The It Leader'S Checklist For Saas Operations
The It Leader'S Checklist For Saas Operations
The It Leader'S Checklist For Saas Operations
Interactions are simply the actions your users take in those SaaS apps; they’re the processes
users perform, the people they interact with, as well as the data they interact with. User
interactions lead to an ever-growing data sprawl, which in turn increases risks of human error and
negligence.
This is why managing and securing the modern enterprise is no easy feat. To get a handle on
your SaaS operations, or SaaSOps for short, some key best practices can help.
Use this handy checklist to start tackling the challenge, and steer your SaaS operations to secure
and efficiently manage your digital workplace.
SaaSOps noun
: an IT practice referring to how software-as-a-service (SaaS) applications are
managed and secured through centralized and automated operations (Ops),
resulting in reduced friction, improved collaboration, and better employee
experience
SaaSOps has three essential pillars. First, it’s about people and processes. Without the right
processes manned by the right team, the remaining pillars are more challenging.
Besides people and processes, SaaSOps is made of two inseparable components: SaaS
management and SaaS security. SaaS must be managed with regard to security. And conversely,
SaaS must be secured with regard to how it’s managed.
These checklist items, while by no means exhaustive, will get you started on how you can
run IT the SaaSOps way.
Experience with SaaS app performance monitoring, incident response, and auditing
Ability to proactively build relationships with other teams and stakeholders across the
business
SaaS app testing with small groups of employees to identify common trouble spots
Ensuring users know how to get the most out of collaboration tools
Ensuring users know meaning of alerts and notifications of potential security violations
Strong passwords
Change management plans according to the nature of the new SaaS app; if it’s a complete
switchover from one tool to a replacement that some may resent, get top management to
announce the change
Change, validation, and deployment standardization and automation for fast, efficient
handling of all IT infrastructure or SaaS environment changes to minimize impact on service
delivery
3. Application configuration
5. Spend management
TIP:
As part of the onboarding • What policies you have, why you have them, and best practices.
process, set up an “IT welcome” • What technological and IT resources are available to them.
meeting with new employees • If there are certain features of SaaS apps that everybody needs to
on their first day. This is a good know how to use, walk them through it.
opportunity to explain:
Keep it short—20 mins is great!
Part-time employees, temporary Lock the user out of the account (e.g.,
workers, seasonal workers reset password)
Back up data
Delete account
TIP:
To learn more about the
essential steps of a perfect
offboarding workflow, check
out Offboarding Employees:
The Ultimate Checklist for
Modern IT Professionals.
All users, groups, and files across SaaS apps and instances
TIP:
G Suite add-ons installed by users
Review any dependencies tied to
specific users and/or accounts.
Office 365 add-ins installed by users This visibility helps you discover
what SaaS systems and processes
will break if an account is
suspended or the user
Spikes in failed user logins leaves the organization.
Users who have not logged into SaaS apps in 30/60/90 days (i.e., inactive licenses)
TIP:
Audit your existing webhooks and scripts. It’s a good idea to know where they live, who’s managing them,
and how they’re hosted.
Email lists
Web forums
Q&A forums
Collaborative inboxes
Granular user access roles for minimum privileges necessary for job
2. Insider threats
3. File security
4. Incident response
5. Regulatory compliance
Once again, each component has its own best practices checklist. While security practices change
with evolving threats, a checklist can almost never be exhaustive. However, the checklist in each
section provides a good starting point.
MFA deployment
Suspicious activity related to data theft, like unusually large file downloads within a short
time period
Email forwarding from specific users to email addresses outside your domain
Sensitive folder paths, like accounting or finance, being publicly or externally shared
Specific file types being publicly or externally shared (e.g., spreadsheets and PDFs are more
likely to contain sensitive information)
Users who should no longer have access to specific files, folders, calendars, etc. (e.g.,
consultants, interns, employees who’ve switched
teams)
Payment information
TIP:
Passwords Create a dedicated IT email group
or Slack channel to centralize
Intellectual property (IP) or trade secrets relevant, actionable, and
important alerts.
Encryption keys
Keywords that may signal sensitive information, like “Confidential” or “Internal Use Only”
Defining the criteria for security incidents and thresholds (e.g., exposure of confidential
financial data)
Orchestrated and automated remediation across integrated systems (e.g., SIEM, EMM,
ITSM)
Having detailed audit logs of user and admin actions for proof of compliance
Setting up automated policies for specific regulatory compliance standards (e.g., HIPAA,
PCI, and GDPR)
Detecting, and remediating, sensitive data exposure and excess admin privileges to ensure
compliance
Once you’ve assessed your environment, you can work on a longer-term strategic SaaSOps plan
that aligns with business goals and policies. With this, not only can you demonstrate that IT is a
value driver and engaged business partner, but you’ll also ensure that your organization is set up
for success in the digital workplace.
Looking for more SaaSOps info? Check out www.bettercloud.com/saasops/ for in-depth webinars,
books, success stories from SaaSOps practitioners, and more.
