SaaS Security
How SaaS Security Inline Determines an App's Risk Score
Table of Contents
Expand All
|
Collapse All
SaaS Security Docs
-
-
- Begin Scanning an Amazon S3 App
- Begin Scanning a Bitbucket App
- Begin Scanning a Box App
- Begin Scanning ChatGPT Enterprise App
- Begin Scanning a Cisco Webex Teams App
- Begin Scanning a Confluence App
- Begin Scanning a Confluence Data Center App
- Begin Scanning a Dropbox App
- Begin Scanning a GitHub App
- Begin Scanning a Gmail App
- Begin Scanning a Google Cloud Storage App
- Begin Scanning a Google Drive App
- Begin Scanning a Jira App
- Begin Scanning a Jira Data Center App
- Begin Scanning a Microsoft Azure Storage App
- Begin Scanning a Microsoft Exchange App
- Begin Scanning a Microsoft Teams App
- Begin Scanning Office 365 Apps
- Begin Scanning a Salesforce App
- Begin Scanning a ServiceNow App
- Begin Scanning a ShareFile App
- Begin Scanning a Slack Enterprise App
- Begin Scanning a Slack for Pro and Business App
- Begin Scanning a Workday App
- Begin Scanning a Zendesk App
- Begin Scanning a Zoom App
- Perform Actions on Sanctioned Apps
- API Throttling
- Configure Classification Labels
- Microsoft Labeling for Office 365
- Google Drive Labeling
- Configure Phishing Analysis
- Configure WildFire Analysis
- Fine-Tune Policy
-
- What is an Incident?
- Filter Incidents
- Configure Slack Notification Alerts on Data Security
- Security Controls Incident Details
- Track Down Threats with WildFire Report
- Customize the Incident Categories
- Close Incidents
- Download Assets for Incidents
- View Asset Snippets for Incidents
- Modify Incident Status
- Email Asset Owners
- Generate Reports on Data Security
- Integrate CIE with Data Security
- Search in Data Security
-
-
- View Usage Data for Unsanctioned SaaS Apps
- SaaS Visibility Application Attributes
- How SaaS Security Inline Determines an App's Risk Score
- Identify Risky Unsanctioned SaaS Apps and Users
- Generate the SaaS Security Report
- Filter Unsanctioned SaaS Apps
-
- SaaS Policy Rule Recommendations
- App-ID Cloud Engine
- Guidelines for SaaS Policy Rule Recommendations
- Apply Predefined SaaS Policy Rule Recommendations
- Create SaaS Policy Rule Recommendations
- Enable SaaS Policy Rule Recommendations
- Monitor SaaS Policy Rule Recommendations
- Delete SaaS Policy Rule Recommendations
- Modify Active SaaS Policy Rule Recommendations
- Manage Enforcement of Rule Recommendations on Strata Cloud Manager
- Manage Enforcement of Rule Recommendations on Panorama
- Tag Discovered SaaS Apps
- Apply Tag Recommendations to Sanctioned Apps
- Change Risk Score for Discovered SaaS Apps
- Troubleshoot Issues on SaaS Security Inline
-
-
- Onboarding Overview for Supported SaaS Apps
- Onboard an Aha.io App to SSPM
- Onboard an Alteryx Designer Cloud App to SSPM
- Onboard an Aptible App to SSPM
- Onboard an ArcGIS App to SSPM
- Onboard an Articulate Global App to SSPM
- Onboard an Atlassian App to SSPM
- Onboard a BambooHR App to SSPM
- Onboard a Basecamp App to SSPM
- Onboard a Bitbucket App to SSPM
- Onboard a Bito AI App to SSPM
- Onboard a BlueJeans App to SSPM
- Onboard a Box App to SSPM
- Onboard a Bright Security App to SSPM
- Onboard a Celonis App to SSPM
- Onboard a Cisco Meraki App to SSPM
- Onboard a Claude App to SSPM
- Onboard a ClickUp App to SSPM
- Onboard a Codeium App to SSPM
- Onboard a Cody App to SSPM
- Onboard a Confluence App to SSPM
- Onboard a Contentful App to SSPM
- Onboard a Convo App to SSPM
- Onboard a Couchbase App to SSPM
- Onboard a Coveo App to SSPM
- Onboard a Crowdin Enterprise App to SSPM
- Onboard a Customer.io App to SSPM
- Onboard a Databricks App to SSPM
- Onboard a Datadog App to SSPM
