SaaS Security (expanded)59 items

SaaS Security (expanded)59 items
Jump to diagrams:
SaaS Security → Tenant Isolation

Tags: Multi-tenant, RLS

Question: Does the SaaS enforce tenant isolation at data/execution with per-tenant keying?

Applicable Requirements:
- NIST 800-53: SC-4, SC-7, SC-28
- ISO 27001: A.14.2.7
- SOC 2: CC6.6

Applicability: Multi-tenant SaaS

Expected Result: Tenant ID validation on every access; RLS; per-tenant keys or strict grants.

Why It Matters: Prevents cross-tenant leaks.

Technical Breakdown:

  1. Middleware enforces tenant claims; block cross-tenant joins.
  2. Pen tests include cross-tenant attempts.
Deep Dive
SaaS Security → SSPM & Config Drift

Tags: SSPM, Drift

Question: Is SaaS posture monitored for misconfig and drift?

Applicable Requirements:
- NIST 800-53: CA-7, RA-5

Applicability: Core SaaS (M365, Google, Slack, Salesforce)

Expected Result: Continuous checks; alert on public shares/legacy auth/weak MFA.

Why It Matters: Early detection of risky settings.

Technical Breakdown:

  1. Baseline desired config; ticket on drift; export to SIEM.
Deep Dive
SaaS Security → OAuth App Governance

Tags: OAuth, CASB

Question: Do you restrict third-party OAuth apps and review scopes/consent?

Applicable Requirements:
- NIST 800-53: AC-19, SI-4

Applicability: Google/M365/Slack/Salesforce

Expected Result: Admin consent workflows; block risky scopes; review tokens.

Why It Matters: SaaS-to-SaaS exfil path.

Technical Breakdown:

  1. Limit offline_access; alert on new app installs; remove dormant apps.
Deep Dive
SaaS Security (Microsoft 365) → Audit Logging

Tags: Audit, SIEM

Question: Are admin and data-access logs enabled with export to SIEM and ≥365d retention?

Applicable Requirements:
- NIST 800-53: AU-6, AU-12
- SOC 2: CC7.3

Applicability: All tenants

Expected Result: Immutable logs; export API enabled; retention set; access restricted.

Why It Matters: Supports IR and legal holds.

Technical Breakdown:

  1. Enable advanced audit add-ons; WORM storage; sign logs.
Deep Dive
SaaS Security (Microsoft 365) → Backup & Restore

Tags: Backups, RTO/RPO

Question: Are backups/versioning enabled and restores tested for RPO/RTO?

Applicable Requirements:
- NIST 800-53: CP-9, CP-10

Applicability: Business-critical data

Expected Result: Daily backups; quarterly restores; immutable copies; separate keys.

Why It Matters: Resilience to ransomware and operator error.

Technical Breakdown:

  1. Export APIs; cross-tenant isolation for backups; restore runbooks.
Deep Dive
SaaS Security (Microsoft 365) → DLP & Sharing Controls

Tags: DLP, Sharing

Question: Are DLP rules and external sharing controls enforced by sensitivity?

Applicable Requirements:
- NIST 800-53: MP-7, AC-4

Applicability: Docs/chat/code

Expected Result: Sensitivity labels; block external shares by default; exceptions approved.

Why It Matters: Prevents inadvertent data exposure.

Technical Breakdown:

  1. CASB policies; quarantine flows; owner reattestation.
Deep Dive
SaaS Security (Microsoft 365) → Legacy/Basic Auth

Tags: Legacy Auth

Question: Is legacy/basic auth disabled tenant-wide?

Applicable Requirements:
- NIST 800-53: IA-2, AC-17

Applicability: Email/IMAP/POP/SMTP/API

Expected Result: Block legacy protocols; migrate to OAuth; enforce MFA.

Why It Matters: Legacy auth bypasses MFA and is abused.

Technical Breakdown:

  1. CA rules to block; metrics to show residual usage.
Deep Dive
SaaS Security (Google Workspace) → Audit Logging

Tags: Audit, SIEM

Question: Are admin and data-access logs enabled with export to SIEM and ≥365d retention?

