
306 ◾ Information Security Management Handbook
Table 20.1 highlights the security challenges for adopting these models and the relative advan-
tages and disadvantages.
Securing SaaS Applications
We have identified the following key mitigation strategies for addressing the above critical security
challenges and improving the robustness of the SaaS applications:
◾ Secure product engineering
◾ Secure deployment
◾ Governance and regulatory compliance audits
◾ ird-Party SaaS security assessment
Secure Product Engineering
Product vendors are always rushing to meet market release deadlines. Consequently, product secu-
rity is often given lesser precedence. ...