SaaS is fast becoming the new enterprise operating system. Given the pervasiveness of SaaS app usage and the high degree of customizability within each SaaS app, there are bound to be customer-side SaaS app misconfigurations. These misconfigurations can include over-permissioned end-user roles and data exposed to the public internet.
In this regard, a recent article titled “Data Exposure and ServiceNow: The Elephant in the ITSM Room” discusses the risk of misconfigured ACLs that may lead to open or anonymous access to data in a ServiceNow instance. The article points out how data exfiltration can occur due to potential misconfigurations performed by customers in their ServiceNow deployments. There are no zero-day risks in the potential misconfigurations mentioned in the article.
While this research was published independently, many organizations have made inquiries to AppOmni on other detection and mitigation measures they can take to ensure their deployments are secured.
ServiceNow has issued the following guidance to their customers:
“ServiceNow works with customers on the ongoing safety of their security configurations, including Access Control Lists (ACLs), to ensure they are properly structured and aligned to their intended purpose. These protocols are built to be extensible so customers can configure them based on their unique security needs — from companies with public portals providing broad access to information to enterprise-specific use cases where access is restricted to select users.
ServiceNow has also issued guidance through an updated knowledge base (KB1553688) article that provides recommendations to address the potential misconfiguration.
As the leading SSPM solution, AppOmni detects unintended data exposures in ServiceNow and many other SaaS platforms arising due to customer-side misconfigurations. AppOmni Insights are derived from analyzing toxic combinations of misconfigurations, improper permissions, incorrect ACLs and IP restrictions, or exposed APIs and can help customers identify if they are impacted by this issue.
The potential misconfigurations mentioned in the article along with many similar SaaS access risks are detected by the AppOmni platform on a continuous basis. These SaaS access risks are displayed in the AppOmni console, enabling customers to analyze and triage each Insight. This enables timely, proactive SaaS threat detection, prevention and guided steps for remediation.
In addition, AppOmni has provided the following summary guidelines previously to address ServiceNow misconfigurations.
Administrators should perform the following checks on a regular basis to ensure that access to sensitive information is not being provisioned to external unauthenticated users.
Addressing SaaS cyber risks requires adopting a SaaS Security Posture Management (SSPM) solution that importantly provides SaaS risk visibility across the SaaS estate, as well as guided steps to remediate and address this risk as it manifests. The AppOmni Platform’s SaaS cyber risk visibility, SaaS-to-SaaS app security management, threat detection, as well as the recently released Identity Fabric capabilities, enable customers to proactively fix these and any other SaaS access risks.
AppOmni has created a ServiceNow ACL misconfiguration assessment to detect potential misconfigurations in ServiceNow instances. Trusted by over 20% of the Fortune 100, AppOmni is best placed to help you analyze your ServiceNow deployment and provide guided remediation to address any SaaS access risk.
Click here to sign up for a risk assessment of potential ServiceNow misconfigurations.
The post Handling SaaS Data Exposure Risks Due to Potential ServiceNow Misconfigurations appeared first on AppOmni.
*** This is a Security Bloggers Network syndicated blog from AppOmni feed authored by AppOmni. Read the original post at: https://appomni.com/blog_post/handling-saas-data-exposure-risks-due-to-potential-servicenow-misconfigurations/