@blamejs/exceptd-skills 0.12.26 → 0.12.28
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/AGENTS.md +3 -0
- package/CHANGELOG.md +60 -0
- package/bin/exceptd.js +73 -1
- package/data/_indexes/_meta.json +22 -19
- package/data/_indexes/activity-feed.json +26 -5
- package/data/_indexes/catalog-summaries.json +3 -3
- package/data/_indexes/chains.json +994 -64
- package/data/_indexes/currency.json +28 -1
- package/data/_indexes/frequency.json +428 -124
- package/data/_indexes/handoff-dag.json +70 -19
- package/data/_indexes/jurisdiction-map.json +37 -12
- package/data/_indexes/section-offsets.json +282 -0
- package/data/_indexes/stale-content.json +2 -2
- package/data/_indexes/summary-cards.json +198 -0
- package/data/_indexes/token-budget.json +168 -3
- package/data/_indexes/trigger-table.json +190 -0
- package/data/_indexes/xref.json +145 -2
- package/data/attack-techniques.json +104 -19
- package/data/framework-control-gaps.json +498 -11
- package/data/playbooks/cloud-iam-incident.json +1351 -0
- package/data/playbooks/idp-incident.json +1259 -0
- package/data/playbooks/ransomware.json +1407 -0
- package/data/rfc-references.json +44 -0
- package/lib/flag-suggest.js +4 -0
- package/lib/playbook-runner.js +117 -10
- package/manifest-snapshot.json +227 -3
- package/manifest-snapshot.sha256 +1 -1
- package/manifest.json +282 -41
- package/package.json +1 -1
- package/sbom.cdx.json +7 -7
- package/skills/cloud-iam-incident/skill.md +419 -0
- package/skills/idp-incident-response/skill.md +352 -0
- package/skills/ransomware-response/skill.md +374 -0
|
@@ -0,0 +1,352 @@
|
|
|
1
|
+
---
|
|
2
|
+
name: idp-incident-response
|
|
3
|
+
version: "1.0.0"
|
|
4
|
+
description: Identity-provider incident response for mid-2026 — Okta, Entra ID, Auth0, Ping, OneLogin tenant compromise, federated-trust abuse, OAuth app consent abuse, Midnight Blizzard and Scattered Spider TTPs against the IdP control plane
|
|
5
|
+
triggers:
|
|
6
|
+
- idp incident
|
|
7
|
+
- identity provider incident
|
|
8
|
+
- okta breach
|
|
9
|
+
- okta compromise
|
|
10
|
+
- entra id compromise
|
|
11
|
+
- entra app consent
|
|
12
|
+
- auth0 breach
|
|
13
|
+
- ping identity breach
|
|
14
|
+
- onelogin breach
|
|
15
|
+
- midnight blizzard
|
|
16
|
+
- cozy bear
|
|
17
|
+
- apt29 entra
|
|
18
|
+
- scattered spider
|
|
19
|
+
- octo tempest
|
|
20
|
+
- storm-0875
|
|
21
|
+
- oauth consent abuse
|
|
22
|
+
- federated trust abuse
|
|
23
|
+
- saml token forgery
|
|
24
|
+
- cross-tenant abuse
|
|
25
|
+
- management api token leak
|
|
26
|
+
- service account compromise
|
|
27
|
+
- help-desk social engineering
|
|
28
|
+
- mfa factor swap
|
|
29
|
+
- tenant compromise
|
|
30
|
+
data_deps:
|
|
31
|
+
- cve-catalog.json
|
|
32
|
+
- attack-techniques.json
|
|
33
|
+
- framework-control-gaps.json
|
|
34
|
+
- global-frameworks.json
|
|
35
|
+
- cwe-catalog.json
|
|
36
|
+
- d3fend-catalog.json
|
|
37
|
+
atlas_refs: []
|
|
38
|
+
attack_refs:
|
|
39
|
+
- T1078.004
|
|
40
|
+
- T1556.007
|
|
41
|
+
- T1098.001
|
|
42
|
+
- T1606.002
|
|
43
|
+
- T1199
|
|
44
|
+
framework_gaps:
|
|
45
|
+
- NIST-800-53-IA-5-Federated
|
|
46
|
+
- ISO-27001-2022-A.5.16-Federated
|
|
47
|
+
- SOC2-CC6-OAuth-Consent
|
|
48
|
+
- UK-CAF-B2-IdP-Tenant
|
|
49
|
+
- AU-ISM-1559-IdP
|
|
50
|
+
- NIS2-Art-21-Federated-Identity
|
|
51
|
+
- DORA-Art-19-IdP-4h
|
|
52
|
+
- OFAC-Sanctions-Threat-Actor-Negotiation
|
|
53
|
+
rfc_refs:
|
|
54
|
+
- RFC-7519
|
|
55
|
+
- RFC-8725
|
|
56
|
+
- RFC-7591
|
|
57
|
+
- RFC-9421
|
|
58
|
+
cwe_refs:
|
|
59
|
+
- CWE-287
|
|
60
|
+
- CWE-863
|
|
61
|
+
- CWE-269
|
|
62
|
+
- CWE-284
|
|
63
|
+
- CWE-522
|
|
64
|
+
- CWE-345
|
|
65
|
+
d3fend_refs:
|
|
66
|
+
- D3-MFA
|
|
67
|
+
- D3-CBAN
|
|
68
|
+
- D3-NTA
|
|
69
|
+
- D3-IOPR
|
|
70
|
+
forward_watch:
|
|
71
|
+
- Entra ID conditional access evolution post-Midnight Blizzard — Microsoft's 2025-2026 commitments on legacy-tenant MFA enforcement and OAuth-app consent gating
|
|
72
|
+
- Okta IPSIE (Interoperability Profile for Secure Identity in the Enterprise) OpenID Foundation working-group output and adoption timeline
|
|
73
|
+
- Auth0 management-API token deprecation roadmap and replacement workload-identity-federation pattern
|
|
74
|
+
- Ping Identity DaVinci flow-execution security model under post-2024 Thoma Bravo ownership
|
|
75
|
+
- OneLogin (One Identity) post-acquisition platform evolution
|
|
76
|
+
- CISA AA24 series — Okta, Entra ID, and IdP-tenant compromise advisories (forward-watched for AA25/AA26 successors)
|
|
77
|
+
- SAML token-forgery (T1606.002) detection-strategy publication in MITRE ATT&CK v20 (October 2026 cycle)
|
|
78
|
+
- DORA Art.19 implementing-act guidance for IdP-class incidents — forward-watched for ESAs publication
|
|
79
|
+
- NIS2 implementing-act revision enumerating federated-identity control-plane indicators
|
|
80
|
+
- Cross-tenant access settings evolution at Entra ID — partner-tenant attestation cadence and revocation latency
|
|
81
|
+
- PSD3 / PSR final text on agent-initiated payments and the IdP-mediated agent-attestation surface
|
|
82
|
+
last_threat_review: "2026-05-15"
|
|
83
|
+
---
|
|
84
|
+
|
|
85
|
+
# Identity-Provider Incident Response (mid-2026)
|
|
86
|
+
|
|
87
|
+
## Threat Context (mid-2026)
|
|
88
|
+
|
|
89
|
+
Identity-provider tenants are the highest-blast-radius single object in a modern cloud estate. The IdP issues every authentication outcome, federates every OAuth scope, and serves as the source-of-truth for privileged-role assignment across the downstream SaaS / cloud / on-prem fleet. 2023-2026 incident-response data shows five recurring themes, each of which now drives both attacker tradecraft and the framework-lag conversation.
