IT teams.
  • Roughly half of these 42 connected apps have not been used in the last six months. Whether active or dormant, connected SaaS-to-SaaS apps retain their data access rights.
  • Many of these organizations have reached a total of nearly 900 user-to-application connections.
Figure 2: SaaS environments contain many entry points outside traditional network and CASB protection.

As this research demonstrates, the number of “authorized” apps in contact with potentially sensitive data is infeasible to assess and monitor without the correct SaaS security tooling.

Practical Steps for Monitoring and Securing SaaS Connections

Most Security teams lack the proper tooling to gain visibility into SaaS connectivity and the associated user activity. SaaS Security Posture Management (SSPM) solutions address these concerns by bringing visibility and control over the SaaS estate.

A Security or IT professional can, for instance, utilize SSPM to discover everything running in Salesforce, along with the SaaS apps connected to it. The same is true for numerous other SaaS applications used by the organization.

This added visibility and control in ongoing monitoring of SaaS apps and SaaS-to-SaaS connections reduces attack surface risk and enables proactive security control. If a vulnerability is discovered, the Security team can take action, such as pinpointing unsanctioned, unsecure, and over-permissioned SaaS apps.

Thanks to an SSPM solution’s continuous monitoring capabilities, the Security team is able to determine a baseline of SaaS activity to use as a time-in-point frame of reference. While the potential for a SaaS-related breach can never be fully eliminated, utilizing SSPM drives down that risk considerably.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Contents
Why Users Flock to SaaS Apps — And Often Bypass IT in the ProcessHow SaaS Apps Inherit Permissions via OAuth TokensThe Reach — and Risk — SaaS Apps and SaaS-to-SaaS Connections Present Practical Steps for Monitoring and Securing SaaS Connections

You Might Also Like

North Korean Hackers Target Developers with Malicious npm Packages

Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack

Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32

2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit

Unpatched AVTECH IP Camera Flaw Exploited by Hackers for Botnet Attacks

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Reddit Telegram Email Copy Link Print
Share
Previous Article Blackpink’s ‘Carpool Karaoke’ with James Corden is fun as hell
Next Article WAF Deployment Key Considerations | Indusface Blog
Leave a comment Leave a comment

Comments (0) Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

235.3k Followers Like
69.1k Followers Follow
11.6k Followers Pin
56.4k Followers Follow
136k Subscribers Subscribe
4.4k Followers Follow
- Advertisement -
Ad imageAd image

Latest News

From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 16 December 2025
6 Personalized Stationery Sets for a Fancy Kind of Sentimentality
ARCHITECTURE 16 December 2025
Switzerland to tighten rules on military service for dual nationals
SWITZERLAND 16 December 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 16 December 2025
//

We influence 20 million users and is the number one business and technology news network on the planet

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Loading
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Follow US
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Amyris news letter
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Loading
Zero spam, Unsubscribe at any time.
login Amyris SH
Welcome Back!

Sign in to your account

Lost your password?