Across homes, schools, and a growing majority of businesses, Software as a Service (SaaS) applications are moving closer to the center of everyday life. But in business contexts, this move to cloud-based software such as Google’s G Suite or Microsoft’s Office 365 may open up security challenges that businesses aren’t equipped to address.
The Popularity of SaaS
Businesses have a number of reasons for switching to SaaS architecture, including cost effectiveness, centralization of files and work processes, and a degree of standardization and support for bring your own device (BYOD) workplaces. And the convenience of cloud-based architecture is convincing: according to a report by BetterCloud, a significant proportion (25% to over 50%) of businesses that already use the G Suite or Office 365 plan to migrate to entirely cloud-based software environments by the end of the decade.
However, that same report revealed that over 60% of businesses running SaaS applications consider themselves underfunded for addressing cloud security – and many of those businesses simply don’t recognize cloud security in their budgets at all.
Security and SaaS
Several factors may be responsible for this discrepancy, including poor understanding of what SaaS security entails on the business end. Server security, for example, falls under the auspices of the service provider. However, companies are responsible for a number of critical security topics, including:
- Managing employee authentication and access, including requiring strong passwords, limiting the creation of accounts, and disabling account access when employees leave the company. Employees should also have access only to the files and applications they need in order to perform their jobs – access should never be granted across the board.
- Mandating secure access points, using (for example) VPNs or secure web gateway applications, and requiring all connected devices to have passwords and idle screen locking. Employees who take advantage of BYOD policies should be prepared to keep their devices up to date and configured to the standards developed by their company’s IT security team.
- Thorough knowledge of emerging cloud security standards, as well as work done by groups such as the Cloud Security Alliance, and insistence that SaaS applications meet security standards as a prerequisite for adoption. As SaaS is more and more widely adopted, these standards will become more finely-tuned.
- Thorough knowledge of security implementations on the part of the SaaS provider. While IT security managers may have little or no ability to affect the security profile of a SaaS application, they should nevertheless know the details of the cloud’s security. This will enable them to judge whether or not the implementation is in compliance with security standards, and whether or not it’s in compliance with company- or industry-specific regulations.
While SaaS removes a number of concerns from the IT team’s wheelhouse, security can never be entirely outsourced. For some years, security has been a highly-cited reason for discouraging adoption of cloud technologies, but with appropriate funding and attention to detail, companies can enjoy the convenience of cloud sourcing as well as rigorous security.