SlideShare a Scribd company logo
1
Cloud Usage Risk Report
November 2014
2
Executive summary
The Adallom Cloud Risk Report is published annually, detailing actionable insights and information mined from the Adallom
subscriber base. This specific report incorporates analysis of cloud application usage for over one million enterprise SaaS enabled
users traversing four dominant SaaS platforms: Salesforce, Box, Google Apps, and Office 365 between October 2013 and October
2014.
This report is the first of its kind to detail application usage patterns and risky behaviors for the top SaaS applications used by
businesses. The key findings in this report reaffirm the need for a new approach to data governance, risk management, and security
in the context of cloud adoption. Perimeter and endpoint security solutions provide minimal protection against new, emerging, and
largely unknown risks. Therefore, enterprises need to proactively invest in new controls like Identity and Access Management (IAM)
solutions and Cloud Access Security Brokers.
Key findings include:
•	 In the cloud zombies are real: 11% of all enterprise SaaS accounts are “zombies,” inactive assigned users that are at best eating
up the cost of a license, and at worst increase the attack surface of the organization.
•	 More admins, more problems: Every administrative account represents a real and present risk to the enterprise. In some SaaS
applications Adallom recorded an average of 7 administrators out of every 100 users.
•	 80% of companies have at least one former employee whose SaaS application credentials have not been disabled: De-
provisioning continues to plague organizations, credential creep makes the problem unwieldy.
•	 19% of users bypass Identity and Access Management controls: Rebalancing the enterprise security portfolio from exclusively
preventative controls to blended risk management based compensating controls is necessary.
•	 5% of an average company’s private files are publicly accessible: The productivity gains of SaaS adoption come at the cost of
reduced legacy control effectiveness and purview, it’s time to refresh enterprise governance controls.
•	 The average company shares files with 393 external domains: Accountability and liability for the distribution of enterprise
data, especially privileged data continue to challenge IT in the cloud era.
•	 29% of employees share an average 98 corporate files with their personal email accounts: Personal sharing of enterprise data
manifests both governance and security risks.
•	 Think of the orphans: An average of 6% of files in cloud services are orphans. Of those, approximately 70% were created by
users outside the company, and 30% by terminated employees or former contractors.
•	 37% of our customers discovered they stored more cloud data in Salesforce than any other cloud storage service: Although
Salesforce has a secure storage layer, its information governance controls are limited.
Copyright ©2014 Adallom Inc.
3
Introduction
When it comes to the protection of enterprise data in the cloud, the SaaS providers’ focus is on security, not “risk”: SaaS providers’
investments in security are largely directed toward certifications, compliance and audits/testing of their infrastructure that all increase
their “trustability” in the eyes of their customers. [1]
It’s not reasonable to expect your SaaS provider to protect your users from malware or phishing attacks, even if those attacks
specifically target their service. That’s not to say the provider won’t do everything within their power to help you - their security
teams rank among the best, but they could never be accountable for the security posture of your organization or its employees.
A recent Forrester survey found that a majority of IT decision makers placed accountability for a data breach on SaaS providers. [2]
This is a misplacement, as in reality, companies are responsible for user activities and data, even in the cloud. According to the Cloud
Security Alliance guidelines:
“When data is transferred to a cloud, the responsibility for protecting and securing the data typically remains with the collector or
custodian of that data.” [3]
The Forrester survey findings clearly indicate that the broad IT community is still grappling with the boundaries between provider
and customer liability.
An example that may aid in edifying the shared responsibility model is a phishing attack which targeted Google Apps users
discovered recently by security experts at BitDefender.[4]
The attack employed the data URI feature to conceal the true origin of
the phishing page. Once breached, attackers could have gained access to sensitive company data, including user emails, drive and
company shared files. Furthermore, compromised accounts could be used to further infiltrate the affected company by sending
phishing emails and infected emails from the compromised employee’s corporate email account.
With access to a person’s Google account, attackers could cause a lot of damage very quickly – from compromising email and
documents to expanding the attack to the victim’s social circle via email or social tools, like Google+.
There is no doubt this kind of attack poses a great risk to enterprise data in the cloud; the problem lies in delineating accountability
for mitigation should such an attack take place. In the aforementioned scenario, the Google Apps Terms of Service clearly state:
“Customer will use commercially reasonable efforts to prevent unauthorized use of the Services and to terminate any unauthorized use.
Customer will promptly notify Google of any unauthorized use of or access to the Services of which it becomes aware.” [5]
The only reasonable interpretation of this clause is that the customer is expected to prevent unauthorized usage of the service.
This clause encompasses most of the possible user attack scenarios, from identity theft (compromised insider) to internal threat
Figure 1: Adallom Infographic (source: Forrester survey - “SaaS Adoption Requires a New Approach To Information Security”)
Copyright ©2014 Adallom Inc.
(malicious insider), as in the cloud everything falls under the broad definition of "unauthorized usage" because the “insider” is the
attack vector. Specifically, the BitDefender phishing attack described above is classified as "unauthorized usage," and a Google
Apps customer affected by it is liable for any damage caused while Google itself is indemnified.
The fact that the majority of SaaS adopting companies do not understand they are responsible for SaaS security means that these
companies are left unprotected and their data is at great risk.
SaaS risk management is a very different competency, which is why Cloud Access Security Brokers are an important complement to
the likes of endpoint and perimeter security controls. Adallom Labs has compiled the insights in this report from over a million users
traversing through the Adallom service.
In the cloud, zombies are real
At Adallom, we refer to user accounts which haven’t been active over a period of three months as “zombies”. Not all zombies are
bad – in some cases, such as sabbaticals, maternity leave, or disability – this inactivity is not unusual, but even in those cases there are
best practices such as account suspensions that keep the user’s data active while preventing a would-be hijacker from taking over the
account during the user’s absence.
An inactive account does not only represent a security risk, it’s also a financial burden on the company. In many of the organizations
we protect, we often see double digit percentages of zombies – these are licenses which the company is paying for even though they
aren’t being used.
The most dangerous kind of zombies are “Zombie Admins” – because privileged accounts are the preferred and most targeted attack
vector for threat actors. A compromised account with administrative capabilities may allow an attacker to gain substantial access to
valuable corporate information. Specifically, in administrative panels for cloud applications, a privileged account wields a lot of power.
Figure 2: 11% of enterprise SaaS users are zombies that have access to the application, but have not been active for three months or longer
4Copyright ©2014 Adallom Inc.
More admins, more problems
Different cloud services have varied ratios of administrators to users. The higher the ratio, the greater the likelihood of one of
those privileged users being a zombie admin.
Figure 3: Percentage of privileged users to non-privileged users for SaaS applications
Within our Adallom customer community, we find that Salesforce has the highest ratio of privileged users to non-privileged users.
One of the biggest issues in cloud services is that these privileged users are often what we call “super admins” – meaning they have
complete and unrestricted access to the service. A compromised “super admin” account represents a much greater threat to an
organization because it has access not only to view and edit privileged data, but also to modify access rights of other privileged
users.
A well-documented recent example of such a scenario is Code Spaces:[6]
The company’s Amazon EC2 control panel access
credentials were compromised through a phishing attack. The attackers then made extortion demands of company officials. Upon
realization that somebody had access to their administrative control panel, Code Spaces changed their EC2 passwords. However, they
quickly discovered the attackers had created backup logins, and once recovery attempts were noticed, the attackers began deleting
artifacts from the panel. By the time Code Spaces finally managed to get their panel access back, most of their data, backups,
machine configurations and offsite backups were either partially or completely deleted.
The Amazon Web Services administrative portal is itself delivered as-a-Service, much like the administrative portals of Google Apps,
Box, Salesforce, and Office 365. Customers, not vendors, are responsible for risk management. While most enterprise SaaS providers
have built-in support for two-factor authentication and IP restrictions that can be used with user accounts, sophisticated attackers
can circumvent those controls through session hijacks and targeted malware.
Using Adallom, one of our customers found over 100 Salesforce users with administrator privileges. We gave them visibility into
which users were using administrative functions, and the users who were never actually logging in (the zombies). We worked with
their sales operations team on enabling delegated admin user groups within Salesforce so that not every admin was a “super admin,”
thus significantly reducing their attack surface.
5Copyright ©2014 Adallom Inc.
80% of companies have at least one former
employee whose SaaS application credentials
have not been disabled
Enterprise user de-provisioning continues to be the dark side of an organization’s user access provisioning process. When it comes
to removing access due to a changing job role or an employee (more often a contractor) departing the organization, IT is notified to
revoke access through a semi-automated policy-driven process infamous for its gaps.
Focusing attention on the problem and making executive management aware of the risks posed by having “orphaned” accounts
within the organization’s business systems is a crucial component of a prudent risk management strategy. There is plenty of
supporting evidence which documents the high costs to organizations through data loss, reputation and monetary costs due to
errant user access management. [7]
Fortunately, the de-provisioning threat has been reduced significantly through Identity and Access Management (IAM) tools such
as Centrify, Okta, or Ping. Onboarding an IAM service is a best practice, but doing so should be complemented with Cloud Access
Security Brokers.
19% of users bypass Identity and Access
Management controls
Although SaaS providers offer security features such as two factor authentication and IP restrictions, there are many ways for the
security to fail. IAM and Single Sign-On tools go a long way toward centralized access control, but there are many mechanisms built in
to standard user workflows that yield non-malicious circumvention.
One example of consumer-driven circumvention are platform specific mobile apps that allow users to authenticate directly to the
application. Another is direct access to the application through third party API. Neither of these scenarios necessarily represent
malicious behavior by users; in some cases users are not even aware that they are bypassing the IAM mechanism. Unfortunately,
in the event of a breach, circumvention does not move liability from the shoulders of the organization to the user. IT still has a
responsibility to protect the integrity of the data in the services that power the business. [8]
The challenge is how to function in the
face of such disruptive forces.
Changing the strategy is not just about satisfying employees. IT can also benefit. By embracing and aligning itself with a risk
management model that accounts for circumvention, rather than maintaining the slower, provable inefficient pace of prevention-
based security. While no perfect solution exists, a combination of third-party tools and attention to where data is stored can create a
security environment sufficient to meet the assessed risk level of many organizations.
6Copyright ©2014 Adallom Inc.
7
5% of an average company’s files are publicly
accessible by anyone on the internet
There are several reasons private enterprise data unknowingly winds up publicly accessible:
1. The “anyone with this link” problem
Ideally, to share a document with specific people, we expect users to share the file exclusively with the recipient’s email address.
However, problems have arisen for users who would not (or could not) create an account on the file sharing service in question. These
users were unable to access the shared documents. When the complaints began, savvy users gleaned a different security setting to
solve the problem - sharing files using the ‘Anyone with the link’ setting. That works, but now anyone who had the link could share the
link which makes documents easier to share, but less secure.
2. Enabling anonymous access and indexing (aka “crawlability”)
Some SaaS applications allow search engines to index (or crawl) documents contained within them, and lack of awareness over the
governance of search engine indexed documents has already made headlines several times over the past few years. [9]
This functionality is usually globally controllable, and often disabled by default – but we are consistently surprised by the quantity of
organizations that have public crawling enabled.
Copyright ©2014 Adallom Inc.
8
3. Unnecessarily privileged third-party applications
Enterprise SaaS providers often feature marketplaces for third party ecosystem applications built on their platform. Whether
installed by administrators, or end users, these applications can request and be granted privileged access that allows them to upload,
download, edit, and delete files and data.
In the consumer space, there have already been scenarios where malicious ecosystem applications have tricked users into handing
over access to privileged data [10]
– and we are currently investigating several such apps in enterprise SaaS marketplaces.
Governance over third party SaaS ecosystem application access becomes increasingly difficult as SaaS platforms intersect with each
other. For example, there are already cross-platform third party applications that integrate services like Dropbox with Salesforce, or
Google Drive with Huddle – meaning a compromised account in one cloud service could become an attack vector into another. It’s a
best practice to know what third party ecosystem applications have access to enterprise data in the core platform, and develop a risk
appetite strategy for the access privileges those apps are granted.
The average company shares its files with
393 external domains
Sharing files with third parties is an important and beneficial feature of enterprise SaaS applications, however there are risk
ramifications that are concurrent with these benefits.
Some SaaS providers install a local device agent in order to synchronize between user devices and the Web, which often means users
are unaware of the full spectrum of data being synchronized to the SaaS provider.
Inadvertent sharing is a real danger for enterprises with an increased uptake of services such as Office 365, Box and Google Drive. For
governance and security purposes, it’s crucial to understand where corporate files are stored and who they are being shared with.
Malicious threat actors have already used malicious file sharing with employees as a successful attack vector for malware distribution,
clandestinely exploiting file sharing as a mechanism for gaining access to enterprise resources.[11]
Copyright ©2014 Adallom Inc.
9
Adallom assigns risk scores to external domains based on a comprehensive heuristic scale, including factors such as their Alexa score,
whether any Adallom subscriber has ever interacted with them, when they registered, and the sensitivity of the data being shared
relative to the risk score of the domain it’s being shared with.
29% of employees share an average 98 corporate
files with their personal email accounts
Personal sharing can happen unintentionally via the aforementioned sync agents – for example, employees who use Google Drive
for personal as well as enterprise storage may have their data segregated in the cloud but integrated on their local device, such that
when they move files from one folder to another on the local device, corporate files accidentally sync to their personal Google Drive in
