RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top
ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabs
AppSec & Supply Chain SecurityMay 7, 2025

SaaS risk is on the rise: 7 action items for better management

The rapid rise of SaaS apps has spawned new risks. One new hopeful stands out: The SaaSBOM. Here are key steps that help rein them in.

man in suit
Jaikumar Vijayan, Freelance technology journalistJaikumar Vijayan
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
big sign that says manage your risk

The rapid rise in the use of SaaS applications — often without the IT organization's knowledge or consent — has spawned a whole new set of challenges for security teams. These include visibility gaps, unmanaged data flows, and an expanding attack surface that traditional tools aren't equipped to handle.

A recent study by BetterCloud found that, on average, organizations use 105 SaaS apps — and those apps can have different configurations, security settings, and use cases. In many situations, enterprise IT and security teams have little idea of the scope of SaaS use in their environment and even less control over their security.

An AppOmni survey of security managers and decision makers at 644 organizations highlighted a disturbing disconnect between perception and reality, with 49% of respondents saying they had fewer than 10 apps connected to their Microsoft 365 platform, when in reality they averaged more than 1,000. And 34% simply admitted that they had no idea about the number of SaaS apps in their organization.

A couple of factors threaten to make the future even more challenging. Gartner predicted last year that organizations worldwide would spend just over $247 billion on SaaS apps in 2024 and that spending would surge 20% to more than $295 billion in 2025.

The rapidly growing number of SaaS-to-SaaS app connections and third-party integrations at many organizations is another issue. These integrations are exposing organizations to new risks such as those tied to misconfigured APIs and excessive permissions. Because these integrations often lack proper monitoring and oversight, they are a prime target for attackers.

Here are key measures to mitigate SaaS security risks — including one new hopeful from CycloneDX, the SaaSBOM.

Get White Paper: Go Beyond the SBOMPlus: Join Webinar, Welcome CycloneDX xBOM

1. Assess and quantify the risks

One of the biggest challenges in managing SaaS security often is a lack of visibility into the full scope of risk from SaaS apps, Without a clear, quantifiable understanding of where exposures lie, it's difficult to prioritize action or allocate resources effectively, said Omri Weinberg, CEO at DoControl. Such visibility is essential for quantifying the risks and taking steps to address them, he said.

The first step in SaaS security is conducting an assessment to identify exposed sensitive data, installed shadow apps, high-risk identities, and configuration missteps. Organizations know SaaS presents risks, but they lack the visibility and knowledge to quantify those risks within their environments.

Omri Weinberg

Organizations can take several steps to assess SaaS security risks, including doing proper assessment planning and scope definition, information gathering, security control evaluation, vulnerability assessment, and risk analysis. The goal is to build an inventory of all the SaaS applications in use, checking for the presence of access management, encryption, and other security controls, and to understand how they interact with other applications.

It is also important for organizations to do a systematic assessment of the vulnerabilities in their SaaS environment and their potential impact, said Sean Roche, a senior director at Obsidian Security.

SaaS is the hardest category of apps to manage vulnerability because IT is accountable, while app owners are responsible. This means app owners without security expertise are often tasked with configuring their apps securely, while security teams lack visibility and oversight into the specifics of every application.

Sean Roche

2. Assign responsibility for SaaS security

Misconceptions about the shared responsibility model can often leave critical gaps in protection. Brian Soby, CTO at AppOmni, said many organizations in his company's survey mistakenly assume that SaaS vendors and cloud providers will address most security requirements. In reality, it is the end-user organization that is responsible for monitoring and updating SaaS, setting application access control policies, managing identities and permissions, and fulfilling compliance mandates.

Additionally, security teams are often unaware of which SaaS apps are used within their organization, who is using them, and what permissions have been established, he said. So, not only are they are unable to get a handle on what is risky, but they are also unsure who has the responsibility to secure them within their own organization.

SaaS security has not yet come fully under the purview of the security team. Alarmingly, only 15% of enterprises surveyed have security teams actively managing SaaS security.

