Across homes, schools, and a growing majority of businesses, Software as a Service (SaaS) applications are moving closer to the center of everyday life. But in business contexts, this move to cloud-based software such as Google’s G Suite or Microsoft’s Office 365 may open up security challenges that businesses aren’t equipped to address.
The Popularity of SaaS
Businesses have a number of reasons for switching to SaaS architecture, including cost effectiveness, centralization of files and work processes, and a degree of standardization and support for bring your own device (BYOD) workplaces. And the convenience of cloud-based architecture is convincing: according to a report by BetterCloud, a significant proportion (25% to over 50%) of businesses that already use the G Suite or Office 365 plan to migrate to entirely cloud-based software environments by the end of the decade.
However, that same report revealed that over 60% of businesses running SaaS applications consider themselves underfunded for addressing cloud security – and many of those businesses simply don’t recognize cloud security in their budgets at all.
Security and SaaS
Several factors may be responsible for this discrepancy, including poor understanding of what SaaS security entails on the business end. Server security, for example, falls under the auspices of the service provider. However, companies are responsible for a number of critical security topics, including:
- Managing employee authentication and access, including requiring strong passwords, limiting the creation of accounts, and disabling account access when employees leave the company. Employees should also have access only to the files and applications they need in order to perform their jobs – access should never be granted across the board.
- Mandating secure access points, using (for example) VPNs or secure web gateway applications, and requiring all connected devices to have passwords and idle screen locking. Employees who take advantage of BYOD policies should be prepared to keep their devices up to date and configured to the standards developed by their company’s IT security team.
- Thorough knowledge of emerging cloud security standards, as well as work done by groups such as the Cloud Security Alliance, and insistence that SaaS applications meet security standards as a prerequisite for adoption. As SaaS is more and more widely adopted, these standards will become more finely-tuned.
- Thorough knowledge of security implementations on the part of the SaaS provider. While IT security managers may have little or no ability to affect the security profile of a SaaS application, they should nevertheless know the details of the cloud’s security. This will enable them to judge whether or not the implementation is in compliance with security standards, and whether or not it’s in compliance with company- or industry-specific regulations.
While SaaS removes a number of concerns from the IT team’s wheelhouse, security can never be entirely outsourced. For some years, security has been a highly-cited reason for discouraging adoption of cloud technologies, but with appropriate funding and attention to detail, companies can enjoy the convenience of cloud sourcing as well as rigorous security.
Bring your own device (BYOD) has the benefit of allowing businesses to cut costs on providing devices to employees, but it also creates a number of security issues. This is an especially important factor to consider for government agencies, which often handle very sensitive data but may not have a focused, detailed policy for employees to follow. Employees aren’t necessarily creating security holes on purpose, but agencies should still have a firm policy in place — or make the decision not to allow employees to bring their own devices at all.
With the explosion in affordable mobile devices like smartphones, tablets, personal laptops, and even smartwatches, many businesses have or are in the process of implementing a bring your own device (BYOD) policy. Software company Code 42 reveals in their 2016 Datastrophe Study that 67% of IT decision makers and 87% of CIOs and CISOs believe that they have a clear and comprehensive policy.
Before technology became the way of the world, enterprise IT had strict control over the network, devices, security measures, and software. However, many businesses are embracing the bring your own device (BYOD) trend and providing full support to employees who wish to use their own devices. The rise of BYOD culture means that the IT department needs to develop the following skills to provide optimal support.