Skip to content

Business Software Security Guide: What to Check Before Buying Any SaaS Tool

Before buying any SaaS tool, check for SOC 2 Type II, data residency, access controls, data export rights, and breach notification policies. A practical checklist for SMBs.

3 min read
Business Software Security Guide: What to Check Before Buying Any SaaS Tool

Business Software Security Guide: What to Check Before Buying Any SaaS Tool

Most small businesses buy software based on features and price without asking a single security question. That changes the first time customer data is exposed in a breach or a compliance audit reveals you''ve been storing sensitive data with a vendor that wasn''t certified. Here''s what to check before you sign up.

Security Certifications: What They Mean

SOC 2 Type II (Most Important) SOC 2 Type II means an independent auditor has verified that the vendor''s security controls actually operate as described — not just that policies exist, but that they''re followed consistently over a period of at least 6 months. This is the most meaningful security certification for SaaS vendors.

Ask for: SOC 2 Type II report (vendors should provide this on request or via a trust portal).

ISO 27001 An international information security management standard. Less common in US-focused SaaS, more prevalent in enterprise and European vendors. Indicates a comprehensive security management system.

PCI DSS Required for any vendor that processes, stores, or transmits payment card data. If you''re evaluating payment processing software, verify PCI DSS Level 1 compliance specifically.

HIPAA Required for healthcare data. If your business handles patient information, any software touching that data must be HIPAA compliant and willing to sign a Business Associate Agreement (BAA).

Data Residency and GDPR

Where is your data stored? This matters if you have European customers or operate in states with strong data privacy laws (California''s CCPA, Virginia''s CDPA).

Questions to ask:

  • What country/region are your servers in?
  • Do you offer EU data residency?
  • Will you sign a Data Processing Agreement (DPA)?
  • How do you handle GDPR data subject requests (access, deletion)?

Access Controls

Evaluate how the software protects your data from unauthorized access — including from your own team.

Single Sign-On (SSO): Allows authentication through your identity provider (Google, Microsoft, Okta). Centralizes access control so offboarding a team member revokes access everywhere. Usually gated to higher tiers — watch for "SSO tax."

Multi-Factor Authentication (MFA): Should be available and ideally enforced by default for admin accounts.

Role-Based Permissions: Can you limit what different users can see and do? Especially important for CRM (limiting access to sensitive deal data) and accounting (separating viewer vs editor access).

Data Export and Portability

Before you put your data in, know how to get it out. Ask:

  • Can I export all my data at any time?
  • In what format? (CSV is table stakes; JSON or full database export is better)
  • Is there an API for automated data extraction?
  • What happens to my data if I cancel — how long until it''s deleted?

Vendors with strong lock-in strategies often make export difficult. This is a red flag.

Breach Notification Policy

If the vendor suffers a security breach involving your data, how quickly will they notify you? The GDPR standard is 72 hours; many US states now require similar timelines. Ask for this in writing or check their security policy page.

Uptime SLA and Support Tiers

Uptime SLA: What uptime does the vendor guarantee (99.9% = ~8.7 hours downtime/year; 99.99% = ~52 minutes/year)? What''s the remediation if they miss it?

Support tiers: What level of support does your pricing tier include? Many vendors put phone support and dedicated account managers behind enterprise pricing.

The Security Checklist

Before signing up for any SaaS tool that handles business or customer data:

  • SOC 2 Type II report available on request
  • MFA available and recommended
  • Role-based permissions match your team structure
  • Data export available in standard format
  • Data residency acceptable for your compliance requirements
  • Breach notification policy documented
  • Uptime SLA in writing
  • Support response time for your tier is acceptable

Two minutes reviewing a vendor''s Trust page or security documentation saves considerable pain later.

Related Articles