|
|
90
|
+
|
|
91
|
+
**Okta — October 2023 customer-support breach.** A stolen support-engineer credential gave the attacker read access to customer-uploaded HAR files containing valid session tokens for approximately 134 Okta customer tenants. Downstream exploitation against 1Password, BeyondTrust, Cloudflare, and others followed within days. Root cause was a personal-Google-account-stored Okta service-account credential — a service account that bypassed the human-MFA gate because service accounts at Okta were exempt from MFA enforcement by design. The blast-radius lesson is that service-account credential hygiene at the IdP vendor itself sits upstream of every customer's identity-security programme; the framework-lag lesson is that NIST IA-5, ISO A.5.17, and SOC 2 CC6 had no evidence path that would have surfaced the missing MFA on the upstream service account.
|
|
92
|
+
|
|
93
|
+
**Microsoft / Entra ID — January 2024 Midnight Blizzard (APT29 / Cozy Bear).** Russian state actor compromised a legacy non-MFA test tenant via residential-proxy + password-spray. Escalation went through OAuth-app consent abuse: a legacy application held a privileged Graph scope (full-mail-read across the tenant), and the attacker harvested the application's refresh tokens after the initial compromise. The attacker exfiltrated corporate mail including senior leadership and the security team's own correspondence about the investigation. Public attribution and Microsoft's own SEC filings (2024 8-K) confirm continued dwell and onward compromise at HPE and others into 2025. The framework-lag lesson is that CC6 audit evidence showed nothing anomalous — the consenting user authenticated correctly, the legacy app's onward Graph calls were authorized by the prior consent grant. Quarterly OAuth consent review is silent on attacker timelines measured in days.
|
|
94
|
+
|
|
95
|
+
**Snowflake — mid-2024 credential-database compromise.** Approximately 165 customer tenants were compromised through stolen Snowflake-customer credentials harvested from infostealer-malware logs; the dominant pivot was IdP-service-account credentials whose customer tenants had not enforced MFA on the Snowflake user. Affected: AT&T's approximately 110-million-record exposure, Ticketmaster, Santander, Pure Storage, Advance Auto Parts. The framework-lag lesson is that the Snowflake-side controls were fine (MFA was available and the affected customers had not enabled it); the IdP-side gap was that customer identity teams had classified the Snowflake service-account as "system not subject to MFA enforcement" without the IdP tenant enforcing a workload-identity-federation pattern that would have moved the credential off static secret entirely.
|
|
96
|
+
|
|
97
|
+
**Scattered Spider (UNC3944 / Octo Tempest / Storm-0875) — 2022-2026 help-desk social engineering.** Voice-impersonated calls to IT help-desks to mint replacement MFA factors, then SIM-swap fallback, then ransomware deployment. Public references: MGM Resorts (approximately USD 100M operational impact, September 2023), Caesars Entertainment (approximately USD 15M ransom paid, August 2023), Twilio (multiple breaches 2022-2023), Mailchimp, and dozens of others. The attack pattern continues evolving through 2026 toward deepfake-voice and AI-augmented social-engineering reconnaissance against help-desk operators. The framework-lag lesson is that AU Essential 8 Strategy 4 (MFA), NIST IA-5, and SOC 2 CC6 all show "MFA enforced" status for the targeted users — the factor swap leaves the user-facing MFA policy unchanged while replacing the factor under operator control.
|
|
98
|
+
|
|
99
|
+
**Auth0 management-API token leakage (2026 class).** Management-API tokens with broad scope checked into IaC or CI configuration produce tenant-wide compromise paths that bypass MFA entirely. The Auth0 management API permits creating users, modifying applications, rotating signing keys, and managing rules — every operation that a tenant administrator could perform interactively. The pattern is structurally identical to AWS root-access-key leakage but the framework controls are weaker: Auth0's management-API token model lacks the AWS-grade IP-allowlist and source-fingerprint enforcement that AWS root-access tokens have.
|
|
100
|
+
|
|
101
|
+
**Adjacent reality.** Salt Typhoon's 2024-2025 telecommunications-sector compromises (T-Mobile, AT&T Wireless, Verizon, Lumen) leveraged adjacent identity surfaces — the lawful-intercept management plane and the wireline-carrier admin tenant — by similar TTPs (legacy non-MFA admin accounts, dormant service accounts, OAuth-mediated lateral movement). The IdP-tenant control plane is the shared structural attack surface across the Microsoft-class, Okta-class, and Telco-class incidents; the framework controls treat the IdP as oracle in every case.
|
|
102
|
+
|
|
103
|
+
Agentic AI is the emerging structural problem on top. AI agents operating on behalf of users hold session credentials and refresh tokens; in mid-2026 the dominant question is no longer "did the user authenticate" but "did the user, or an AI agent acting under loosely-scoped delegated authority within the user's authenticated session, initiate this operation." OAuth consent grants made to AI agents (Copilot for Microsoft 365, ChatGPT enterprise connectors, Anthropic computer-use-class agents, LangChain orchestrators) are themselves a high-blast-radius lateral-movement primitive that no framework currently models.
