PUBlished on
November 4, 2025
updated on
November 7, 2025

From SaaS Sprawl to a Knowledge Graph

Sean Roche

Turning fragmented signals into a foundation for secure automation

SaaS adoption has outpaced security’s ability to keep up. Every new application defines its own model of users, roles, and permissions. Each integration adds another path for access. Inactive accounts pile up. What looks like visibility at the app level turns into blind spots at the enterprise level.

Security teams feel this every day. They are buried in alerts, but the basic questions linger: Who still has admin rights across multiple apps? Which third-party connections create exposure? How many dormant identities still hold sensitive access?

Data collection is essential but that alone isn’t enough. Without a way to connect the dots, it’s impossible to see how identities, permissions, and activity interact to create real risk. Solving that requires a new kind of data architecture, one that doesn't just ingest records but understands relationships, derives context, continuously learns as new data flows in and turns these insights into action. That’s where the concept of a knowledge graph becomes essential.

What a Knowledge Graph Really Is

A knowledge graph connects facts about entities such as people, accounts, tokens, and resources into relationships that reveal context. Instead of storing data in tables or indexes, it links things the way they exist in the real world. That structure makes it possible to ask questions that cross systems: who owns what, how access was granted, when it changed, and what it connects to now. For security, it means turning scattered identity and application state or process data into a single, living model that can explain how risk actually forms and moves.

Why you Need a Purpose-built Graph that Knows SaaS

SaaS environments are not like traditional infrastructure. They’re built around people, permissions, and connections that cross products, tenants, and identity systems. Answering basic but critical questions like Who has access? How was it granted? Where does access spread? requires tracing how a single identity moves through multiple systems, roles, permissions. Each relationship builds on the next, creating a long chain of dependencies that are hard to follow. Relational databases struggle with these kinds of questions because they depend on complex joins that don’t scale.

A graph built for SaaS makes this practical:

This is why the Knowledge Graph must be purpose-built for SaaS from the start. It models relationships as they really exist across vendors and identity systems, and scales those connections naturally and brings visibility to places other tools can’t reach. This is something that traditional databases or retrofitted cloud graphs simply weren’t designed to capture how SaaS identities, permissions, and integrations actually interconnect.

Why Traditional Graphs Don't Work for SaaS

At first glance, it might seem like the security industry has already solved this problem. Graphs are everywhere. In EDRs, cloud posture tools, in SIEMs. Each promise to secure SaaS. But how a graph is built defines what it can represent. And no matter how advanced these legacy models are, none can be retrofitted to deliver comprehensive SaaS security. The foundation simply isn’t built for it. Let’s take a look at a few of them. 

Endpoint first graphs don’t understand SaaS: These graphs were designed for a world of hosts and processes, where everything revolves around client agents and events from devices. That model breaks when there’s no agent to observe. In SaaS, there are no hosts to monitor. There are only users, roles, and entitlements exposed through APIs that don’t share a common schema. The result: endpoint-style graphs can tell you what’s running on a machine, but not who has access to what in your SaaS estate, or how that access shifts when an integration or admin token changes ownership.

Cloud posture graphs miss the SaaS and identity context: Cloud posture systems map infrastructure like compute, storage, IAM policies, and configuration into a digital twin of the environment. That’s great for answering questions like “which S3 buckets are public?” but not access questions like “which vendor integration can impersonate a user across tenants?” SaaS apps don’t behave like EC2 or IAM. Each app defines its own identity model, and many don’t emit full telemetry (and AWS Cloudwatch logs are expensive!). Treating SaaS as cloud infrastructure creates an illusion of coverage, while blind spots and real risk accumulates in the relationships between users, entitlements, and third-party integrations.

Your SIEM can’t explain SaaS access: SIEMs excel at centralizing and correlating events, which is valuable for detection. But SaaS risk doesn’t live in events, it lives in relationships. Questions like “Who still has admin rights across multiple apps?” or “Which inactive account retains effective access?” require a normalized entitlement model that spans hundreds of SaaS APIs. SIEMs don’t maintain that structure. Without it, you can ingest events endlessly and still miss where the real exposure lives.

The bottom line! Extending endpoint graphs, cloud posture graphs, or SIEMs into SaaS doesn’t work because their anchors, joins, and update patterns were never meant for it.They model infrastructure, not identities. SaaS security demands something purpose-built, a graph that treats users, roles, permissions, and integrations as first-class citizens, and captures how they actually interact across systems. 