Brian Soby

In half of the firms surveyed, the business owners of each application were responsible for security, but in others responsibility was unclear, Soby said. A clear understanding of responsibility for SaaS security is essential because it ensures that organizations are addressing their own critical obligations — such as access controls, data protection, and compliance — rather than assuming that those risks are fully managed by the SaaS provider or by the business users buying and using these apps.

Security teams often have zero visibility into how these applications are deployed and operated in their companies. The business users usually get a green light through procurement, and then it's the Wild West in terms of how these applications are used and/or locked down.

Brian Soby

3. Manage SaaS identities and behavioral risk

The widespread adoption of SaaS platforms has led to a surge in user identities. Often, these identities can exist across multiple systems and include vulnerabilities such as weak passwords and authentication mechanisms, excessive permissions, and accounts no one is using any longer. Behavioral risks, such as users sharing sensitive data externally or ignoring access policies, are another issue. They amplify breach risks and can put organizations at risk of noncompliance with regulations such as the EU's GDPR and California's CCPA.

In this context, the ability to manage identities and user behavior has become critical, said DoControl's Weinberg. "SaaS identities present a new and high-risk challenge," he said. Identity-based attacks often lead to data exposure. He noted that 90% of data breaches stem from identity-related attacks — phishing, account takeovers, etc. "Even with the best security infrastructure, a single wrong click by a user can undermine it all," he said.

Weinberg said it's become essential to understand who a user is, what data they access, the associated risk, and how to remediate risky behavior. For example, if a user who rarely shares data suddenly shares over 100 assets in minutes, that’s a red flag. Similarly, one person logging into Salesforce from Boston and then from Los Angeles 30 minutes later is a physical impossibility that could indicate an account takeover.

SaaS data risks have never been more critical. Organizations must invest in comprehensive and scalable solutions to address these challenges.

Omri Weinberg

4. Implement continuous posture management

Continuous posture management is key to addressing SaaS security risks. Modern SaaS environments tend to be dynamic. The users accessing these environments can constantly change, and so can SaaS app configurations and integrations. Point tools are often insufficient because they are designed for specific issues and not for detecting and mitigating risk across the entire SaaS landscape.

"Since SaaS environments are complex, with widely varying configurations, ownership, and access patterns, protecting each application separately isn’t possible," AppOmni's Soby said. What's needed instead are capabilities for constantly monitoring security configurations, user behavior, permissions, and integrations across all SaaS applications. The goal is to detect and address security gaps quickly as the SaaS environment evolves.

Organizations need continuous SaaS security posture management to protect their complete SaaS estate at scale, to surface data exposures, detect threats, discover unsanctioned third- and fourth-party SaaS connections, manage identities and privileges, and spot configuration drift.

Brian Soby

5. Identify and monitor SaaS-to-SaaS connections

SaaS-to-SaaS connections, where one SaaS application connects directly to another — often through APIs or OAuth tokens — present a large and growing attack target for adversaries. While such connections can boost productivity, they’re usually set up by end users with little IT oversight, making them difficult to track and even harder to secure. Potential risks include excessive data sharing, unauthorized access, and an attack surface that traditional security tools often miss.

Soby said AppOmni's survey found that in some large organizations, a single SaaS platform such as Salesforce or ServiceNow could have tens of thousands of other applications connected to it — often via APIs, integrations, or third-party add-ons. "SaaS-to-SaaS connections create an entire universe of interconnected apps that allow an attacker to move across applications and pilfer whatever data they want to," he said.

AppOmni found that each SaaS instance had, on average, 250 connected apps, and in some environments that number reached as high as 60,000. Given how complex and large these environments can be, organizations need capabilities to automatically discover and monitor these SaaS-to-SaaS integrations, mapping connections and data flows via APIs. Equally critical are tools that can detect risky configurations, unauthorized access, and data-sharing vulnerabilities in real time

Obsidian Security's Roche said teams have long invested in controls to protect authentication to SaaS applications, "but these tools are typically blind to the fast-growing SaaS-to-SaaS data movement that is not governed or monitored."

The lack of visibility into the applications, identities, and app-to-app connections in corporate environments hides risk and creates an ever-growing unknown attack surface.

