New Blog Post | Enhanced Malicious OAuth Activity Detection Capabilities in App Governance

%3CLINGO-SUB%20id%3D%22lingo-sub-2768006%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Enhanced%20Malicious%20OAuth%20Activity%20Detection%20Capabilities%20in%20App%20Governance%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2768006%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22App%20Governance%20Screen.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F311616i2692DC5600F6A726%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22App%20Governance%20Screen.png%22%20alt%3D%22App%20Governance%20Screen.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fannouncing-enhanced-malicious-oauth-activity-detection%2Fba-p%2F2757011%22%20target%3D%22_blank%22%3EAnnouncing%20Enhanced%20Malicious%20OAuth%20Activity%20Detection%20Capabilities%20in%20App%20Governance%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EWith%20the%20increase%20in%20popularity%20of%20global%20cloud%20platforms%2C%20the%20number%20of%20cloud%20applications%20developed%20by%20Service%20Providers%2C%20Independent%20Service%20Vendors%20(ISVs)%2C%20and%20Citizen%20developers%20have%20been%20on%20a%20steep%20incline.%20This%20growth%20has%2C%20in%20turn%2C%20attracted%20malicious%20actors%20seeking%20to%20exploit%20the%20platform%20and%20its%20users%20to%20gain%20access%20to%20valuable%20data%20and%20resources%20resulting%20in%20an%20uptick%20of%20security%20incidents%20involving%20apps%2C%20both%20in%20terms%20of%20frequency%20and%20impact.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThese%20incidents%20span%20a%20wide%20range%2C%20including%20malicious%20apps%20engaging%20in%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F07%2F08%2Fprotecting-remote-workforce-application-attacks-consent-phishing%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EOAuth%20consent%20phishing%3C%2FA%3E%2C%20as%20well%20as%20apps%20in%20good%20standing%20that%20are%20vulnerable%20to%20being%20exploited%20by%20bad%20actors.%20With%20hundreds%20to%20thousands%20of%20apps%20in%20an%20organization%20capable%20of%20accessing%20data%2C%20administrators%20find%20it%20even%20more%20challenging%20to%20audit%20the%20apps%20running%20in%20their%20environment%20and%20to%20ensure%20they%20are%20protected%20from%20malicious%20or%20non-compliant%20apps.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2768006%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Cloud%20App%20Security%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

App Governance Screen.png

Announcing Enhanced Malicious OAuth Activity Detection Capabilities in App Governance - Microsoft Te...

With the increase in popularity of global cloud platforms, the number of cloud applications developed by Service Providers, Independent Service Vendors (ISVs), and Citizen developers have been on a steep incline. This growth has, in turn, attracted malicious actors seeking to exploit the platform and its users to gain access to valuable data and resources resulting in an uptick of security incidents involving apps, both in terms of frequency and impact.

 

These incidents span a wide range, including malicious apps engaging in OAuth consent phishing, as well as apps in good standing that are vulnerable to being exploited by bad actors. With hundreds to thousands of apps in an organization capable of accessing data, administrators find it even more challenging to audit the apps running in their environment and to ensure they are protected from malicious or non-compliant apps.

0 Replies