the cloud.
When personal sharing is intentional, the act is rarely malicious. In fact, we consistently see “malicious insiders” as the least likely
scenario for data exfiltration. In some cases, personal sharing of corporate data is done for productivity purposes (sometimes at the
expense of data governance policy circumvention). For example, many Office 365 users prefer editing a document in a local version
of Word 2013 over of Word Online.
Any variety of personal sharing manifests both governance and security risks. [12]
Once corporate data is moved to a user’s personal
cloud or physical drive, any attestation, DLP, or eDiscovery controls become largely moot.
Encryption is often thought of as a solution to this problem, but third party encryption tools are given more gravitas than they
deserve. The theory is that only authorized personnel and programs see decrypted information. But encryption controls are not
designed to know if the user has been compromised or has granted someone else access to the key.
Most enterprise SaaS providers encrypt data in transit as it flows between their data centers and user devices, as well as “at rest” on
their servers. Those providers who aren’t doing so are certainly moving in that direction, and can be persuaded to move faster by
their customers (a good use of your time!).
Beyond vendor provided encryption, the focus in SaaS should be attestation, not encryption. What’s needed is a clear and actionable
audit trail of all user activities in SaaS applications with direct correlation to which data - structured and unstructured - has been
exchanged, shared, or otherwise interacted with.
Excerpt from an Adallom Risk Assessment Report
Copyright ©2014 Adallom Inc.
10
Think of the orphans
Previously in this report, we discussed the notion of “orphan” users whose accounts persist beyond their termination. However,
“orphaned” files are an entirely different risk that is often unseen or overlooked in the enterprise. Orphan files are files that have no
owner. This can happen when files are owned by users or groups that have been deleted. It can also happen when external users
share files with internal users through temporary access on the corporate sanctioned SaaS drive.
Among our customers, an average of 6% of files in cloud services are orphans. When we research their origin, we find that
approximately 70% were created by users outside the company, and 30% by terminated employees or former contractors.
Figure 4: Average of 6% of files in Adallom cloud services are orphans which have no owners
The danger of having a file or folder owned by a non-existent user or group ID is that someday, that user or group ID could be
assigned to a newly created user or group, members of which would be automatically able to access the file.
Orphan files also create a governance problem because they don’t have a clear provenance and attestation trail, which means that
they might violate retention policies. In the event of an eDiscovery query or regulatory compliance audit, orphan files could be
troublesome, especially if they contain privileged data. [13]
Adallom provides a “single pane of glass” view into orphan files across SaaS services and can be used to establish origin, age, and
ownership along with governance capabilities that allow proper custodianship and control.
37% of our customers discovered they stored
more cloud data in Salesforce than anywhere else.
Figure 5: More data is stored in Salesforce than any other SaaS application, including corporate-approved cloud storage services
Copyright ©2014 Adallom Inc.
11
In many cases, even ostensibly well-governed organizations overlook critical risks.[14]
For example, one of our customers, prior to
engaging with us, had spent nearly a full year on a Shadow IT control project intended on standardizing their enterprise file storage,
sharing, and sync on a single sanctioned vendor – Box. However, shortly after deploying Adallom, the security team found that
although employees had largely standardized on Box for file storage, nearly forty percent of their enterprise files in the cloud were
stored in Salesforce. They had simply never considered Salesforce, an enterprise SaaS vendor that was sanctioned for CRM, as a cloud
storage provider.
Although Salesforce has a storage layer, its information governance controls are limited. For example, it’s impossible to create a DLP
policy for data in Salesforce without using a third party solution. So while it’s obvious that the Salesforce platform can be trusted with
data retention, when it comes to managing files inside of Salesforce, it’s a best practice to integrate an enterprise storage governance
solution from the Salesforce AppExchange. Consider Box for Salesforce for governance, along with a Cloud Access Security Broker
for risk management, such as Adallom for Salesforce.
Takeways On Protecting SaaS Applications
“A whopping 92% of respondents to our survey indicated a belief that their existing security controls are either effective or very
effective in protecting their digital assets in SaaS applications,” wrote Andras Cser, Forrester VP, Principal Analyst Serving Security &
Risk Professionals. “Unfortunately, security professionals with this mindset are rolling the dice with their sensitive data. Perimeter and
endpoint protections provide minimal protection against new, emerging, and largely unknown threats; they are ineffective when the
endpoint is unmanaged and off premise.” [2]
Being prepared means understanding organizational accountability for protecting enterprise data in SaaS applications, and adding
a Cloud Access Security Broker to a prudent defense-in-depth architecture; which is why we emphasize the proactive service
component of our cloud security solution. Adallom not only provides the visibility, governance, and protection capabilities of our
platform, but we act as an extension of our customers’ security and risk management teams. This gives them actionable insights into
compliance risks and external threats, as well as engages business units in their organization to jointly improve the company’s cloud
security posture.
Source: “SaaS Adoption Requires A New Approach To Information Security,”
Forrester Consulting, 2014
Figure 6: More data is stored in Salesforce than any other SaaS application, including corporate-approved cloud storage services
Copyright ©2014 Adallom Inc.
12
HQ
2390 El Camino Real, Suite 240
Palo Alto, CA 94306
+1 (650) 268-8322
R&D
Habarzel 21 Street, Building B
Tel Aviv, 6971001
Israel
www.adallom.com
References
[1]
	 S. Deshpande, N. MacDonald and C. Lawson, “Emerging Technology Analysis: Cloud Access Security Brokers,” Gartner, 2014.
[2]
	 A. Cser, “SaaS Adoption Requires A New Approach To Information Security,” Forrester Consulting, 2014.
[3]
	 F. Gilbert, P. Jones Harbour, D. Kessler, S. Ross and T. Trappler, “CSA Security Guidance Domain 3: Legal Issues: Contracts and 	
	 Electronic Discovery,” Cloud Security Alliance, 2011.
[4]
	 S. Ragan, “Phishing attack uses data URI to target Google accounts,” 13 May 2014. [Online]. Available: http://www.csoonline.com/	
	article/2154202/social-engineering/phishing-attack-using-data-uris-to-target-google-accounts.html.
[5]
	 Google, Inc., “Google Apps for Business (Online) Agreement,” 22 July 2014. [Online]. Available: http://www.google.com/apps/intl/	
	 en/terms/premier_terms.html. [Accessed 8 October 2014].
[6]
	 AbleBots, LLC, “Code Spaces : Is Down!,” Code Spaces, 17 June 2014. [Online]. Available: http://www.codespaces.com. [Accessed 	
	 7 September 2014].
[7]
	 A. Allan and F. Gaehtgens, “Align Your IAM Program With Your CIO’s Priorities,” Gartner, 2014.
[8]
	 S. Chuang and D. Zumerle, “Managing Mobile Access to the Cloud,” Gartner, 2013.
[9]
	 D. Gilbert, “Dropbox and Box Users Accidentally Leaking Private Files Online,” 6 May 2014. [Online]. Available: http://www.ibtimes.	
	co.uk/dropbox-box-users-accidentally-leaking-private-files-online-1447352.
[10]
	 L. Constantin, “More fake antivirus programs found in Google Play, Windows Phone Store,” IDG News Service, 16 May 2014. 	
	 [Online]. Available: http://www.pcworld.com/article/2156300/more-fake-antivirus-programs-found-in-google-play-windows-	
	phone-store.html.
[11]
	 A. Gonsalves, “What to avoid in Dropbox-related phishing attack,” 6 June 2014. [Online]. Available: http://www.csoonline.com/	
	article/2360670/malware-cybercrime/what-to-avoid-in-dropbox-related-phishing-attack.html.
[12]
	 T. McClure and K. Kao, “Security Considerations for Online File Sharing,” Enterprise Strategy Group (ESG), 2013.
[13]
	 S. Krapes, “Use IAM Life Cycle Policies to Enforce Account Disabling and Deletion,” Gartner, 2014.
[14]
	 R. Mogull, “The Future of Security: The Trends and Technologies Transforming Security,” Securosis, 2014.
Copyright ©2014 Adallom Inc.

