Real world help desk stories of unrestricted access to SaaS applications

Table of Contents

“Don’t open that door!”

That’s the kind of thing we might shout at a character in a horror movie when there’s a danger lurking.

With less bloodshed, the very same things can happen all too easily with unrestricted access to SaaS applications. The quickly growing SaaS apps that organizations rely on have created a huge number of virtual doors that might be opened inappropriately — opened by an unwitting user or by an outside malicious agent.

What’s to be done? The safeguarding principle behind Least Privilege Access (LPA) is pretty simple but often overlooked. The idea is that if each user in a system is given only the level of access needed to complete their assigned tasks, the possibility for serious error and other unwanted horrors is greatly reduced.

But if an MSP is managing an organization’s SaaS stack without the vital securing effect of LPA, chances are that administrators will lose a lot of sleep listening for bumps in the night. Here are a few grim examples.

Every door opened to every user!

Let’s say you’re a SaaS-managing MSP and your customer’s well-intentioned end-user has been given a high level of admin access. In other words, there are a lot of inappropriate doors that this end-user can open. Then, tragedy strikes. The innocent end-user accidentally hits the button that makes all employee files visible to every employee via Dropbox. Just like that, private data is laid open to the entire organization, including salaries and other personal details.

If that’s not scary enough, consider another scenario that might be a little closer to home for the MSP. Imagine that one of your junior technicians is attempting to offboard an employee named John Smith at Customer ABC but logs into the wrong Microsoft 365 environment and accidentally offboards John Smith at Customer XYZ. Ouch! You’ll have to perform your most agile maneuvers to survive that one.

We’ve found that as a rule of thumb, only an MSP’s most senior technicians with the necessary training, certifications and experience should be logging into the Microsoft or Google portals. Each time you grant full admin access, it opens 100% of your customer’s environment, leaving room for potential issues to arise.

Hacked into submission

Cyber attacks are one of those potential issues. Overprovisioning of user privilege significantly increases the risk of malware or hackers stealing passwords or for malicious code to be installed via email attachments. Successful assaults like these can leverage the entire set of assigned user privileges to access data or launch an attack against your networked computers or servers.

Again, it’s all about the level of access. If a low-access user clicks on an attachment or link within a phishing email that loads ransomware onto their system, the impact would be isolated to the user’s system and the resources they can access. But if the phishing victim has broad admin privileges, the ransomware could exploit domain account privileges to modify settings and to access, corrupt, or encrypt sensitive data from endpoints and servers across the network.

Scarier still, hackers often gain initial access through a low-level entry point such as a phishing attack on a standard user. The intruder then works through the network until they find a dormant or orphaned account that allows them to escalate their own privileges. Elevation of privilege vulnerabilities is increasingly common and can make it shockingly easy for a hacker to do serious harm.

Stop the horror stories before they begin

Fortunately, applying LPA protocols makes it virtually impossible for MSPs to experience nightmare scenarios like those described above—and with Augmentt Engage, it’s a simple matter of automation. With Engage, you can easily adopt LPA for all users (and in some cases for L1 technicians) across multiple applications.

Designed with a transparent access management model, Engage makes it easy to seamlessly provides users with only the access level they require to get the job done. That means far less exposure to the security risks and data breaches associated with excess privileges.

And because Augmentt Engage lets you implement LPA directly into your workflow, it means that technicians must stop sharing passwords, further reducing security threats, and it lets you track administrator activity for both traceability and troubleshooting.

Above all else, LPA with Engage will spare you from those recurring and sleep-stealing SaaS management horror stories.

Author
Gavin Garbutt
Co-Founder & Chairman of Augmentt

FAQ

Using our GDAP tool & Magic Link, setting up is easy! You can integrate with your CSP partner portal in minutes
Augmentt uses a combination of Microsoft Secure Score best practices as well as industry standards such as NIST & CIS. You can use the out of box templates to get started right away and even build your own custom templates to match your client requirements.
Out of box, Augmentt comes pre-configured to not be noisy. Very few Microsoft alerts are critical in nature so you will be receiving tickets for account breaches and not minor user log related events. That said, everything is customizable and you can turn alerts on & off to match your clients’ needs.
No. You can choose to schedule alerts to any stakeholder you want and at the frequency you want or manually download reports when you need them.
Regardless of how MFA is managed across your tenants, we have you covered. Augmentt supports Conditional Access Policies, Security Defaults, Entra ID per user (Legacy) MFA as well as 3rd party MFA services like DUO.
No. You can use Augmentt to monitor and manage all clients regardless of their licensing. For environments with no premium licensing you can still provide alerts and monitoring for account breaches and configure security best practices. For environments with premium licensing, you can leverage Microsoft’s premium alerts and premium security configurations such as Conditional Access Policies.
Augmentt is one of the few vendors SOC 2 Type II, and GDPR compliant.
Site licenses to make sure you can deliver standardized service across all clients very affordably.

SUBSCRIBE for more resources

Related Content

Policy Sprawl Is Killing MSP Efficiency
Policy sprawl is quietly draining your margins, creating security gaps, and eroding client trust. The good news? Standardization is the cure.
Does Microsoft Secure Score Tell the Whole Story?
Do you have a complete understanding of your security? See why MSPs need to understand the role licensing plays in Secure Score results.
Top 10 M365 Security Best Practices for MSPs
Here are the top M365 security best practices to help you enhance protection, ensure compliance, and stay ahead of emerging threats.