Applicable Requirements:
- NIST 800-53: AU-6, AU-12
- SOC 2: CC7.3

Applicability: All tenants

Expected Result: Immutable logs; export API enabled; retention set; access restricted.

Why It Matters: Supports IR and legal holds.

Technical Breakdown:

  1. Enable advanced audit add-ons; WORM storage; sign logs.
Deep Dive
SaaS Security (Google Workspace) → Backup & Restore

Tags: Backups, RTO/RPO

Question: Are backups/versioning enabled and restores tested for RPO/RTO?

Applicable Requirements:
- NIST 800-53: CP-9, CP-10

Applicability: Business-critical data

Expected Result: Daily backups; quarterly restores; immutable copies; separate keys.

Why It Matters: Resilience to ransomware and operator error.

Technical Breakdown:

  1. Export APIs; cross-tenant isolation for backups; restore runbooks.
Deep Dive
SaaS Security (Google Workspace) → DLP & Sharing Controls

Tags: DLP, Sharing

Question: Are DLP rules and external sharing controls enforced by sensitivity?

Applicable Requirements:
- NIST 800-53: MP-7, AC-4

Applicability: Docs/chat/code

Expected Result: Sensitivity labels; block external shares by default; exceptions approved.

Why It Matters: Prevents inadvertent data exposure.

Technical Breakdown:

  1. CASB policies; quarantine flows; owner reattestation.
Deep Dive
SaaS Security (Google Workspace) → Legacy/Basic Auth

Tags: Legacy Auth

Question: Is legacy/basic auth disabled tenant-wide?

Applicable Requirements:
- NIST 800-53: IA-2, AC-17

Applicability: Email/IMAP/POP/SMTP/API

Expected Result: Block legacy protocols; migrate to OAuth; enforce MFA.

Why It Matters: Legacy auth bypasses MFA and is abused.

Technical Breakdown:

  1. CA rules to block; metrics to show residual usage.
Deep Dive
SaaS Security (Salesforce) → Audit Logging

Tags: Audit, SIEM

Question: Are admin and data-access logs enabled with export to SIEM and ≥365d retention?

Applicable Requirements:
- NIST 800-53: AU-6, AU-12
- SOC 2: CC7.3

Applicability: All tenants

Expected Result: Immutable logs; export API enabled; retention set; access restricted.

Why It Matters: Supports IR and legal holds.

Technical Breakdown:

  1. Enable advanced audit add-ons; WORM storage; sign logs.
Deep Dive
SaaS Security (Salesforce) → Backup & Restore

Tags: Backups, RTO/RPO

Question: Are backups/versioning enabled and restores tested for RPO/RTO?

Applicable Requirements:
- NIST 800-53: CP-9, CP-10

Applicability: Business-critical data

Expected Result: Daily backups; quarterly restores; immutable copies; separate keys.

Why It Matters: Resilience to ransomware and operator error.

Technical Breakdown:

  1. Export APIs; cross-tenant isolation for backups; restore runbooks.
Deep Dive
SaaS Security (Salesforce) → DLP & Sharing Controls

Tags: DLP, Sharing

Question: Are DLP rules and external sharing controls enforced by sensitivity?

Applicable Requirements:
- NIST 800-53: MP-7, AC-4

Applicability: Docs/chat/code

Expected Result: Sensitivity labels; block external shares by default; exceptions approved.

Why It Matters: Prevents inadvertent data exposure.

Technical Breakdown:

  1. CASB policies; quarantine flows; owner reattestation.
Deep Dive
SaaS Security (Salesforce) → Legacy/Basic Auth

Tags: Legacy Auth

Question: Is legacy/basic auth disabled tenant-wide?

Applicable Requirements:
- NIST 800-53: IA-2, AC-17

Applicability: Email/IMAP/POP/SMTP/API

Expected Result: Block legacy protocols; migrate to OAuth; enforce MFA.

Why It Matters: Legacy auth bypasses MFA and is abused.

Technical Breakdown:

  1. CA rules to block; metrics to show residual usage.
Deep Dive
SaaS Security (Slack) → Audit Logging

Tags: Audit, SIEM

Question: Are admin and data-access logs enabled with export to SIEM and ≥365d retention?

Applicable Requirements:
- NIST 800-53: AU-6, AU-12
- SOC 2: CC7.3

Applicability: All tenants

Expected Result: Immutable logs; export API enabled; retention set; access restricted.