Rethinking Security Graph Foundations for SaaS and AI Enterprise

It’s clear that traditional graphs weren’t built for the realities of SaaS and extending them won’t bridge the gap. Securing this new landscape, needs a fresh ground-up thinking of how SaaS security graphs work.

We know SaaS risk doesn’t live in one account or one misconfiguration. It hides in the connections between users, systems, and now AI agents. As enterprises adopt AI-driven workflows with delegated credentials and broad access to data, the attack surface shifts from static to dynamic. A dormant admin token might seem harmless until it is paired with an overly broad Oauth integration or an AI workflow that inherits those permissions. A forgotten local account becomes dangerous when an agent chains its access through other unsupervised SaaS APIs. 

Logs can’t reveal this kind of exposure. Only a stateful security graph that understands relationships between users, AI agents, integrations, and workflows can map the relationships that attackers exploit or that misaligned AI actions might take advantage of.

A few outcomes that matter on day one:

In the SaaS and AI enterprise, visibility isn’t just about collecting data, it’s about understanding how everything connects. That’s the foundation of a modern SaaS security graph, and it’s why Obsidian is redefining how security intelligence is built for this new SaaS and AI era.

The Obsidian Knowledge Graph

If traditional graphs fall short in SaaS, the answer isn’t to retrofit, it’s to rebuild from first principles. The Obsidian Knowledge Graph does exactly that.

Our approach starts with SaaS itself as the system of record. The graph models people, accounts (human, non-human), entitlements, applications, tokens, and the relationships that connect them. Every entity and edge is versioned to capture how things change over time. Data from admin APIs, activity streams, and integrations is normalized into a common schema that scales naturally across hundreds of applications and many tenants. The result is a living, stateful model of your SaaS environment, one that continuously learns and adapts as your ecosystem evolves.

Why the Obsidian Knowledge Graph Has an Advantage

Enterprise scale. Obsidian dominates at the enterprise level, with some of the largest SaaS deployments in the world, including Fortune 25 environments. The platform is built to handle millions of identities and thousands of connected apps while staying extensible for any customer architecture and emerging use case.

Deep and extensible connectors. We build deep connectors where they matter most, pulling both posture data and activity data across major SaaS platforms. And through our community connector strategy, partners, customers and SaaS vendors can use our SDK to extend coverage, adding their own integrations without losing normalization or control.

Soft visibility on top of hard data. Structured APIs only tell part of the story. Obsidian layers inferential insight from the client side through our browser extension, email metadata, and related behavioral context. This reveals shadow SaaS and AI use, local access patterns, and the hidden web of interconnections across integrations, tokens, and identities that connect your business. The result is full-spectrum visibility that grows with your environment and sees beyond the systems you manage to the ones your people actually use.

How We Layered the Data to See What Others Can’t

Each layer of the Obsidian Knowledge Graph builds upon the last, transforming raw data into actionable intelligence: 

  1. Start with identity and activity: Security begins with two essentials: who someone is and what they did. Our connectors pull identity data such as users, groups, roles, and entitlements, along with activity data like authentications and in-app actions and aligns them over time. These events are versioned and never overwritten. So, identity changes and behavior stay consistent and analysts can replay changes across vendors and tenants.
  2. Build baselines and learn from real incidents: Our machine learning algorithms establish behavioral baselines across users, roles, and applications, continuously refining them with lessons from real world SaaS incidents investigated by Obsidian, the only vendor standardized for SaaS incident response. The system learns which patterns matter, and analysts can reinforce it in product by marking outcomes to keep detections precise and grounded in reality.
  3. Add SaaS state to manage rights and surface misconfigurations: Configuration and policy data such as settings, controls, roles, and ownership, are layered to show how access and posture align across applications. This makes it easy to spot critical misconfigurations and privilege overlaps before they create exposure. Each finding includes its evidence path and the smallest change needed to restore least privilege. 
  4. Model non-human identities: Service accounts, API keys, and OAuth clients and AI Agents are modeled as first-class entities with origin, scope, and usage. Linking them to apps and data makes it clear when automation drifts beyond its intended role.
  5. Capture client-side truth: Server-side APIs show what’s reported, not always what’s real. Our browser extension fills that gap by reading authentication signals, confirming local account use, and identifying when sessions move to different infrastructure that could indicate an active threat. It also exposes shadow SaaS and AI use that admin consoles never see.

