SaaS Security Review
Your productivity suite is an attack surface.
Security configuration assessment of Microsoft 365 and Google Workspace against CIS benchmarks and security best practices.
Overview
SaaS security review evaluates the security configuration of your Microsoft 365 or Google Workspace environment against CIS benchmarks and industry best practices. These platforms are the backbone of modern business operations—and prime targets for attackers. Misconfigured sharing settings, weak authentication policies, and overly permissive access controls can expose sensitive data without anyone touching your network perimeter.
What We Test
Our saas security review engagements cover these key areas:
Identity & Authentication
Entra ID or Google Identity configurations including MFA enforcement, conditional access policies, and password policies.
Email Security
Exchange Online or Gmail settings for anti-phishing, anti-malware, DMARC/DKIM/SPF records, and mail flow rules.
Data Sharing Controls
SharePoint, OneDrive, and Google Drive external sharing settings, guest access policies, and link sharing defaults.
Collaboration Settings
Teams or Google Meet/Chat configurations for external access, guest permissions, and channel policies.
Admin & Privileged Access
Global admin accounts, role assignments, and privileged access management configurations.
Audit & Logging
Unified audit log settings, retention policies, and alert configurations for security events.
Our Approach
We assess your SaaS environment using a combination of native security tools, third-party scanners, and manual configuration review against CIS benchmarks.
Access Configuration
We configure read-only admin access to assess your tenant without making changes to production settings.
Automated Assessment
Security posture tools scan your configuration against hundreds of CIS benchmark controls and best practices.
Manual Review
We manually review sharing policies, conditional access rules, and high-risk configurations that automated tools miss.
Benchmark Mapping
Findings are mapped to CIS Microsoft 365 or Google Workspace benchmarks with specific remediation guidance.
Common Findings
These are issues we frequently discover during saas security review engagements:
MFA Not Enforced
CriticalMulti-factor authentication not required for all users, leaving accounts vulnerable to credential attacks.
External Sharing Overly Permissive
HighSharePoint or Google Drive configured to allow anonymous sharing or sharing with any external user.
Legacy Authentication Enabled
HighLegacy protocols (POP, IMAP, SMTP AUTH) still enabled, bypassing modern authentication controls.
Missing Email Authentication
MediumDMARC, DKIM, or SPF records missing or misconfigured, enabling email spoofing attacks.
Excessive Global Admins
MediumToo many accounts with global administrator privileges beyond operational requirements.
Common Questions
Which platforms do you assess?
We assess Microsoft 365 (including Entra ID, Exchange Online, SharePoint, OneDrive, and Teams) and Google Workspace (including Gmail, Drive, Meet, and Admin console). We can assess either platform individually or both if you're in a hybrid environment.
What access do you need?
We need read-only administrative access to review configurations. For Microsoft 365, this typically means Global Reader or Security Reader roles. For Google Workspace, we need a super admin account or delegated admin access with reporting privileges.
Do you test against CIS benchmarks?
Yes. We assess against the CIS Microsoft 365 Foundations Benchmark or CIS Google Workspace Foundations Benchmark, depending on your platform. We can also map findings to other frameworks like NIST or your internal security standards.
Other Vulnerability Assessment Options
Network Vulnerability Scanning
Comprehensive scanning of internal and external network infrastructure to identify vulnerable systems and misconfigurations.
Web Application Scanning
Automated and manual scanning of web applications for OWASP Top 10 vulnerabilities and security misconfigurations.
Cloud Configuration Review
Assessment of AWS, Azure, or GCP configurations against CIS benchmarks and cloud security best practices.
Database Security Assessment
Evaluation of database configurations, access controls, and encryption for SQL Server, Oracle, PostgreSQL, and more.
Ready to Strengthen Your Defenses?
Schedule a free consultation with our security experts to discuss your organization's needs.
Or call us directly at (445) 273-2873