The zero fluff guide to navigating enterprise information security assessments

Prologue
Hello! If you've stumbled upon this note, you are perhaps looking to sell SaaS to large enterprises. We've been in your shoes, and through our blunders, we've learned a few things about how young SaaS companies can present a strong case for their Infosec posturing. As part of this note, we shall also cover some basics of ISO 27001, SOC 2, and GDPR and how compliance with these standards could provide a competitive edge in the sales process.
The context
Let's take the example of a hypothetical large pharma company called Skull Pharma Inc., with manufacturing in India and customers in multiple geographies, which includes India, the US, and parts of Europe. Also, the company works with vendors across several geographies, which again include India, the US, and maybe some parts of Europe.
Such an organization would have potentially sensitive data of the following types:
- Confidential pricing information for their finished goods
- Confidential cost information for key inputs
- Personal Identifiable Information (PII) in the form of email IDs, phone numbers, and possibly the medical history of individuals
- Results of clinical trials or bioequivalence studies of pipeline products
Given the size and sensitivity of data that such an organization would handle, it is imperative that they comply with the highest standards of information security, which would typically manifest in compliance with ISO 27001, SOC 2, GDPR, and some guidelines like ISO 27018.
How does the buyer's compliance to Infosec standards impact the sales process?
When an organization is compliant with ISO 27001, SOC 2, or GDPR, it is necessary to ensure that their software vendors are equally compliant with these standards (even if they are not formally certified) and their sensitive data is in good hands. The recent spate of cybersecurity attacks and data breaches at Facebook, Scripps Health, JBS, Dr. Reddy's, Astra Zeneca, and several others show that attackers are becoming savvier, and enterprises across the globe are increasing their Infosec budgets.
Consequently, there are three ways the sales process for Enterprise SaaS gets impacted.
- Large enterprises asking for software to be deployed on-premise, which is a very expensive option but is perceived as more secure
- Large enterprises are paying 4-5x higher subscription fees for 'legacy' tools or 'established players' which are perceived to be 'more secure.'
- Large enterprises put very stringent checks and evaluation criteria for Infosec compliance for their software vendors.
Now, here is a typical situation during the enterprise sales process that we've seen several extremely promising SaaS companies find themselves in.
Jeremy, the business user:
Jeremy has done an extensive pilot with your product, and your product is loved not only by Jeremy's colleagues but also by Jeremy's suppliers. As a young and nimble SaaS start-up, you've absolutely nailed all aspects of the UX and have CSAT scores that have shot through the roof.
Jacinda, the Finance team member:
Jacinda has done an extensive cost-benefit assessment of your SaaS product and finds that you can potentially deliver an IRR of ~300-400% over a five-year period, even at conservative adoption levels.
Jacob, Head of IT procurement:
Jacob has made a quick pre-proposal comparison of your SaaS product's subscription cost with your peers and legacy competitors. While Jacob doesn't find you to be the cheapest, he also acknowledges that you are priced fairly for the value that Jacinda thinks you provide. Of course, Jacob is likely to negotiate with you in the end and stop only when you are on the verge of starting to weep.
Janice, the IT ERP team leader:
Janice is the gatekeeper for all things ERP. Janice has nurtured the company's ERP systems with her hands, and she will not let any garbage flow in or flow out of it. You've somehow managed to ensure smooth integration with Skull Pharma's ERP using Mulesoft or similar tools, and your initial system integration testing is successful. While Janice doesn't like you yet, she doesn't hate you either.
So now, Jeremy and Jacinda are filled with glee, Jacob broadly likes you, and Janice doesn't hate you. Should you tag the account as 'decision stage' in your CRM yet?
Not yet; there's another stakeholder.
Stonecold, the Chief Information Security Officer (CISO)
Stonecold has asked you ~30 questions about your Infosec practices and is not confident about how robust your Infosec posturing is. You've provided satisfactory responses to only half of Stonecold's questions and Stonecold has disqualified you.
Why did Jenn do that? Because if Skull Pharma's data is handled irresponsibly, they lose a lot more to lose in terms of goodwill than they could save by opting for you against your 'legacy' competitor that is perceived to be more secure.
How could we avoid such a situation and make Stonecold our strongest supporter within the organisation?
We spoke to several SaaS companies in India and the US that have successfully closed $100K+ deals with large enterprises, operating in spaces where there are legacy players or on-prem alternatives. We've tried to distill the learnings below.
Role-based access
Stonecold would be happy to understand the various user roles and access controls associated with the various modules within your product.
An example of how role-based access can be explained could be (not exhaustive):

Infra and Storage
Since there are multiple deployment models available, the CISO would be keen to understand the model that the SaaS vendor follows and the controls associated with it.
- In which geography is the data hosted (for e.g., if there are multiple EC2 instances running in different geographies, mentioning all of them is important)
- Does your SaaS platform have multiple tenants mapped to a single instance? Or is every account mapped to a separate instance?
- How are the databases created in case of multi-tenancy? Do multiple tenants share a common database?
- How frequently are the databases backed up? After what period is the data archived, and what is the retrieval policy?
Based on their comfort, the CISO could be OK with a multi-tenant architecture, could ask for complete on-prem deployment, or could settle for a middle ground by asking for the creation of a dedicated instance of the software on their private cloud. Each alternative will have a different time and cost implication for the SaaS vendor, but if the security posturing is established upfront, the SaaS vendor can negotiate like an equal.
Both ISO 27001 and SOC 2 clearly outline the best practices around how databases should be secured. We could share what we've learned, too, sign up for a free consultation.
Logging
A very important element of the SaaS vendors' security posturing is managing unauthorized/suspicious attempts to access the platform. It helps to answer the following questions proactively.
- Which users (or user groups) have access to client data?
- Are there any third-party applications that would indirectly access the client's data?
- What tools do you use for logging (e.g., AWS Cloudwatch)?
- How are suspicious or malicious login attempts identified (access control failures, server-side input validation failures)?
- How will server logs be monitored and alerted (e.g., unexpected events such as SSH connections from a new IP address)?
Network and Communication Security
Any data for which access and disclosure are restricted to a limited (specified) set of users or user groups classify as confidential data. Examples of confidential data include internal price lists and other types of sensitive financial information. Encryption is an important control for protecting confidentiality during transmission.
- Are network and application firewalls used to safeguard information being processed or stored on computer systems?
- What version of SSL/TLS is being used? Are you using a version that is deprecated? Usually, the CISO would raise a red flag if the vendor is using a version older than TLS 1.2
- Which is the certifying authority for the SSL/TLS certificate?
- Are Virtual Private Clouds enabled on the Cloud Service Provider to ensure Network Security?
Session Management
Managing sessions is an important task. Large enterprises have strict policies around. SaaS vendors must exhibit flexibility around session management and align with the target organization's policies. Some of the important questions are:
- How are new sessions managed (e.g., using Tokens)?
- Can clients configure rules to allow multiple sessions for a user/restrict to a single session?
- What happens to existing sessions when an account is deleted, or the password is changed?
- Can the client configure expiry rules for the JWT tokens?
Application Security
Most controls related to application security are laid down in the ISO 27001 and SOC 2 manuals. Broadly, most enterprise security assessment questionnaires would seek answers to the following questions:
- Are Web Application Firewalls used to protect from common exploits?
- What protocol is used to allow secure authorization through all applications (e.g., OAuth2.0)?
- Does the application support Single Sign On (SSO)?
- Is data encrypted at rest?
- Does the application use API Rate limit to prevent brute force/DoS attacks?
- How are cross-domain requests handled? Is CORS enabled?
We could share our experiences on how we've seen the best SaaS companies manage their application security practices, schedule a call with us (it's free)
Other Miscellaneous Questions
Apart from the most commonly occurring pointers that we covered above, we've also seen some specific questions that certain enterprises like to ask SaaS vendors. We've tried to compile a list here (many of these would get covered as part of the ISO 27001 and SOC 2 compliance process):
- How are MITM attacks prevented? Are all insecure HTTP requests redirected to secure HTTPS?
- Are development, QA, staging, and production environments equally secured?
- Are all environments configured to the Principle of Least Privilege (access granted only to those who have a legitimate need for the information)?
- How frequently are Vulnerability Assessment tests carried out (the CISO could ask for a recent report)?
- How frequently are external penetration tests carried out (the CISO could ask for a recent report)?
- What is the Disaster Recovery plan followed by the SaaS vendor?
Hopefully, with most of the above questions answered, Stonecold will support us in the enterprise sales process. With 90% of the job done right, not being able to cross the CISO barrier due to inadequate/incorrect Infosec posturing could be a real heartbreak. It's best to seek a meeting with Stonecold proactively and be transparent about your infosec posture upfront, even before the team asks for it.
We help SaaS companies of all sizes create their security posturing and automate tasks related to ISO 27001 and SOC 2 compliance. We won't just provide a tool; we'll ride with you till the end of the line.
Visit us at scrut.io or schedule a demo
Ready to see what security-first GRC really looks like?
Ready to see what security-first GRC really looks like?
Ready to see what security-first GRC really looks like?
See what a real security- first GRC platform looks like
Ready to see what security-first GRC really looks like?
Focus on the traveler experience. We’ll handle the regulations.
Get Scrut. Achieve and maintain compliance without the busywork.
Choose risk-first compliance that’s always on, built for you, and never in your way.
Ready to see what security-first GRC
One platform, every framework. No more duplicate work.
You can’t manage user access if you’re always playing catch-up.
Explore the future of enterprise GRC
Tired of chasing vendors for risk assessments?
Join the thousands of companies automating their compliance with Scrut.
The right partner makes all the difference. Let’s grow together.
Make your business easy to trust, put security transparency front and center.
Risk-first security starts with risk-first visibility.