Sean Roche

6. Tap AI for help strategically

A new generation of AI-powered tools is emerging that aims to help organizations automatically discover connected apps, identify overprivileged access, and deliver real-time insights for detecting and responding to security risks. AI's ability to analyze vast amounts of user activity and configuration data could significantly improve the ability of security teams to detect dangerous misconfigurations, unusual login activity, mass data sharing, and excessive permissions.

The key is knowing how and when to use it, said Weinberg. "AI is a powerful tool, but it must be used strategically to make a real impact on organizations. In SaaS security, one key area AI can significantly enhance is risk scoring and identification," he said.

AI can correlate data across SaaS apps, identify threats and anomalous activities, and provide accurate risk scores to pinpoint threats and automate policies to address risky scenarios, Weinberg said. "By connecting the dots across various SaaS tools and automatically detecting genuine risks, AI reduces false positives and delivers actionable insights, enabling security teams to be accurate and efficient when mitigating risks," he said.

Melissa Ruzzi, director of AI at AppOmni, perceives AI as offering the only way for organizations to keep up with SaaS-related threats going forward. With organizations using scores of SaaS applications, understanding what each SaaS app does, assessing associated risks, and sifting through vast amounts of data to identify security issues can be overwhelming for security teams. "When built and trained on the right data, AI-enabled solutions can provide visibility into the SaaS environment, and data analytics at a scale and depth that only AI can handle," Ruzzi said.

One especially significant use case for AI is enabling users to chat with their data, investigate security events, and make faster and more informed decisions. AI-driven observations can transform complex SaaS security questions into clear, actionable answers and visual representations for deeper understanding, Ruzzi said. It can also optimize security workflows and surface critical observations in a narrative form with added contextualization to help teams focus on taking faster action.

But the outcome of AI can only be as valuable as the comprehensiveness of the data that it uses. The richer the data, the smarter the AI.

Melissa Ruzzi

7. Go beyond the SBOM with an xBOM — namely, the SaaSBOM

One key category of CycloneDX's new xBOM bill of materials standard is the SaasBOM, which identifies and inventories cloud-based applications, APIs, endpoints, and data flows to help ensure governance, compliance, and risk mitigation in SaaS environments.

SaaSBOMs provide better insights into the dynamic relationships between the services the software integrates with. They allow organizations to check the level of security of those third-party services, as well as identify and more effectively manage risks regarding insecure APIs, vulnerable data exchanges, and misconfigured services. As a result, users can confidently make more informed decisions on what they include in their applications.

The xBOM addresses the nature of how various assets move through and are incorporated into software supply chains. Industry guidelines and regulations are increasingly calling for the software bill of materials – and now the xBOM – to bring detailed visibility into their software ecosystems by representing comprehensive inventories of software components, dependencies, and relationships, said Dan Petrillo, vice president of product marketing for ReversingLabs.

We need to encompass all facets of software, and SaaSBOM is an interesting one because it acknowledges that software is more than just the bits and bytes of the package you build in. Software calls on services, touches endpoints, APIs, and so on. SaaSBOM brings visibility to that.

Dan Petrillo

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:AppSec & Supply Chain Security

More Blog Posts

ReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu

How agentic AI flips the trust model

As AppSec shifts focus from the components to data, your strategy needs updating. Are you on top of your trust debt?

Learn More about How agentic AI flips the trust model
How agentic AI flips the trust model

MCP rug-pull attack worries mount

This new class of AI tool supply chain attack highlights how trust of agents can be exploited.

Learn More about MCP rug-pull attack worries mount
MCP rug-pull attack worries mount

Can AppSec keep pace with AI coding?

AI lets software teams generate code at a rate faster than security can validate it. One way to win the race: more AI.

Learn More about Can AppSec keep pace with AI coding?
Can AppSec keep pace with AI coding?
Finger on map

LLMmap puts its finger on ML attacks

Researchers show how LLM fingerprinting can be used to automate generation of customized attacks.

Learn More about LLMmap puts its finger on ML attacks
LLMmap puts its finger on ML attacks
Trust model flips
MCP attacks
AI coding racing