More Related Content

What's hot

VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
GFI Software
 
SaaS Platform Securing
SaaS Platform SecuringSaaS Platform Securing
SaaS Platform Securing
Leo TechnoSoft
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
GFI Software
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
GFI Software
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
DMI
 
Rapport X force 2014
Rapport X force 2014Rapport X force 2014
Rapport X force 2014
Patrick Bouillaud
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Dean Iacovelli
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
BurCom Consulting Ltd.
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
CMR WORLD TECH
 
Peoplesoft Erp
Peoplesoft ErpPeoplesoft Erp
Peoplesoft Erp
Appsian
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
Symantec
 
Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?
Web Werks Data Centers
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
Sarah Freemantle
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
DMIMarketing
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Ass3201 cyber securityassignment
Ass3201 cyber securityassignmentAss3201 cyber securityassignment
Ass3201 cyber securityassignment
harinathinfotech
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 

What's hot (19)

VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
SaaS Platform Securing
SaaS Platform SecuringSaaS Platform Securing
SaaS Platform Securing
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
Rapport X force 2014
Rapport X force 2014Rapport X force 2014
Rapport X force 2014
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
Peoplesoft Erp
Peoplesoft ErpPeoplesoft Erp
Peoplesoft Erp
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
The Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent ThemThe Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent Them
 
Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Ass3201 cyber securityassignment
Ass3201 cyber securityassignmentAss3201 cyber securityassignment
Ass3201 cyber securityassignment
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 

Similar to Adallom_Cloud_Risk_Report-Nov14

Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
Techugo
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
Techugo
 
Discussion 300 wordsSearch scholar.google.com or your textbook
Discussion 300 wordsSearch scholar.google.com or your textbookDiscussion 300 wordsSearch scholar.google.com or your textbook
Discussion 300 wordsSearch scholar.google.com or your textbook
huttenangela
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
CloudMask inc.
 