|
|
104
|
+
|
|
105
|
+
---
|
|
106
|
+
|
|
107
|
+
## Framework Lag Declaration
|
|
108
|
+
|
|
109
|
+
| Framework | Control | Designed For | Fails Because |
|
|
110
|
+
|---|---|---|---|
|
|
111
|
+
| NIST 800-53 Rev.5 | IA-5 (Authenticator Management) | Authenticator issuance, distribution, storage, revocation, replacement at the system layer | Captured in `data/framework-control-gaps.json#NIST-800-53-IA-5-Federated`. IA-5 evidence is satisfied by a quarterly authenticator inventory snapshot; federated-trust modification at the IdP control plane (token-signing certificate rotation, claim-transformation rule changes, OIDC discovery-document tampering) is outside the evidence path. Management-API tokens that bypass the human-MFA gate are not enumerated as IA-5 authenticators by most implementations. |
|
|
112
|
+
| NIST 800-53 Rev.5 | IA-2 (Identification and Authentication) | Authenticating organisational and non-organisational users | IA-2 specifies MFA for privileged and non-privileged users; it does not require evidence that the MFA path itself has not been tampered with at the IdP control plane. Help-desk-mediated factor swap (Scattered Spider TTP) produces an IA-2-compliant authentication outcome. |
|
|
113
|
+
| ISO/IEC 27001:2022 | A.5.16 (Identity Management) + A.5.17 (Authentication Information) | Static identity lifecycle and credential protection | Captured in `data/framework-control-gaps.json#ISO-27001-2022-A.5.16-Federated`. A.5.16/A.5.17 cover static identity state (was the account provisioned, was MFA enrolled, was the password rotated). Federated-state transitions (OAuth consent grants, cross-tenant access settings, federated-trust modification) are not enumerated as a distinct control class. |
|
|
114
|
+
| SOC 2 | CC6 (Logical and Physical Access Controls) | Authentication, authorization, and access controls for human users and service accounts | Captured in `data/framework-control-gaps.json#SOC2-CC6-OAuth-Consent`. CC6 treats the authenticated session as the access boundary. OAuth consent grants federate scope outside the authenticated-session boundary; the consenting user authenticated correctly, the third-party app's onward calls are authorized by the grant, and CC6 audit evidence shows nothing anomalous. The dominant 2024-2026 IdP-pivot pattern is invisible to CC6 audit evidence. |
|
|
115
|
+
| UK NCSC CAF | B2.b (Identity and Access Control) | Outcome-based identity and access control for the essential function | Captured in `data/framework-control-gaps.json#UK-CAF-B2-IdP-Tenant`. B2.b is assessed against the IdP tenant's published authentication outcomes; the IdP-tenant control plane (who modified the tenant configuration itself) is outside the outcome's typical evidence surface. A compromised tenant continues to produce compliant outcomes until the attacker abandons stealth. |
|
|
116
|
+
| AU ISM | ISM-1559 (Privileged Account Credential Management) + ISM-1546 (MFA for Privileged Users) | Privileged credential storage, rotation, monitoring + MFA for human-initiated privileged authentication | Captured in `data/framework-control-gaps.json#AU-ISM-1559-IdP`. ISM-1559 reaches privileged credentials at the system layer; IdP-tenant control-plane operations are outside the evidence path. ISM-1546 covers human-initiated authentication; IdP control-plane operations performed by management-API tokens never cross the human-MFA gate. |
|
|
117
|
+
| AU Essential 8 | Strategy 4 — Multi-factor authentication (E8 M.4) | MFA on privileged and internet-facing accounts | E8 M.4 defends the interactive authentication flow. IdP-tenant control-plane operations performed via management-API tokens, OAuth client credentials, or workload identity federation never cross the MFA gate. Compliance-theater test: count admin-action audit events over the last 30 days, partition by service-token vs human-MFA-session origin; if service tokens dominate, M.4 compliance is paper. |
|
|
118
|
+
| EU NIS2 | Art.21(2)(j) + Art.23 | Cryptography + access control + 24-hour incident notification | Captured in `data/framework-control-gaps.json#NIS2-Art-21-Federated-Identity`. The supporting implementing acts do not enumerate federated-identity control-plane operations. IdP-provider tenants serving essential entities are in scope but the evidence model lags. Art.23 24-hour clock fires on IdP incidents but the tenant-operator-to-essential-entity notification chain is undefined for IdP-class incidents. |
|
|
119
|
+
| EU DORA | Art.19 (Major-ICT-related-incident notification) | 4-hour initial / 72-hour intermediate / one-month final notification for major ICT incidents | Captured in `data/framework-control-gaps.json#DORA-Art-19-IdP-4h`. Art.19 does not specify IdP-tenant compromise as a distinct incident class; financial entities relying on a CSP-hosted IdP frequently classify IdP incidents under Art.28 concentration risk and miss the Art.19 4-hour clock. |
|
|
120
|
+
| US-NY NYDFS | 23 NYCRR 500.7 (Privileged Access) + 500.17 (Notification of Cybersecurity Event) | Privileged-access controls + 72-hour cyber-event notification | 500.7 covers privileged account access for human accounts; IdP-tenant management-API tokens are treated as conventional service accounts when they are not. 500.17 72-hour clock applies but Class A designation does not specifically enumerate IdP-tenant compromise. |
|
|
121
|
+
| US Treasury OFAC + EU + UK sanctions | Cyber-Related Sanctions program (EO 13694 + 13757 + EU Reg.269/2014 + UK OFSI) | Prohibits transactions with designated cyber-actors | Captured in `data/framework-control-gaps.json#OFAC-Sanctions-Threat-Actor-Negotiation`. IdP-incident-response that escalates to ransomware faces ransom-payment-vs-sanctions screening under time pressure; attribution-to-designated-entity is rarely deterministic during an active incident. |
|
|
122
|
+
| HIPAA | 164.308(a)(4) (Information Access Management) + 164.312(d) (Person or Entity Authentication) | Access-authorisation policies + entity authentication | Treats the authenticated session as the access boundary; OAuth-consent-mediated scope grant to a third-party app processing PHI is invisible. |
|
|
123
|
+
|
|
124
|
+
**Cross-jurisdiction posture (per AGENTS.md rule #5).** Any IdP-incident-response analysis for a multi-jurisdiction tenant must cite at minimum: EU NIS2 + DORA + GDPR (Art.33 and Art.34) + national overlays, UK GDPR + NCSC CAF, AU Privacy Act NDB + APRA CPS 234 (where applicable) + Essential 8 + ISM, US NYDFS 500 + state breach-notification laws + sector-specific (HIPAA for healthcare, GLBA + NYDFS for financial), Canada PIPEDA + OSFI B-13 (where applicable), Singapore PDPA + MAS Notice 655, Hong Kong PDPO + HKMA guidance, ISO/IEC 27001:2022, SOC 2, and the OFAC + EU + UK sanctions overlay for any ransomware-bridging incident. US-only (NIST + NYDFS + state laws) is incomplete.
