News

The Cyber Resilience Act and SaaS: Why Compliance is Only Half the Battle

  • Ariel Parnes--securityboulevard.com
  • published date: 2025-11-26 00:00:00 UTC

None

<p><span data-contrast="auto">The European Union’s Cyber Resilience Act (CRA) has captured global attention because of the </span><span data-contrast="auto">new approach it brings to regulating software and connected products</span><span data-contrast="auto">. The CRA doesn’t stop at compliance checkboxes. It introduces four principles that reshape how vendors must think about security: Products should launch without known vulnerabilities, security must be built in from the design phase, vulnerabilities must be managed across the entire lifecycle, and vendors must be prepared to deliver rapid updates when issues arise. The common thread is clear. <a href="https://securityboulevard.com/2025/11/rethinking-cyber-resilience-in-the-age-of-ai/" target="_blank" rel="noopener">Resilience needs to be embedded from the start</a> rather than bolted on after incidents.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></p><p><span data-contrast="auto">Though born in Europe, the CRA’s influence will eventually spread far beyond EU borders. Global vendors cannot realistically maintain different development and security standards across markets. Like General Data Protection Regulation (GDPR) before it, the CRA will shape how products are built, shipped, and maintained worldwide. U.S. companies should pay close attention, not only because they may fall under its scope, but also because domestic regulators are moving in the same direction. The SEC’s new disclosure rules, the FTC’s scrutiny of negligent practices, and the growing number of state-level data protection laws all point to a world where resilience isn’t a “nice to have.”</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></p><h3><b><span data-contrast="auto">SaaS as the CRA’s Proving Ground</span></b><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></h3><p><span data-contrast="auto">Software-as-a-service (SaaS) is one of the most overlooked proving grounds for CRA principles. SaaS applications are now the backbone of modern organizations, from sales and finance to HR and engineering. They are also a prime target for attackers, precisely because they sit at the intersection of sensitive data, federated identity and complex integrations.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></p><p><span data-contrast="auto">The recent </span><a href="https://www.bleepingcomputer.com/news/security/salesloft-march-github-repo-breach-led-to-salesforce-data-theft-attacks/" target="_blank" rel="noopener"><span data-contrast="none">Salesloft breach</span></a><span data-contrast="auto"> shows why CRA-style requirements matter here. In March, attackers </span><a href="https://trust.salesloft.com/?uid=Update+on+Mandiant+Drift+and+Salesloft+Application+Investigations" target="_blank" rel="noopener"><span data-contrast="none">compromised a GitHub workflow</span></a><span data-contrast="auto">, stole OAuth tokens, and leveraged them to access Salesforce environments connected to Salesloft. This was not a traditional exploit of unpatched software, but it did involve weaknesses in the vendor’s security practices. Stronger controls, rapid patching, immediate reporting and more secure development pipelines – the exact requirements envisioned by the CRA – would have reduced the likelihood and impact of such an incident.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></p><p><span data-contrast="auto">In this sense, CRA provides a useful framework for SaaS vendors. “No known vulnerabilities” at launch, a continuous vulnerability management process and lifecycle security obligations – together set a baseline for responsible SaaS development.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></p><h3><b><span data-contrast="auto">Why Compliance Alone Won’t Stop the Next Breach</span></b><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></h3><p><span data-contrast="auto">But this is only half the story. Even the most diligent vendor can ship a service that is technically free of known vulnerabilities, and customers may still find themselves compromised. Some of the most dangerous attacks don’t exploit software flaws. They exploit people.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></p><p><span data-contrast="auto">The wave of vishing campaigns targeting </span><a href="https://www.mitiga.io/blog/how-threat-actors-used-salesforce-data-loader-for-covert-api-exfiltration" target="_blank" rel="noopener"><span data-contrast="none">Salesforce customers</span></a><span data-contrast="auto"> shows this clearly. Groups like ShinyHunters convinced employees to hand over valid Salesforce credentials through phone and voice phishing schemes. With real logins in hand, attackers moved laterally, accessed sensitive records and exfiltrated data. No unpatched vulnerability was needed.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></p><p><b><span data-contrast="auto">Attackers don’t break in. They log in.</span></b><span data-contrast="auto"> When valid credentials or tokens are abused, the principle of lifecycle security and even strong vulnerability handling are not enough. Prevention-focused approaches are bypassed entirely, underscoring the need for resilient defenses.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></p><h3><b><span data-contrast="auto">Shared Responsibility is the Only Way Forward</span></b><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></h3><p><span data-contrast="auto">This brings us to the heart of the matter: SaaS security is inherently a shared responsibility. The CRA rightfully raises the bar for vendors, demanding secure-by-design practices, vulnerability handling and timely updates. But customers cannot outsource all accountability.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></p><p><span data-contrast="auto">Vendors must:</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props='{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}' data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Harden their code, pipelines and integrations.