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdfThe 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
Groovy Web
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMask
CloudMask inc.
 
A017130104
A017130104A017130104
A017130104
IOSR Journals
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
IOSR Journals
 
Cloud computing risks
Cloud computing risksCloud computing risks
Cloud computing risks
sripriya78
 
Ultimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecUltimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecJessica Lavery Pozerski
 
ultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeSean Varga
 
Appsian securing mobile_ess_solution_brief
Appsian securing mobile_ess_solution_briefAppsian securing mobile_ess_solution_brief
Appsian securing mobile_ess_solution_brief
Appsian
 
Peoplesoft Best Practices for Maintaining Security
Peoplesoft Best Practices for Maintaining SecurityPeoplesoft Best Practices for Maintaining Security
Peoplesoft Best Practices for Maintaining Security
Appsian
 
The 3 Recommendations for Cloud Security
The 3 Recommendations for Cloud SecurityThe 3 Recommendations for Cloud Security
The 3 Recommendations for Cloud Security
VAST
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
Kumar Goud
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
mistryritesh
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceKeith Purves
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidencePaul Richards
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 

Similar to Adallom_Cloud_Risk_Report-Nov14 (20)

Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
Discussion 300 wordsSearch scholar.google.com or your textbook
Discussion 300 wordsSearch scholar.google.com or your textbookDiscussion 300 wordsSearch scholar.google.com or your textbook
Discussion 300 wordsSearch scholar.google.com or your textbook
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdfThe 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
The 14 Most Common Security Risks For SaaS Applications And How To Fix Them.pdf
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMask
 
A017130104
A017130104A017130104
A017130104
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
Cloud computing risks
Cloud computing risksCloud computing risks
Cloud computing risks
 
Ultimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecUltimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSec
 
ultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracode
 
Appsian securing mobile_ess_solution_brief
Appsian securing mobile_ess_solution_briefAppsian securing mobile_ess_solution_brief
Appsian securing mobile_ess_solution_brief
 
Peoplesoft Best Practices for Maintaining Security
Peoplesoft Best Practices for Maintaining SecurityPeoplesoft Best Practices for Maintaining Security
Peoplesoft Best Practices for Maintaining Security
 
The 3 Recommendations for Cloud Security
The 3 Recommendations for Cloud SecurityThe 3 Recommendations for Cloud Security
The 3 Recommendations for Cloud Security
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidence
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidence
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 