- Onboard a DocHub App to SSPM
- Onboard a DocuSign App to SSPM
- Onboard a Dropbox Business App to SSPM
- Onboard an Envoy App to SSPM
- Onboard an Expiration Reminder App to SSPM
- Onboard a Gainsight PX App to SSPM
- Onboard a GitHub Enterprise App to SSPM
- Onboard a GitLab App to SSPM
- Onboard a Google Analytics App to SSPM
- Onboard a Google Workspace App to SSPM
- Onboard a GoTo Meeting App to SSPM
- Onboard a Grammarly App to SSPM
- Onboard a Harness App to SSPM
- Onboard a Hellonext App to SSPM
- Onboard a Hugging Face App to SSPM
- Onboard an IDrive App to SSPM
- Onboard an Intercom App to SSPM
- Onboard a Jira App to SSPM
- Onboard a Kanbanize App to SSPM
- Onboard a Kanban Tool App to SSPM
- Onboard a Krisp App to SSPM
- Onboard a Kustomer App to SSPM
- Onboard a Lokalise App to SSPM
- Onboard a Microsoft 365 Copilot App to SSPM
- Onboard a Microsoft Azure AD App to SSPM
- Onboard a Microsoft Exchange App to SSPM
- Onboard a Microsoft OneDrive App to SSPM
- Onboard a Microsoft Outlook App to SSPM
- Onboard a Microsoft Power BI App to SSPM
- Onboard a Microsoft SharePoint App to SSPM
- Onboard a Microsoft Teams App to SSPM
- Onboard a Miro App to SSPM
- Onboard a monday.com App to SSPM
- Onboard a MongoDB Atlas App to SSPM
- Onboard a MuleSoft App to SSPM
- Onboard a Mural App to SSPM
- Onboard a Notta App to SSPM
- Onboard an Office 365 App to SSPM
- Onboard Office 365 Productivity Apps to SSPM
- Onboard an Okta App to SSPM
- Onboard an OpenAI App to SSPM
- Onboard a PagerDuty App to SSPM
- Onboard a Perplexity App to SSPM
- Onboard a Qodo App to SSPM
- Onboard a RingCentral App to SSPM
- Onboard a Salesforce App to SSPM
- Onboard an SAP Ariba App to SSPM
- Onboard a ServiceNow App to SSPM
- Onboard a Slack Enterprise App to SSPM
- Onboard a Snowflake App to SSPM
- Onboard a SparkPost App to SSPM
- Onboard a Tableau Cloud App to SSPM
- Onboard a Tabnine App to SSPM
- Onboard a Webex App to SSPM
- Onboard a Weights & Biases App to SSPM
- Onboard a Workday App to SSPM
- Onboard a Wrike App to SSPM
- Onboard a YouTrack App to SSPM
- Onboard a Zendesk App to SSPM
- Onboard a Zoom App to SSPM
- Onboarding an App Using Azure AD Credentials
- Onboarding an App Using Okta Credentials
- Register an Azure AD Client Application
- View the Health Status of Application Scans
- Delete SaaS Apps Managed by SSPM
-
-
-
- New Features Introduced in December 2024
- New Features Introduced in November 2024
- New Features Introduced in October 2024
- New Features Introduced in August 2024
- New Features Introduced in July 2024
- New Features Introduced in June 2024
- New Features Introduced in May 2024
- New Features Introduced in April 2024
- New Features Introduced in March 2024
- New Features Introduced in January 2024
-
- New Features Introduced in November 2023
- New Features Introduced in October 2023
- New Features Introduced in September 2023
- New Features Introduced in August 2023
- New Features Introduced in July 2023
- New Features Introduced in June 2023
- New Features Introduced in May 2023
- New Features Introduced in April 2023
- New Features Introduced in March 2023
- New Features Introduced in January 2023
-
- New Features Introduced in December 2021
- New Features Introduced in October 2021
- New Features Introduced in September 2021
- New Features Introduced in August 2021
- New Features Introduced in July 2021
- New Features Introduced in June 2021
- New Features Introduced in May 2021
- New Features Introduced in March 2021
- New Features Introduced in January 2021
How SaaS Security Inline Determines an App's Risk Score
An app's risk score is determined by a calculation that is applied to the app's
attribute values.