|
|
125
|
+
|
|
126
|
+
---
|
|
127
|
+
|
|
128
|
+
## TTP Mapping
|
|
129
|
+
|
|
130
|
+
| Surface | TTP | Matrix | Variant in mid-2026 | Gap Flag |
|
|
131
|
+
|---|---|---|---|---|
|
|
132
|
+
| IdP service-account compromise / dormant-then-active reactivation | T1078.004 — Valid Accounts: Cloud Accounts | ATT&CK Enterprise | Snowflake-via-Okta-service-account 2024; ongoing through 2025-2026 against any IdP whose service-account credentials are stored in IaC / CI / dev tooling. CWE-798 (hard-coded credentials) and CWE-522 (insufficiently protected credentials) are the underlying weakness classes. | NIST IA-5 silent on management-API tokens; AU ISM-1559 silent on IdP-tenant control plane |
|
|
133
|
+
| Federated-trust modification / SAML / OIDC signing-key tampering | T1556.007 — Modify Authentication Process: Hybrid Identity | ATT&CK Enterprise | APT29-class state actors continue exploiting hybrid-identity federation; on-prem AD-to-Entra cutover windows are particularly vulnerable. CWE-345 (insufficient verification of data authenticity) is the underlying weakness class. | NIST IA-5 silent on federated-trust modification; ISO A.5.16/A.5.17 silent on federated-state transitions |
|
|
134
|
+
| OAuth-app consent abuse / additional cloud credentials | T1098.001 — Account Manipulation: Additional Cloud Credentials | ATT&CK Enterprise | Midnight Blizzard's January 2024 Entra ID pattern. Legacy OAuth applications holding privileged Graph / Okta API / Auth0 management scope are the dominant pivot. CWE-863 (incorrect authorization) and CWE-284 (improper access control) underlying. | SOC 2 CC6 audit evidence blind to OAuth-consent-mediated scope; UK CAF B2.b outcome-blind |
|
|
135
|
+
| SAML / web-cookie token forgery | T1606.002 — Forge Web Credentials: SAML Tokens | ATT&CK Enterprise | Golden-SAML class attacks (NobleSAML / Solorigate 2020 legacy, ongoing variants against hybrid-identity tenants in 2024-2026). When the IdP signing-state has been tampered with, the attacker can mint authentic tokens for any user. CWE-345 + CWE-287 (improper authentication) underlying. | NIST IA-5 silent on token-signing-state attestation |
|
|
136
|
+
| Cross-tenant trust abuse / federated relationship exploitation | T1199 — Trusted Relationship | ATT&CK Enterprise | Entra ID cross-tenant access settings + Okta org-to-org federation + Auth0 enterprise connections all permit persistent token issuance against the home tenant from an attacker-controlled partner tenant. Invisible to most identity-hygiene programmes. CWE-863 underlying. | ISO A.5.16 silent on cross-tenant inventory |
|
|
137
|
+
| Help-desk-mediated factor swap | (No native TTP — closest: T1556.007 + T1078.004) | ATT&CK Enterprise | Scattered Spider primary TTP. Voice-impersonated calls produce a factor-reset event that pairs with no password-reset event, leaving the user-facing MFA policy unchanged. AI-augmented reconnaissance accelerates target-selection. | AU E8 M.4 + NIST IA-5 + ISO A.5.17 all show "MFA enforced" for the targeted user |
|
|
138
|
+
| Management-API token leakage | T1078.004 + CWE-798 | ATT&CK + CWE | Auth0 management API tokens checked into IaC; Okta API tokens in CI logs; Entra app secrets in dev .env files. Tenant-wide compromise without crossing the human-MFA gate. | ISM-1546 covers human MFA; management-API tokens are out of scope |
|
|
139
|
+
| Break-glass account misuse | T1078.004 + (no native TTP for "designed-to-bypass account exploited") | ATT&CK Enterprise | Break-glass accounts whose audit-log alerting was never exercised become attacker backdoors. Conditional-access exclusions designed to permit emergency access remove the MFA gate by design. | UK CAF B2.b outcome-blind; ISO A.5.17 evidence path absent |
|
|
140
|
+
|
|
141
|
+
**Note on TTP coverage.** ATT&CK Enterprise covers federated-identity attacks through T1078.004 (Cloud Accounts), T1556.007 (Hybrid Identity), T1098.001 (Additional Cloud Credentials), T1606.002 (SAML Tokens), and T1199 (Trusted Relationship). The gap between (a) help-desk-mediated factor swap and (b) any named TTP is the most notable structural omission as of mid-2026; the closest mapping (T1556.007 + T1078.004) does not capture the social-engineering vector that drives Scattered Spider.
|
|
142
|
+
|
|
143
|
+
---
|
|
144
|
+
|
|
145
|
+
## Exploit Availability Matrix
|
|
146
|
+
|
|
147
|
+
| Surface / CVE Class | CVSS | RWEP | CISA KEV | PoC Public | AI-Discovered | Active Exploitation | Patch Available | Live-Patchable | Sector-Aware Detection |
|
|
148
|
+
|---|---|---|---|---|---|---|---|---|---|
|
|
149
|
+
| Okta tenant compromise via support-system / service-account | n/a (config-class) | high (operationally exploited 2023-2024) | n/a | Documented at scale | n/a | Confirmed mass exploitation 2023; ongoing variants | Configuration hardening (MFA enforcement on service accounts, IP allowlist, workload identity federation) | n/a | Vendor-side telemetry; partial customer-side via System Log |
|
|
150
|
+
| Entra ID OAuth-app consent abuse (Midnight Blizzard class) | n/a (design class) | high (USD-impact > USD 100M cumulative 2024-2025) | n/a | Demonstrated at scale | n/a (state-actor driven) | Confirmed ongoing 2024-2026 against EU + US targets | Mitigation only — consent grant policies, publisher verification, scope gating | n/a | Microsoft Identity Protection + Conditional Access; vendor-fragmented at lower tiers |
|
|
151
|
+
| Auth0 / Ping / OneLogin management-API token leak | n/a (config-class) | high (ongoing 2026 reports) | n/a | Documented across multiple operators | n/a | Suspected continuous against any tenant with management-API tokens in IaC | Mitigation — token TTL + scope + IP allowlist + workload identity federation | n/a | Tenant-side telemetry if log streaming configured |
|
|
152
|
+
| Help-desk social engineering (Scattered Spider) | n/a (social engineering) | high (MGM USD 100M, Caesars USD 15M as public reference) | n/a | Demonstrated at scale | n/a (AI-augmented reconnaissance) | Confirmed ongoing 2022-2026 | Mitigation only — out-of-band identity verification, video-callback to previously-registered number, knowledge-based + government-ID verification, never phone-only | n/a | Help-desk-system audit; vendor-fragmented |
|
|
153
|
+
| SAML token forgery (Golden SAML / NobleSAML class) | n/a (design class) | high (state-actor priority) | n/a | Public research + active campaigns | n/a | Suspected ongoing against hybrid-identity tenants | Mitigation — signing-key rotation + signing-state attestation + audit-log alerting on signing-cert modification | n/a | Tenant audit log if signing-state modification alerts configured |
|
|
154
|
+
| ScreenConnect identity-class CVE | 7.5 (CVSS) | high (CISA KEV) | Yes (2024-02) | Yes — public PoC | No | Confirmed exploitation against IdP-adjacent MSP surface | Yes — vendor patch | Patch-class | EDR + tenant audit if integration logged |
|
|
155
|
+
| CVE-2024-1709 ScreenConnect authentication bypass | 10.0 | 95 | Yes | Yes | No | Confirmed exploitation 2024 | Yes | Limited — appliance reboot window | Vendor-side patching + IdP-side conditional-access tightening |
|
|
156
|
+
| CVE-2023-3519 Citrix NetScaler RCE | 9.8 | 92 | Yes | Yes | No | Confirmed exploitation 2023-2024 (financial-sector and federal targets) | Yes | Limited — appliance reboot | Network telemetry + IdP-tenant access-pattern alerting |
|
|
157
|
+
| CVE-2026-30615 Windsurf MCP — adjacent identity surface | 8.6 | 88 | Forward-watched | Yes | Yes | Suspected | Mitigation + vendor patch | n/a | MCP-tool-trust telemetry |
|
|
158
|
+
|
|
159
|
+
**Honest gap statement (per AGENTS.md rule #10).** IdP-specific CVEs (Okta Auth0 Workforce CVEs, Entra ID Graph CVEs, Auth0 platform CVEs, Ping platform CVEs, OneLogin platform CVEs) are not exhaustively inventoried in `data/cve-catalog.json`. Authoritative sources: vendor advisories (Okta Security, Microsoft MSRC + Security Update Guide, Auth0 Security Advisories, Ping Identity Security Notices, One Identity Customer Advisory), CISA KEV for cross-sector exposure, CISA AA24 series for federal-targeting advisories, and sector intel feeds. Forward-watched.
|
|
160
|
+
|
|
161
|
+
---
|
|
162
|
+
|
|
163
|
+
## Analysis Procedure
|
|
164
|
+
|
|
165
|
+
This procedure threads the three foundational design principles required by AGENTS.md skill-format spec (defense in depth, least privilege, zero trust) through the seven-phase loop.
|
|
166
|
+
|
|
167
|
+
**Defense in depth.** Multi-layer authentication for tenant-admin operations: phishing-resistant FIDO2 device-bound passkey at the human layer (skill `identity-assurance`); paired-admin (4-eyes) on federated-trust modification, signing-key rotation, and tenant-wide application permission grants; conditional access requiring known-device + corporate-network + step-up on privileged-role assignment; out-of-band notification on every consent grant for high-risk scope; continuous audit-log alerting on every IdP control-plane operation; downstream-SaaS telemetry for token-use anomalies.
|
|
168
|
+
|
|
169
|
+
**Least privilege.** Per-service-account scoping (workload identity federation eliminates the static-secret class entirely where vendor support exists); admin-role separation (Application Administrator and Privileged Role Administrator should not be held by the same identity); break-glass accounts scoped to emergency-only with audit-log alerting on every use; OAuth consent grants reviewed per-grant rather than per-app (the same app can hold multiple scopes accreted over time); management-API tokens scoped to specific operations + source-IP allowlist + bounded TTL.
|
|
170
|
+
|
|
171
|
+
**Zero trust.** Every authentication event verified, not session-trusted; step-up for any privileged-role assignment AND for any federated-trust modification AND for any management-API token issuance; cross-tenant access verified per-partner per-quarter with written attestation; consent grants treated as never-expiring permissions whose business purpose must be re-attested; downstream-SaaS audit logs treated as primary detection telemetry (the IdP itself is the compromised oracle).
|
|
172
|
+
|
|
173
|
+
### Step 1 — Tenant-ownership + jurisdiction-clock attestation
|
|
174
|
+
|
|
175
|
+
For every IdP-incident-response engagement:
|
|
176
|
+
|
|
177
|
+
- Confirm tenant ownership in writing (operator owns the tenant or holds explicit written authorisation). IdP-incident response touches authentication state for every downstream service; ownership ambiguity is a halt condition.
|
|
178
|
+
- Identify applicable jurisdiction clocks: DORA Art.19 4-hour (financial entities, IdP is critical ICT third-party), NIS2 Art.23 24-hour (essential entities), GDPR Art.33 72-hour, NYDFS 500.17 72-hour, UK GDPR Art.33 72-hour, AU NDB 30-day, CCPA / CPRA 60-day. Surface clock obligations to the operator and wait for explicit acknowledgement before continuing.
|
|
179
|
+
|
|
180
|
+
### Step 2 — Audit-log evidence collection
|
|
181
|
+
|
|
182
|
+
Pull the last 90 days of IdP audit events (or longer if retention permits). For Okta: `/api/v1/logs` filtered for `eventType eq user.session.* OR user.authentication.* OR application.lifecycle.* OR system.org.*`. For Entra ID: Microsoft Graph `/auditLogs/directoryAudits` + `/auditLogs/signIns` with high-risk sign-in + consent-grant + role-assignment + federation-config filters. For Auth0: `/api/v2/logs` filtered for management events. For Ping and OneLogin: vendor-specific audit-trail APIs.
|
|
183
|
+
|
|
184
|
+
Air-gap or restricted environments: operator-supplied CSV or JSON export from the IdP admin portal.
|
|
185
|
+
|
|
186
|
+
### Step 3 — Federated-trust integrity check
|
|
187
|
+
|
|
188
|
+
Pull every federated-trust configuration: Entra ID `/policies/identityProviders` + `/policies/crossTenantAccessPolicy/partners`; Okta `/api/v1/idps` + `/api/v1/org/security/federation`; Auth0 enterprise connections; Ping environment IdPs; OneLogin identity providers. For each, capture token-signing certificate fingerprint, claim-transformation rules, issuer URI, last-modification timestamp + actor.
|
|
189
|
+
|
|
190
|
+
Match every modification within the 90-day window against the operator's change-control register. Any unmatched modification is a deterministic finding regardless of indicator-level severity.
|
|
191
|
+
|
|
192
|
+
### Step 4 — OAuth consent-grant inventory
|
|
193
|
+
|
|
194
|
+
Enumerate active and recently-revoked OAuth consent grants. Capture publisher verification status, scope, tenant-of-origin, grant timestamp, granter identity. Filter for any grant with `/.default`, wildcard, `Mail.Read`, `Mail.ReadWrite`, `Files.Read.All`, `User.Read.All`, `Directory.Read.All` scope; for any unverified publisher; for any cross-tenant grant whose tenant-of-origin is not on the corporate allowlist.
|
|
195
|
+
|
|
196
|
+
### Step 5 — Privileged-role-assignment audit + break-glass state
|
|
197
|
+
|
|
198
|
+
Enumerate every assignment to Super Admin / Global Administrator / Tenant Owner / Application Administrator / Privileged Role Administrator within the last 90 days. Cross-reference assignment timestamp against the audit log for assigner identity, source IP, user agent.
|
|
199
|
+
|
|
200
|
+
Inventory break-glass / emergency-access accounts. Capture last-sign-in timestamp, MFA factor enrolment, conditional-access exclusions, password age, audit-log alerting configuration. Verify that an exercised authentication path fires on-call paging (the IR-drill calendar establishes this).
