
The deadly weak link in your SaaS chain
Last week, I was meeting with an IT manager at one of our new clients. In the middle of the conversation, he leaned forward and said, “Hugo, you have to write about this.” We were talking about optimization and security. When I told him how we approach these issues, he was silent for a moment. And then he encouraged me to write this blog.
What's going on?
More and more often, companies are linking systems from different suppliers. This seems smart for business: data flows more smoothly, processes are automated faster, and employees don't have to do double work as often. But for the security of your data, it's often a nightmare.
The recent hack of Salesloft and Drift painfully demonstrated this. Hackers gained access to the Salesforce data of large companies through these very tools. And that Salesforce data didn't just contain customer information. They also found the access keys to Amazon Web Services.
In other words, a single leak at a relatively small SaaS platform opened the door to the crown jewels of various multinationals. Among the victims were some big names, including Cloudflare, Palo Alto, and other cybersecurity providers. Ironic, isn't it?
Ironic or not, the same risk applies when logging in via a Google, Microsoft, or Facebook account. Convenient, because one click and you're in. But often, these apps gain much more access than is strictly necessary. As soon as one of these “convenient” tools turns out to be unsafe, your data ends up on the dark web in no time—and then with the highest bidder.
And that's just one form of connection. APIs, plug-ins, shadow IT, and poorly documented integrations combine to create an explosive mix.
The invisible threat of SaaS integrations
Explosive? Surely it can't be that bad?
That may be what you think, but in practice it's more complicated, even though you can solve it so easily (and cheaply).
The more links you add to the chain, the greater the chance that there will be a weak one. And if that weak link breaks, it drags the whole chain down with it.
The lesson? The danger isn't in the one application you trust, but in the web between them. That's where the gaps are. That's where data leaks occur. That's where you lose control.
Links between SaaS systems are often presented as a standard feature. With one click, you have “native integration” between your CRM and your marketing tool, or between your HR package and your financial system. Mind you, I'm not disputing that it's convenient, fast, and efficient. But I am critical of what happens behind the scenes, and you should be too. Because that remains a black box as long as you do nothing about it.
You rarely get insight into how that link is secured. Which credentials are used? How and where are they stored? Are temporary tokens used, or static keys that last for years? And who actually checks whether those credentials have been misused?
These are not the questions you want to be asked when you are already busy making systems easier and faster. But it is precisely the answers to these questions that determine whether you are taking unnecessary risks or can really rest assured.
Because monitoring is often a blind spot too. What policies does the supplier have in place to warn you of suspicious behavior? Are you informed immediately if unusual data flows occur, or do you only find out when your customer calls because their data has appeared on the dark web?
This rarely makes the news, but that doesn't mean it doesn't happen. We hear enough “crazy” stories in our work. And the costs of repairing what could have been prevented in advance are often enormous.
What's more, you have little insight into how much data is actually being exchanged. Often, one application gains access to much more than is strictly necessary. Not just the data needed for the link, but complete datasets that you never wanted to share. This means that a single breach can quickly turn into a massive data leak.
Four simple steps to make your cloud chain more secure
The real danger? The lack of an overview of the risks. Every new link between systems is a potential attack vector. And the more links you add, the larger the web that a hacker can exploit.
The chain may seem solid, but the weak links are invisible. Until it's too late.
We will never completely eliminate links between systems. They make processes more efficient and save work. But there is a lot you can do to limit the risk of a data breach. Here are four simple steps to make your cloud chain more secure:
- Limit the attack surface.
Only give an application access to the data that is strictly necessary. An email campaign system does not need to know the entire customer profile. A list of names and email addresses is sufficient. The less data that is circulating, the less damage will be done in the event of a breach. - Add human oversight.
Automation does not mean “filtering out humans 100%,” because abuse is always lurking. By adding a simple step of human approval, you prevent large datasets from disappearing unnoticed. For example, the export to your email tool only runs after someone on your team has confirmed that this is a legitimate action. - Limit the direction of the data flow.
Not every connection needs to be two-way. A lead generator that sends new leads to your CRM is fine. But that same tool does not need access to read data from your CRM. The CRM can determine for itself whether a lead already exists. By making data flows one-way, you reduce the risk of sensitive information being shared unnecessarily. - Differentiate access.
All too often, we see multiple applications using the same API key. Or there are only a handful of roles, giving everyone far too many rights. Sound familiar? The result: a small tool gains access to much more than it needs without anyone noticing. By creating separate credentials for each SaaS application and setting up roles as finely meshed as possible, you limit the damage if something goes wrong. If one key is cracked, it doesn't suddenly open up the entire cloud.
Summary
The risk of SaaS integrations lies not only in the software itself, but also in the way we allow data to flow. By setting stricter limits on what is shared, building in human checks, and simplifying data flows, you make it considerably more difficult for hackers to get their hands on your crown jewels. Perfect security does not exist, but by taking the above steps, you can drastically reduce the chance of a minor or major disaster.
Why “i'm sure they have it covered” could be your most costly assumption
Many companies still assume that large suppliers have their security in order:
“It's Microsoft, so it must be fine.”
“Salesforce has plenty of security specialists.”
“Cloudflare, that's security, right?”
But practice shows time and again that this is a dangerous assumption. Think of the hacks in which customer data, access keys, and even entire infrastructures were exposed. Not at obscure startups, but at the biggest names in the market.
The problem lies in how suppliers tell us how we should feel: it'll be fine. That is demonstrably not true. That feeling is precisely the red flag. Without asking critical questions, we know nothing about how security is really organized. Are credentials regularly renewed? How are API keys managed? What monitoring is in place for links? And above all: what are the procedures if something suspicious is detected?
Anyone doing business with SaaS suppliers must impose the same requirements as they would on an internal IT department. Ask questions. Don't be fobbed off with vague certifications or marketing talk about compliance. Ask your supplier to tell you specifically what measures have been taken, how incidents are reported, and exactly how much data is shared.
Unfortunately, security is not something we can buy off with a big, well-known logo. It is a shared responsibility. And we all know that those who give away trust too easily pay the highest price.
Discover your blind spots before a hacker does
You cannot avoid connections. But you can prevent them from exposing your organization to data breaches and reputational damage. That starts with insight: knowing what connections you have, how they are secured, and where the weak spots are.
Don't think: that won't happen to us. We all know it's a matter of time. Not if, but when.
Too often, companies only discover how big the risks were after an incident has occurred. By then, it's not only too late, but the damage is also considerable. Not just financially: customer confidence crumbles, employees experience prolonged stress, and continuity is disrupted.
Don't want to wait until a hack wakes you up? Then make a no-obligation appointment with me. Together, we will map out your SaaS landscape, assess the risks, and give you concrete steps to drastically reduce your attack surface.
The choice is simple: wait for the inevitable leak, or take control now.