Navigating the Security Maze of Distributed SaaS Applications and Devices