top of page
Writer's pictureMartin Snyder

The News You Don’t Want on Monday: SaaS Security Edition



Background: A large financial institution, renowned for its strict compliance and data security standards, carefully vets all software applications to prevent any data exposure risks. However, as employees became more reliant on SaaS tools, an increasing number of unapproved services began creeping into their workflows. The institution’s IT team had visibility over officially approved tools but struggled to keep track of all new subscriptions, especially those adopted at the department level without formal IT approval.


The Incident

The incident began within the institution’s marketing team, where employees were seeking faster ways to collaborate and share information on upcoming campaigns. One team member, hoping to streamline processes, signed up for a free file-sharing service without notifying IT. The tool allowed the team to share large client documents and financial projections easily, and it quickly became an unofficial part of their workflow.

This “shadow SaaS” tool was neither authorized nor reviewed by the security and compliance teams, and it lacked essential security features like encryption and multifactor authentication. Over time, sensitive client data, including personal financial information, was stored and shared through the tool, entirely outside the purview of the institution’s security and compliance controls.


Pain Points and Consequences

Months later, during a routine security audit, IT discovered traffic linked to the file-sharing service. After investigation, they uncovered a host of issues:

  1. Data Exposure: Sensitive client data, including financial records, was found on the platform with no encryption. The service’s weak security controls exposed the data to unauthorized access and potential leaks.

  2. Compliance Violation: The financial institution had strict regulations, including SOC 2 and PCI DSS requirements, for managing client data. This unapproved tool did not meet these standards, putting the institution in breach of regulatory requirements and risking hefty fines.

  3. Operational Disruption: The IT and compliance teams had to manually secure the data and revoke access, leading to delays across projects and a costly investigation into whether client data had been compromised.


Lessons Learned and Remediation

To prevent future incidents, the institution took several corrective measures:

  • Automated SaaS Discovery: They implemented tools to detect new SaaS applications on their network, giving IT visibility over unapproved tools.

  • Employee Training: Teams received enhanced training on the risks of using unauthorized software and the importance of vetting all SaaS tools through IT.

  • Enhanced Offboarding and Monitoring: The institution strengthened its data tracking and SaaS approval workflows, ensuring every tool had proper security oversight.


This incident underscored the significant risks of shadow SaaS in highly regulated sectors. The lack of oversight over a single tool exposed the institution to compliance violations, potential data breaches, and operational headaches, emphasizing the need for continuous monitoring and strict SaaS governance.

1 view0 comments

Comentários


bottom of page