No-code/low-code applications often sync data or trigger operations across multiple systems, which creates a path for data to find its way outside the organizational boundary. This means that operations in one system can have unexpected consequences in another.
In a number of cases, attackers have been able to exploit these connections to access sensitive data or to execute unauthorized operations. In other words, even though the original purpose was good — to improve efficiency and productivity — no-code/low-code applications can be used by outsiders as a vector to gain unauthorized access.
As the CEO of Makeitfuture - Tiberiu Socaci - said:
Low and No Code is a risk if not managed properly at a stage that concerns us that work daily with low and no code.
A person sets up automation to run whenever a new email arrives in their company mailbox. Automation copies the recipients, topic, and text of the original email received in the business mailbox and sends a new email to the maker's personal email account. The automation gets around DLP restrictions since data is copied to a different mailbox rather than emails being forwarded from the corporate inbox.
Maker Mike configures automation to sync updates across two SharePoint sites, copying each new file from site A to site B. User Marc fails to realize that a sensitive document gets replicated to site B when they inadvertently write it to site A. The document is removed from site A by user Marc. The document is still accessible at site B, though.
Audit all existing no-code/low-code applications for authorization misuse vulnerabilities.
Implement risk matrixes and threat modeling processes for new no-code/low-code applications prior to deployment.
No-code/low-code applications are frequently used to synchronize data between various systems or to start certain activities on one system when another change.
No-code/low-code applications, which act as data movers, make it simple for data to leak out to a different organization or a personal account. No-code/low-code applications that implicitly link an operation in one system with a change in another can have unanticipated results when used as operation triggers, you need to monitor this!
Additionally, a single data source may be used to trigger several applications, creating chained data movement or operation triggers that are challenging to forecast or completely map.
Both can be ensured with ASERVMENT. Sign-Up and secure your citizen developers.
The rich text element allows you to create and format headings, paragraphs, blockquotes, images, and video all in one place instead of having to add and format them individually. Just double-click and easily create content.
A rich text element can be used with static or dynamic content. For static content, just drop it into any page and begin editing. For dynamic content, add a rich text field to any collection and then connect a rich text element to that field in the settings panel. Voila!
Headings, paragraphs, blockquotes, figures, images, and figure captions can all be styled after a class is added to the rich text element using the "When inside of" nested selector system.
Secure your iPaaS & Automation environment so Citizen developers can work without harming your business.
ASERVMENT. Make Low- and No-Code Automation Compliant and guide citizen developers.