1. Identify and assess the risks
Start by understanding your business objectives and critical applications, and which applications you use that are supported by third parties. Identify and define the security responsibilities across your organisation, the vendor and the cloud service provider. This will be key to finding and addressing any vulnerabilities in the supply chain.
Also, assess your risk exposure across these key areas:
- which data will be shared with the SaaS application and the level of protection needed
- the SaaS vendor’s own commitment to security, their capabilities and resilience
- the SaaS application itself: how critical is the application to your business?
- your own internal technical capabilities: can you maintain the application in-house?
This knowledge lets you build a comprehensive supplier assurance programme to help determine the effectiveness of your suppliers’ security controls.
2. Develop a business continuity plan
With SaaS applications, your software is hosted in the cloud by a CSP, which introduces more variables and supply chain dependencies.
Before onboarding new vendors or adding SaaS applications, revisit your procurement procedures and include a software escrow into your licence agreements to ensure you have continuity of service and can restore critical data in a useable format.
As part of your legal agreement with the provider, you should also include the requirement for them to report major cyber-security and IT incidents within a tight time frame so you can take appropriate measures to engage your own incident response plans.
3. Test and validate the business continuity plan
Only by testing and validating the business continuity plan can you be confident that it works. A software escrow verification validates the accuracy and usability of the materials deposited in escrow, such as source code and infrastructure as code, and gives you the knowledge required to execute your continuity plan accordingly.