Adallom_Cloud_Risk_Report-Nov14

  • 1. 1 Cloud Usage Risk Report November 2014
  • 2. 2 Executive summary The Adallom Cloud Risk Report is published annually, detailing actionable insights and information mined from the Adallom subscriber base. This specific report incorporates analysis of cloud application usage for over one million enterprise SaaS enabled users traversing four dominant SaaS platforms: Salesforce, Box, Google Apps, and Office 365 between October 2013 and October 2014. This report is the first of its kind to detail application usage patterns and risky behaviors for the top SaaS applications used by businesses. The key findings in this report reaffirm the need for a new approach to data governance, risk management, and security in the context of cloud adoption. Perimeter and endpoint security solutions provide minimal protection against new, emerging, and largely unknown risks. Therefore, enterprises need to proactively invest in new controls like Identity and Access Management (IAM) solutions and Cloud Access Security Brokers. Key findings include: • In the cloud zombies are real: 11% of all enterprise SaaS accounts are “zombies,” inactive assigned users that are at best eating up the cost of a license, and at worst increase the attack surface of the organization. • More admins, more problems: Every administrative account represents a real and present risk to the enterprise. In some SaaS applications Adallom recorded an average of 7 administrators out of every 100 users. • 80% of companies have at least one former employee whose SaaS application credentials have not been disabled: De- provisioning continues to plague organizations, credential creep makes the problem unwieldy. • 19% of users bypass Identity and Access Management controls: Rebalancing the enterprise security portfolio from exclusively preventative controls to blended risk management based compensating controls is necessary. • 5% of an average company’s private files are publicly accessible: The productivity gains of SaaS adoption come at the cost of reduced legacy control effectiveness and purview, it’s time to refresh enterprise governance controls. • The average company shares files with 393 external domains: Accountability and liability for the distribution of enterprise data, especially privileged data continue to challenge IT in the cloud era. • 29% of employees share an average 98 corporate files with their personal email accounts: Personal sharing of enterprise data manifests both governance and security risks. • Think of the orphans: An average of 6% of files in cloud services are orphans. Of those, approximately 70% were created by users outside the company, and 30% by terminated employees or former contractors. • 37% of our customers discovered they stored more cloud data in Salesforce than any other cloud storage service: Although Salesforce has a secure storage layer, its information governance controls are limited. Copyright ©2014 Adallom Inc.
  • 3. 3 Introduction When it comes to the protection of enterprise data in the cloud, the SaaS providers’ focus is on security, not “risk”: SaaS providers’ investments in security are largely directed toward certifications, compliance and audits/testing of their infrastructure that all increase their “trustability” in the eyes of their customers. [1] It’s not reasonable to expect your SaaS provider to protect your users from malware or phishing attacks, even if those attacks specifically target their service. That’s not to say the provider won’t do everything within their power to help you - their security teams rank among the best, but they could never be accountable for the security posture of your organization or its employees. A recent Forrester survey found that a majority of IT decision makers placed accountability for a data breach on SaaS providers. [2] This is a misplacement, as in reality, companies are responsible for user activities and data, even in the cloud. According to the Cloud Security Alliance guidelines: “When data is transferred to a cloud, the responsibility for protecting and securing the data typically remains with the collector or custodian of that data.” [3] The Forrester survey findings clearly indicate that the broad IT community is still grappling with the boundaries between provider and customer liability. An example that may aid in edifying the shared responsibility model is a phishing attack which targeted Google Apps users discovered recently by security experts at BitDefender.[4] The attack employed the data URI feature to conceal the true origin of the phishing page. Once breached, attackers could have gained access to sensitive company data, including user emails, drive and company shared files. Furthermore, compromised accounts could be used to further infiltrate the affected company by sending phishing emails and infected emails from the compromised employee’s corporate email account. With access to a person’s Google account, attackers could cause a lot of damage very quickly – from compromising email and documents to expanding the attack to the victim’s social circle via email or social tools, like Google+. There is no doubt this kind of attack poses a great risk to enterprise data in the cloud; the problem lies in delineating accountability for mitigation should such an attack take place. In the aforementioned scenario, the Google Apps Terms of Service clearly state: “Customer will use commercially reasonable efforts to prevent unauthorized use of the Services and to terminate any unauthorized use. Customer will promptly notify Google of any unauthorized use of or access to the Services of which it becomes aware.” [5] The only reasonable interpretation of this clause is that the customer is expected to prevent unauthorized usage of the service. This clause encompasses most of the possible user attack scenarios, from identity theft (compromised insider) to internal threat Figure 1: Adallom Infographic (source: Forrester survey - “SaaS Adoption Requires a New Approach To Information Security”) Copyright ©2014 Adallom Inc.
  • 4. (malicious insider), as in the cloud everything falls under the broad definition of "unauthorized usage" because the “insider” is the attack vector. Specifically, the BitDefender phishing attack described above is classified as "unauthorized usage," and a Google Apps customer affected by it is liable for any damage caused while Google itself is indemnified. The fact that the majority of SaaS adopting companies do not understand they are responsible for SaaS security means that these companies are left unprotected and their data is at great risk. SaaS risk management is a very different competency, which is why Cloud Access Security Brokers are an important complement to the likes of endpoint and perimeter security controls. Adallom Labs has compiled the insights in this report from over a million users traversing through the Adallom service. In the cloud, zombies are real At Adallom, we refer to user accounts which haven’t been active over a period of three months as “zombies”. Not all zombies are bad – in some cases, such as sabbaticals, maternity leave, or disability – this inactivity is not unusual, but even in those cases there are best practices such as account suspensions that keep the user’s data active while preventing a would-be hijacker from taking over the account during the user’s absence. An inactive account does not only represent a security risk, it’s also a financial burden on the company. In many of the organizations we protect, we often see double digit percentages of zombies – these are licenses which the company is paying for even though they aren’t being used. The most dangerous kind of zombies are “Zombie Admins” – because privileged accounts are the preferred and most targeted attack vector for threat actors. A compromised account with administrative capabilities may allow an attacker to gain substantial access to valuable corporate information. Specifically, in administrative panels for cloud applications, a privileged account wields a lot of power. Figure 2: 11% of enterprise SaaS users are zombies that have access to the application, but have not been active for three months or longer 4Copyright ©2014 Adallom Inc.
