New Features Introduced in July 2024
Focus
Focus
SaaS Security

New Features Introduced in July 2024

Table of Contents

New Features Introduced in July 2024

Learn about the new features that became available in SaaS Security starting July 2024.
The following new features were introduced for SaaS Security in July 2024. Refer to the Administrator’s Guide for more information on how to use Data Security, SaaS Security Inline, SaaS Security Posture Management (SSPM), and Behavior Threats.

Create Policies in SSPM

You can now create policies to monitor specific settings for specific application instances. This capability helps you to concentrate your attention on the applications and settings that are most critical to your organization. SSPM displays the status of all policies on a new Security Configurations page (SSPMSecurity Configurations). On the Security Configurations page, you can also view the status of SSPM's predefined rules. While SSPM's predefined rules monitor the status of similar settings across all SaaS applications, administrator-defined policies focus on the applications and settings that are most important to you.
For example, for the subset of applications that are most critical to your organization, enforcing multi-factor authentication (MFA) and limiting session length might be of primary importance to you. In this case, you could create a policy that monitors only these critical applications and only the settings related to MFA and session duration. If SSPM detects a new violation in these settings, SSPM updates the policy status on the Security Configurations page. In this way, SSPM helps you track the status of your most critical applications to maintain a healthy security posture.
This new feature also introduces a change to SSPM terminology. Previously, the term policy referred to a built-in recommendation for securing SaaS applications. Each policy was a grouping of similar settings, related to the recommendation, across all applications. When SSPM detected a misconfigured setting, SSPM would change the associated policy's status to Failed. What was previously called a policy in SSPM is now called a rule. The purpose and behavior of rules are the same as when they were called policies; only the name has changed.
The term policy now refers to an administrator-defined grouping of SaaS application instance settings for SSPM to monitor.

Webhook Notifications from SSPM

To ensure you can respond immediately to critical changes across your SaaS application portfolio, you need timely and automated notifications that integrate directly into your established communication and collaboration workflows, eliminating the need for constant manual checks of a dashboard. To provide such timely responses, SaaS Security Posture Management (SSPM) now provides support for webhook notifications.
With this feature, you can configure SSPM to send webhook notifications directly to a specified channel in Slack or Microsoft Teams. You will receive notifications when applications are onboarded or deleted, the first time an application is scanned, and when scans detect changes to an application's configuration settings. This integration keeps you informed in real-time within the tools you already use.

Assess Your Identity Posture in SSPM

In today's cloud environment, ensuring robust identity protection is critical, yet many organizations struggle with misconfigurations in their essential security controls, particularly Multi-Factor Authentication (MFA). Leaving identity gaps open increases the risk of unauthorized access and account compromise.
To tackle this persistent problem, SaaS Security Posture Management (SSPM) now includes an Identity Security component. This new feature is specifically designed to help you analyze and identify critical misconfigurations within your overall identity posture. The component gives security teams actionable visibility into common MFA implementation problems, including both enrollment failures and authentication sign-in issues that could compromise user accounts. The Identity Security component leverages information sourced directly from your organization’s identity provider. It supports integration with key platforms, allowing you to connect either the Microsoft Azure or the Okta identity provider.

Scan Support for ChatGPT Enterprise App

Enterprises have started to use GenAI apps to increase productivity and efficiency. However, usage of these apps like ChatGPT poses some serious security risks like app misconfiguration, bad access control, malicious attacks, sensitive data exposure, and data leakage to unauthorized third-party vendors. So, as an administrator, you need to secure your app and data from attacks and prevent the loss of sensitive data. You can connect a ChatGPT Enterprise instance to Data Security to gain visibility into the usage of ChatGPT in your network. With this feature, you can define Data Asset policy rules to create incidents for sensitive data after you onboard your ChatGPT enterprise app to Data Security.