top of page

What 10,000 SaaS Discoveries Taught Us About Enterprise Blind Spots

10,000 SaaS Discoveries
10,000 SaaS Discoveries

If you’ve ever been surprised by a “Where did that app come from?” moment, you’re not alone. After running more than 10,000 SaaS discovery scans across industries, we’ve seen the same hidden risks crop up again and again. Waldo Security maps every SaaS app and account in minutes, including shadow tenants and AI plug-ins, then helps you govern access, right-size OAuth scopes, automate offboarding, and export audit-ready evidence—so you can fix problems you can finally see. Start with Instant SaaS Discovery, then keep auditors happy with the SaaS Compliance Overview.


A quick reality check (why blind spots keep winning)

  • The average organization still juggles ~100+ apps, even in a “consolidation” era. More apps = more doors to lock. (BetterCloud, Okta)

  • Credentials remain the easiest way in: “Basic Web Application Attacks” still lean heavily on stolen logins. If you don’t know which apps are in play, you can’t protect the logins that matter. (Verizon)

  • Breach costs are stubborn: IBM pegs the global average at about $4.4M, and warns of an AI oversight gap—ungoverned tools raise both likelihood and cost. (IBM)

  • Shadow AI is exploding. Netskope tracks 1,500+ GenAI SaaS apps and rising—many bypass normal reviews and identity controls. (Netskope)

These stats aren’t fearmongering; they’re context. The pattern we see is simple: unknown ≠ unmanaged, and unmanaged ≠ secure.


The 9 blind spots we keep seeing (and how they bite)

1) Duplicate tenants you didn’t know existed

A team spins up a separate tenant “just for a pilot.” It quietly accumulates real data and real users—outside your normal controls and logs. Later, a renewal hits finance, or an incident hits IR, and nobody knows who owns it. Okta’s long-running Businesses at Work research shows app portfolios keep growing past the 100-app mark; duplicate environments are an inevitable side effect. (Okta)


2) Unmanaged identities in the long tail

Most orgs protect the big suites. Risk hides in the small tools with local passwords, shared logins, or guest accounts that never expire. This is exactly where stolen credentials turn into quiet data access, which DBIR keeps highlighting in web-app breaches. (Verizon)


3) OAuth persistence nobody meant to grant

One “Sign in with…” later, an app gets broad scopes plus offline_access and keeps refreshing tokens indefinitely. Password resets don’t fix it; revoking tokens and consent does. (In our scans, durable delegated access is one of the top two misconfig drivers of blast radius.)


4) Shadow AI plug-ins sitting in the browser

The fastest-growing “apps” aren’t apps at all—they’re GenAI extensions and assistants inside tools your teams already use. They often move sensitive snippets (tickets, code, contracts) into third-party models without your knowledge. Netskope’s tracking of 1,500+ GenAI apps confirms the pace. (Netskope)


5) External guests with internal powers

Partners and contractors accrue permissions over time, especially in collaboration suites. Guests become de facto admins (“just for this project”), and no one revisits the role. Six months later, offboarding misses them.


6) Admin sprawl hiding behind “just in case”

Every extra admin account widens your incident blast radius and audit effort. It also compounds credential risk—because attackers love powerful logins. (Again, DBIR’s emphasis on credential-driven web-app attacks is the north star here.) (Verizon)


7) Public links you forgot to turn off

A one-click public link solves today’s collaboration problem and creates tomorrow’s data-exposure problem. We routinely find widely shared files in marketing drives, HR folders, and product wikis that were never meant to be world-readable.


8) Spend that doesn’t match risk

By the time finance sees renewals, it’s too late to have the “does anyone still use this?” conversation. Reports from multiple sources show portfolios expanding or hovering around triple digits; the spend signal alone won’t tell you what’s risky, only what’s expensive. Pair usage + sensitivity, not just dollars. (BetterCloud, Zylo)


9) Evidence after the fact

If you collect screenshots the week before an audit, you’re going to hate your job. The fix is continuous, exportable evidence: SSO coverage, role changes, OAuth diffs, offboarding timestamps, and data-sharing exceptions—all tied to real apps and accounts.