About BetterCloud
BetterCloud is the first provider of SaaSOps solutions to manage and secure the digital workplace.
Over 2,500 customers in 60+ countries rely on BetterCloud to automate processes and policies
across a company’s SaaS application portfolio. BetterCloud is headquartered in New York City with
offices in San Francisco, CA and Atlanta, GA.
BetterCloud has offboarded 1 million users and secured 5 billion files to date. To learn more about
how BetterCloud can help you manage and secure your SaaS apps, request a demo.
API
Known as Application Programming Interface, it specifies how software components interact, allowing
two applications to communicate with each other.
API frameworks
A collection of APIs that make application creation easier and faster by providing reusable components.
Application configuration
Refers to the management of user, group, and file settings/controls. This can apply to the initial configura-
tion of these settings (e.g., when an organization adopts a new SaaS application) or ongoing management,
like detecting and remediating when changes and misconfigurations are made to settings in an existing
application.
Auditability
Ability to control, track, and view changes made by administrators. It is critical for security coverage and
regulatory compliance.
Authentication
Process to grant access to apps by verifying that users are who they claim to be. Authentication solves the
first order problem: identity/access.
Authorization
Process to grant access to specific SaaS data, configurations, resources, or functions. Authorization solves
the second order problem: user interactions.
EMM
Enterprise Mobility Management (EMM) is an enterprise solution to distribute, manage, and secure
mobile endpoints, such as phones, tablets, and laptops that are used by employees.
File security
Process to protect the most sensitive data stored in files across your SaaS apps, including customer
data, employee data, company IP, etc. It protects files within SaaS applications from being leaked,
inappropriately shared, or downloaded to user’s computers for unauthorized use.
Heterogeneous environment
A best-of-breed approach that allows organizations to pick and choose cloud applications that best
suit their needs, as opposed to keeping with a single vendor.
Homogeneous environment
An approach in IT where organizations standardize on solutions from a single vendor.
IAM
Identity and access management (IAM) refers to policies and technologies
that ensure users have appropriate access to apps at the right time.
IDaaS
Identity-as-a-service (IDaaS) refers to cloud-based identity and access
management services that are offered on a subscription basis.
Incident response
Umbrella term for activities where an organization recognizes and responds
to an event. The purpose is to gather the information required to make
educated decisions about how to deal with a specific event and act
upon the information gathered.
Insider threat
A current or former employee, contractor, or business partner who has access to an organization’s
network, systems, or data and is either:
• Compromised (exploited by outsiders through compromised credentials)
• Malicious (intentionally causes harm, either for personal or financial gain)
• Negligent (well-meaning, but accidentally exposes sensitive information)
MFA
Multi-factor authentication (MFA) is the process of granting access to SaaS and IT resources after a user
successfully gives two or more pieces of evidence that confirms their identity.
SaaS
Software-as-a-service (SaaS) is a method of software delivery and licensing in which software is accessed
online via a subscription.
SIEM
Security Information and Event Management (SIEM) refers to the real-time analysis of security alerts from
SaaS applications, IT, and network infrastructure.
SaaS management
Process of managing onboarding, offboarding, and app configurations across SaaS apps. Core tenets of
SaaS management include visibility across apps as well as the ability to audit admin activity and enforce a
least privilege model. SaaS management ensures that users have the right access to the right data at the
right time.
SaaS Operations
An IT practice referring to how software-as-a-service (SaaS) applications are managed and secured
through centralized and automated operations (Ops), resulting in reduced friction, improved collaboration,
and better employee experience. It does not refer to uptime, performance, or availability of a SaaS app.
SaaSOps
The shortened term that refers to SaaS Operations.
SaaS security
Process to protect mission-critical data in SaaS apps so that companies can avoid data breaches/leakage,
compliance fines, loss of IP, loss of competitive advantage, and/or business disruption.
Shadow IT
The use of software, systems, and other IT solutions without IT’s explicit approval or knowledge.
Spend management
Ability to manage and control SaaS costs by centralizing visibility of subscriptions and usage to
identify unnecessary spending.
SSO
Single Sign-on (SSO) refers to session and user authentication where a user uses the same login
credentials to access multiple apps.
System of record
Information storage that is the authoritative data source. Organizations trust SaaS vendors to house
mission-critical, irreplaceable data.
Regulatory compliance
Activities that ensure an organization is compliant with and continues to remain compliant with the rules
and bylaws of different regulatory boards (ex. PII, HIPAA, GDPR, etc).
User interaction
The action a user takes to get work done in the digital workplace. It refers to the processes users are
performing inside SaaS apps, the people they’re interacting with, and the data they’re interacting with.
(Examples: sharing a Google Drive file with a partner, creating a public Office 365 group, downloading a
folder from Dropbox)
Visibility
Ability to view all of the users, groups, and files in an organization’s SaaS applications in a single place. It is
key to identify problem areas within an organization’s environment.