2023年SaaS安全调查报告(英)-26页-WN7.pdf

上传人:530650****qq.com 文档编号:95793537 上传时间:2023-08-31 格式:PDF 页数:26 大小:1.68MB
返回 下载 相关 举报
2023年SaaS安全调查报告(英)-26页-WN7.pdf_第1页
第1页 / 共26页
2023年SaaS安全调查报告(英)-26页-WN7.pdf_第2页
第2页 / 共26页
点击查看更多>>
资源描述

《2023年SaaS安全调查报告(英)-26页-WN7.pdf》由会员分享,可在线阅读,更多相关《2023年SaaS安全调查报告(英)-26页-WN7.pdf(26页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。

1、1The Annual SaaS Security Survey Report:2024 Plans&Priorities All rights reserved to Adaptive Shield&Cloud Security AllianceThe Annual SaaS Security Survey ReportPla n s a nd Pr ior itie s 202 42The Annual SaaS Security Survey Report:2024 Plans&Priorities All rights reserved to Adaptive Shield&Cloud

2、 Security AllianceContentsKey Findings 3Survey Creation and Methodology 4Data&Discussion 5 SaaS Security Incidents on the Rise 5 Current SaaS Security Strategies and Methodologies Dont Go Far Enough 6 Stakeholder Spread in Securing SaaS Applications 8 How Organizations Are Prioritizing Policies&Proc

3、esses for Their Entire SaaS Security Ecosystem 9 Investment in SaaS and SaaS Security Resources are Drastically Increasing 12Demographics 15Appendix A:Survey Results 17Acknowledgements 26About the Sponsor 263The Annual SaaS Security Survey Report:2024 Plans&Priorities All rights reserved to Adaptive

4、 Shield&Cloud Security AllianceKey Findings 1SaaS Security Incidents on the Rise55%of organizations report that they experienced an incident in the past two years,with another 12%unsure.These findings underscore that companies are coming to understand the harsh reality that common on-prem types of a

5、ttacks,such as ransomware,malware,and data breaches,can also occur in their cloud SaaS environments.2Current SaaS Security Strategies and Methodologies Dont Go Far EnoughThe survey finds that over half(58%)of organizations estimate their current SaaS security solutions only cover 50%or less of their

6、 SaaS applications.Its becoming clear that manual audits and CASBs are not enough to protect companies from SaaS security incidents.3Stakeholder Spread in Securing SaaS AppsCISOs and security managers are shifting from being the controllers to governors as the ownership of SaaS apps are spread out t

7、hrough all the different departments of their organization.Alignment,communication and collaboration are key to being able to secure the organizations SaaS stack.4How Organizations Are Prioritizing Policies&Processes for Their Entire SaaS Security EcosystemSaaS security continues to adapt to encompa

8、ss the expanding broad range of concerns in the SaaS Ecosystem,including SaaS Misconfigurations,SaaS-to-SaaS Access,Device-to-SaaS Risk Management,Identity and Access Governance,and Identity Threat Detection&Response(ITDR).Organizations are putting robust policies,processes,and capabilities in place

9、 that are essential for protecting these different domains.5Investment in SaaS and SaaS Security Resources Are Drastically Increasing66%of organizations have increased their investment in apps,with 71%increasing their investment in security tools for SaaS.More specifically,the survey shows that adop

10、tion of SaaS Security Posture Management(SSPM)solutions has grown significantly,increasing from 17%in 2022 to 44%in 2023.This can be attributed to the fact that SSPMs provide coverage in areas where other methods and strategies have fallen short,offering more comprehensive protection against various

11、 security risks throughout the whole SaaS Security Ecosystem.4The Annual SaaS Security Survey Report:2024 Plans&Priorities All rights reserved to Adaptive Shield&Cloud Security AllianceSurvey Creation and MethodologyGoals of the StudyThe Cloud Security Alliance(CSA)is a not-for-profit organization w

12、ith a mission to widely promote best practices for ensuring cybersecurity in cloud computing and IT technologies.CSA also educates various stakeholders within these industries about security concerns in all other forms of computing.CSAs membership is a broad coalition of industry practitioners,corpo

13、rations,and professional associations.One of CSAs primary goals is to conduct surveys that assess information security trends.These surveys provide information on organizations current maturity,opinions,interests,and intentions regarding information security and technology.Adaptive Shield commission

14、ed CSA to develop a survey and report to better understand the industrys knowledge,attitudes,and opinions regarding SaaS application use,SaaS security policies and processes,SaaS threats,and SaaS security strategy/solutions.Adaptive Shield financed the project and co-developed the questionnaire with