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props='{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}' data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Provide rapid updates and transparency when vulnerabilities are found. </span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props='{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}' data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Build in protections against unauthorized access.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props='{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}' data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Report exploited vulnerabilities or incidents quickly to the authorities.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></li></ul><p><span data-contrast="auto">Customers must:</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></p><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props='{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}' data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Monitor how identities are used across SaaS applications.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props='{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}' data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Detect and respond to suspicious logins, anomalous activity, or unauthorized integrations.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props='{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}' data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Educate employees to resist social engineering and phishing campaigns.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></li></ul><ul><li aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props='{"335552541":1,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left","469777804":"","469777815":"multilevel"}' data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Integrate SaaS events into detection and response workflows.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></li></ul><p><span data-contrast="auto">Resilience in SaaS comes not from compliance checkboxes, but from this balance. Vendors secure the foundation, and customers build vigilance on top of it. Both sides must act.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></p><h3><b><span data-contrast="auto">A Preview of What’s Coming</span></b><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></h3><p><span data-contrast="auto">The CRA points the way for global regulation: Resilience, accountability and lifecycle security. U.S. regulators may not choose to adopt the exact same framework, but the principles are already visible in SEC disclosure mandates and FTC enforcement. For companies operating in the U.S., the safest path is to prepare as if CRA-style rules are inevitable.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></p><p><span data-contrast="auto">Organizations must do both: Hold vendors accountable and build detection and response capabilities for when attackers inevitably log in. Organizations that treat resilience as a partnership – vendors building secure platforms, customers monitoring identity and activity – will be far better positioned than those who view compliance as a finish line.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></p><h3><b><span data-contrast="auto">Resilience Demands Shared Responsibility</span></b><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></h3><p><span data-contrast="auto">The Cyber Resilience Act is a step forward for software security, and SaaS vendors should embrace its principles. But it would be a mistake to assume that compliance alone will deliver resilience. As the Salesloft breach shows, vendor practices matter. As the Salesforce vishing campaigns show, so does customer vigilance.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></p><p><span data-contrast="auto">Attackers in the SaaS era exploit both technology and people. They don’t break in. They log in. The only way forward is shared responsibility. Vendors and customers must accept that resilience is a joint mission. Those who act on that understanding will not only stay ahead of regulators but will also be ready for the next wave of attacks.</span><span data-ccp-props='{"134233117":true,"134233118":true,"201341983":0,"335559740":240}'> </span></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2025/11/the-cyber-resilience-act-and-saas-why-compliance-is-only-half-the-battle/" data-a2a-title="The Cyber Resilience Act and SaaS: Why Compliance is Only Half the Battle "><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fthe-cyber-resilience-act-and-saas-why-compliance-is-only-half-the-battle%2F&amp;linkname=The%20Cyber%20Resilience%20Act%20and%20SaaS%3A%20Why%20Compliance%20is%20Only%20Half%20the%20Battle%C2%A0" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fthe-cyber-resilience-act-and-saas-why-compliance-is-only-half-the-battle%2F&amp;linkname=The%20Cyber%20Resilience%20Act%20and%20SaaS%3A%20Why%20Compliance%20is%20Only%20Half%20the%20Battle%C2%A0" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fthe-cyber-resilience-act-and-saas-why-compliance-is-only-half-the-battle%2F&amp;linkname=The%20Cyber%20Resilience%20Act%20and%20SaaS%3A%20Why%20Compliance%20is%20Only%20Half%20the%20Battle%C2%A0" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fthe-cyber-resilience-act-and-saas-why-compliance-is-only-half-the-battle%2F&amp;linkname=The%20Cyber%20Resilience%20Act%20and%20SaaS%3A%20Why%20Compliance%20is%20Only%20Half%20the%20Battle%C2%A0" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2025%2F11%2Fthe-cyber-resilience-act-and-saas-why-compliance-is-only-half-the-battle%2F&amp;linkname=The%20Cyber%20Resilience%20Act%20and%20SaaS%3A%20Why%20Compliance%20is%20Only%20Half%20the%20Battle%C2%A0" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>