Determine risky permissions assignable from both Microsoft Graph and other APIs #1397
Closed
2 tasks done
Labels
analysis-required
This issue requires review or analysis work to complete
Milestone
💡 Summary
Permissions like Sites.FullControl.All are covered in both Graph and the SharePoint API. Another example is Mail.ReadWrite which is assignable from Graph and Office 365 Exchange Online.
ScubaGear should catch a risky permissions regardless if it was assigned through Graph, another API, or vice versa.
(Resource App ID is in reference to the SharePoint API)
![Image](https://private-user-images.githubusercontent.com/149098823/382430399-d0a67aaf-0569-4455-9309-fc0721fefa7a.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJnaXRodWIuY29tIiwiYXVkIjoicmF3LmdpdGh1YnVzZXJjb250ZW50LmNvbSIsImtleSI6ImtleTUiLCJleHAiOjE3Mzk2MDUwMzYsIm5iZiI6MTczOTYwNDczNiwicGF0aCI6Ii8xNDkwOTg4MjMvMzgyNDMwMzk5LWQwYTY3YWFmLTA1NjktNDQ1NS05MzA5LWZjMDcyMWZlZmE3YS5wbmc_WC1BbXotQWxnb3JpdGhtPUFXUzQtSE1BQy1TSEEyNTYmWC1BbXotQ3JlZGVudGlhbD1BS0lBVkNPRFlMU0E1M1BRSzRaQSUyRjIwMjUwMjE1JTJGdXMtZWFzdC0xJTJGczMlMkZhd3M0X3JlcXVlc3QmWC1BbXotRGF0ZT0yMDI1MDIxNVQwNzMyMTZaJlgtQW16LUV4cGlyZXM9MzAwJlgtQW16LVNpZ25hdHVyZT01Mjc3MWNiZjRhMmQzYWY2ZDMwMjkxNTliMzQ5YjQzZDg3MWYxOTlhMWY4NzNmOTIxZDM0NzliMjA4ZTk0MWQ1JlgtQW16LVNpZ25lZEhlYWRlcnM9aG9zdCJ9.OfWB-V8wefUBJC9-HibBTvuz4-GaKcSpbJHvOAmbGMU)
Motivation and context
Relates to the epic #1073 and ongoing work in #1327.
Implementation notes
The majority of risky API permissions in this list are pulled from MS Graph. Verify if MS Graph permissions are included as a subset in other Microsoft APIs.
Some initial APIs to investigate further:
Acceptance criteria
How do we know when this work is done?
The text was updated successfully, but these errors were encountered: