Cloud Application Integration

Adversaries may achieve persistence by leveraging OAuth application integrations in a software-as-a-service environment. Adversaries may create a custom application, add a legitimate application into the environment, or even co-opt an existing integration to achieve malicious ends.[1][2]

OAuth is an open standard that allows users to authorize applications to access their information on their behalf. In a SaaS environment such as Microsoft 365 or Google Workspace, users may integrate applications to improve their workflow and achieve tasks.

Leveraging application integrations may allow adversaries to persist in an environment – for example, by granting consent to an application from a high-privileged adversary-controlled account in order to maintain access to its data, even in the event of losing access to the account.[3][4][5] In some cases, integrations may remain valid even after the original consenting user account is disabled.[6] Application integrations may also allow adversaries to bypass multi-factor authentication requirements through the use of Application Access Tokens. Finally, they may enable persistent Automated Exfiltration over time.[7]

Creating or adding a new application may require the adversary to create a dedicated Cloud Account for the application and assign it Additional Cloud Roles – for example, in Microsoft 365 environments, an application can only access resources via an associated service principal.[8]

ID: T1671
Sub-techniques:  No sub-techniques
Tactic: Persistence
Platforms: Office Suite, SaaS
Version: 1.0
Created: 20 March 2025
Last Modified: 15 April 2025

Mitigations

ID Mitigation Description
M1047 Audit

Periodically review SaaS integrations for unapproved or potentially malicious applications.

M1042 Disable or Remove Feature or Program

Do not allow users to add new application integrations into a SaaS environment. In Entra ID environments, consider enforcing the "Do not allow user consent" option.[9]

Detection

ID Data Source Data Component Detects
DS0026 Active Directory Active Directory Object Modification

Monitor M365 Audit logs for the Operations Add app role assignment grant to user and/or Consent to application occurring against AzureActiveDirectory Workloads.[10]

DS0025 Cloud Service Cloud Service Modification

Monitor for additions and changes to applications in the SaaS environment.

References