|
|
201
|
+
|
|
202
|
+
### Step 6 — Service-account + management-API token inventory
|
|
203
|
+
|
|
204
|
+
Enumerate every non-human identity in the tenant. For each, capture last-rotation timestamp, scope, source-IP allowlist, last-use timestamp, owner. Any static secret older than 90 days, broad scope, no IP allowlist is a high-priority finding. Match dormant-then-active accounts against the operator's runbook calendar (Step 7).
|
|
205
|
+
|
|
206
|
+
Inventory management-API tokens with the same lens. Bypass-the-human-MFA-gate by design; any token with broad scope + age > 90 days + no audit-log alerting is structural.
|
|
207
|
+
|
|
208
|
+
### Step 7 — MFA factor-event review
|
|
209
|
+
|
|
210
|
+
Filter the audit log for MFA factor enrolment, modification, reset, and bypass events. Each factor-reset event must pair with a documented help-desk identity-verification record (video-callback, knowledge-based + government-ID, never phone-only). Unpaired factor-reset events are the Scattered Spider signature.
|
|
211
|
+
|
|
212
|
+
### Step 8 — Cross-tenant access-settings review
|
|
213
|
+
|
|
214
|
+
For Entra ID specifically: enumerate `/policies/crossTenantAccessPolicy` + per-partner inbound/outbound rules. For Okta org-to-org federation; for Auth0 tenant linking. Any cross-tenant grant whose partner tenant cannot be attested in writing is a finding. Any modification within the 90-day window must match the change-control register.
|
|
215
|
+
|
|
216
|
+
### Step 9 — Downstream-SaaS telemetry sweep (post-detection)
|
|
217
|
+
|
|
218
|
+
When indicators fire, downstream-SaaS audit logs become primary detection telemetry — the IdP itself is the compromised oracle and its telemetry may have been tampered with. Pull audit logs from every downstream SaaS reachable via the affected credentials for the full exposure window. Focus areas: mail data exfiltration (Microsoft 365 unified audit, Google Workspace audit), file-share download patterns (SharePoint, OneDrive, Google Drive), source-code repository clones (GitHub audit, GitLab audit, Bitbucket audit), data-warehouse queries (Snowflake query history, BigQuery audit), and cloud-account control-plane operations (AWS CloudTrail, GCP Cloud Audit Logs, Azure Activity Log).
|
|
219
|
+
|
|
220
|
+
### Step 10 — Compliance Theater Check (see dedicated section below)
|
|
221
|
+
|
|
222
|
+
---
|
|
223
|
+
|
|
224
|
+
## Output Format
|
|
225
|
+
|
|
226
|
+
The output is the operator-facing IdP-tenant compromise assessment. Every section is mandatory; empty tables remain present with a "no evidence" row to make absence auditable. The jurisdiction-clock snapshot anchors every subsequent timestamp; downstream tooling parses the deadline column for SLA enforcement. Produce this structure verbatim:
|
|
227
|
+
|
|
228
|
+
```
|
|
229
|
+
## IdP-Tenant Compromise Assessment
|
|
230
|
+
|
|
231
|
+
**Assessment Date:** YYYY-MM-DD
|
|
232
|
+
**Tenant ID (hashed):** [hashed_tenant_identifier]
|
|
233
|
+
**IdP Vendor:** [Okta / Entra ID / Auth0 / Ping / OneLogin / hybrid]
|
|
234
|
+
**Regulatory exposure:** [EU DORA / EU NIS2 / EU GDPR / UK / US NYDFS / AU NDB / ...]
|
|
235
|
+
**Critical or important functions affected:** [list per DORA Art.8 / equivalent]
|
|
236
|
+
**Suspected entry vector:** [residential-proxy password spray / help-desk SE / management-API token leak / federation modification / OAuth consent abuse / cross-tenant trust abuse / dormant service-account reactivation / undetermined]
|
|
237
|
+
**Detection-confirmed timestamp (UTC):** [ISO 8601]
|
|
238
|
+
|
|
239
|
+
### Jurisdiction Clock Snapshot
|
|
240
|
+
| Regulator | Notification SLA | Clock Start | Deadline (UTC) | Status |
|
|
241
|
+
|
|
242
|
+
### Federated-Trust Integrity
|
|
243
|
+
| Federation | Last Modification | Modification Actor | Change-Control Match | Signing-Cert Fingerprint Drift | Verdict |
|
|
244
|
+
|
|
245
|
+
### OAuth Consent-Grant Inventory
|
|
246
|
+
| App | Publisher (verified?) | Tenant-of-Origin | Scope | Grant Timestamp | Granter | Verdict |
|
|
247
|
+
|
|
248
|
+
### Privileged-Role-Assignment Audit
|
|
249
|
+
| Role | Assignee | Assigner | Timestamp | Source IP | RBAC-Review Match | Verdict |
|
|
250
|
+
|
|
251
|
+
### Break-Glass Account State
|
|
252
|
+
| Account | Last Sign-In | MFA Factors | Conditional-Access Exclusions | Audit-Log Alert | Drill Match | Verdict |
|
|
253
|
+
|
|
254
|
+
### Service-Account + Management-API Token Inventory
|
|
255
|
+
| Identity | Type | Last Rotation | Scope | IP Allowlist | Last Use | Owner | Verdict |
|
|
256
|
+
|
|
257
|
+
### Cross-Tenant Access Settings
|
|
258
|
+
| Partner Tenant | Direction | Permission Set | Ownership Attested | Last Modification | Verdict |
|
|
259
|
+
|
|
260
|
+
### MFA Factor-Event Audit
|
|
261
|
+
| User | Event Type | Timestamp | Reset Actor | Help-Desk Ticket Match | Password-Reset Pair | Verdict |
|
|
262
|
+
|
|
263
|
+
### Indicator Firing Summary
|
|
264
|
+
| Indicator | Affected Actor / Asset | Confidence | RWEP | Distinguishing-Test Outcome | Verdict |
|
|
265
|
+
|
|
266
|
+
### Blast-Radius Score
|
|
267
|
+
[1-5 per blast_radius_model rubric, with rationale]
|
|
268
|
+
|
|
269
|
+
### Compliance Theater Findings
|
|
270
|
+
[Outcome of the seven theater tests in the Compliance Theater Check section below]
|
|
271
|
+
|
|
272
|
+
### Defensive Countermeasure Plan (D3FEND)
|
|
273
|
+
[D3-MFA, D3-CBAN, D3-NTA, D3-IOPR — concrete control placements by surface]
|
|
274
|
+
|
|
275
|
+
### Priority Remediation Actions
|
|
276
|
+
1. Rotate signing keys + revoke sessions + force MFA re-enrolment for admin-tier + rotate management-API tokens.
|
|
277
|
+
2. Review and revoke OAuth consent grants; close cross-tenant trusts not in current scope.
|
|
278
|
+
3. Harden service accounts (rotation + IP allowlist + scoped credentials); exercise break-glass account audit-log alerting.