  • 5. More admins, more problems Different cloud services have varied ratios of administrators to users. The higher the ratio, the greater the likelihood of one of those privileged users being a zombie admin. Figure 3: Percentage of privileged users to non-privileged users for SaaS applications Within our Adallom customer community, we find that Salesforce has the highest ratio of privileged users to non-privileged users. One of the biggest issues in cloud services is that these privileged users are often what we call “super admins” – meaning they have complete and unrestricted access to the service. A compromised “super admin” account represents a much greater threat to an organization because it has access not only to view and edit privileged data, but also to modify access rights of other privileged users. A well-documented recent example of such a scenario is Code Spaces:[6] The company’s Amazon EC2 control panel access credentials were compromised through a phishing attack. The attackers then made extortion demands of company officials. Upon realization that somebody had access to their administrative control panel, Code Spaces changed their EC2 passwords. However, they quickly discovered the attackers had created backup logins, and once recovery attempts were noticed, the attackers began deleting artifacts from the panel. By the time Code Spaces finally managed to get their panel access back, most of their data, backups, machine configurations and offsite backups were either partially or completely deleted. The Amazon Web Services administrative portal is itself delivered as-a-Service, much like the administrative portals of Google Apps, Box, Salesforce, and Office 365. Customers, not vendors, are responsible for risk management. While most enterprise SaaS providers have built-in support for two-factor authentication and IP restrictions that can be used with user accounts, sophisticated attackers can circumvent those controls through session hijacks and targeted malware. Using Adallom, one of our customers found over 100 Salesforce users with administrator privileges. We gave them visibility into which users were using administrative functions, and the users who were never actually logging in (the zombies). We worked with their sales operations team on enabling delegated admin user groups within Salesforce so that not every admin was a “super admin,” thus significantly reducing their attack surface. 5Copyright ©2014 Adallom Inc.
  • 6. 80% of companies have at least one former employee whose SaaS application credentials have not been disabled Enterprise user de-provisioning continues to be the dark side of an organization’s user access provisioning process. When it comes to removing access due to a changing job role or an employee (more often a contractor) departing the organization, IT is notified to revoke access through a semi-automated policy-driven process infamous for its gaps. Focusing attention on the problem and making executive management aware of the risks posed by having “orphaned” accounts within the organization’s business systems is a crucial component of a prudent risk management strategy. There is plenty of supporting evidence which documents the high costs to organizations through data loss, reputation and monetary costs due to errant user access management. [7] Fortunately, the de-provisioning threat has been reduced significantly through Identity and Access Management (IAM) tools such as Centrify, Okta, or Ping. Onboarding an IAM service is a best practice, but doing so should be complemented with Cloud Access Security Brokers. 19% of users bypass Identity and Access Management controls Although SaaS providers offer security features such as two factor authentication and IP restrictions, there are many ways for the security to fail. IAM and Single Sign-On tools go a long way toward centralized access control, but there are many mechanisms built in to standard user workflows that yield non-malicious circumvention. One example of consumer-driven circumvention are platform specific mobile apps that allow users to authenticate directly to the application. Another is direct access to the application through third party API. Neither of these scenarios necessarily represent malicious behavior by users; in some cases users are not even aware that they are bypassing the IAM mechanism. Unfortunately, in the event of a breach, circumvention does not move liability from the shoulders of the organization to the user. IT still has a responsibility to protect the integrity of the data in the services that power the business. [8] The challenge is how to function in the face of such disruptive forces. Changing the strategy is not just about satisfying employees. IT can also benefit. By embracing and aligning itself with a risk management model that accounts for circumvention, rather than maintaining the slower, provable inefficient pace of prevention- based security. While no perfect solution exists, a combination of third-party tools and attention to where data is stored can create a security environment sufficient to meet the assessed risk level of many organizations. 6Copyright ©2014 Adallom Inc.
  • 7. 7 5% of an average company’s files are publicly accessible by anyone on the internet There are several reasons private enterprise data unknowingly winds up publicly accessible: 1. The “anyone with this link” problem Ideally, to share a document with specific people, we expect users to share the file exclusively with the recipient’s email address. However, problems have arisen for users who would not (or could not) create an account on the file sharing service in question. These users were unable to access the shared documents. When the complaints began, savvy users gleaned a different security setting to solve the problem - sharing files using the ‘Anyone with the link’ setting. That works, but now anyone who had the link could share the link which makes documents easier to share, but less secure. 2. Enabling anonymous access and indexing (aka “crawlability”) Some SaaS applications allow search engines to index (or crawl) documents contained within them, and lack of awareness over the governance of search engine indexed documents has already made headlines several times over the past few years. [9] This functionality is usually globally controllable, and often disabled by default – but we are consistently surprised by the quantity of organizations that have public crawling enabled. Copyright ©2014 Adallom Inc.
  • 8. 8 3. Unnecessarily privileged third-party applications Enterprise SaaS providers often feature marketplaces for third party ecosystem applications built on their platform. Whether installed by administrators, or end users, these applications can request and be granted privileged access that allows them to upload, download, edit, and delete files and data. In the consumer space, there have already been scenarios where malicious ecosystem applications have tricked users into handing over access to privileged data [10] – and we are currently investigating several such apps in enterprise SaaS marketplaces. Governance over third party SaaS ecosystem application access becomes increasingly difficult as SaaS platforms intersect with each other. For example, there are already cross-platform third party applications that integrate services like Dropbox with Salesforce, or Google Drive with Huddle – meaning a compromised account in one cloud service could become an attack vector into another. It’s a best practice to know what third party ecosystem applications have access to enterprise data in the core platform, and develop a risk appetite strategy for the access privileges those apps are granted. The average company shares its files with 393 external domains Sharing files with third parties is an important and beneficial feature of enterprise SaaS applications, however there are risk ramifications that are concurrent with these benefits. Some SaaS providers install a local device agent in order to synchronize between user devices and the Web, which often means users are unaware of the full spectrum of data being synchronized to the SaaS provider. Inadvertent sharing is a real danger for enterprises with an increased uptake of services such as Office 365, Box and Google Drive. For governance and security purposes, it’s crucial to understand where corporate files are stored and who they are being shared with. Malicious threat actors have already used malicious file sharing with employees as a successful attack vector for malware distribution, clandestinely exploiting file sharing as a mechanism for gaining access to enterprise resources.[11] Copyright ©2014 Adallom Inc.
