PUBlished on
August 21, 2022
updated on
November 5, 2025

Spotting SaaS Application Vulnerabilities

HASAN IMAM

This blog is reposted from an article originally published on August 19, 2022 by Michael Novinson and ISMG. Listen to the full interview here.

Obsidian Security has in recent months invested in giving enterprises more visibility into how their SaaS applications are talking to other SaaS applications so that supply chain compromise can be more easily recognized, CEO Hasan Imam says. This linkage has required Obsidian to better understand how SaaS applications are connected as well as the threat vectors related to those integration points, Imam says.

Organizations must distinguish between normal and abnormal data movement between SaaS applications, which means they must know who’s accessing those systems and how often, so typical behavior can be modeled out, Imam says. From there, it becomes easier to detect potential attacks, especially when a valid token is being used but the user behavior or activity is very unusual (see: Obsidian Security Raises $90M to Safeguard More SaaS Apps).

“We believe it’s very important to build out depth of coverage around the core SaaS applications because that represents 90% of the risk and threat to enterprises,” Imam says.

In this audio interview with Information Security Media Group, Imam also discusses:

Imam, who joined Obsidian as CEO at the start of 2021, previously spent nearly five years at Shape Security, ending in a two-year stint as the web and mobile application security vendor’s chief revenue and customer officer. Before joining Shape, Imam spent three years at DocuSign, where he led the e-signature company’s industry and horizontal solutions. Prior to that, he spent more than three years at Hewlett-Packard, where he oversaw strategic accounts and operations.

Frequently Asked Questions (FAQs)

What are the biggest vulnerabilities in SaaS application integrations?

SaaS application integrations can expose organizations to supply chain compromises if not properly monitored. Vulnerabilities often arise when SaaS apps connect and share data; attackers may exploit these integration points to gain unauthorized access or move laterally within systems. Maintaining visibility into how and when applications interact is crucial for spotting abnormal behavior indicative of threats.

Why is it challenging to detect breaches involving valid credentials in SaaS apps?

Breaches involving valid credentials often bypass traditional security measures since the login appears legitimate. Attackers may obtain tokens or certificates and mimic normal user behavior, making detection much harder. Organizations need to distinguish between genuine activity and abnormal patterns—such as unusual access locations or irregular data transfers—to effectively identify these threats.

How can enterprises monitor data movement between SaaS applications?

Enterprises should implement tools that provide visibility into user activity and data transfers across all integrated SaaS platforms. By modeling typical behavior and setting baselines for each user and application, security teams can quickly flag anomalies such as unexpected file sharing, excessive data extraction, or unauthorized API calls, which may signal a compromise.

What are the differences between cloud security posture management (CSPM) and SaaS security posture management (SSPM)?

CSPM focuses on securing cloud infrastructure—like AWS or Azure—by identifying misconfigurations and compliance issues, while SSPM specifically addresses the unique risks in SaaS environments. SSPM concentrates on user permissions, app integrations, and data flows within SaaS platforms, which represent the majority of enterprise cloud risk.

You May Also Like

Get Started

Start in minutes and secure your critical SaaS applications with continuous monitoring and data-driven insights.

get a demo