Managed service providers (MSPs) have become a favored target of cyberaattackers, particularly for attempted wide-scale scores.
As a result, monitoring and segmenting events by severity has become more critical than ever for MSPs, witness the high-profile SUNBURST and Kaseya attacks that went after MSPs’ accounts to gain network access at bigger targets. But with proper monitoring, alerts that rise to the level of “critical” are very few in number in comparison to the total number of events. With the right monitoring approach and an accurate security configuration, security teams will not be overrun with the “noise” of incidental alerts.
The news comes via SaaS Alerts, a Wilmington, North Carolina software-as-a-service (SaaS) platform monitoring specialist, in the third annual edition of its SaaS Application Security Insights (SASI) report.
In fact, out of 976 million total alerts in 2022, SaaS Alerts saw:
To gather data for the report, SaaS Alerts sifted information gleaned from the SaaS application security records of roughly 7,500 small and medium-sized businesses (SMBs), 728 MSP partners, and 980,000 end user accounts during the period January 1 to December 31, 2022.
A Deeper Dive into the Report
Key findings include:
MSSP Alert Interviews SaaS Alerts' Jim Lippie
MSSP Alert asked SaaS Alerts chief executive Jim Lippie to clarify some of the data in the SASI report. Below are his answers, submitted by email, regarding platform tools, MSPs, alerts and much more. Jessica C. Davis, CyberRisk Alliance editorial director, Channel Brands, conducted the interview.
MSSP Alert: Can you clarify how many platform tools that MSPs use and how many alerts were generated over the course of a year?
"We added VSA and CW Automate more than halfway through the year, so we did not include those numbers because they would not be fair "apples to apples" comparisons. That said, on average we monitor 15-30 different events per MSP tool.
"I should also highlight, just because a specific application throws off a lot of alerts it doesn't mean it's always a negative. Our MSPs have the ability to customize alert thresholds on every application. Generally speaking, MSPs set higher thresholds for their own tools (like NinjaOne or IT Glue) because they want to keep even a closer eye on the apps within their own operation.
"The other apps monitored throughout the year were, MSFT 365, Google Workspace, Salesforce, Slack and Dropbox."
MSSP Alert: Just to clarify then, the number of alerts are all based on how the MSP has tuned the tool for each individual application?
"There are a fixed number of events that we monitor, and the total number is now up to 254. There are three settings (Low, Medium, Critical). MSPs can set a customized alert threshold for each event. For example, if a certain "high risk" employee exceeds 25 GB of data downloaded out of OneDrive, an MSP can determine that event a "critical alert". However, there could be other employees that are allowed to download 300 GB of data."
8 SaaS Hygiene Practices
Based on the current and emerging SaaS application threat vectors SaaS Alerts recommends the following eight hygiene practices:
“The good news is that more MSPs are starting to monitor their internal own tools,” the report reads. “SaaS Alerts saw a 200% increase in the MSPs using our platform who are monitoring their own tools, with at least half now monitoring one or more tool.”