Labs

Cloud & SaaS Tradecraft
Living off the cloud, not the land.

Attackers don’t need custom implants to be dangerous in 2025. They need OAuth consent, a few mis-scoped roles, access to “just one” mailbox, or a misconfigured automation flow. This lab focuses on how real intrusions play out in Microsoft 365, Google Workspace, and critical SaaS—and how to turn that knowledge into opinionated defenses.

M365, Entra ID & Azure AD Google Workspace & OAuth apps SaaS persistence & identity abuse

The goal isn’t to catalog every trick—it’s to understand durable patterns that defenders can reliably detect, block, or make prohibitively expensive.

Talk about cloud & SaaS exposure
Focus areas

Where we spend our time in cloud & SaaS

Instead of trying to cover “everything cloud,” we focus on the places attackers reliably get leverage: identity, OAuth apps, automation, and the glue between systems.

Identity & access

Entra ID, Workspace & SSO misdesign

Cloud identity models can quietly create high-impact pathways. We explore:

  • Over-privileged roles and groups in Entra ID
  • Workspace admin scopes, domain-wide delegation, and service accounts
  • SSO misconfigurations across key SaaS platforms
OAuth & apps

Consent, tokens & application abuse

Once an attacker has consent, they often don’t need passwords. We study:

  • Malicious or abused OAuth applications and add-ins
  • Token reuse, refresh flows, and long-lived access
  • Consent phishing and shadow IT app ecosystems
Automation

Living inside “business as usual” workflows

Built-in automation is a powerful substrate for persistence and exfiltration:

  • M365 Power Automate, Logic Apps, and Google Apps Script abuse
  • Using SaaS-native rules (mail, storage, chat) as stealth channels
  • Chaining low-severity misconfigurations into reliable access
Research lines

Examples of tradecraft we study

These are representative patterns—each turns into concrete detection logic, hardening guidance, or incident playbook content in our client work.

Pattern

“Single mailbox to tenant material impact”

Starting from one compromised account or shared inbox, we explore:

  • Which default mailbox and Teams features can be abused for recon
  • Pivot into file storage, approvals, and key business workflows
  • Detection opportunities in sign-in, mailbox, and audit logs
Pattern

“Quiet SaaS persistence without malware”

Maintaining control without obvious binaries or implants:

  • App-based persistence using approved OAuth scopes
  • Abusing “low suspicion” automation rules for long-term access
  • Blending with normal service accounts and integrations
Pattern

“Cross-SaaS lateral movement”

Moving from one platform to another using SSO and API bridges:

  • How compromise in M365 can expose CRM, ticketing, and finance tools
  • Role of SCIM, SAML, and custom integrations in lateral risk
  • Where to place compensating controls that aren’t vendor-specific
Applied output

What this work becomes for defenders

Cloud & SaaS Tradecraft research isn’t an academic exercise. It feeds directly into how we help customers harden tenants, build detection, and rehearse incidents.

Cloud-hardening patterns

Opinionated recommendations for Entra ID, M365, Google Workspace, and key SaaS platforms used in our Cloud & 365 / Workspace Resilience solution and M365 / Entra ID Hardening service.

Detection engineering inputs

Log sources, event patterns, and correlation ideas that are practical for small and mid-sized teams, not just large SOCs.

IR playbooks & tabletops

Cloud-specific incident scenarios, containment decision points, and investigation steps embedded into our Incident Readiness offerings.

Guides & briefings

Distilled explanations of emerging cloud/SaaS techniques for security leaders, engineers, and non-technical stakeholders who need to understand the “why,” not just the “what.”

Want your cloud defenses based on current tradecraft?

We use this research to shape how we harden tenants, build detection, and run incident exercises. If your risk is in M365, Workspace, and SaaS, this is where we start.

Talk about cloud & SaaS exposure Explore cloud resilience solution