A data breach is a security incident in which unauthorized individuals gain access to protected, sensitive, or confidential information.
‍
A data breach occurs when an unauthorized party gains access to data they're not permitted to see or take. That data might be customer records, financial information, intellectual property, employee details, or protected health information. The mechanism can vary widely—compromised credentials, misconfigured storage, phishing, insider threats, or exploitation of a third-party integration—but the defining characteristic is unauthorized access to data that was supposed to be protected.
‍
Breaches vary significantly in scope and impact. A small unauthorized access event involving a handful of records carries different legal and operational consequences than a large-scale exfiltration of millions of customer records. But the underlying causes tend to have more in common than the headlines suggest: weak access controls, ungoverned permissions, and identities that had more access than they needed.
‍
Despite the complexity of modern threat landscapes, the majority of data breaches trace back to a small number of root causes. The Verizon Data Breach Investigations Report consistently finds that credential compromise, phishing, and exploitation of legitimate access paths are responsible for the overwhelming majority of incidents.
‍
In practical terms, this means:
SaaS environments have significantly expanded the potential breach surface for most organizations. Employees have accounts across dozens of applications, many of which IT never formally approved or inventoried. Each of those accounts is a potential entry point. Each OAuth integration is a potential data pathway that attackers can exploit if they compromise the right identity.
‍
What makes SaaS breaches particularly challenging is the combination of breadth and invisibility. When an attacker gains access to a central identity provider account, they may be able to access every application in the SSO environment. When they compromise an account in a shadow SaaS application, they may access whatever data that application holds—or whatever it's connected to through OAuth—without any of it appearing in the security team's monitoring tools.
‍
The result is a breach surface that's larger and less visible than most organizations realize. Addressing it requires comprehensive identity discovery: knowing every account, every integration, and every permission associated with every identity in the environment before an incident makes that information urgently necessary.
‍
Learn how Nudge Security maps SaaS identity and access to reduce breach exposure →