15、 CSA research analysts.The survey was conducted online by CSA in March of 2023 and received 1130 responses from IT and security professionals from organizations of various sizes and locations.CSAs research analysts performed the data analysis and interpretation for this report.The primary objectives

16、 of the survey were to gain a deeper understanding of several critical aspects of SaaS security in organizations.Current SaaS application use in organizationsOrganizations security policies and processes regarding SaaS applicationsAwareness and experience with SaaS threatsCurrent and future use of s

17、ecurity solutions5The Annual SaaS Security Survey Report:2024 Plans&Priorities All rights reserved to Adaptive Shield&Cloud Security AllianceKey Finding#1SaaS Security Incidents on the RiseThe survey reveals a significant increase in security incidents within the SaaS ecosystem,with 55%of organizati

18、ons reporting that they experienced an incident in the past two years,up 12%from the previous year.About a third(32%)of respondents stated that they hadnt encountered a SaaS security incident within the same period,while 12%were unsure.The findings underscore that many companies are coming to unders

19、tand the harsh reality that common on-prem types of attacks,such as ransomware,malware,and data breaches,can also occur in their SaaS environments.Has your company experienced a SaaS application security incident within the past two years55%Yes32%No12%UnsureWhat type of security incident(s)have you

20、experiencedData LeakageSaaS RansomwareData BreachMalicious AppsCorporate EspionageData&Discussion In todays digital landscape,SaaS security is of critical importance for organizations of all sizes.As businesses increasingly move their operations and data to the cloud,or more specifically SaaS applic

21、ations,the security of these apps becomes paramount.While SaaS applications are secure by design,the way they are configured and governed is what poses a risk.Without proper security measures,organizations are exposed to data breaches,cyber-attacks,and other security incidents that can result in sig

22、nificant financial and reputational damage.Understanding SaaS security is therefore essential for organizations to protect themselves from these risks.Its with this backdrop that this survey returns,delving into the intricacies of SaaS security and offering a follow-up to last years report.Below are

23、 this years findings and insights.6The Annual SaaS Security Survey Report:2024 Plans&Priorities All rights reserved to Adaptive Shield&Cloud Security AllianceKey Finding#2Current SaaS Security Strategies and Methodologies Dont Go Far EnoughInsufficient Monitoring of SaaS ApplicationsA key contributo

24、r to the noted increase in SaaS security incidents,the findings from the survey suggest that a significant number of organizations are falling short when it comes to implementing effective SaaS security measures.Many companies are using security solutions that do not cover their entire SaaS stack,le

25、aving their applications and data exposed to cyber threats.Specifically,the survey found that over half(58%)of organizations estimate their current SaaS security solutions only cover 50%or less of their SaaS applications.Percentage of the SaaS applications monitored by SaaS security solutions25%of t

26、hestack is monitored28%of organizations50%of thestack is monitored33%of organizations75%of thestack is monitored20%of organizationsNone of themmonitored6%of organizationsUnsure6%of organizations100%of thestack is monitored7%of organizationsWhat type of security incident(s)have you experiencedData Le

27、akageSaaS RansomwareData BreachMalicious AppsCorporate Espionage58%11%40%41%47%32%Insider AttackAmong the most prevalent SaaS security incidents reported were data leakage(58%),malicious apps(47%),data breaches(41%),and SaaS ransomware(40%),highlighting the growing need for robust security measures

28、and increased awareness of the potential risks associated with the expanding SaaS landscape.Key Finding#1/SaaS Security Incidents on the Rise7The Annual SaaS Security Survey Report:2024 Plans&Priorities All rights reserved to Adaptive Shield&Cloud Security AllianceCASBs and Manual Audits Falling Sho

29、rt for SaaS securityKey Finding#2/Current SaaS Security Strategies and Methodologies Dont Go Far EnoughMany organizations rely on Cloud Access Security Brokers(CASBs)and manual audits to secure their SaaS applications.However,these methods are proving to be insufficient in a number of key areas.Addi

30、tionally,manual audits expose company data between audits,leaving organizations at risk for security incidents during those gaps.These findings indicate that organizations need to reevaluate their security strategies and invest in more comprehensive solutions and strategies that provide full coverag

31、e across their SaaS ecosystem to reduce the risk of security incidents.This is also likely what is contributing to the increased use of SaaS Security Posture Management(SSPM)tools.What percentage of organizations are getting full SaaS security coverage from CASB and manual auditsIdentity and Access

32、Governance15%CASB14%Manual AuditsSaaS Threat11%CASB13%Manual AuditsData Loss Prevention14%CASB13%Manual Audits3rd Party App Discovery10%CASB10%Manual AuditsSaaS User Device Risk Management12%CASB11%Manual AuditsSaaS Misconfigurations10%CASB10%Manual AuditsThese findings highlight the pressing need f

