Q1. What are some of the biggest challenges organizations face in using SSPM data to mitigate cyber risk in a measurable way? What is Adaptive Shield's approach in helping overcome this challenge?
The biggest challenge organizations face in mitigating cyber risk from SaaS apps is acquiring data from these apps, owners, users, and devices, and then analyzing it in a way to categorize risk and determine their security posture.
The Adaptive Shield SSPM platform enables a holistic, centralized view of security and potential threats on organizations’ SaaS stacks, by automatically monitoring a broad pool of data on the state of app security configurations and identifying potential risks.
Information is categorized by the level of risk severity and includes a prioritized mapping of risks for automated remediation or instructions for the security team to guide the app owners. These insights also enable mapping for industry standards and frameworks.
Over the past year, we have also enhanced Adaptive Shield’s ability to collect and analyze data indicative of a compromise. Identity fabric continues to protect SaaS applications even in the event of a breach or insider attack.
Those could include things like a user gaining access from an IP address that had a large number of failed access attempts before the successful login or a user uncharacteristically accessing a SaaS app in the middle of the night. Any threats that are detected appear in the Threat Center, together with a severity level to aid in prioritization with enough data for the incident response team to conduct a thorough investigation.
Q2. What advice would you give to CEOs of organizations that are considering implementing an SSPM platform? Where and how do they begin, especially in organizations that might be using a large number of SaaS apps?
As the number of apps in organizations grows exponentially, the SaaS stack is a highly vulnerable attack surface by threat actors into an organization’s data.
While SaaS vendors keep improving security controls, the complexity of applications and their settings exposes enterprises to misconfigurations and mistakes. SaaS app admins are not security people but hold the keys. For security teams, it’s hard to protect what you are not aware of.
An SSPM comes in to close the widening security gap in the SaaS stack, allowing organizations to invest in an efficient monitoring system focused on real risks..
But keep in mind that an SSPM is not just another cyber security platform. The organization needs to be prepared to accept a new security paradigm that involves higher collaboration and commitment across teams.
Before developing a SaaS security program, you should map your landscape and understand your unique security requirements. This helps create the foundation for your security plan. In addition, identify the regulatory and compliance requirements that impact your business.
To launch an SSPM program, security teams should begin by integrating a few critical apps into the system. Adaptive Shield makes it easy by supporting 150 SaaS apps out of the box.
As a first step, appoint one single owner from the security team who will be responsible for the program coordination and identifying stakeholders. Next, define applications for a pilot. Choose some of your most critical applications that significantly impact your business from different departments, for example, Sales, Marketing, Legal, Finance, and R&D. This way you can exercise collaboration between the app owners and the security functions. A pilot should be conducted over approximately three months.
Finally, define short-term goals, to get some quick wins and start improving your posture, look for high-risk failed security checks that impact a small number of employees.
Q3. What was Adaptive Shield's main focus at Black Hat Europe 2023? What were customers and organizations at the event most interested in hearing about from your company?
At Black Hat 2023 we had an opportunity to continue educating the market on emerging security threats around SaaS apps and how to manage them efficiently and effectively with the SSPM.
Customers and prospects we spoke with at the event are concerned about threat actors' increasing sophistication. They are worried that this will lead to more data leakage and data theft. The high volume of apps and settings, and the need for security teams to understand different settings in hundreds of apps, is leading to more human error in configurations, which exposes the data even more.
Beyond proactive tools to monitor and ensure the security of SaaS applications, our customers were very interested in hearing about new technology that can detect suspicious activity, especially around identity and insider threats, and to head off data breach attempts. Our new ITDR capabilities add this critical layer of identity fabric protection for an SSPM solution for complete coverage. It enables users to detect suspicious patterns like mass downloading or deletions, or when there is any indication of compromise within the stack.