HomeCII/OTRogue Azure AD Guests Can Steal Data through Power Apps

Rogue Azure AD Guests Can Steal Data through Power Apps

Published on

spot_img

In recent news, concerns have been raised about certain default guest settings in Azure AD (Active Directory) and the risky connections made by over-promiscuous low-code app developers. These vulnerabilities have the potential to disrupt data protections and compromise sensitive information.

Azure AD, Microsoft’s cloud-based identity and access management service, provides organizations with the ability to manage user identities and access to various resources. However, default guest settings within Azure AD have been found to be manipulatable, potentially allowing unauthorized access to sensitive data.

Guest accounts are created in Azure AD to allow external users, such as business partners or contractors, to access specific resources within an organization’s environment. By default, these guest accounts have certain permissions that can inadvertently expose sensitive data if not properly configured.

Security researchers have discovered that some organizations unknowingly leave their default guest settings in an insecure state. This means that guest users might have access to more resources and data than they should, posing a significant risk to data privacy and security.

Additionally, the use of low-code development platforms has seen a surge in recent years, enabling developers with limited coding knowledge to create powerful applications. While these platforms offer convenience and speed, they can also introduce security risks if not used with caution.

Promiscuous low-code app developers, who are often less experienced in security practices, may unknowingly create connections that grant excessive access to sensitive data. This over-promiscuity can lead to unintended exposure and leakage of confidential information.

The combination of default guest setting manipulations and over-promiscuous low-code app developer connections can have severe consequences for data protection. Organizations must be proactive in identifying and addressing these vulnerabilities to avoid potential breaches and data loss.

To mitigate these risks, experts recommend implementing a comprehensive security strategy. This includes regularly reviewing and updating Azure AD guest settings to ensure that appropriate access controls are in place. Organizations should also provide proper training and guidance to low-code app developers to ensure they understand the importance of security measures and follow best practices.

Furthermore, organizations should establish protocols for regular security audits and vulnerability assessments to identify potential weaknesses. This will enable the prompt resolution of any issues and the strengthening of data protection measures.

In conclusion, the default guest settings in Azure AD and the connections made by over-promiscuous low-code app developers present significant risks to data protections. Taking the necessary steps to address these vulnerabilities is crucial in safeguarding sensitive information. By implementing robust security measures, organizations can ensure the integrity and confidentiality of their data and prevent potential data breaches.

Source link

Latest articles

Reengineering AML for the Era of Instant Payments

Financial Institutions Rethink Anti-Money Laundering Controls Amid Rising Demand for Instant Payments In an era...

Akira-Style Ransomware Campaign Targets Windows Users in South America

A newly uncovered ransomware campaign is currently targeting Windows users across South America, employing...

New Storm Infostealer Remotely Decrypts Stolen Credentials

Surge in Risks from New Infostealer Malware: Varonis Reports on "Storm" In an alarming development...

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

 The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a new phishing...

More like this

Reengineering AML for the Era of Instant Payments

Financial Institutions Rethink Anti-Money Laundering Controls Amid Rising Demand for Instant Payments In an era...

Akira-Style Ransomware Campaign Targets Windows Users in South America

A newly uncovered ransomware campaign is currently targeting Windows users across South America, employing...

New Storm Infostealer Remotely Decrypts Stolen Credentials

Surge in Risks from New Infostealer Malware: Varonis Reports on "Storm" In an alarming development...