The Back Door Attackers Know About - and Most Security Teams Still Haven't Closed
Briefly

The Back Door Attackers Know About - and Most Security Teams Still Haven't Closed
"Every AI tool, workflow automation, and productivity app your employees connected to Google or Microsoft this year left something behind: a persistent OAuth token with no expiration date, no automatic cleanup, and in most organizations, no one watching it."
"80% of security leaders consider unmanaged OAuth grants a critical or significant risk. Most have said as much for years. But awareness doesn't translate directly into capability."
"A substantial portion of organizations (45%) are doing nothing to monitor OAuth grants at scale. Many of the rest (33%) are running manual processes - tracking grants in spreadsheets, reviewing permissions on an ad hoc basis."
OAuth tokens granted to employees do not expire, leading to security vulnerabilities as organizations lack oversight. Many security leaders recognize unmanaged OAuth grants as a critical risk, yet 45% of organizations do not monitor them. Manual tracking methods, such as spreadsheets, are inadequate for threat response. The primary concern is not just sensitive data exposure but the broader implications of unmanaged OAuth tokens in the security landscape, highlighting a gap between awareness and actionable security measures.
Read at The Hacker News
Unable to calculate read time
[
|
]