What “good” looks like (a simple, durable loop)

We call it Find → Fix → Prove. It’s not flashy, but it works.

FIND: Build a living inventory, not a spreadsheet

Aggregate identity, email, network, browser, and spend signals into one deduped list of apps, tenants, and accounts. Tag each with owner, department, auth method (SSO vs local), admin count, OAuth scopes, and data sensitivity. CISA’s Cloud Security Technical Reference Architecture puts inventory and least-privilege at the heart of cloud/SaaS governance for a reason—everything else assumes you did this first. (CISA)

With Waldo: SaaS Discovery reveals sanctioned, unsanctioned, and AI tools in minutes—no manual hunts.

FIX: Right-size identity and sharing where it matters most

  • Enforce SSO + MFA on high-sensitivity apps first.

  • Cull admin sprawl and require time-boxed elevation.

  • Govern OAuth: kill idle tokens, remove *.ReadWrite.All where not essential, and require verified publishers for new consents.

  • Shrink data egress: disable public links by default and restrict external share scopes.

Those moves directly counter the top breach patterns (credential + web-app) and the AI-driven growth at the edges. (Verizon, Netskope)


PROVE: Turn continuous posture into one-click evidence

Stream SaaS audit logs into your SIEM, track SSO/MFA coverage, alert on new admins and high-privilege grants, and attach timestamps to offboarding. When the next questionnaire or audit comes, export a packet instead of rebuilding proof. IBM’s data shows faster identification/containment lowers breach cost—continuous evidence makes that speed possible. (IBM)

With Waldo: The SaaS Compliance Overview maps controls to SOC 2 / ISO 27001 / HIPAA and exports evidence on demand.

The five KPIs that separate reactive from ready

  1. Unknown → Known: % of traffic/spend tied to inventoried apps (aim for +10 points in 90 days).

  2. Identity posture: SSO/MFA coverage across high-risk apps; number of high-privilege OAuth grants.

  3. Admin hygiene: Net change in admins; % of time-boxed elevations that auto-revoke.

  4. Data exposure: Count of public links and wide external shares in high-sensitivity workspaces.

  5. Offboarding SLA: Median time from HR event to all SaaS access removed (including tokens and long-tail apps).

Keep it small, keep it measurable, and review monthly.


A 30-day action plan you can actually finish

  • Week 1 — See it. Run discovery; tag owners, auth method, sensitivity. Flag duplicate tenants, local passwords, and admin outliers.

  • Week 2 — Stabilize it. Enforce SSO/MFA on top 20 riskiest apps; revoke stale OAuth tokens; require verified publishers for new consents.

  • Week 3 — Seal it. Turn off public links by default in docs/drives; review external guests; transfer orphaned data to teams.

  • Week 4 — Prove it. Wire SaaS logs to SIEM, enable drift alerts (new apps/admins/shares), and generate your first monthly evidence packet.

With Waldo, most of this is configuration and bulk actions—not a spreadsheet marathon.


The bottom line

After 10,000 discoveries, the pattern is clear: enterprises aren’t losing to zero-days; they’re losing to zero-visibility. Unknown apps become unmanaged identities; unmanaged identities fuel credential-driven incidents; incidents become expensive when you lack the evidence to act quickly. The fix isn’t a silver bullet—it’s a reliable loop: Find what’s real, Fix what matters, Prove it continuously.

If you want that loop without the heavy lift, we built it for you. Start with Instant SaaS Discovery. We’ll turn blind spots into a punch list—and then into a boring, predictable process.


P.S. If you only do one thing this quarter: get a living inventory. Everything good—identity hygiene, OAuth governance, data protection, and audit sanity—starts there.

 
 
 

Comments


bottom of page