Dark Mode

Free Trial
Image of Mor Bikovsky
  • 8 min read
  • May 5, 2025 10:27:49 AM

Calling for SaaS Security Reform

SaaS Security Reform1

When JPMorgan Chase sounds the alarm, we should all pay attention.

In a powerful open letter, the firm argues that the SaaS delivery model, while transformative, is eroding fundamental security boundaries and introducing systemic risk at a scale the industry is not prepared to handle.

It's not an altogether unfamiliar warning. Over the years, we've seen many security insiders comment on the potential dangers of letting current trends continue unabated. What sets this letter apart though was not only where it came from — a giant of global finance and trade — but the fact that it was not dealing in hypotheticals.

JPMorgan is talking about very real and growing costs to their business, requiring them to:

  • Respond to compromised third-parties when those SaaS providers ensnared JPMorgan data and system in their problems

  • Isolate vendors, cutting off access or removing integrations

  • Dedicate significant internal resources to clean up and mitigate vendor fallout

It's placing an unreasonable burden on the business and appears to be increasing in frequency. Which is why JPMorgan took the bold step of publicly calling out software providers, challenging them to do better.

To abandon fragile trust models. To rebuild security architectures that can withstand the realities of SaaS sprawl, token-based trust, and identity-driven integration. And most importantly, to prioritize secure-by-default design. 

At GYTPOL, we know better than anyone just how not secure-by-default most devices, systems, and environments are. In fact, insecure defaults are a huge part of the overall configuration security challenge that we were founded to solve.

Unfortunately, the gap  between the current reality and the secure-by-default paradigm that JPMorgan called for is very big. And it's costing companies dearly, with an estimated 15% of all breaches stemming from insecure defaults. 

Security Design and Defaults Aren't Keeping Up

It's fairly difficult to argue with the point that legacy assumptions about endpoint hardening, segmentation, and trust boundaries don’t hold up in a SaaS-first world. While integration, speed, and collaboration have accelerated, the hygiene and governance of security configurations — especially those enabled by default — remain dangerously misaligned.

As JPMorgan rightly points out, the convergence of authorization and authentication, paired with over-permissive defaults and token-based integrations, has created a perfect storm.

It's why we made GYTPOL to proactively detect and remediate insecure configurations in real time across endpoints, environments and identity systems. By injecting greater visibility and measurability into your cyber hygiene efforts, we help you take concrete hardening steps before the storm hits.

Secure-by-Default Must Be More Than a Slogan

JPMorgan is challenging the industry to up its game and deliver products that are secure-by-default. The inconvenient truth however is that despite plenty of vendor claims to the contrary, we're nowhere near that today.

To the contrary, most ship their products with problematic defaults and settings more suited to convenience than security. When JPMorgan says “we need vendors to step up,” they’re right. But even if the industry responds positively to JPMorgan's call for reform, it will be years until we bear the fruit of that response.

Where does that leave us in the interim? What do we do with all the insecure-by-default software already active in our networks? The misconfigurations are live. The risk is growing — and no one even knows where it all lays.

SaaS-security-reform

At GYTPOL, we systematically seek and close any gaps between “what’s secure by default” and “what’s running in production”. Configuration drift, excessive permissions, and misaligned policies aren’t minor missteps — they are systemic weaknesses waiting to be exploited.

With GYTPOL, organizations can:

  • Detect and fix insecure endpoint configurations before they give attackers a foothold in your network.

  • Validate that security settings match policies and enforce them continuously, not just during audits.

  • Eliminate configuration drift at scale, even across thousands of decentralized devices and users.

  • Ensure identity integration is hardened, not just assumed.

Shared Responsibility, Backed by Visibility and Control

JPMorgan’s letter is a call for change. A demand for shared responsibility. But shared responsibility is meaningless without shared visibility and control. The stakes are clear. The risks are real. And the time to act is now.

We join JPMorgan in calling on SaaS providers to do better — but we also empower customers to take control today. Because security is not just a vendor problem. It’s a hygiene problem. A configuration problem. A visibility problem.

And it's entirely solvable.

We know it is because we've solved it. Over the years, we've helped many major enterprises uncover and resolve thousands of misconfigurations across systems they believed were secure. We empower them to take control back — not just from attackers, but from blind spots, defaults, and unchecked assumptions.

Together, we can make secure-by-default a reality!


Think your environment is secure? Let’s put that to the test >>

About Author

Image of Mor Bikovsky

Mor Bikovsky

Mor draws on more than a decade of cyber and business strategy experience to lead GYTPOL's Partner Strategy.

Comments