Skip to main content

SaaS Security Posture Management

The One Protect includes a SaaS Security Posture Management (SSPM) module that connects to your clients' SaaS applications, evaluates their security configurations, and provides remediation guidance for misconfigurations.

Supported SaaS Applications

ApplicationConnection MethodChecks
Microsoft 365OAuth (Graph API)MFA enforcement, conditional access, external sharing, mailbox forwarding, admin roles
Google WorkspaceOAuth (Admin SDK)2-Step Verification, app passwords, external sharing, Drive permissions, admin roles
SalesforceOAuth (REST API)MFA enforcement, session settings, IP restrictions, API access, field-level security
Dropbox BusinessOAuthExternal sharing, link expiration, device approvals, SSO enforcement
SlackOAuthExternal channel access, file sharing permissions, SSO enforcement, app installations
ZoomOAuthMeeting security defaults, waiting room, recording permissions, SSO enforcement

Connecting a SaaS Application

  1. Navigate to Protect → SaaS Security → Connected Apps
  2. Click Connect App
  3. Select the application
  4. Authenticate with an admin account in the target tenant
  5. Grant the requested permissions
  6. Click Complete Setup

The first security scan runs automatically within 15 minutes of connection.

ℹ️Connecting a SaaS app requires admin-level access in the target tenant. The OAuth token is stored securely in Azure Key Vault.

Security Scoring

Each connected application receives a security score from 0 to 100 based on its configuration:

Score RangeRatingMeaning
90–100ExcellentAll critical settings are properly configured
70–89GoodMinor misconfigurations that should be addressed
50–69FairSeveral misconfigurations that increase risk
0–49PoorCritical misconfigurations requiring immediate attention

The score is recalculated after each scan. View score history and trends from the Score History tab on each connected app.

Misconfiguration Detection

The SSPM module checks for common misconfigurations across connected apps:

Identity and Access

  • MFA not enforced for all users
  • Conditional access policies missing or misconfigured
  • Admin roles assigned to too many users
  • Stale accounts (no sign-in for 90+ days)
  • Guest/external user access not restricted

Data Sharing

  • External sharing enabled without restrictions
  • Public link sharing with no expiration
  • Mailbox forwarding rules to external addresses
  • Drive/file sharing with "anyone with the link"

Security Settings

  • SSO not enforced
  • Session timeout too long or not configured
  • API access granted without restrictions
  • App installations not limited to approved list
  • Audit logging not enabled

Each finding includes:

  • Severity — Critical, High, Medium, or Low
  • Description — What was detected
  • Risk — Why it matters
  • Remediation — Step-by-step instructions to fix the misconfiguration

Remediation Guidance

Each misconfiguration finding includes detailed remediation steps:

  1. Open the finding from SaaS Security → Findings
  2. Review the Remediation section for step-by-step instructions
  3. Click Mark as Remediated after applying the fix
  4. The next scan verifies the fix and updates the score

For findings that require action in the SaaS admin console, the remediation steps include direct links to the relevant settings page when available.

⚠️Remediation actions are performed in the SaaS application's admin console, not in The One Protect. The One Protect detects and reports misconfigurations but does not modify SaaS configurations directly.