Where Can I Use This? | What Do I Need? |
---|---|
|
Or any of the following licenses that include the SaaS Security Inline license:
|
We designed app risk scores to help you quickly assess the security posture of an app.
Because you might be using this information to determine whether to allow or block
access to an app, it's helpful to understand how SaaS Security Inline determines
the risk score. Ultimately, an app's risk score is determined by a calculation that is
based on the app's attribute values. But to understand the significance and accuracy of
the risk score, you should understand how we identify the app attributes, how we
determine the attribute values for each app, and how the calculation considers some
attributes to have a greater impact on risk scores than others.
For all apps, SaaS Security Inline
calculates a SaaS Risk Score from Compliance, Identity Access Management,
and Security and Privacy attribute values. For the subset of apps that are GenAI apps,
SaaS Security Inline also calculates a GenAI Risk Score from
GenAI attributes. For most apps, the
SaaS Risk Score is the app's risk score. For GenAI apps only, the app's risk score is
derived from both the SaaS Risk Score and the
GenAI Risk Score
, with more weight
given to the GenAI Risk Score.To determine an app's risk score, the following actions are taken by Palo Alto Networks
and by SaaS Security Inline.
- Attribute Identification: Palo Alto Networks analyzes the current SaaS Security landscape to identify characteristics of SaaS apps that can impact an app's security posture. These characteristics are the attributes that we will identify for the SaaS apps that SaaS Security Inline can detect in your environment. These attributes are divided into the following categories based on how they can impact an app's security posture.
- Compliance attributes identify whether an app adheres to various regulatory
requirements and standards.
- Identity Access Management attributes identify an app's authentication and
access control capabilities.
- Security and Privacy attributes identify product features for protecting
data.
Attribute Identification Updates: Palo Alto Networks's analysis of the SaaS Security landscape is ongoing. As new threats emerge, new app attributes are added to SaaS Security Inline. - Compliance attributes identify whether an app adheres to various regulatory
requirements and standards.
- Attribute Value Determination: For each SaaS app that can be detected by SaaS Security Inline, Palo Alto Networks determines the values to assign to the app attributes. Palo Alto Networks uses a variety of techniques to determine whether the SaaS app has the capabilities identified by the attributes. For many attributes, we rely on publicly available documentation to determine attribute values. This publicly available documentation includes a SaaS app's help documentation, privacy policy, and security documents. For other attributes, we examine the app domain or app traffic to determine attribute values.In most cases, the determination of attribute values is an automated process. For certain priority apps, we manually determine attribute values. We identify apps as priority apps based on app usage and user feedback.
- Compliance Attribute Determination: To determine these attribute values, we rely completely on the documentation and public links of the app.
- Identity Access Management Attribute Determination: To determine these attribute values, we rely mostly on the documentation and public links of the app. For a subset of apps that we have identified as priority apps, we access the app to determine attribute values.
- Security and Privacy Attribute Determination: We use several methods
to determine these attribute values. The method we use depends on the
particular attribute.
Attributes Attribute Determination Method - Data Ownership
- File/Content Sharing
- Audit Log
- Disaster Recovery
- Encryption at Rest
- Encryption Strength at Rest
- Native Data Classification
- Data Retention
- Privacy Policy
- Terms and Conditions
- Session Timeout
- Third Party Data Sharing
To determine values for these attributes, we rely completely on the documentation and public links of the app. Encryption in Transit We examine the SaaS app domain to identify the TLS versions that the app supports. HTTP Security Headers We analyze app traffic to identify whether the SaaS app is using security headers. Protected from Downgrade Attacks We examine the SaaS app domain to identify the TLS versions that the app supports. We also examine whether the SaaS app allows TLS 1.0 or TLS 1.1 connections. Spoof Risk Level We analyze the DMARC and SPF records for the SaaS app domain to determine the value for this attribute.
Attribute Value Determination Updates:- On a monthly basis, we identify new SaaS apps and add the apps to the app library. We determine the attribute values for these new apps.
- On a monthly basis, we manually verify attribute data for priority apps. If necessary, we update attribute values based on this research.
- On a monthly basis, we measure the accuracy of the attribute data collected by our automated processes. On a quarterly basis, we update our automated processes based on this research.
- On a quarterly basis, we collect and update attribute values for apps by using our updated automated processes.
- Attribute Weight Assignment: We assign weights to app attributes, which will affect the risk score calculation. We assign each attribute a default weight from 0-100. As required by the risk score calculation, the combined weights for all of the attributes total 100.To assign default weights, we assess the security impact of the attribute categories and the individual attributes. Attributes that we consider to have a greater security impact are assigned greater weights, and will have a greater impact on an app's risk score. You can view the default weights from the SaaS Security Settings page (SettingsConfigureConfigure Global Risk Score). From this page, you can also adjust the weights assigned to attributes.Attribute Weight Assignment Updates: As we add attributes to SaaS Security Inline, we revise the attribute weight assignments, which in turn can affect the app risk scores. We might also update weight assignments if we determine that certain attributes should have a greater or lesser impact on an app's risk score.
- Risk Score Calculation: SaaS Security Inline assigns a risk score for each app by completing the following actions:
- SaaS Security Inline assigns a risk score to each attribute based on the attribute value. The attribute value identifies an app characteristic that strengthens or weakens the app's overall security posture. If the value weakens the security posture, the attribute is assigned a higher risk score. For example, the MFA attribute value indicates whether an app offers multi-factor authentication (MFA). If the app does support MFA, the attribute is assigned the lowest risk score. However, if the attribute value indicates that the app does not offer MFA (or that MFA support cannot be derived from the app documentation), the attribute is assigned a higher risk score.
- To determine the app's overall risk score, SaaS Security Inline calculates the weighted average of the individual attribute risk scores. The weighted average is based on the weights that were assigned to the attributes.
- SaaS Security Inline scales the risk score within a range of 1-5, with 1 representing the lowest risk and 5 representing the greatest risk, and assigns the risk score to the app.
If you think there are adjustments that we should make to an app's risk score, send us feedback. To send us feedback, click on the following icon, which appears on the Application Dictionary, Discovered Applications, and Application Detail views.In the Give App Feedback form, select Risk score adjustment as the Feedback Type.
GenAI Risk Score
For GenAI apps only, the risk score calculation considers GenAI attributes. SaaS Security Inline calculates a
separate GenAI Risk Score from the following attribute values. This GenAI risk score
is combined with the risk score calculated from the Compliance, Identity Access
Management, and Security and Privacy attributes, which is called the SaaS Risk
Score, to determine the GenAI apps final risk score.
- SaaS Security Inline determines the values for the following GenAI
attributes, which have the following assigned weights:
Attribute Weight Input Data Types 10% Output Data Types 15% Interface 10% Data Used in Model Training 45% Popularity 20% - SaaS Security Inline calculates the GenAI Risk Score based on these values
and then combines it with the SaaS Risk Score. The risk score calculation gives
more weight to the GenAI risk score.
Risk Score Weight GenAI Risk Score 70% SaaS Risk Score 30%