Cloud 101CircleEventsBlog

Download Publication

SaaS Security and Misconfigurations Report
SaaS Security and Misconfigurations Report
Who it's for:
cybersecurity professionals

SaaS Security and Misconfigurations Report

Release Date: 04/11/2022

Working Group: SaaS Governance

Many recent breaches and data leaks have been tied back to misconfigurations causing it to be a top concern for many organizations. Most research related to misconfigurations has focused strictly on the IaaS layers and ignores the SaaS stack entirely. Yet, SaaS security and misconfigurations are equally crucial to the organization's overall security. For these reasons, CSA developed and distributed a survey to better understand the use of SaaS applications, timeline and tools for SaaS security assessments, a timeframe for misconfiguration detection and remediation, and awareness of security tools for SaaS applications.

The goal of this survey was to understand the current state of SaaS security and misconfigurations. Key areas of interest include:

  • Use of SaaS applications with organizations
  • Methods, policies, and tools for assessing SaaS app security
  • Timeline for detecting and remediating misconfigurations in SaaS app security
  • Awareness of new SaaS security related products
Download this Resource

Bookmark
Share
View translations
Related resources

Sponsor

Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
Top Concerns With Vulnerability Data
Top Concerns With Vulnerability Data
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Using Asymmetric Cryptography to Help Achieve Z...
What 2024’s SaaS Breaches Mean for 2025 Cybersecurity
What 2024’s SaaS Breaches Mean for 2025 Cybersecurity
Published: 12/03/2024
Legacy MFT Solutions Might Not Look Broken, But They Are
Legacy MFT Solutions Might Not Look Broken, But They Are
Published: 12/03/2024
Defining Identities, Accounts, and the Challenge of Privilege Sprawl
Defining Identities, Accounts, and the Challenge of Privilege Sprawl
Published: 12/02/2024
Readiness Assessments: A Crucial Part of Your SOC Engagement
Readiness Assessments: A Crucial Part of Your SOC Engagement
Published: 12/02/2024

Acknowledgements

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Sean Heide
Sean Heide
Technical Research Director, CSA

Sean Heide

Technical Research Director, CSA

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training