Why It Matters: Supports IR and legal holds.

Technical Breakdown:

  1. Enable advanced audit add-ons; WORM storage; sign logs.
Deep Dive
SaaS Security (Slack) → Backup & Restore

Tags: Backups, RTO/RPO

Question: Are backups/versioning enabled and restores tested for RPO/RTO?

Applicable Requirements:
- NIST 800-53: CP-9, CP-10

Applicability: Business-critical data

Expected Result: Daily backups; quarterly restores; immutable copies; separate keys.

Why It Matters: Resilience to ransomware and operator error.

Technical Breakdown:

  1. Export APIs; cross-tenant isolation for backups; restore runbooks.
Deep Dive
SaaS Security (Slack) → DLP & Sharing Controls

Tags: DLP, Sharing

Question: Are DLP rules and external sharing controls enforced by sensitivity?

Applicable Requirements:
- NIST 800-53: MP-7, AC-4

Applicability: Docs/chat/code

Expected Result: Sensitivity labels; block external shares by default; exceptions approved.

Why It Matters: Prevents inadvertent data exposure.

Technical Breakdown:

  1. CASB policies; quarantine flows; owner reattestation.
Deep Dive
SaaS Security (Slack) → Legacy/Basic Auth

Tags: Legacy Auth

Question: Is legacy/basic auth disabled tenant-wide?

Applicable Requirements:
- NIST 800-53: IA-2, AC-17

Applicability: Email/IMAP/POP/SMTP/API

Expected Result: Block legacy protocols; migrate to OAuth; enforce MFA.

Why It Matters: Legacy auth bypasses MFA and is abused.

Technical Breakdown:

  1. CA rules to block; metrics to show residual usage.
Deep Dive
SaaS Security (Atlassian) → Audit Logging

Tags: Audit, SIEM

Question: Are admin and data-access logs enabled with export to SIEM and ≥365d retention?

Applicable Requirements:
- NIST 800-53: AU-6, AU-12
- SOC 2: CC7.3

Applicability: All tenants

Expected Result: Immutable logs; export API enabled; retention set; access restricted.

Why It Matters: Supports IR and legal holds.

Technical Breakdown:

  1. Enable advanced audit add-ons; WORM storage; sign logs.
Deep Dive
SaaS Security (Atlassian) → Backup & Restore

Tags: Backups, RTO/RPO

Question: Are backups/versioning enabled and restores tested for RPO/RTO?

Applicable Requirements:
- NIST 800-53: CP-9, CP-10

Applicability: Business-critical data

Expected Result: Daily backups; quarterly restores; immutable copies; separate keys.

Why It Matters: Resilience to ransomware and operator error.

Technical Breakdown:

  1. Export APIs; cross-tenant isolation for backups; restore runbooks.
Deep Dive
SaaS Security (Atlassian) → DLP & Sharing Controls

Tags: DLP, Sharing

Question: Are DLP rules and external sharing controls enforced by sensitivity?

Applicable Requirements:
- NIST 800-53: MP-7, AC-4

Applicability: Docs/chat/code

Expected Result: Sensitivity labels; block external shares by default; exceptions approved.

Why It Matters: Prevents inadvertent data exposure.

Technical Breakdown:

  1. CASB policies; quarantine flows; owner reattestation.
Deep Dive
SaaS Security (Atlassian) → Legacy/Basic Auth

Tags: Legacy Auth

Question: Is legacy/basic auth disabled tenant-wide?

Applicable Requirements:
- NIST 800-53: IA-2, AC-17

Applicability: Email/IMAP/POP/SMTP/API

Expected Result: Block legacy protocols; migrate to OAuth; enforce MFA.

Why It Matters: Legacy auth bypasses MFA and is abused.

Technical Breakdown:

  1. CA rules to block; metrics to show residual usage.
Deep Dive
SaaS Security (GitHub) → Audit Logging

Tags: Audit, SIEM

Question: Are admin and data-access logs enabled with export to SIEM and ≥365d retention?

Applicable Requirements:
- NIST 800-53: AU-6, AU-12
- SOC 2: CC7.3

Applicability: All tenants

Expected Result: Immutable logs; export API enabled; retention set; access restricted.

