cisagov / ScubaGear

Automation to assess the state of your M365 tenant against CISA's baselines
https://www.cisa.gov/resources-tools/services/secure-cloud-business-applications-scuba-project
Creative Commons Zero v1.0 Universal
1.77k stars 228 forks source link

Determine risky permissions assignable from both Microsoft Graph and other APIs #1397

Open mitchelbaker-cisa opened 3 weeks ago

mitchelbaker-cisa commented 3 weeks ago

💡 Summary

Permissions like Sites.FullControl.All are covered in both Graph and the SharePoint API. Another example is Mail.ReadWrite which is assignable from Graph and Office 365 Exchange Online.

ScubaGear should catch a risky permissions regardless if it was assigned through Graph, another API, or vice versa.

(Resource App ID is in reference to the SharePoint API) Image

Motivation and context

Relates to the epic #1073 and ongoing work in #1327.

Implementation notes

The majority of risky API permissions in this list are pulled from MS Graph. Verify if MS Graph permissions are included as a subset in other Microsoft APIs.

Some initial APIs to investigate further:

Acceptance criteria

How do we know when this work is done?

mitchelbaker-cisa commented 2 weeks ago

Office 365 Exchange Online: