Determine risky permissions assignable from both Microsoft Graph and other APIs #1397
Closed
2 tasks done
Labels
analysis-required
This issue requires review or analysis work to complete
Milestone
💡 Summary
Permissions like Sites.FullControl.All are covered in both Graph and the SharePoint API. Another example is Mail.ReadWrite which is assignable from Graph and Office 365 Exchange Online.
ScubaGear should catch a risky permissions regardless if it was assigned through Graph, another API, or vice versa.
(Resource App ID is in reference to the SharePoint API)
Motivation and context
Relates to the epic #1073 and ongoing work in #1327.
Implementation notes
The majority of risky API permissions in this list are pulled from MS Graph. Verify if MS Graph permissions are included as a subset in other Microsoft APIs.
Some initial APIs to investigate further:
Acceptance criteria
How do we know when this work is done?
The text was updated successfully, but these errors were encountered: