Tip Sheet

Checklist – SaaS Incident Response

lmg checklist saas incident response thumbnail

The Salesforce–Drift breach underscored how a single point of failure in the supply chain can cascade into widespread SaaS compromises. With attackers targeting cloud integrations more aggressively, organizations can’t afford to wait for vendor updates before acting. This checklist provides clear, practical guidance to help you respond decisively when incidents strike — and strengthen your defenses against the next SaaS breach.

Click here to download the checklist as a PDF: Checklist - SaaS Incident Response

Tips for SaaS Incident Response:

  1. Treat this as an incident:
    • Don’t wait for vendor confirmation before acting. There may be delays in vendor disclosure, so act quickly.
  2. Notify your cyber insurance provider:
    • Provide notice as soon as possible.
    • Insurers may share early IOCs, coordinate with vendors, and advocate for your org alongside other affected clients.
    • They can also connect you with funded IR and legal resources.
  3. Engage external support:
    • Bring in your IR firm to investigate and document.
    • Work with legal counsel to determine if notification obligations are triggered.
  4. Revoke and rotate credentials:
    • Cycle API keys, OAuth tokens, and active sessions.
    • Rotate credentials for connected service accounts.
  5. Inventory your data:
    • Identify what sensitive Salesforce (or other SaaS) data is stored.
    • Check whether support tickets, logs, or credentials were included.
  6. Search for attacker activity:
    • Review advisories for malicious IPs, user agents, and behaviors.
    • Don’t rely solely on vendor-published IOCs — they may be incomplete.
CONTACT US