33、or companies to reassess their security solutions and ensure they provide comprehensive coverage across their entire SaaS ecosystem.By doing so,organizations can significantly reduce their risk of security incidents,including data breaches,ransomware attacks,and other types of cyber-attacks.Ultimate

34、ly,this will help to safeguard their reputation and maintain the trust of their customers.8The Annual SaaS Security Survey Report:2024 Plans&Priorities All rights reserved to Adaptive Shield&Cloud Security AllianceIn addition to monetary investments in tools,security,and staff,organizations are incr

35、easingly involving numerous stakeholders in the process of securing business-critical applications.Across a typical organization,a wide array of SaaS apps are used from file sharing and collaboration apps to CRM,project and work management,marketing automation,and many more.SaaS apps fill a variety

36、of niche roles,yet this stakeholder spread complicates the threat landscape.Now,CISOs and security managers are shifting from being the controllers to governors of SaaS app security,and the survey shows how many of those engaged in security governance hold executive-level positions or serve as depar

37、tment heads,indicating that businesses are taking SaaS security seriously.The involvement of key decision-makers underscores the growing recognition of the critical role that SaaS security plays in protecting valuable assets and ensuring operational continuity.However,with so many individuals involv

38、ed,it can become challenging to determine who is ultimately responsible for SaaS security.SaaS applications often require close collaboration between the security team and app owners,as the security team may not always have direct access to the SaaS app.This necessitates processes and tools that can

39、 bridge the gap and actively engage app owners,who are crucial for effective SaaS security management.By fostering a collaborative environment and implementing solutions or strategies that facilitate communication and coordination between security teams and app owners,organizations can create a more

40、 robust and streamlined approach to securing their business-critical applications.This,in turn,will help minimize potential threat and ensure a higher level of protection against the ever-evolving landscape of SaaS security threats.Key Finding#3Stakeholder Spread in Securing SaaS ApplicationsTitles

41、involved in securing business-critical appsGRC TeamI dont know/OtherHead of Security43%Cloud Security Architects42%Security Operations39%IT38%Business Application Owner29%CIO26%16%4%9The Annual SaaS Security Survey Report:2024 Plans&Priorities All rights reserved to Adaptive Shield&Cloud Security Al

42、lianceOver the past year,the focus of SaaS security has evolved significantly,driven by factors such as increased investment in business-critical SaaS applications,a rise in security incidents,and the growing number of threat actors targeting SaaS apps.Previously,organizations and security tools,lik

43、e SSPMs,were primarily focused on misconfiguration management.However,SaaS security has adapted to encompass a broader range of concerns,including SaaS-to-SaaS Access,Device-to-SaaS Risk Management,Identity and Access Governance,and Identity Threat Detection&Response(ITDR).Key Finding#4How Organizat

44、ions Are Prioritizing Policies&Processes for Their Entire SaaS Security EcosystemSaaS Policies and ProceduresMisconfiguration ManagementWith the rising importance of SaaS in the business landscape,having robust policies,processes,and capabilities in place is essential for protecting an organizations

45、 SaaS stack and the data it contains from threat actors.Organizations are now putting measures in place to address key areas.The data below presents what organizations are starting to prioritize when securing their SaaS stack throughout the different domains of the SaaS Security Ecosystem.Addressing

46、 misconfiguration issues is vital to protect an organizations SaaS stack from misconfigured security settings that can be exploited by threat actors.The main priorities for misconfiguration management of respondents include:With a strong system and process in place,these high-impact areas can help r

47、educe the SaaS attack surface.Communication and collaboration between security and app owner teamsDetailed fixes and mitigation of misconfigurationsPrioritization based on the application,security domain,and risk level10The Annual SaaS Security Survey Report:2024 Plans&Priorities All rights reserved

48、 to Adaptive Shield&Cloud Security AllianceKey Finding#4/How Organizations Are Prioritizing Policies&Processes for Their Entire SaaS Security EcosystemThese priorities reflect the need for strong systems and processes in place to protect against third-party app access threats.Ensure each user has th

49、e right level of access neededNotification of Admin accessDetect dormant accounts to quickly ensure the deprovisioning of their access to SaaS if neededDetect users that have been disabled in the Active Directory but still have access to SaaS applicationsAuthentication practices(e.g.,key management,

50、certificate management)SaaS Identity and Access Governance Proper identity and access governance is essential for safeguarding sensitive data within the SaaS ecosystem.The priorities in Identity and Access Governance in organizations today include:Is your security team able to identify and manage us

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 研究报告 > 可研报告

本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

工信部备案号:黑ICP备15003705号© 2020-2023 www.taowenge.com 淘文阁