Skip to content
Menu
Cloud Gal 42
  • Home
Cloud Gal 42

Security Considerations for Software as a Service (SaaS)

June 2, 2021May 25, 2021 by admin

Previous article in series – Security Considerations for PaaS

When SaaS is consumed from a public cloud service provider, the security options that the customer can control may be only at the application level. In that model, application security is the responsibility of the cloud service provider, but the customer retains responsibility for identity access and authorization processes. In a public cloud scenario, this requires a high degree of trust in the cloud vendor because they have complete control of the infrastructure and platform layers. While network security is not typically considered a part of SaaS, customer due diligence efforts should clarify all security responsibilities and use SLAs and contracts to define cloud vendor and cloud customer responsibilities.

It is important to note that many SaaS applications are offered from an environment that has independent PaaS or IaaS service providers. They also may be part of an app store. Customers should investigate all subcontracting and service supplier relationships to ensure sufficient attention is paid to security requirements and responsibilities. Customers should also guard against malware maliciously posted into an app store. Although SaaS is not concerned directly with storage, you should ensure that data is encrypted as it travels across the internet, and if the data is stored at a public cloud vendor facility, you should do due diligence on storage encryption mechanisms and the overall storage architecture.

SaaS: Data Segregation

Multitenancy is one of the major characteristics of cloud computing. As a result of multitenancy, multiple users can store their data using the applications provided by SaaS. Within these architectures, the data of various users will reside at the same location or across multiple locations and sites. With the appropriate permissions, or falling prey to attack methods, the data of customers may become visible or possible to access.

Typically, in SaaS environments, this can be achieved by exploiting code vulnerabilities or injecting code within the SaaS application. If the application executes this code without verification, then there is a high potential of success for the attacker to access or view other customers’ / tenants’ data. A SaaS model should therefore ensure a clear segregation for each user’s data. The segregation must be ensured not only at the physical level but also at the application level. The service should be intelligent enough to segregate the data from different users. A malicious user can use application vulnerabilities to handcraft parameters that bypass security checks and access sensitive data of other tenants.

SaaS: Data Access and Policies

When allowing and reviewing access to customer data, the key aspect to structuring a measurable and scalable approach begins with the correct identification, customization, implementation, and repeated assessments of the security policies for accessing data. The challenge associated with this is mapping existing security policies, processes, and standards to meet and match the policies enforced by the cloud provider. This may mean revising existing internal policies or adopting new practices where users can only access data and resources relevant to their job function and role.

The cloud must adhere to these security policies to avoid intrusion or unauthorized users viewing or accessing data. The challenge from a cloud provider perspective is to offer a solution and service that is flexible enough to incorporate the specific organizational policies put forward by the organization, while also being positioned to provide a boundary and segregation among the multiple organizations and customers within a single cloud environment.

First article in series – Cloud Computing: Shared Security Model

Related

1 thought on “Security Considerations for Software as a Service (SaaS)”

  1. Pingback: Security Considerations for Platform as a Service (PaaS) – Cloud Gal 42

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Role of AI/ML in Cybersecurity
  • QuickGuide: Security on OCI
  • The Cloud Management Plane
  • Secure Installation and Configuration of Virtualized Cloud Datacenters
  • Cloud Datacenter: Hardware-specific Security Configuration Requirements

Recent Comments

  • Rafael on Installing Debian on OCI
  • Jorge on Installing Debian on OCI
  • admin on Installing Debian on OCI
  • Andreas on Installing Debian on OCI
  • admin on Installing Debian on OCI

Archives

  • December 2022
  • February 2022
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • February 2021
  • January 2021
  • November 2020
  • October 2020

Categories

  • aws
  • bcdr
  • cloud
  • cloudsecurity
  • compliance
  • informationsecurity
  • oracle
  • pci
  • QuickGuide
  • security
©2025 Cloud Gal 42 | Powered by WordPress and Superb Themes!