Third-Party Integration Risk
mediumthird-party-integration-risk
Insecure integrations with third-party applications create attack vectors or expose sensitive data through connected services
Information DisclosureTamperingElevation of Privilege
MITRE ATT&CK techniques
| ID | Name | Tactic |
|---|---|---|
| T1199 | Trusted Relationship | Initial Access |
| T1195 | Supply Chain Compromise | Initial Access |
Common Weakness Enumeration
Mitigating controls
ctrl-integration-1- Maintain inventory of all third-party integrations and their permissions
ctrl-integration-2- Implement security review process for new integrations
ctrl-integration-3- Monitor data flows between integrated applications
ctrl-integration-4- Enforce API rate limiting and access controls
ctrl-integration-5- Regularly review and remove unused integrations