SaaS Security Checklist & Assessment Questionnaire

SaaS Security Checklist & Assessment Questionnaire

A security assessment is vital for businesses looking to implement new SaaS, which can be completed using a detailed SaaS security checklist.

► Find out how to evaluate SaaS applications!

SaaS Security Checklist & Assessment Questionnaire

SaaS Security Checklist & Assessment Questionnaire

Shortcuts

  1. Introduction
  2. SaaS security checklist
    1. General information
    2. Information security

    Introduction

    Performing a Software-as-a-Service (SaaS) security assessment is a vital part of any company's quality assessment protocol when evaluating potential vendors. Data stored through SaaS is not stored on-premise, which means sensitive and confidential data becomes more at risk from security breaches from the outside. It is important that all new SaaS in your portfolio meets the regulatory standards of your company.

    A SaaS security questionnaire will ask where the data will be stored, what security measures are in place to ensure data safety, and make sure the vendor is up-to-date with data protection rules and certificates – along with various other questions.

    Following general SaaS security best practices and a well-defined checklist will guide this assessment.

    SaaS security checklist

    A SaaS security checklist is necessary when a company is evaluating the security of a new SaaS solution, and procurement should not move forward unless a proper SaaS risk assessment has been conducted and received the approval of the internal security teams.

    It is a separate process to a technology risk assessment that evaluates application risks, reduces costs, and increases agility. A SaaS security application checklist is created and completed by the external supplier before moving forward with a company. An important part of this process is ensuring end-to-end encryption is in place, which guarantees data will not be shared with third parties or can be accessed by the provider.

    General information

    The first part of the SaaS security questionnaire will contain general information about the vendor before moving into more detailed questions regarding the security of the vendor. General information includes the contact details as well as how long the vendor has been in business. Here is the full list of questions in the general information section of the SaaS security checklist:

    Information security

    This section and the subsections within go much more into detail regarding the security information of the product. Each subsection of the SaaS security checklist will assess whether the product is fit for its purpose and in line with your company’s security protocols.

    Organizational security

    This subsection of the SaaS security checklist outlines who is responsible for information security and what policies have already been implemented to ensure the security of the data between the company and the supplier. The questions are as follows:

    HR security

    Much like organizational security, human resources security covers who the company will be working with and what kind of access they have to sensitive information. This part of the SaaS security questionnaire asks whether the vendor has sufficient onboarding and offboarding processes, if they perform background checks and whether they receive security training.

    Physical site

    This part of the SaaS security questionnaire will outline where on the physical site the servers will be kept, and what kind of physical security is in place to protect sensitive company data.

    Application and network security

    During this subsection of the SaaS security checklist, the company is asking whether the applications and network are regularly tested for security breaches, and what kinds of countermeasures are in place to stop that from happening.

    Asset management

    How are the assets managed within the company, and how are each of the supplier’s clients’ data and information stored to ensure it is kept separate from each other? This part of the questionnaire will also require the vendor to outline a risk management methodology.

    System acquisition, development, and maintenance

    This subsection of the SaaS security questionnaire will cover how the applications mitigate risk, and what processes are in place for development, testing, and operations. The vendor is required to share software development methodology and what security measures are incorporated as part of the application development life cycle.

    Sub-contractor relationships

    What does the relationship between the vendor and third-party subcontractors look like? This is important to outline who the subcontractors are, and what processes they use. This part of the SaaS security checklist should list all subcontractors.

    Incident management

    Incidents can always happen, so this section of the SaaS security questionnaire will require information on what incidents have occurred in the last year, and what incident management processes are already in place. The vendor must share their incident management policy.

    Enterprise Architecture Success Kit

    IT Cost Savings: A Guide to Application Rationalization

    The Enterprise Architect of Tomorrow

    Reshape your IT with 24 key Enterprise Architecture Views

    Business continuity management

    The supplier must outline both their Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) to ensure that they have protocols in place in the event of a breach or other possible issue that may occur.

    Operations security

    This section of the SaaS security checklist reveals what kind of operations security is in place; what malicious software protection is deployed? Are audit logs retained and reviewed? This is important for monitoring and logging anything unusual during day-to-day processes.

    Backup and restoration

    Here the vendor will be responsible for outlining what backup and restoration policies are in place in case of a server breach or crash. This could directly impact the continued use of the SaaS service and put company data at risk.

    Cryptography

    In this section of the SaaS security checklist, the vendor must outline what data encryption policy is in place. This is highly important, as it will determine how well the supplier safeguards an organization's data and information from potential threats.

    Data disposal

    How is sensitive data disposed of, both physically and through the service? The supplier must outline what data disposal policies are in place and also ensure that all paper is securely destroyed and computer hardware wiped according to good industry practice.

    Change management

    In this subsection of the SaaS security questionnaire, the vendor must outline what change management process is implemented. This ensures that if the system undergoes any changes the service will remain secure.

    Information security standards

    This final section of the SaaS security checklist makes sure the SaaS provider has all external certificates and meets important assessments concerning the security of the company. They are asked to provide recent proof.

    Conclusion

    Following the completion of the SaaS security checklist, the company will then assess whether the answers to the questions are sufficient and effectively ensure the security of data and sensitive information. If so, they can then move on to the next stage of the SaaS implementation process.

    A successful quality security assessment is essential after a shadow IT discovery and provides peace of mind to companies implementing new SaaS solutions and is vital for a successful relationship between both parties.

    Free Template

    SaaS Vendor Criteria Matrix

    Evaluate and assess new or existing SaaS vendors based on their security or product features, cost, support, and service criteria important to your organization.

    Get your free template

    SaaS Vendor Evaluation Template

    Compare and evaluate different SaaS vendors

    Add your own evaluation criteria

    Grade vendors based on the criteria of importance and urgency

    Select the SaaS vendor that fits your organization

    Answers to frequently asked questions on SaaS security checklist

    How do you assess SaaS security?

    The best way to assess the security of a SaaS provider is through a SaaS security assessment which usually includes the completion of a well-defined questionnaire. This questionnaire seeks to outline what security protocols are in place, making sure the answers successfully meet the regulatory security standards of the company. Once complete, the SaaS software can be implemented.

    What is data security in SaaS?

    Data security is a vital part of SaaS. SaaS software stores a huge amount of sensitive data in cloud-based applications which are vulnerable to threats from the outside if they are not properly secured and encrypted. When looking for a new SaaS software, potential customers need to make sure their important and sensitive data is secured by the SaaS supplier.

    What is a SaaS security checklist?

    A SaaS security checklist is a comprehensive list of questions and considerations posed by a company looking to onboard a new SaaS software. It helps the buyer assess whether the vendor meets the security needs of the company.

    What is a SaaS security audit?

    A SaaS security audit is completed to ensure the safety, security, and privacy of data stored in SaaS software. SaaS security audits help to identify vulnerabilities and areas of improvement to prevent hacks and strengthen the overall security of SaaS software.

    How can you conduct a SaaS security audit?

    To conduct a SaaS security audit you must assess all areas of the platform, including employee security habits and compliance with industry best practices and standards. This can be done through the successful completion of a SaaS security evaluation. This audit will evaluate the security of the physical environment, applications and software, network vulnerabilities, and make sure all standard and federal regulations are met. This audit will usually be done in the form of a SaaS security checklist.