Shadow Applications
Last updated
Last updated
On this page, you will see a list of discovered Shadow applications from your integrated SaaS applications. It shows crucial and security analyst-curated information about applications that are not otherwise easily accessible to administrators/ security personnel. Here's a detailed breakdown of the information included in the applications table: i. Name This column holds the name and the logo of the discovered application (app). ii. Applications This column holds the name of the SaaS application from which the discovered application (app) was authorized. iii. Users As the name suggests, this column holds the total number of users from the application who authorized the discovered shadow application. iv. Scopes This column holds the number of total unique scopes that the discovered application (app) was authorized to. v. Scopes Risk This column holds the well-calculated risk of the discovered application. vi. Approval Status This column holds information about the approval status of the discovered application. This column is a dropdown with the options, a. Approved b. Not Approved c. Not Reviewed
NOTE: Applications using AI technology are marked automatically.
Filters:
Scope Risk - Users can choose to look at Shadow apps with a certain scope risk amongst Critical, High, Medium, Low, and All Good.
Approval Status - Users can choose to look at Shadow apps that are either Approved, Not Approved, or Not Reviewed.
AI application - Users can also look at AI applications.
Download: A download option in CSV format is provided which can be useful in auditing purposes.
When a newly discovered application (app) gets added to the list, its default status becomes Not Reviewed which Perimeters' Application Administrators can manually change based on the application inspection with Application Trust Profile.
On clicking a Discovered Application's (app) name, a side drawer will appear - this contains detailed information about the application.
Here is a breakdown of all the information the Discovered Applications (app) side drawer includes:
Overview
The overview has multiple parts sharing different types of information, this includes five types of information, here is a breakdown of the information : i. Scopes Risk This section shows the overall scope risk of the application with the number of delegated scopes. ii. Users This section shows the total number of users who have authorized the discovered application (app). iii. Applications This section shows the total number of Integrated SaaS applications from which the discovered application (app) was authorized. iv. Frameworks This section shows the security compliance frameworks that the discovered application (app) claims to be compliant (certified) with.
Trustworthy
This section shows the level of trust Perimeters has on the discovered application, the trustworthy indicator has value in % which comes from calculating Trust Profile data with Perimeters' well-crafted algorithm.
Scopes Risk
This section shows the number of risky scopes along with the risk from the discovered application (app).
In the middle section, you'll find various tabs, these tabs share detailed information about Issues, Trust profile for that application, Users, Applications, and Scopes as detailed below.
Issues
Shadow (Third Party Applications) may be a significant entry point to the SaaS Supply Chain and other types of Cyber Attacks. Hence, it's important that a SaaS Security Solution provides enough visibility and insights about these apps. Perimeters provides such based on Scope risks, admin authorizations, Vendor Risks as well as AI risks.
Trust Profile Trust Profiles has information that Perimeters' automated system collects about the discovered application, which later on gets approved by a Security Analyst. These Trust Profiles are a collection of three types of information : i. General Information
This includes some basic information of the the Company or Organization that provides the discovered application (app). ii. Company Disclosure
This includes security compliances (certificates) and some data protection and processing policies such as Privacy Policy, Disaster Recovery Policy, Terms of Use etc. iii. Security Details
This includes technical or Security information such as Web Application Firewall (WAF) support, Transport layer Security (TLS) versions, Incidents etc.
Users
This tab contains a list of users with various types of information, here is a breakdown of the information : i. Name This column holds name of the user along with email and profile picture. Also, if user is privileged or not. ii. Scopes This column holds number of scopes that the user has authorized the access to the discovered application. iii. Applications This column holds the application through which the discovered application was authorized. iv. Scope Risk This column represents the security risk of scopes asked by the shadow application.
Applications
This tab contains applications that were used to connect with shadow apps, along with the following information : i. Application This column holds the Integrated SaaS applications from which the discovered application was authorized. ii. Since When This column holds the timestamp of when the discovered application was first detected.
iii. Scopes It depicts the number of scopes requested by the shadow application. iii. Users This column holds the total number of users who authorized the discovered application. iv. Issues This column holds the total number of open issues for the Integrated SaaS application. v. Severity This column holds the overall severity of the open issues for the Integrated SaaS application.
Scopes
This tab contains a list of unique scopes and affiliated information : i. Name Name or Scope names are standardized from perimeters to make them understandable. Perimeters' scope name involves the Resource and the Access type or level to the resource. ii. Applications This column holds the name of the Integrated SaaS application from which the scope was authorized. iii. Resource This column holds the name of the resource to which the scope gives access to. iv. Type This column holds the access type or level that the scope requests. v. Risk As the name suggests, this column holds the overall risk that the scopes pose to an organization.