Forum Discussion

pter01's avatar
pter01
Copper Contributor
Nov 19, 2024

Config protection policy to share with a third-party app only

Hi all,
I want to share a document from Teams via third-party app only (Ex: Telegram). I configure Teams using Intune app protection policies.
I tried sending to config Send org data to other apps, and using Policy managed apps with Open-In/Share filtering. 
Config Select apps to exempt with Telegram appID and app name but not work.

I want to ask if this approach is correct and if Microsoft allows us to do that?
Thanks.

  • Tomsmith1122's avatar
    Tomsmith1122
    Copper Contributor

    If you're looking to configure a protection policy that allows you to share data or access with a third-party app while ensuring security, it's important to use strategies like permission management, data access control, and app authorization. Depending on your environment (whether it’s for a mobile device, cloud platform, or enterprise application), here are some general steps you can take:

    1. Use OAuth 2.0 for Authorization (for third-party apps)

    If the third-party app requires access to your system (e.g., for an API or other services), the OAuth 2.0 protocol is one of the most secure ways to handle the process. This allows you to share limited access without exposing your login credentials.

    • Scope Management: Only provide the minimum necessary permissions to the third-party app by defining scopes. Scopes specify what resources the app can access (e.g., read-only access, specific actions, etc.).
    • Access Tokens: OAuth uses access tokens to authenticate the third-party app. Set token expiration times to limit long-term access.

    2. Set Up Permissions and Roles

    For apps that need access to your data or services, create granular permissions based on roles or attributes:

    • Granular Permissions: Limit access to only the required data and resources.
    • Role-based Access Control (RBAC): Implement RBAC to ensure third-party apps only access what’s necessary, based on the role they are assigned (e.g., user, admin).
    • Least Privilege Principle: Always apply the principle of least privilege, meaning give access to only what is needed for functionality and nothing more.

    3. Use API Gateway and Authentication

    For APIs accessed by third-party apps:

    • API Gateway: Protect your backend services using an API gateway. This can include rate-limiting, logging, and managing traffic from third-party apps.
    • API Keys: Issue API keys to control access to your API, ensuring that only authorized third-party apps can connect.
    • Secure APIs: Use secure methods like TLS/SSL encryption to ensure data privacy during transmission.

    4. Implement Multi-Factor Authentication (MFA)

    If your system requires third-party apps to access sensitive data, consider enabling MFA. This adds an additional layer of security by requiring a second form of authentication (e.g., a code sent to a phone or email) to access the system.

    5. Data Encryption and Storage Policies

    • Encryption at Rest: Ensure that any data shared with the third-party app is encrypted when stored, using strong encryption algorithms like AES-256.
    • Encryption in Transit: Encrypt all data in transit between your system and the third-party app using TLS or SSL.
    • Data Masking: Mask sensitive data wherever possible. For example, show only the last four digits of a phone number or account number.

    6. Audit and Monitoring

    Implement auditing and logging to track all access and data exchanges between your system and the third-party app:

    • Logging: Keep logs of who accessed what data and when.
    • Monitor Access: Use tools to monitor usage patterns and identify any unauthorized access attempts.
    • Alerting: Set up alerts to notify you of unusual behavior or unauthorized access.

    7. Data Sharing Agreement

    When working with third-party apps, it’s essential to have a data-sharing agreement that clearly outlines:

    • The data you are sharing with the app.
    • The security measures the app must comply with.
    • How long the third party can access your data and under what conditions.
    • Responsibility for data breaches or misuse.

    8. Third-Party App Security Checks

    Before sharing sensitive information, ensure that the third-party app complies with the following:

    • Security Reviews: Perform a security review or penetration testing on the third-party app to identify any vulnerabilities.
    • App Permissions: Carefully review the permissions the third-party app is asking for and ensure they align with your data-sharing policy.

    9. Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) (for mobile apps)

    If you're sharing data with a third-party mobile app or allowing third-party apps to access work resources:

    • Implement MDM/EMM solutions to control access and enforce security policies, such as requiring strong passwords, data encryption, and remote wiping of data.
    • App Whitelisting: Only allow trusted, approved apps to access company resources.

    Example Protection Policy Outline for Sharing Data with Third-Party Apps

    • Objective: Protect sensitive data while enabling secure sharing with third-party apps.
    • Authorization: Use OAuth 2.0 and API keys to limit access to authorized apps only.
    • Permissions: Provide least privilege access with granular permissions based on defined roles.
    • Encryption: All shared data must be encrypted at rest and in transit.
    • Authentication: Enable multi-factor authentication (MFA) for third-party access.
    • Monitoring: Continuously monitor access logs and set up alerts for unusual activities.
    • Compliance: Ensure the third-party app complies with industry security standards (e.g., GDPR, HIPAA).

    This combination of security layers—encryption, permissions, MFA, and auditing—will ensure that your data remains protected while being shared with third-party applications. Always review security policies regularly to adapt to new threats or vulnerabilities.

Resources