|
|
279
|
+
4. ...
|
|
280
|
+
|
|
281
|
+
### Residual Risk Statement
|
|
282
|
+
[Per validate.residual_risk_statement template]
|
|
283
|
+
|
|
284
|
+
### Notification Drafts
|
|
285
|
+
[Per close.notification_actions templates — one per applicable jurisdiction clock]
|
|
286
|
+
|
|
287
|
+
### Evidence Package (signed)
|
|
288
|
+
[CSAF-2.0 bundle with structured IdP audit export + IR timeline]
|
|
289
|
+
```
|
|
290
|
+
|
|
291
|
+
---
|
|
292
|
+
|
|
293
|
+
## Compliance Theater Check
|
|
294
|
+
|
|
295
|
+
Run all seven tests. Any "fail" is a theater finding documented with the evidence (or absence thereof).
|
|
296
|
+
|
|
297
|
+
**Theater Test 1 — "Okta MFA is enforced, so the tenant cannot be compromised."**
|
|
298
|
+
Pull the last 90 days of admin-audit events and filter for `AuthenticatorEnrollment`, `FactorReset`, `FactorBypass`, and policy-change events on the MFA policy itself. Help-desk-mediated factor reset (Scattered Spider TTP) leaves the user-facing MFA policy unchanged while replacing the factor under operator control. If any factor-reset event lacks a paired help-desk ticket and identity-verification record, the MFA-enforced claim is paper compliance only. Acceptable: every factor-reset matched to a help-desk ticket with video-callback + knowledge-based + government-ID verification recorded.
|
|
299
|
+
|
|
300
|
+
**Theater Test 2 — "We use SSO across every SaaS, so identity hygiene is complete."**
|
|
301
|
+
Enumerate every OAuth app consent in the tenant. Any consent from a non-corporate tenant, any grant with `/.default` or wildcard scope, any grant whose publisher is unverified, any consent that survived a previous SSO migration is a structural finding regardless of SSO posture. SSO authenticates users; consent grants federate scope and frequently survive identity-hygiene programmes invisibly. Acceptable: consent-grant inventory with per-grant business-purpose attestation, continuous alerting on high-risk scope, automatic gating on unverified publishers.
|
|
302
|
+
|
|
303
|
+
**Theater Test 3 — "We review OAuth consent grants quarterly."**
|
|
304
|
+
Time the gap between consent-grant timestamp and review timestamp across the last 90 days. Midnight Blizzard's January 2024 escalation completed within days; quarterly cadence cannot detect this. Any gap above 24 hours for a high-privilege scope grant is theater. Acceptable: continuous alerting on new high-risk scope grants paired with quarterly comprehensive review.
|
|
305
|
+
|
|
306
|
+
**Theater Test 4 — "The break-glass account has never been used, so it is by definition secure."**
|
|
307
|
+
Pull the break-glass account's last-sign-in timestamp, MFA factors, conditional-access exclusions, password age, audit-log alerting configuration. A never-used account is an account whose audit-log alerting has never been exercised. If conditional access excludes the account from MFA AND no alert fires on break-glass authentication AND password age exceeds rotation policy, the account is a backdoor, not a control. Acceptable: quarterly calendared drill with named operator + expected source IP + audit-log alert firing within SLA.
|
|
308
|
+
|
|
309
|
+
**Theater Test 5 — "Our SAML / OIDC federation with partner X was set up by the security team and is reviewed annually."**
|
|
310
|
+
Pull every federated-trust configuration and compare token-signing certificate fingerprint vs the expected partner fingerprint, claim transformation rules vs documented expectation, and last-modification timestamp + actor against the change-control register. Any unexplained modification within the last 90 days is a structural finding regardless of annual-review attestation. Acceptable: continuous alerting on federated-trust modification with change-control cross-reference.
|
|
311
|
+
|
|
312
|
+
**Theater Test 6 — "Service accounts are MFA-exempt by design because automation cannot prompt for MFA."**
|
|
313
|
+
Pull every service account. Validate that each holds a scoped client-credentials flow OR a workload identity federation (no static secret), that token TTL is bounded, that source-IP allowlist is configured, and that last-rotation date is within policy. Any service account with a static secret older than 90 days, no IP allowlist, and broad scope is theater compliance against the "MFA enforced" attestation. Acceptable: workload identity federation or scoped client credentials with rotation enforcement and IP allowlist on every service account.
|
|
314
|
+
|
|
315
|
+
**Theater Test 7 — "Admin access is restricted to corporate IPs via conditional access."**
|
|
316
|
+
Pull the conditional-access policy targeting admin roles and list every IP range it permits. Cross-reference against the current VPN egress range AND any documented bring-your-own-device exception. Residential-proxy + password-spray defeats corporate-IP allowlist only when the corporate-IP rule includes split-tunnel VPN exits. Any range whose ownership cannot be attested in writing to the corporate network team is an attack-surface gap. Acceptable: documented IP-allowlist with corporate-network attestation and BYOD exceptions enumerated, never wildcard.
|
|
317
|
+
|
|
318
|
+
---
|
|
319
|
+
|
|
320
|
+
## Defensive Countermeasure Mapping
|
|
321
|
+
|
|
322
|
+
Per AGENTS.md optional 8th section (required for skills shipped on or after 2026-05-11). Maps IdP-tenant compromise findings to MITRE D3FEND IDs from `data/d3fend-catalog.json`, with explicit defense-in-depth layer position, least-privilege scope, zero-trust posture, and AI-pipeline applicability per Hard Rule #9.
