ChaptersCircleEventsBlog

Download Publication

State of SaaS Security Report 2025
State of SaaS Security Report 2025

State of SaaS Security Report 2025

Release Date: 04/21/2025

Software-as-a-Service (SaaS) applications have become foundational to modern business operations. However, organizations are also facing a rising tide of security challenges, including visibility gaps, shadow IT, over-privileged access, and unchecked third-party integrations. Considering these conditions, Valence Security commissioned CSA to develop a survey and report to better understand the current state of SaaS security. CSA conducted the survey in January 2025 and received 420 responses from IT and security professionals. 

The main goals of the study were to: 
  • Understand who is responsible for SaaS security management, along with what tools they use and how security is enforced
  • Identify top SaaS security risks and challenges
  • Evaluate how organizations prioritize SaaS security, allocate budgets, and adopt security solutions
  • Examine the impact of emerging threats, including AI-driven integrations, SaaS-to-SaaS connections, and non-human identities

The survey findings reveal that SaaS security continues to be an afterthought. Despite clear progress, most organizations are still relying on tools and strategies not built for the realities of SaaS. They are working with incomplete coverage and inconsistent enforcement. To keep pace with the speed of SaaS and AI innovation, organizations must act now. They must embrace proactive risk reduction and understand what tools and strategies best support SaaS security as a connected ecosystem.

Key Findings:
  • SaaS security is now a high priority for 86% of organizations, with 76% increasing budgets. The focus is on key areas like threat detection and posture management.
  • 63% of organizations report external data oversharing and 56% say employees upload sensitive data to unauthorized SaaS apps, often without sufficient visibility or enforcement. 
  • With 55% of employees adopting SaaS without security’s involvement and 57% reporting fragmented administration, many organizations struggle to maintain consistent oversight. 
  • Identity and Access Management remains a challenge, with 58% of organizations struggling to enforce privileges and 54% lacking automation for lifecycle management.
  • GenAI tools and SaaS-to-SaaS integrations are expanding the attack surface. 46% of organizations struggle to monitor non-human identities and 56% report concerns about overprivileged API access.
  • Despite confidence, many organizations rely on vendor-native tools and manual audits. These fragmented strategies leave critical gaps across the SaaS environment.
Download this Resource

Bookmark
Share
Related resources
Zero Trust Guidance For Critical Infrastructure - Korean Translation
Zero Trust Guidance For Critical Infrastructure...
Zero Trust Privacy Assessment and Guidance - Japanese Translation
Zero Trust Privacy Assessment and Guidance - Ja...
CSA Code of Conduct to EU Cloud Code of Conduct Mapping
CSA Code of Conduct to EU Cloud Code of Conduct...
Phishing Tests: What Your Provider Should Be Telling You
Phishing Tests: What Your Provider Should Be Telling You
Published: 04/24/2025
Securing Smart (and Not So Smart) Devices With Microsegmentation
Securing Smart (and Not So Smart) Devices With Microsegmentation
Published: 04/14/2025
Securing Your Cloud Attack Surface by Reducing DNS Infrastructure Risk
Securing Your Cloud Attack Surface by Reducing DNS Infrastructure Risk
Published: 04/10/2025
The Disinformation Epidemic and Its Cost to Modern Enterprises
The Disinformation Epidemic and Its Cost to Modern Enterprises
Published: 04/09/2025

Acknowledgements

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Marina Bregkou
Marina Bregkou
Principal Research Analyst, Associate VP

Marina Bregkou

Principal Research Analyst, Associate VP

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Josh Buker
Josh Buker
Research Analyst, CSA

Josh Buker

Research Analyst, CSA

Ryan Gifford
Ryan Gifford
Research Analyst, CSA

Ryan Gifford

Research Analyst, CSA

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training