Skip to content

Commit 96efca9

Browse files
Merge pull request #3428 from DeCohen/update-oauthapps-attack-paths-article
moved the note message under the heading investigation user flow
2 parents e0b66a1 + 07a5c8c commit 96efca9

File tree

1 file changed

+9
-7
lines changed

1 file changed

+9
-7
lines changed

CloudAppSecurityDocs/attack-paths.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,6 @@ ms.date: 03/23/2025
1010
[Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management) helps you to manage your company's attack surface and exposure risk effectively. By combining assets and techniques, [attack paths](/security-exposure-management/review-attack-paths) illustrate the end-to-end paths that attackers can use to move from an entry point within your organization to your critical assets.
1111
Microsoft Defender for Cloud Apps observed an increase in attackers using OAuth applications to access sensitive data in business-critical applications like Microsoft Teams, SharePoint, Outlook, and more. To support investigation and mitigation, these applications are integrated into the attack path and attack surface map views in Microsoft Security Exposure Management.
1212

13-
### Critical Asset Management - Service Principals
14-
15-
Microsoft Defender for Cloud Apps defines a set of critical privilege OAuth permissions. OAuth applications with these permissions are considered high-value assets. If compromised, an attacker can gain high privileges to SaaS applications. To reflect this risk, attack paths treat service principals with these permissions as target goals.
1613

1714
### Prerequisites
1815

@@ -44,21 +41,26 @@ Alternatively, you can use one of the following **Entra ID roles**:
4441
>[!NOTE]
4542
> Currently available in commercial cloud environments only. Microsoft Security Exposure Management data and capabilities are currently unavailable in U.S Government clouds - GCC, GCC High, DoD, and China Gov.
4643
47-
## View permissions for critical assets
44+
### Critical Asset Management - Service Principals
45+
46+
Microsoft Defender for Cloud Apps defines a set of critical privilege OAuth permissions. OAuth applications with these permissions are considered high-value assets. If compromised, an attacker can gain high privileges to SaaS applications. To reflect this risk, attack paths treat service principals with these permissions as target goals.
47+
48+
#### View permissions for critical assets
4849

4950
To view the full list of permissions, go to the [Microsoft Defender portal](https://security.microsoft.com) and navigate to Settings > Microsoft Defender XDR > Rules > Critical asset management.
5051

5152
:::image type="content" source="media/saas-securty-initiative/screenshot-of-the-critical-asset-management-page.png" alt-text="Screenshot of the Critical asset management page in the Defender XDR portal." lightbox="media/saas-securty-initiative/Screenshot-of-the-critical-asset-management-page.png":::
5253

53-
> [!NOTE]
54-
> OAuth apps appear in the attack path surface map only when specific conditions are detected.
55-
> For example, an OAuth app may appear in the attack path only if a vulnerable component with an easily exploitable entry point is detected that allows lateral movement to service principals with high privileges.
5654

5755
## Investigation user flow: View attack paths involving OAuth applications
5856

5957
Once you understand which permissions represent high-value targets, use the following steps to investigate how these applications appear in your environment’s attack paths.
6058
For smaller organizations with a manageable number of attack paths, we recommend following this structured approach to investigate each attack path:
6159

60+
> [!NOTE]
61+
> OAuth apps show in the attack path surface map only when specific conditions are detected.
62+
> For example, an OAuth app might appear in the attack path if a vulnerable component with an easily exploitable entry point is detected. This entry point allows lateral movement to service principals with high privileges.
63+
6264
1. Go to Exposure Management > Attack surface > Attack paths.
6365

6466
1. Filter by 'Target type: AAD Service principal'

0 commit comments

Comments
 (0)