|
|
323
|
+
|
|
324
|
+
| D3FEND ID | Technique | Layer Position | Least-Privilege Scope | Zero-Trust Posture | AI-Pipeline Applicability |
|
|
325
|
+
|---|---|---|---|---|---|
|
|
326
|
+
| D3-MFA | Multi-Factor Authentication | Tenant-admin authentication path (phishing-resistant FIDO2 device-bound passkey); user-tier authentication for privileged-role assignment and federated-trust modification; help-desk operator authentication into the help-desk system itself | Per-principal MFA enrolment; phishing-resistant factors mandatory for admin-tier; per-operation step-up for federation modification, signing-key rotation, tenant-wide application permission grants | Every authentication event verified, not session-trusted; step-up for any privileged-role assignment AND for any federated-trust modification AND for any management-API token issuance | Applicable to human principals. AI-agent identities require a scope-token construct + delegated-authority attestation rather than D3-MFA; OAuth consent grants made to AI agents are themselves a lateral-movement primitive requiring per-grant attestation. |
|
|
327
|
+
| D3-CBAN | Credential-Based Authentication | Service-account credential plane (workload identity federation eliminates static secrets where supported); management-API token plane; OAuth client-credentials grants | Per-credential scope + source-IP allowlist + bounded TTL; CWE-798 prohibition on hard-coded management-API tokens in IaC / CI / dev tooling; workload identity federation preferred over static secrets | Credential issuance just-in-time where feasible; credential rotation enforced; credential leakage detection at egress and on public-code-search surfaces; management-API tokens treated as root-equivalent credentials | Applicable. AI-agent management-API access requires scope-token construct beyond conventional CBAN — agent tokens scoped to specific operations + amounts + time windows + counterparties. |
|
|
328
|
+
| D3-NTA | Network Traffic Analysis | IdP audit-log telemetry as authoritative source of control-plane operations; downstream-SaaS audit-log telemetry as primary detection when IdP itself is suspect; help-desk-system audit telemetry; IaC + CI configuration scanning for embedded management-API tokens | SOC-aggregated visibility; per-tenant alerting on consent-grant + federation-modification + privileged-role-assignment + break-glass-authentication events | Audit-log alerting continuous, not periodic; SLA on every IdP control-plane operation; downstream-SaaS audit logs treated as primary when IdP is compromised | Applicable. AI-agent traffic monitoring is the specific gap: AI-channel egress (LLM API egress with embedded tenant credentials) is a separate exfiltration path. |
|
|
329
|
+
| D3-IOPR | Input / Output Pattern Recognition | Authentication-event pattern analysis (impossible-travel, anomalous source-IP, anomalous user-agent); OAuth-app behavioural baseline (typical scope use, typical request pattern); session-token behavioural baseline | Per-user authentication-pattern detection; per-app OAuth-behavioural baseline; per-service-account authentication-pattern baseline | Every authentication outcome verified against historical norm; OAuth-app behavioural drift treated as compromise signal; help-desk-mediated factor swap requires out-of-band identity verification | Critical. AI-agent authentication patterns (sustained API token use, broad scope queries, high-velocity calls) are themselves a detection signal; OAuth grants to AI agents require per-grant behavioural baselining. |
|
|
330
|
+
|
|
331
|
+
**AI-pipeline-specific posture (per Hard Rule #9).** Conventional D3-MFA cannot apply to AI agents holding session credentials on behalf of users — there is no agent-side biometric inherence factor, and possession factors reduce to API-key custody. The AI-pipeline-appropriate construct is: scoped delegated-authority attestation + per-grant business-purpose attestation + continuous behavioural baselining (D3-IOPR) + out-of-band confirmation for any tenant-control-plane operation requested by an AI agent. Skill `identity-assurance` covers AAL/IAL/FAL constructs for human-side authentication; this skill covers the IdP-tenant-control-plane framing of the agent-side gap.
|
|
332
|
+
|
|
333
|
+
---
|
|
334
|
+
|
|
335
|
+
## Hand-Off / Related Skills
|
|
336
|
+
|
|
337
|
+
After producing the IdP-tenant compromise assessment, chain into the following skills.
|
|
338
|
+
|
|
339
|
+
- **`identity-assurance`** — for AAL3 / FIDO2 / WebAuthn admin-tier authentication implementation detail, IAL2/IAL3 for high-value workforce identity, FAL constructs for federation, and the cryptographic posture (RFC 7519 JWT, RFC 8725 JWT BCP, RFC 7591 OAuth Dynamic Client Registration, RFC 9421 HTTP Message Signatures) that IdP-tenant control-plane operations reference but framework controls do not specify.
|
|
340
|
+
- **`cred-stores`** — for downstream containment: rotate management-API tokens, downstream service-account credentials, session tokens; audit Vault / Secrets Manager / KMS for IdP-derived credentials. Blast-radius >= 4 findings feed directly into `cred-stores`.
|
|
341
|
+
- **`framework-gap-analysis`** — for per-jurisdiction reconciliation of IdP-tenant control-plane coverage gaps across NIST + ISO + SOC 2 + UK CAF + AU ISM + AU E8 + NIS2 + DORA + NYDFS.
|
|
342
|
+
- **`compliance-theater`** — to extend the seven theater tests above with general-purpose theater detection across the wider GRC posture (CISO certification independence, audit-attestation evidence currency, change-control register completeness).
|
|
343
|
+
- **`coordinated-vuln-disclosure`** — for DORA Art.19 4-hour clock orchestration, NIS2 Art.23 24-hour clock, GDPR Art.33 72-hour clock, NYDFS 500.17 72-hour clock, AU NDB 30-day clock, and the multi-regulator notification when a single IdP-tenant incident triggers multiple clocks across jurisdictions.
|
|
344
|
+
- **`incident-response-playbook`** — for the general-purpose IR loop (triage, containment, eradication, recovery, lessons-learned) that frames the IdP-specific work in this skill.
|
|
345
|
+
- **`dlp-gap-analysis`** — for downstream data-exfiltration assessment when consent-grant or federation-modification indicators fire and Mail.Read / Files.Read / data-warehouse access scopes were granted.
|
|
346
|
+
- **`policy-exception-gen`** — to generate auditor-ready exception language for IdP controls that cannot be remediated within stated SLAs (e.g. coordinated federation re-keying across 50+ relying parties).
|
|
347
|
+
- **`sector-financial`** — for financial-services-specific IdP exposure (DORA Art.19 4-hour clock, NYDFS 500 CISO certification, treasury-tooling IdP integration). Skill `sector-financial` scopes the regulatory mapping; this skill covers the IdP-tenant attack surface.
|
|
348
|
+
- **`sector-telecom`** — for telecommunications-sector IdP exposure (Salt Typhoon adjacent surface, lawful-intercept admin tenant, wireline-carrier OAM).
|
|
349
|
+
- **`sector-federal-government`** — for federal-tenant IdP exposure (FedRAMP IL2/IL4/IL5 tenant separation, CISA AA24 advisories on Okta / Entra ID compromise patterns, M-22-09 zero-trust mandate).
|
|
350
|
+
- **`ai-attack-surface`** and **`mcp-agent-trust`** — when AI agents hold session credentials or OAuth consent grants on the tenant; `ai-attack-surface` for prompt-injection and agent-mediated lateral movement, `mcp-agent-trust` for tool-use governance on AI agents with write access to IdP-tenant or downstream-SaaS surfaces.
|
|
351
|
+
|
|
352
|
+
**Forward watch (per skill-format spec).** Entra ID conditional-access evolution post-Midnight Blizzard; Okta IPSIE working-group output; Auth0 management-API token deprecation roadmap; Ping DaVinci flow-execution security model under post-Thoma-Bravo ownership; OneLogin platform evolution post-One-Identity acquisition; CISA AA25/AA26 successor advisories; ATT&CK v20 SAML token-forgery detection-strategy publication; DORA Art.19 implementing-act guidance for IdP-class incidents; NIS2 implementing-act revision enumerating federated-identity control-plane indicators; cross-tenant access settings evolution at Entra ID with partner-tenant attestation cadence; PSD3/PSR final text on agent-initiated payments and IdP-mediated agent attestation.
|