Secure your team from the inside out.
Don't settle for slow, expensive compliance. Get Scrut instead.
Risk-first compliance for forward-thinking teams.
Audits without the back-and-forth. Just seamless collaboration.
Scale fast. Stay compliant. Automate the rest.
Compliance? Done and dusted, in half the time.
Get ahead of GDPR compliance before it becomes a problem.
Outgrowing table-stakes compliance? Create custom frameworks with ease.
Navigate SOC 2 compliance, minus the stress.
PCI DSS compliance, minus the panic.
Take the wheel of your HIPAA certification journey today.
We’ve got what you need to fast-track your ISO 27001 certification.
Make your NIST AI RMF journey as smooth as possible.
Your GRC team, multiplied and AI-backed.
Modern compliance for the evolving education landscape.
Ready to simplify healthcare compliance?
Don’t let compliance turn into a bottleneck in your SaaS growth.
Find the right compliance frameworks for your business in minutes
Ready to see what security-first GRC really looks like?
Real-time visibility into every asset
Ready to simplify fintech compliance?
The Scrut Platform helps you move fast, stay compliant, and build securely from the start.
Scrut helps you set up a security program that scales with your business and stands up to audits. Without last-minute chaos.
Scrut helps you streamline audits, close deals faster, and stay ahead of risk without slowing down your team. Because trust shouldn’t take months to earn.
Scrut helps you set up a security program that scales with your business and stands up to audits. Without last-minute chaos.
Tag, classify, and monitor assets in real time—without the manual overhead.
Whether you're entering new markets or launching new products, Scrut helps you stay compliant without slowing down.
Scrut pulls compliance data straight from the tools you already use—so you don’t have to dig for evidence, chase approvals, or manually track controls.
Less manual work, more customizability. The Scrut Platform gives you everything you need to align your compliance to your business’s priorities.
With Scrut, you’re not just adding a tool to your offering—you’re adding a competitive edge. Join our Partner Network and help your clients streamline their GRC program.
Gaining trust is your first step to growing and cracking better deals. The Scrut Platform comes pre-built with all the tools you need to showcase a firm security posture and build confidence.
Don’t settle for rigid systems—Scrut ensures your risk management strategy is as flexible as your business needs.
Start building a security-first culture. Save your operations from improper training and a lack of compliance awareness.
Scrut fast-tracks compliance so you can focus on scaling, not scrambling. Automate compliance tasks and accelerate enterprise deals—without the grind.
Automate assessments, track compliance, and get full visibility into third-party risk—all in one place.
Scrut automates compliance tasks, supports proactive risk management, and saves you time, so you can focus on growing your business. Start building trust with customers and scaling confidently.
Leave legacy GRC behind. Meet the AI-powered platform built for teams managing risk and compliance in real time.
Give auditors direct access, keep track of every request, and manage audits effortlessly—all in one place.
Scrut ensures access permissions are correct, up-to-date, and fully compliant.
Whether you need fast results or a fully tailored program mapped to your risks and needs, Scrut delivers exactly what you need, when you need it. Ready to start?
Scrut unifies compliance across all your frameworks, so you can stop juggling systems and start scaling securely.
Manually managing your compliance processes and audits can get inefficient and overwhelming. Scrut automates these outdated, manual processes and eliminates your last-minute worries.
Access automated compliance, real-time risk tracking, and expert-backed support—all in one platform. Get started with Scrut!
Less manual work, more customizability. The Scrut Platform gives you everything you need to align your compliance to your business’s priorities.
The Scrut Platform helps you move fast, stay compliant, and build securely from the start.
Earn trust and back it up with solid evidence. Scrut takes you through the SOC 2 compliance journey step-by-step, navigating every complexity you face.
Manage your PCI DSS compliance with real-time monitoring and effortless automation. Get started with Scrut today!
Securing your PHI shouldn’t be a constant hassle. Scrut automates your workflows—from risk assessments to monitoring—so you can put your compliance worries on the back burner.
Automate security controls, simplify audits, and keep your ISMS aligned with the latest standards. Get started with Scrut!
Tackle potential AI risks with NIST AI RMF-compliant controls and get expert support every step of the way.
Offload the grunt compliance work to us. Execute manual, draining GRC tasks with the reliable AI-powered Scrut Teammates without switching contexts or bottlenecks.
Whether you're managing student data, partnering with educational institute, or expanding to new geographies—Scrut gives you the tools to stay compliant, manage risk, and build trust at every step.
Scaling healthcare doesn’t have to come at the cost of security. Scrut keeps your organization compliant, audit-ready, and protected—no matter how fast you grow.
Scrut automates the hard parts of compliance and security so you can move fast and stay ahead of risks from day one.
The Scrut Platform helps you move fast, stay compliant, and build securely from the start.
Growth in fintech comes with heavy scrutiny. Scrut helps you stay compliant, audit-ready, and secure—without slowing down your momentum.



