Confidential
Managing the
Security of Your
SaaS and Cloud
Providers
1
The Guide to
Confidential
Why
Manage
Your Cloud
and SaaS
Providers
● Increase in Cloud apps
○ The average organization increased its usage of cloud
services by 15% from last year.*
○ The amount of sensitive data shared in the cloud has
increased 53% YoY.*
● Shadow IT
○ In 10 years, 90% of IT dollars will be spent outside of the IT
organization.**
● Providers as a threat vector
○ 59% of organizations experienced a data breach caused by
one of their third-parties.***
● (Lots of) New Regulations
○ GDPR, NY DFS, NY-SHIELD, CCPA, Hawaii, Maryland,
Massachusetts, Mississippi, Nevada, New Mexico, New
Jersey, North Dakota, Rhode Island, Texas and Washington.
2
* Cloud Adoption and Risk Report, McAfee, 2019
** Three Benefits of Shadow IT - and How to
Harness Them, ServerCentral
*** Data Risk in the Third-Party Ecosystem,
Ponemon, Nov. 2018
Confidential
Traditional Cyber
Security Vendor
Management
3
● One size fits all
● Questionnaires, anyone?
Confidential
There MUST Be a Better Way
4
Confidential
Polling
Question
For cloud and SaaS providers
that you assess, do you use
questionnaires?
○ Yes
○ No
5
Confidential
The
Problems
with
Tradition
1. There’s no context to the questionnaires
2. You don’t have the resources to scale to demand
3. You don’t know the real security state of your
providers on Day 1, let alone on Day 60.
4. The provider has a security gap… what do you do?
6
Confidential
How Does
the Provider
See It?
7
The 10 excuses of
providers
Confidential
How Does
the Provider
See It?
8
The 10 excuses of
providers
1. The dog ate my questionnaires
2. The font was too small
3. You sent it as a Google sheet? We restrict access to Drive.
4. It was sent as an attachment. Must’ve been filtered out.
5. The questionnaire never got to the right person
6. The questionnaire was too long
7. The questionnaire has nothing to do with my business
8. If I ignore, will you really not hire me?
9. I found an issue, what do we do?
10.Our technical manager went on vacation. Already a year ago.
Confidential
It’s 2020
and You’re Still Using
Manual Questionnaires.
Confidential
Is Automation
the Answer
to All the
Problems?
NO!
10
1. You need context
2. You need visibility
3. No more providers excuses
Confidential
Issue #1
You Need
Context
Define the relationship - Consider*:
● Business sponsors
● Which data is involved
● How the data flows
● What you’re using the data for
● Who will have access
● Do they use sub-contractors
11
* Defined by Ron Peled, former CISO, LivePerson, founder ProtectOps Security
For more info, see here: https://blog.panorays.com/context-in-your-third-party-security-process
Confidential
● Analogy: If a a restaurant has dirty windows,
how clean do you think the kitchen will be?
● Combine questionnaires with external scanning
for an in-depth read on the company’s cyber
posture
● Effective tool for continuous monitoring
● Review on a policy-driven cadence
12
Issue #2
You Need
Visibility
Confidential
Polling
Question
What kind of monitoring
process do you have in place?
○ None
○ Repeat reviews
○ Vendor self-reporting
○ Scanning
13
Confidential
Issue #1
You Need Your
Providers to
Stop Giving You
Excuses
● Give context also to your suppliers
Make questionnaires as short and relevant as
possible, based on business relationship
● Give your suppliers an understandable, actionable
remediation plan
14
Remediation Recommendations
Fair > Very Good
Fastest Impact:
The supplier needs to remediate 2 critical findings:
Make sure that an open external database is closed.
Make sure that an open DNS zone transfer is closed.
Confidential
Polling
Question
How do you share findings with your
providers?
○ We don’t share findings
○ We communicate on them via email
○ We communicate through a
dedicated risk platform
15
Confidential
Building
Your
Program
Confidential
Step by Step
to Building
Your Program
1. Identify stakeholders
2. Define tiers for the provider portfolio
Inherent risk profile based on unique business relationship
Define the security policy for each tier
3. Define the standard of care for each tier
Review methodology
Frequency of repeat reviews
There’s an alert… what to do?
4. Focus on providers that don’t adhere to policy
Remediate?
Implement compensating internal controls?
Fire them?
17
Confidential
The Effective &
Comprehensive
Program
Confidential
1. Analysis
2. Engagement
3. Remediation
Vendor doesn’t respond -> Compensating controls on
your end (for instance, less access, portal on your end)
4. Approval
5. Monitoring
Add KPIs, historical graphs and benchmarks:
Sell the benefits your program internally
19
Step by Step to a
Comprehensive
Program
Confidential
Summary
Confidential
Case Study
Sell Your
Program
Internally
● Insurance company, assessing 200 providers.
● CISO built a provider security program:
○ Kickoff: align Board of Directors on the need for provider
security management.
○ Each quarter: CISO leverages the Board meeting to include
dashboard on the state of provider cyber-security:
■ How many are critical
■ What is the risk
■ How to ensure providers increase security
■ Compensating controls to decrease risk
● Meeting also sets a bar to the organization’s own security
posture.
● Self risk assessment leads to a discussion on budget and
strategy that the Board is aligned to.
● Organization sees themselves also as providers and so boasts
their own cyber posture to their business partners.
21
Confidential
22
Automated
Third-Party
Security
Lifecycle
Management