Why It Matters: Supports IR and legal holds.

Technical Breakdown:

  1. Enable advanced audit add-ons; WORM storage; sign logs.
Deep Dive
SaaS Security (GitHub) → Backup & Restore

Tags: Backups, RTO/RPO

Question: Are backups/versioning enabled and restores tested for RPO/RTO?

Applicable Requirements:
- NIST 800-53: CP-9, CP-10

Applicability: Business-critical data

Expected Result: Daily backups; quarterly restores; immutable copies; separate keys.

Why It Matters: Resilience to ransomware and operator error.

Technical Breakdown:

  1. Export APIs; cross-tenant isolation for backups; restore runbooks.
Deep Dive
SaaS Security (GitHub) → DLP & Sharing Controls

Tags: DLP, Sharing

Question: Are DLP rules and external sharing controls enforced by sensitivity?

Applicable Requirements:
- NIST 800-53: MP-7, AC-4

Applicability: Docs/chat/code

Expected Result: Sensitivity labels; block external shares by default; exceptions approved.

Why It Matters: Prevents inadvertent data exposure.

Technical Breakdown:

  1. CASB policies; quarantine flows; owner reattestation.
Deep Dive
SaaS Security (GitHub) → Legacy/Basic Auth

Tags: Legacy Auth

Question: Is legacy/basic auth disabled tenant-wide?

Applicable Requirements:
- NIST 800-53: IA-2, AC-17

Applicability: Email/IMAP/POP/SMTP/API

Expected Result: Block legacy protocols; migrate to OAuth; enforce MFA.

Why It Matters: Legacy auth bypasses MFA and is abused.

Technical Breakdown:

  1. CA rules to block; metrics to show residual usage.
Deep Dive
SaaS Security (ServiceNow) → Audit Logging

Tags: Audit, SIEM

Question: Are admin and data-access logs enabled with export to SIEM and ≥365d retention?

Applicable Requirements:
- NIST 800-53: AU-6, AU-12
- SOC 2: CC7.3

Applicability: All tenants

Expected Result: Immutable logs; export API enabled; retention set; access restricted.

Why It Matters: Supports IR and legal holds.

Technical Breakdown:

  1. Enable advanced audit add-ons; WORM storage; sign logs.
Deep Dive
SaaS Security (ServiceNow) → Backup & Restore

Tags: Backups, RTO/RPO

Question: Are backups/versioning enabled and restores tested for RPO/RTO?

Applicable Requirements:
- NIST 800-53: CP-9, CP-10

Applicability: Business-critical data

Expected Result: Daily backups; quarterly restores; immutable copies; separate keys.

Why It Matters: Resilience to ransomware and operator error.

Technical Breakdown:

  1. Export APIs; cross-tenant isolation for backups; restore runbooks.
Deep Dive
SaaS Security (ServiceNow) → DLP & Sharing Controls

Tags: DLP, Sharing

Question: Are DLP rules and external sharing controls enforced by sensitivity?

Applicable Requirements:
- NIST 800-53: MP-7, AC-4

Applicability: Docs/chat/code

Expected Result: Sensitivity labels; block external shares by default; exceptions approved.

Why It Matters: Prevents inadvertent data exposure.

Technical Breakdown:

  1. CASB policies; quarantine flows; owner reattestation.
Deep Dive
SaaS Security (ServiceNow) → Legacy/Basic Auth

Tags: Legacy Auth

Question: Is legacy/basic auth disabled tenant-wide?

Applicable Requirements:
- NIST 800-53: IA-2, AC-17

Applicability: Email/IMAP/POP/SMTP/API

Expected Result: Block legacy protocols; migrate to OAuth; enforce MFA.

Why It Matters: Legacy auth bypasses MFA and is abused.

