Third-Party Integration Risk

medium

third-party-integration-risk

Insecure integrations with third-party applications create attack vectors or expose sensitive data through connected services

Information DisclosureTamperingElevation of Privilege

MITRE ATT&CK techniques

IDNameTactic
T1199 Trusted Relationship Initial Access
T1195 Supply Chain Compromise Initial Access

Common Weakness Enumeration

Mitigating controls

ctrl-integration-1
Maintain inventory of all third-party integrations and their permissions
ctrl-integration-2
Implement security review process for new integrations
ctrl-integration-3
Monitor data flows between integrated applications
ctrl-integration-4
Enforce API rate limiting and access controls
ctrl-integration-5
Regularly review and remove unused integrations

References