More Related Content

PDF
Digital crimescene emv_update_nrfprotect17_skipmyersbethprovenzano_final061217
PDF
2017 U.S. State of Cybercrime
PPTX
Managing security risks in today's digital era
PPTX
Containing the outbreak: The healthcare security pandemic
PDF
Outpost24 webinar - Improve your organizations security with red teaming
PPTX
A Hacker's perspective on ransomware
PPTX
10 web application security best practices for 2020
PDF
20180528 reflex presentation
Digital crimescene emv_update_nrfprotect17_skipmyersbethprovenzano_final061217
2017 U.S. State of Cybercrime
Managing security risks in today's digital era
Containing the outbreak: The healthcare security pandemic
Outpost24 webinar - Improve your organizations security with red teaming
A Hacker's perspective on ransomware
10 web application security best practices for 2020
20180528 reflex presentation

What's hot (9)

PDF
9 September 2014: Cyber Security Model
PDF
Google: The future of apps is web
PDF
Risk Management Metrics That Matter
PDF
Threat Intelligence Tweaks That'll Take Your Security to the Next Level
PDF
GBS - Prevent network security fires
PDF
Pitfalls of Cyber Data
PPTX
Preparing for the Inevitable
PDF
Its time to grow up by Eric C.
PPTX
Preventing Information Flow with Jeeves - Singapore Data Privacy Workshop
9 September 2014: Cyber Security Model
Google: The future of apps is web
Risk Management Metrics That Matter
Threat Intelligence Tweaks That'll Take Your Security to the Next Level
GBS - Prevent network security fires
Pitfalls of Cyber Data
Preparing for the Inevitable
Its time to grow up by Eric C.
Preventing Information Flow with Jeeves - Singapore Data Privacy Workshop
Ad

Similar to The Guide to Managing the Security of Your SaaS and Cloud Providers (20)

PDF
BSidesSF talk: Silver lining for security teams in data protection clouds
PPTX
The State Of Information and Cyber Security in 2016
PPT
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
PDF
A successful GDPR Program
PDF
TrustArc Webinar - Cross-Border Data Transfers in 2025: Regulatory Changes, A...
PDF
2016 Global data valuation survey
PDF
Implementing and Auditing General Data Protection Regulation
PDF
Master Data in the Cloud: 5 Security Fundamentals
PDF
Data Security for MSME
PPTX
Cloud cpr uncc cloud computing conference 2013
PDF
Cyber Rangers S1 E2
PPTX
PrivIQ Product Overview Plataforma de Compliance LGPD
PDF
GDPR Series Session 4
PPTX
Introducing data driven practices into sales environments
PDF
Creating a GDPR Action Plan; Not a Freakout Plan
PPTX
Ciso round table on effective implementation of dlp & data security
PPTX
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
PDF
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
PDF
5 things digital media companies need to do now
PDF
How To Harness First-Party Data & Win In A Cookieless Future
BSidesSF talk: Silver lining for security teams in data protection clouds
The State Of Information and Cyber Security in 2016
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
A successful GDPR Program
TrustArc Webinar - Cross-Border Data Transfers in 2025: Regulatory Changes, A...
2016 Global data valuation survey
Implementing and Auditing General Data Protection Regulation
Master Data in the Cloud: 5 Security Fundamentals
Data Security for MSME
Cloud cpr uncc cloud computing conference 2013
Cyber Rangers S1 E2
PrivIQ Product Overview Plataforma de Compliance LGPD
GDPR Series Session 4
Introducing data driven practices into sales environments
Creating a GDPR Action Plan; Not a Freakout Plan
Ciso round table on effective implementation of dlp & data security
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
5 things digital media companies need to do now
How To Harness First-Party Data & Win In A Cookieless Future
Ad

More from DevOps.com (20)

PDF
Modernizing on IBM Z Made Easier With Open Source Software
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
PPTX
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
PDF
Next Generation Vulnerability Assessment Using Datadog and Snyk
PPTX
Vulnerability Discovery in the Cloud
PDF
2021 Open Source Governance: Top Ten Trends and Predictions
PDF
A New Year’s Ransomware Resolution
PPTX
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
PDF
Don't Panic! Effective Incident Response
PDF
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
PDF
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
PDF
Monitoring Serverless Applications with Datadog
PDF
Deliver your App Anywhere … Publicly or Privately
PPTX
Securing medical apps in the age of covid final
PDF
How to Build a Healthy On-Call Culture
PPTX
The Evolving Role of the Developer in 2021
PDF
Service Mesh: Two Big Words But Do You Need It?
PPTX
Secure Data Sharing in OpenShift Environments
PPTX
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
PDF
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Modernizing on IBM Z Made Easier With Open Source Software
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Next Generation Vulnerability Assessment Using Datadog and Snyk
Vulnerability Discovery in the Cloud
2021 Open Source Governance: Top Ten Trends and Predictions
A New Year’s Ransomware Resolution
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Don't Panic! Effective Incident Response
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Monitoring Serverless Applications with Datadog
Deliver your App Anywhere … Publicly or Privately
Securing medical apps in the age of covid final
How to Build a Healthy On-Call Culture
The Evolving Role of the Developer in 2021
Service Mesh: Two Big Words But Do You Need It?
Secure Data Sharing in OpenShift Environments
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Hybrid model detection and classification of lung cancer
PDF
Zenith AI: Advanced Artificial Intelligence
DOCX
search engine optimization ppt fir known well about this
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
August Patch Tuesday
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPT
Geologic Time for studying geology for geologist
PPT
What is a Computer? Input Devices /output devices
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Architecture types and enterprise applications.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
Enhancing emotion recognition model for a student engagement use case through...
O2C Customer Invoices to Receipt V15A.pptx
Hybrid model detection and classification of lung cancer
Zenith AI: Advanced Artificial Intelligence
search engine optimization ppt fir known well about this
observCloud-Native Containerability and monitoring.pptx
Developing a website for English-speaking practice to English as a foreign la...
August Patch Tuesday
Benefits of Physical activity for teenagers.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
WOOl fibre morphology and structure.pdf for textiles
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Geologic Time for studying geology for geologist
What is a Computer? Input Devices /output devices
A review of recent deep learning applications in wood surface defect identifi...
DP Operators-handbook-extract for the Mautical Institute
Architecture types and enterprise applications.pdf
Hindi spoken digit analysis for native and non-native speakers
From MVP to Full-Scale Product A Startup’s Software Journey.pdf

The Guide to Managing the Security of Your SaaS and Cloud Providers

  • 1. Confidential Managing the Security of Your SaaS and Cloud Providers 1 The Guide to
  • 2. Confidential Why Manage Your Cloud and SaaS Providers ● Increase in Cloud apps ○ The average organization increased its usage of cloud services by 15% from last year.* ○ The amount of sensitive data shared in the cloud has increased 53% YoY.* ● Shadow IT ○ In 10 years, 90% of IT dollars will be spent outside of the IT organization.** ● Providers as a threat vector ○ 59% of organizations experienced a data breach caused by one of their third-parties.*** ● (Lots of) New Regulations ○ GDPR, NY DFS, NY-SHIELD, CCPA, Hawaii, Maryland, Massachusetts, Mississippi, Nevada, New Mexico, New Jersey, North Dakota, Rhode Island, Texas and Washington. 2 * Cloud Adoption and Risk Report, McAfee, 2019 ** Three Benefits of Shadow IT - and How to Harness Them, ServerCentral *** Data Risk in the Third-Party Ecosystem, Ponemon, Nov. 2018
  • 3. Confidential Traditional Cyber Security Vendor Management 3 ● One size fits all ● Questionnaires, anyone?
  • 4. Confidential There MUST Be a Better Way 4
  • 5. Confidential Polling Question For cloud and SaaS providers that you assess, do you use questionnaires? ○ Yes ○ No 5
  • 6. Confidential The Problems with Tradition 1. There’s no context to the questionnaires 2. You don’t have the resources to scale to demand 3. You don’t know the real security state of your providers on Day 1, let alone on Day 60. 4. The provider has a security gap… what do you do? 6
  • 7. Confidential How Does the Provider See It? 7 The 10 excuses of providers
  • 8. Confidential How Does the Provider See It? 8 The 10 excuses of providers 1. The dog ate my questionnaires 2. The font was too small 3. You sent it as a Google sheet? We restrict access to Drive. 4. It was sent as an attachment. Must’ve been filtered out. 5. The questionnaire never got to the right person 6. The questionnaire was too long 7. The questionnaire has nothing to do with my business 8. If I ignore, will you really not hire me? 9. I found an issue, what do we do? 10.Our technical manager went on vacation. Already a year ago.
  • 9. Confidential It’s 2020 and You’re Still Using Manual Questionnaires.
  • 10. Confidential Is Automation the Answer to All the Problems? NO! 10 1. You need context 2. You need visibility 3. No more providers excuses
  • 11. Confidential Issue #1 You Need Context Define the relationship - Consider*: ● Business sponsors ● Which data is involved ● How the data flows ● What you’re using the data for ● Who will have access ● Do they use sub-contractors 11 * Defined by Ron Peled, former CISO, LivePerson, founder ProtectOps Security For more info, see here: https://blog.panorays.com/context-in-your-third-party-security-process
  • 12. Confidential ● Analogy: If a a restaurant has dirty windows, how clean do you think the kitchen will be? ● Combine questionnaires with external scanning for an in-depth read on the company’s cyber posture ● Effective tool for continuous monitoring ● Review on a policy-driven cadence 12 Issue #2 You Need Visibility
  • 13. Confidential Polling Question What kind of monitoring process do you have in place? ○ None ○ Repeat reviews ○ Vendor self-reporting ○ Scanning 13
  • 14. Confidential Issue #1 You Need Your Providers to Stop Giving You Excuses ● Give context also to your suppliers Make questionnaires as short and relevant as possible, based on business relationship ● Give your suppliers an understandable, actionable remediation plan 14 Remediation Recommendations Fair > Very Good Fastest Impact: The supplier needs to remediate 2 critical findings: Make sure that an open external database is closed. Make sure that an open DNS zone transfer is closed.
  • 15. Confidential Polling Question How do you share findings with your providers? ○ We don’t share findings ○ We communicate on them via email ○ We communicate through a dedicated risk platform 15
  • 17. Confidential Step by Step to Building Your Program 1. Identify stakeholders 2. Define tiers for the provider portfolio Inherent risk profile based on unique business relationship Define the security policy for each tier 3. Define the standard of care for each tier Review methodology Frequency of repeat reviews There’s an alert… what to do? 4. Focus on providers that don’t adhere to policy Remediate? Implement compensating internal controls? Fire them? 17
  • 19. Confidential 1. Analysis 2. Engagement 3. Remediation Vendor doesn’t respond -> Compensating controls on your end (for instance, less access, portal on your end) 4. Approval 5. Monitoring Add KPIs, historical graphs and benchmarks: Sell the benefits your program internally 19 Step by Step to a Comprehensive Program
  • 21. Confidential Case Study Sell Your Program Internally ● Insurance company, assessing 200 providers. ● CISO built a provider security program: ○ Kickoff: align Board of Directors on the need for provider security management. ○ Each quarter: CISO leverages the Board meeting to include dashboard on the state of provider cyber-security: ■ How many are critical ■ What is the risk ■ How to ensure providers increase security ■ Compensating controls to decrease risk ● Meeting also sets a bar to the organization’s own security posture. ● Self risk assessment leads to a discussion on budget and strategy that the Board is aligned to. ● Organization sees themselves also as providers and so boasts their own cyber posture to their business partners. 21

Editor's Notes

  • #2: DEMI
  • #3: DOV. Bubble metaphor Hearing from people – privacy regs
  • #4: DOV
  • #5: DOV
  • #6: DOV
  • #7: DOV. Point #2: You’re one person and hundreds/ thousands of vendors
  • #8: DOV
  • #9: DOV
  • #10: DEMI
  • #11: DEMI
  • #12: DEMI - Business Sponsors have information you (the IT Risk pro) need in order to understand context
  • #13: DEMI Tier vendors based on risk/criticality – drives the frequency (cadence) of re-reviews Stay in touch with business sponsor – relationship might have changed!
  • #14: DOV
  • #15: DEMI
  • #16: DOV
  • #17: DEMI
  • #18: DOV
  • #19: DOV
  • #20: DOV
  • #21: DEMI
  • #22: CISO built a provider security program: Kickoff: align Board of Directors on the need for provider security management. Each quarter: CISO presents a 2-3 hour 100-page deck on the security state of the organization CISO leverages the meeting to present dashboard on the state of provider cyber-security: How many are critical What is the risk How does the organization ensure the providers increase security Compensating controls to decrease risk Sets a bar also to their own security posture. Going above and beyond the rating threshold they set for the providers Self risk assessment leads to a discussion on budget and strategy that the Board is aligned to. Organization sees themselves also as vendors and so boasts also on their own cyber posture beyond internal tests DEMI
  • #23: DOV