[ad_1]
Intruder posted a blog on January 10th explaining the top four security threats for SaaS apps in 2023.
This list includes web application weaknesses, misconfigurations, vulnerable software and patches, and weak internal security policies and practices.
Many SaaS apps belong to small, growing companies and often have poor security. As such, intruder researchers say security teams should deploy password managers, enable two-factor authentication, and provide security training to general staff.
Craig Burland, Chief Information Security Officer at Inversion6, says the overall theme is spot on. Cybercriminals are hectic in 2023 and security his team should pay more attention to their cloud footprint.
Burland said misconfiguration of the SaaS platform was definitely a problem. Users have great power to open access or enable services that create the risk of compromise. According to Burland, many SaaS platforms actually have features enabled by default that security his team must turn off before an organization can actually start using the platform.
“These often take the form of unmanaged service accounts and cross-cloud integrations rather than permissive firewalls,” says Burland. “Providing visibility into SaaS environments is a new frontier for security companies looking to help organizations minimize these unknown vulnerabilities. It is a great tool that organizations and organizations should use to mitigate the risk of credential compromise.But the threat is not unique to SaaS applications.In today’s world, the threat is ubiquitous. The best way to protect yourself from a SaaS provider (or any other third party) is to thoroughly examine their security posture before trusting your data.”
Mike Britton, chief information security officer at Abnormal Security, says that while MFA provides an important security practice that helps prevent unauthorized access to accounts, it also creates a false sense of security for two main reasons: added that it could give
First, attackers are increasingly leveraging new techniques to bypass MFA protocols or use stolen sessions that can be purchased on the dark web. In some cases, as we saw with her recent Uber attack, it simply fatigues users with push notifications until they provide the necessary authentication for access. Second, solutions that provide MFA do not monitor account behavior or activity once an account is authenticated.
“This is due to the fact that today’s SaaS applications are all interconnected via the OAuth protocol, so once someone gains access to one tool, they can move to other connected applications across the enterprise environment. It gets worse,” said Britton.
[ad_2]
Source link