  • 9. 9 Adallom assigns risk scores to external domains based on a comprehensive heuristic scale, including factors such as their Alexa score, whether any Adallom subscriber has ever interacted with them, when they registered, and the sensitivity of the data being shared relative to the risk score of the domain it’s being shared with. 29% of employees share an average 98 corporate files with their personal email accounts Personal sharing can happen unintentionally via the aforementioned sync agents – for example, employees who use Google Drive for personal as well as enterprise storage may have their data segregated in the cloud but integrated on their local device, such that when they move files from one folder to another on the local device, corporate files accidentally sync to their personal Google Drive in the cloud. When personal sharing is intentional, the act is rarely malicious. In fact, we consistently see “malicious insiders” as the least likely scenario for data exfiltration. In some cases, personal sharing of corporate data is done for productivity purposes (sometimes at the expense of data governance policy circumvention). For example, many Office 365 users prefer editing a document in a local version of Word 2013 over of Word Online. Any variety of personal sharing manifests both governance and security risks. [12] Once corporate data is moved to a user’s personal cloud or physical drive, any attestation, DLP, or eDiscovery controls become largely moot. Encryption is often thought of as a solution to this problem, but third party encryption tools are given more gravitas than they deserve. The theory is that only authorized personnel and programs see decrypted information. But encryption controls are not designed to know if the user has been compromised or has granted someone else access to the key. Most enterprise SaaS providers encrypt data in transit as it flows between their data centers and user devices, as well as “at rest” on their servers. Those providers who aren’t doing so are certainly moving in that direction, and can be persuaded to move faster by their customers (a good use of your time!). Beyond vendor provided encryption, the focus in SaaS should be attestation, not encryption. What’s needed is a clear and actionable audit trail of all user activities in SaaS applications with direct correlation to which data - structured and unstructured - has been exchanged, shared, or otherwise interacted with. Excerpt from an Adallom Risk Assessment Report Copyright ©2014 Adallom Inc.
  • 10. 10 Think of the orphans Previously in this report, we discussed the notion of “orphan” users whose accounts persist beyond their termination. However, “orphaned” files are an entirely different risk that is often unseen or overlooked in the enterprise. Orphan files are files that have no owner. This can happen when files are owned by users or groups that have been deleted. It can also happen when external users share files with internal users through temporary access on the corporate sanctioned SaaS drive. Among our customers, an average of 6% of files in cloud services are orphans. When we research their origin, we find that approximately 70% were created by users outside the company, and 30% by terminated employees or former contractors. Figure 4: Average of 6% of files in Adallom cloud services are orphans which have no owners The danger of having a file or folder owned by a non-existent user or group ID is that someday, that user or group ID could be assigned to a newly created user or group, members of which would be automatically able to access the file. Orphan files also create a governance problem because they don’t have a clear provenance and attestation trail, which means that they might violate retention policies. In the event of an eDiscovery query or regulatory compliance audit, orphan files could be troublesome, especially if they contain privileged data. [13] Adallom provides a “single pane of glass” view into orphan files across SaaS services and can be used to establish origin, age, and ownership along with governance capabilities that allow proper custodianship and control. 37% of our customers discovered they stored more cloud data in Salesforce than anywhere else. Figure 5: More data is stored in Salesforce than any other SaaS application, including corporate-approved cloud storage services Copyright ©2014 Adallom Inc.
  • 11. 11 In many cases, even ostensibly well-governed organizations overlook critical risks.[14] For example, one of our customers, prior to engaging with us, had spent nearly a full year on a Shadow IT control project intended on standardizing their enterprise file storage, sharing, and sync on a single sanctioned vendor – Box. However, shortly after deploying Adallom, the security team found that although employees had largely standardized on Box for file storage, nearly forty percent of their enterprise files in the cloud were stored in Salesforce. They had simply never considered Salesforce, an enterprise SaaS vendor that was sanctioned for CRM, as a cloud storage provider. Although Salesforce has a storage layer, its information governance controls are limited. For example, it’s impossible to create a DLP policy for data in Salesforce without using a third party solution. So while it’s obvious that the Salesforce platform can be trusted with data retention, when it comes to managing files inside of Salesforce, it’s a best practice to integrate an enterprise storage governance solution from the Salesforce AppExchange. Consider Box for Salesforce for governance, along with a Cloud Access Security Broker for risk management, such as Adallom for Salesforce. Takeways On Protecting SaaS Applications “A whopping 92% of respondents to our survey indicated a belief that their existing security controls are either effective or very effective in protecting their digital assets in SaaS applications,” wrote Andras Cser, Forrester VP, Principal Analyst Serving Security & Risk Professionals. “Unfortunately, security professionals with this mindset are rolling the dice with their sensitive data. Perimeter and endpoint protections provide minimal protection against new, emerging, and largely unknown threats; they are ineffective when the endpoint is unmanaged and off premise.” [2] Being prepared means understanding organizational accountability for protecting enterprise data in SaaS applications, and adding a Cloud Access Security Broker to a prudent defense-in-depth architecture; which is why we emphasize the proactive service component of our cloud security solution. Adallom not only provides the visibility, governance, and protection capabilities of our platform, but we act as an extension of our customers’ security and risk management teams. This gives them actionable insights into compliance risks and external threats, as well as engages business units in their organization to jointly improve the company’s cloud security posture. Source: “SaaS Adoption Requires A New Approach To Information Security,” Forrester Consulting, 2014 Figure 6: More data is stored in Salesforce than any other SaaS application, including corporate-approved cloud storage services Copyright ©2014 Adallom Inc.
  • 12. 12 HQ 2390 El Camino Real, Suite 240 Palo Alto, CA 94306 +1 (650) 268-8322 R&D Habarzel 21 Street, Building B Tel Aviv, 6971001 Israel www.adallom.com References [1] S. Deshpande, N. MacDonald and C. Lawson, “Emerging Technology Analysis: Cloud Access Security Brokers,” Gartner, 2014. [2] A. Cser, “SaaS Adoption Requires A New Approach To Information Security,” Forrester Consulting, 2014. [3] F. Gilbert, P. Jones Harbour, D. Kessler, S. Ross and T. Trappler, “CSA Security Guidance Domain 3: Legal Issues: Contracts and Electronic Discovery,” Cloud Security Alliance, 2011. [4] S. Ragan, “Phishing attack uses data URI to target Google accounts,” 13 May 2014. [Online]. Available: http://www.csoonline.com/ article/2154202/social-engineering/phishing-attack-using-data-uris-to-target-google-accounts.html. [5] Google, Inc., “Google Apps for Business (Online) Agreement,” 22 July 2014. [Online]. Available: http://www.google.com/apps/intl/ en/terms/premier_terms.html. [Accessed 8 October 2014]. [6] AbleBots, LLC, “Code Spaces : Is Down!,” Code Spaces, 17 June 2014. [Online]. Available: http://www.codespaces.com. [Accessed 7 September 2014]. [7] A. Allan and F. Gaehtgens, “Align Your IAM Program With Your CIO’s Priorities,” Gartner, 2014. [8] S. Chuang and D. Zumerle, “Managing Mobile Access to the Cloud,” Gartner, 2013. [9] D. Gilbert, “Dropbox and Box Users Accidentally Leaking Private Files Online,” 6 May 2014. [Online]. Available: http://www.ibtimes. co.uk/dropbox-box-users-accidentally-leaking-private-files-online-1447352. [10] L. Constantin, “More fake antivirus programs found in Google Play, Windows Phone Store,” IDG News Service, 16 May 2014. [Online]. Available: http://www.pcworld.com/article/2156300/more-fake-antivirus-programs-found-in-google-play-windows- phone-store.html. [11] A. Gonsalves, “What to avoid in Dropbox-related phishing attack,” 6 June 2014. [Online]. Available: http://www.csoonline.com/ article/2360670/malware-cybercrime/what-to-avoid-in-dropbox-related-phishing-attack.html. [12] T. McClure and K. Kao, “Security Considerations for Online File Sharing,” Enterprise Strategy Group (ESG), 2013. [13] S. Krapes, “Use IAM Life Cycle Policies to Enforce Account Disabling and Deletion,” Gartner, 2014. [14] R. Mogull, “The Future of Security: The Trends and Technologies Transforming Security,” Securosis, 2014. Copyright ©2014 Adallom Inc.