Technical Breakdown:

  1. CA rules to block; metrics to show residual usage.
Deep Dive
SaaS Security (Microsoft 365) → External Collaboration Policies

Tags: Microsoft 365, Governance

Question: Are external sharing and guest access constrained by sensitivity labels and approvals?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (Microsoft 365) → Retention & eDiscovery

Tags: Microsoft 365, Governance

Question: Are legal holds/retention policies configured per data class?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (Microsoft 365) → OAuth Token Hygiene

Tags: Microsoft 365, Governance

Question: Are long-lived refresh tokens limited and rotated?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (Microsoft 365) → Privileged App Consent

Tags: Microsoft 365, Governance

Question: Is privileged app consent limited to security admins with approval workflow?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (Google Workspace) → External Collaboration Policies

Tags: Google Workspace, Governance

Question: Are external sharing and guest access constrained by sensitivity labels and approvals?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (Google Workspace) → Retention & eDiscovery

Tags: Google Workspace, Governance

Question: Are legal holds/retention policies configured per data class?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (Google Workspace) → OAuth Token Hygiene

Tags: Google Workspace, Governance

Question: Are long-lived refresh tokens limited and rotated?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (Google Workspace) → Privileged App Consent

Tags: Google Workspace, Governance

Question: Is privileged app consent limited to security admins with approval workflow?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (Salesforce) → External Collaboration Policies

Tags: Salesforce, Governance

Question: Are external sharing and guest access constrained by sensitivity labels and approvals?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (Salesforce) → Retention & eDiscovery

Tags: Salesforce, Governance

Question: Are legal holds/retention policies configured per data class?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (Salesforce) → OAuth Token Hygiene

Tags: Salesforce, Governance

Question: Are long-lived refresh tokens limited and rotated?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (Salesforce) → Privileged App Consent

Tags: Salesforce, Governance

Question: Is privileged app consent limited to security admins with approval workflow?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (Slack) → External Collaboration Policies

Tags: Slack, Governance

Question: Are external sharing and guest access constrained by sensitivity labels and approvals?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (Slack) → Retention & eDiscovery

Tags: Slack, Governance

Question: Are legal holds/retention policies configured per data class?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (Slack) → OAuth Token Hygiene

Tags: Slack, Governance

Question: Are long-lived refresh tokens limited and rotated?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (Slack) → Privileged App Consent

Tags: Slack, Governance

Question: Is privileged app consent limited to security admins with approval workflow?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (Atlassian) → External Collaboration Policies

Tags: Atlassian, Governance

Question: Are external sharing and guest access constrained by sensitivity labels and approvals?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (Atlassian) → Retention & eDiscovery

Tags: Atlassian, Governance

Question: Are legal holds/retention policies configured per data class?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (Atlassian) → OAuth Token Hygiene

Tags: Atlassian, Governance

Question: Are long-lived refresh tokens limited and rotated?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (Atlassian) → Privileged App Consent

Tags: Atlassian, Governance

Question: Is privileged app consent limited to security admins with approval workflow?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (GitHub) → External Collaboration Policies

Tags: GitHub, Governance

Question: Are external sharing and guest access constrained by sensitivity labels and approvals?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (GitHub) → Retention & eDiscovery

Tags: GitHub, Governance

Question: Are legal holds/retention policies configured per data class?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (GitHub) → OAuth Token Hygiene

Tags: GitHub, Governance

Question: Are long-lived refresh tokens limited and rotated?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (GitHub) → Privileged App Consent

Tags: GitHub, Governance

Question: Is privileged app consent limited to security admins with approval workflow?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (ServiceNow) → External Collaboration Policies

Tags: ServiceNow, Governance

Question: Are external sharing and guest access constrained by sensitivity labels and approvals?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (ServiceNow) → Retention & eDiscovery

Tags: ServiceNow, Governance

Question: Are legal holds/retention policies configured per data class?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (ServiceNow) → OAuth Token Hygiene

Tags: ServiceNow, Governance

Question: Are long-lived refresh tokens limited and rotated?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive
SaaS Security (ServiceNow) → Privileged App Consent

Tags: ServiceNow, Governance

Question: Is privileged app consent limited to security admins with approval workflow?

Applicable Requirements:
- NIST 800-53: AC-3, MP-6, AU-9
- SOC 2: CC6.6

Applicability: Data-sharing and compliance scenarios.

Expected Result: Policies defined; exceptions logged; audits pass.

Why It Matters: Reduces exfiltration and compliance risk.

Technical Breakdown:

  1. Sensitivity labels; review external guests; attest privileged apps.
Deep Dive