What Airports Have in Common With SaaS Security Misconfigurations

December 24, 2020

Airports are among the most secure buildings in the world. Whether it’s London’s Heathrow, The Windy City’s O'Hare, or any other airport across the globe, what’s certain is that they deploy an impressive array of scanning equipment, facial recognition tools, physical security teams, and artificial intelligence systems to keep operations flowing smoothly and prevent threats.

But the real foundation to airport security is the architectural design of the building itself and protocols that are in place. The most sophisticated scanners and the most diligent TSA agents are totally worthless if people who aren't scheduled to fly are granted direct access to the departure gates. Or if the service corridors for staff are accessible to shoppers in the duty free section.

Now imagine having to secure multiple airports simultaneously, where the people inside may be both pilots and passengers of different airlines. And then--and hear me out on this--imagine that all the corridors, walls, and stairways are constantly shifting in relation to each other (think Heathrow meets Hogwarts!). Gate 22 used to be in this hallway--but now, without a moment’s notice, it’s in a different terminal; The emergency exit should obviously be closed at all times--but suddenly, all the passengers are using it freely. In this confusing scenario, the carefully designed management protocols have been broken down, eventually creating a situation in which anyone can access whatever area they choose.

The Complexities of the SaaS Application Ecosystem

Similar to those magically-shifting airport corridors, both admins and regular users can intentionally or unintentionally make major/minor changes to settings which end up enabling risky permissions or disabling key security features.

Despite each application’s countless security and user-related settings, with the addition of custom code, configurations, integrations, 3rd party users and apps, there’s a lot of room for things to go wrong. And so, it should come as no surprise that a leading cause of security incidents in SaaS applications is due to misconfigurations on the part of the organization using the platform--not due to security weaknesses in the platform itself.

For example:

  • Creating public and anonymously accessible content. It is hard to keep track when you have so many different settings on so many apps and this can wind up exposing content.
  • Audit logging feature in mailboxes. When it’s on, audit logging allows for potentially critical analysis and monitoring of accounts. But it can be disabled, leading to a dangerous loss of insight into events and potential exposures.
  • Allowing SSO to be bypassed. Bypassing SSO can lead to account takeovers, which can have devastating results for any organization.

Like the most bustling airports in the world, SaaS environments are inherently chaotic and fragmented. But with the proper toolset, specifically developed to address the unique management challenges of the SaaS application space, security teams can proactively take charge of their landscape.

What’s your current SaaS security posture? Find out today!

About the writer

Adam Pomson
VP Sales
What Airports Have in Common With SaaS Security Misconfigurations
With over 20 years of experience in Enterprise Sales, Adam has built markets from the ground up with a specialty in Cybersecurity Startups. Before joining Adaptive Shield, Adam was Director of Sales at Voca.ai and one of the early stage senior sales managers at CloudLock. Working from the start to the successful exits of both. Originally from the UK, Adam now resides in Israel.
GDPR Compliant
ISO 27001 Compliant
ISO 27001 Certified
ISO 27701 Certified
SOC 2 Compliant
Cyber GRX