Compute
High-performance, scalable computing resources for your critical workloads. Orchestrate your cloud-native applications with our modern container solutions.
Discover the Compute offer
Virtual machines
VM Instances
An on-demand, flexible and secure virtual machine solution on a shared infrastructure.
Dedicated servers
OpenSource IaaS
Open source virtualised infrastructure in a trusted SecNumCloud-qualified cloud environment for complete technological sovereignty.
VMWare IaaS
Your VMware virtual machines in a trusted SecNumCloud-qualified and HDS-certified cloud environment.
Bare Metal
Dedicated, fully customisable servers for total autonomy over your sovereign infrastructure.
Containers
PaaS OpenShift
The unified platform for creating, modernising and deploying your large-scale applications in a sovereign cloud.
Managed Kubernetes
Managed container orchestration solution offering security, resilience and advanced automation on sovereign infrastructure.
Storage
Adaptable, high-performance storage solutions for all your needs. Optimise your data with our highly available block and object solutions.
Discover our Storage offer
Storage
Block storage
The adaptable block storage solution for optimum storage performance in a sovereign cloud.
Object storage
The scalable, cost-effective storage solution for your unstructured data in a sovereign cloud.
Backup
Backup solutions
Differentiated backup solutions tailored to your challenges and environments
Network
Advanced network solutions to connect and secure your infrastructures. Deploy your private networks automatically and securely.
Discover the Network offer
Network
Virtual Private Cloud
Deploy and manage your private networks 100% automatically and securely.
Private Backbone
Take full control of your network with extended Layer 2 connectivity, designed for hybrid architectures and bespoke configurations.
Firewall
Managed Firewall
Advanced security solutions for complete insulation and enhanced protection
Accommodation Dry
Housing - Dedicated space
Secure hosting for your equipment in a dedicated or shared environment, depending on your needs.
Security
Advanced security solutions to protect your critical infrastructures. Control access and defend against online threats.
Discover the Security offer
Security
Anti DDoS
The shield against online attacks
Bastion host
Transparent, centralised access control for robust protection of your infrastructure
Managed KMS
Sovereign cryptographic key management, with HSM hardware root of trust, to protect your most sensitive data on SecNumCloud infrastructure.
Managed SIEM
A centralised platform for collecting and correlating security logs, combining AI-based automation and advanced detection rules (MITRE ATT&CK).
AI
Artificial intelligence solutions to transform your data into insights and accelerate your business processes.
Discover the AI offer
AI
LLMaaS
Access cutting-edge language models on a sovereign, SecNumCloud-qualified and HDS-certified infrastructure for high-performance, secure AI applications.
GPU
NVIDIA GPU instances to accelerate your artificial intelligence and high-performance computing in a sovereign cloud.
Data
Data solutions to manage, analyse and exploit your critical data.
Discover the Data offer
Databases
Managed MariaDB
A fully managed MariaDB relational database and PITR backup on SecNumCloud sovereign infrastructure.
Managed PostGreSQL
The fully managed relational database solution on SecNumCloud sovereign infrastructure
Big Data
Managed Kafka
The open-source distributed platform for streaming data in real time
Managed File System
A managed, sovereign, high-availability distributed file system, accessible via NFS and SMB on the SecNumCloud infrastructure.
Management & Governance
Coaching and support services to help you with your cloud transformation.
Find out about our support services
Support
Support levels
Discover the 3 levels of support available to help you meet your challenges.
Professional services
From design to optimisation, Cloud Temple is with you every step of the way.
Governance
Console - API - Terraform Provider
A single interface for viewing and managing your products and services
Observability
Infrastructure metrics available in market standards
The magazine > Against "cloud camouflage": our security checklist for SaaS solutions
Published on 02/09/2023 by Giuliano Ippoliti, Director of Cybersecurity at Cloud Temple

In response to increased demand, publishers of cybersecurity solutions have expanded their offering to include a SaaS consumption model.

Several families of tools, hitherto distributed mainly in on-premise mode, have taken the plunge: antimalware, WAF, proxy, SIEM, etc. This trend towards moving security services to the cloud has many advantages, but there are also disadvantages that need to be taken seriously. Moving key security functions and the associated sensitive data to the cloud remains a leap into the unknown. 

Countering this trend towards "cloud camouflage" means helping decision-makers to assert their demands for transparency about the level of security provided by the vendor, and enlightening businesses and organisations about the cloud products they consume. Without waiting for the legislator, here are the key questions you should be asking yourself when selecting a SaaS solution, as well as ways of ensuring that you obtain the essential information:

Location

Where is the hosting infrastructure for the SaaS service located?  

  • in France? 
  • in the European Union? 
  • on other continents? 

➡️ These elements are sometimes communicated publicly by the publisher in its general terms and conditions of use (GTCU). However, it is sometimes necessary to ask the question explicitly. 

Reputation

  • What is the publisher's reputation?  
  • Has it been the target of data leaks or high-profile computer attacks?  
  • Are its products frequently affected by common vulnerabilities and exposures (CVEs)? 

➡️ You'll usually find the answers on the public Internet. You simply need to take the time to do the research. If the publisher publishes references on its site, why not ask its customers for feedback? 

Compliance

  • How compliant is the publisher?  
  • What certifications and qualifications has it obtained?  
  • Are its certifications compatible with the legal and regulatory constraints that apply to you? 

➡️ In general, it is in the publisher's interest to publicise its certifications or qualifications (ISO 27001, HDS, SecNumCloud, etc.) However, we recommend that you delve a little deeper into the subject: 

  • Ask for a copy of the certification and pay close attention to the scope covered. A common misuse is to hide the fact that the certification covers a very small area. 
  • If the publisher is ISO 27001 certified, ask for its Declaration of Applicability. 
  • Ask the publisher for audit reports, e.g. ISAE 3402 or SOC 2, ideally type 2. 
  • Ask them to present their data protection policy and the measures taken to ensure compliance with the RGPD. 
  • Check that the publisher is listed in the public registers maintained by qualification authorities such as ANSSI (in France) or ENISA (in Europe). 
  • Submit security questionnaires to the publisher, for example based on the CAIQ (Consensus Assessments Initiative Questionnaire) freely available from the CSA (Cloud Security Alliance). 
  • Negotiate the possibility of carrying out compliance audits 

Maturity

  • How mature is the publisher in the software development of its solution? 

➡️ Part of the answer should be provided by the compliance elements we have already mentioned, but we recommend that you ask for additional elements: 

  • Do developers receive training or awareness-raising on computer code security? 
  • Has the publisher adopted DevSecOps practices? 
  • Does it regularly carry out penetration tests on its own solution? If so, does it agree to share at least executive summaries of its latest tests? 
  • Does the publisher allow customers to carry out penetration tests themselves? 

Obtaining more information and transparency on SaaS security services is a legitimate expectation, and one that will become more pressing as security solutions migrate to the cloud. Encouraged by users, solution publishers will be more likely to raise the overall level of protection for information systems in France. In this way, we can collectively accelerate the fight against cyber-malware.  

The magazine
Cookie policy

We use cookies to give you the best possible experience on our site, but we do not collect any personal data.

Audience measurement services, which are necessary for the operation and improvement of our site, do not allow you to be identified personally. However, you have the option of objecting to their use.

For more information, see our privacy policy.