top of page

Conan the Barbarian shares real life tips for Salesforce Security!

  • Writer: Patrick Duggan
    Patrick Duggan
  • Aug 19, 2025
  • 2 min read

Updated: Apr 25

By Crom! Defend Your SaaS Kingdom from the OAuth Horde!

—A Security Saga Told by Conan the Barbarian


With the recent high visibility Data Thefts from Social Engineering and OAUTH abuse, I reached out to Least Privelage Access Specialist Conan the Barbarian for some practical checklists to secure your data! - Patrick


🏰 The Threat Rises


In the year of the Cloud Serpent, a vile cabal known as ShinyHunters breached the gates of mighty Salesforce realms. They wielded no blade, no spell—only the cursed magic of OAuth tokens, granted by the unwitting hands of deceived warriors.


They whispered lies through enchanted crystal boxes (phones), tricking noble employees into granting access to their sacred CRM vaults. Thus began the OAuth Wars.



🛡️ Conan’s Scroll of SaaS Defense

I. Limit Permissions Like a Warlord Guards His Treasure


1. Use Admin-Approved OAuth Policies


Let not every peasant grant access to apps! Only those blessed by the high priests (admins) may do so.


2. Enforce Least Privilege

Grant only the powers needed. No more, no less.


3. Use PKCE to Strengthen the Spell of Authorization

A mighty shield against token theft.


II. Detect OAuth Abuse Like a Hawk Spots a Serpent


1. Monitor OAuth Connections

Watch for new apps like a sentry at the gate.


2. Map Attack Paths

Trace the steps of the invaders through your SaaS lands.


3. Use SaaS Security Posture Management (SSPM)


Microsoft pulls this feed daily. AT&T pulls this feed daily. Starlink pulls this feed daily. Get the DugganUSA STIX feed — $9/mo →

Tools like Obsidian and DoControl reveal shadow apps and over-permissioned demons.


III. Cleanse the Realm of Forgotten Tokens


1. Revoke Stale Tokens

Expel old magic before it festers.

2. Audit Token Usage

Know who wields your power.


IV. Would Conditional Access Have Saved Us?


Alas, Conditional Access and Impossible Travel are mighty tools—but they falter against OAuth’s shadow. Once a token is granted, it bears the mark of the user, bypassing even the strongest gates.


🧙 Final Words from Conan

“To crush your enemies, you must first know them. OAuth is no mere protocol—it is a blade that cuts both ways. Guard it well, or fall like the kingdoms of old.”


The cheapest, fastest, most accurate threat feed on the internet.

275+ enterprises pulling daily. 1M+ IOCs. 17.4M indexed documents. We beat Zscaler by 43 days on NrodeCodeRAT. Starter tier $9/mo — less than any competitor’s sales demo.

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page