Skip to content

Do something useful with risky applications data #1695

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
1 of 4 tasks
gdasher opened this issue May 9, 2025 · 0 comments
Open
1 of 4 tasks

Do something useful with risky applications data #1695

gdasher opened this issue May 9, 2025 · 0 comments
Labels
enhancement This issue or pull request will add new or improve existing functionality epic A high-level objective issue encompassing multiple issues instead of a specific unit of work

Comments

@gdasher
Copy link
Collaborator

gdasher commented May 9, 2025

Prerequisites

  • This issue has an informative and human-readable title.

💡 Summary

Filing this issue so that we don't forget these ideas. Now that we have data on risky apps in the raw scuba gear data, we should do an investigation to figure out what useful new baseline statements can be made based on this data. Example ideas:

  1. No test apps have risky permissions with admin consent. Could pattern match based on display name looking for ("Dev", "Test", "Nonprod", etc) to find apps in a production tenant with high levels of access.

  2. API Keys are regularly rotated--could flag "Password Credentials" are no older than 120 days (say). Could allow key creds (which are still risky but could be baked with more secure storage options) and federated auth to not have this requirement.

  3. Preference for key credentials and federated credentials vs. API keys (potential should policy or flagged list).

  4. Report with list of apps with risky permissions for admin review, like CAP table.

Motivation and context

TAs are targeting M365 tenants based on exploiting over privileged service principals and apps with admin consented permissions.

Implementation notes

These could be implemented with the data we already are extracting.

Acceptance criteria

  • at least a few baselines are created a around high privilege service principals
  • baselines are tested with customers
  • this issue is decomposed into meaningful implementation issues.
@gdasher gdasher added the enhancement This issue or pull request will add new or improve existing functionality label May 9, 2025
@buidav buidav added the epic A high-level objective issue encompassing multiple issues instead of a specific unit of work label May 10, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement This issue or pull request will add new or improve existing functionality epic A high-level objective issue encompassing multiple issues instead of a specific unit of work
Projects
None yet
Development

No branches or pull requests

2 participants