Together, these layers form a living, learning graph, one that starts with normalized facts, learns from real-world incidents, explains posture with evidence, separates humans from AI automation, and adds client visibility where servers are blind. That is the foundation for understanding and governing SaaS risk at enterprise scale.

Understanding Authentication and Authorization Sprawl in Your SaaS Supply Chain

Once you have a graph that captures every relationship between identities, applications, and integrations, a deeper challenge emerges: understanding how access is actually exercised. 

In SaaS, most access doesn’t happen through an interactive user session, it happens server-side, driven by integrations and automations. OAuth clients receive tokens routinely with scopes that can outlive the click that created them. That is where authentication and authorization sprawl takes root.

The Obsidian Knowledge Graph pulls all of this into one system. It connects who (users, AI agent) and what (identities, accounts, applications, resources) with how access is exercised (grants, scopes, and observed use from admin APIs and browser telemetry). Because it’s time-aware, you can see when scopes expand, when usage patterns change, and where tokens sit idle with unnecessary privilege. It turns integration risk into something you can query and govern, restored to your control environment rather than left dangling as a silo.

The graph is designed to make this manageable and actionable:

With these relationships modeled in the graph, control becomes straightforward: find unused or over-coped tokens, right-size privilege safely, detect anomalous API and token activity, and enforce consistent security and governance policies across every application and tenant. 

This is how the Knowledge Graph protects your SaaS supply chain end to end. You can restore trust with 3rd and 4th party integrations by modeling authentication, authorization, identity and entitlements as part of a single connected fabric.

Seeing the SaaS Estate Through Identities

Once authentication and authorization are connected, the next layer of understanding comes into view: identity.

The Knowledge Graph makes the account–to–identity picture explicit across tenants and applications, and, just as importantly, it shows how each account is used. In practice, a single identity can fan out to multiple application accounts across core SaaS systems such as productivity suites, HR platforms, data warehouses, and CRM tools with clear markers for SSO logins, local logins, and integration-driven access. Obsidian turns this sprawl into a navigable map of relationships and access paths. What’s represented:

This identity-centric view transforms SaaS security from reactive log review into proactive governance, built on clear relationships and verifiable evidence.

Scaling to AI Agent Access

The rise of AI agents raises the stakes because they automate actions across many SaaS applications. They also show why Obsidian’s approach to the Knowledge Graph model matters most now. 

AI agents don’t just interact with SaaS systems, they act across them, chaining permissions and actions that span multiple applications. After years mapping identities, accounts, tokens, scopes, sessions, and their history across large SaaS estates, and refining that model with real incident outcomes and analyst feedback, the Obsidian Knowledge Graph that answers who has what and how, now extends that same precision to who is behind an agent, what tools it used, and where it moves your critical data.

What makes this powerful is Obsidian’s ability to identify toxic combinations where agent access, user privilege, and SaaS data sensitivity align in ways that expose critical systems. The graph understands permissions for both user and runner, the routes each agent can take, and which SaaS objects carry sensitive data. That insight reveals paths to unauthorized use, privilege escalation, public exposure, or cross-SaaS data leakage before they happen.

Just as important, it allows defenders to take decisive, evidence-based action. Analysts can visualize an agent’s identity lineage, review which OAuth scopes it has inherited, and see exactly how its activity traverses tenants and apps. With this understanding, teams can confidently revoke dangerous access, redesign workflows safely, and set policies that limit agent privileges to what’s truly required.

By grounding AI visibility in the same graph that models SaaS identities and entitlements, Obsidian makes AI security operational, not theoretical. The result is control that keeps pace with automation, ensuring that innovation doesn’t outstrip governance.

In a world where agents act faster than humans can review, the Obsidian Knowledge Graph gives security teams back the context, confidence, and control they need to move just as fast, safely.

Closing thought

SaaS sprawl isn’t slowing down, and the rise of AI agents is adding even more motion and complexity. The durable answer isn’t another integration or dashboard or superficial SaaS ‘visibility’. It’s a knowledge graph that starts from identities (human and agentic) and access, learns from real data, and keeps the relationships current. Do that and automation becomes safe, policy becomes portable, and the SaaS estate finally makes sense.

This is the foundation Obsidian was built on from day one. Every part of our platform, from how we collect data to how we model it, is engineered for the realities of SaaS. We didn’t retrofit an endpoint, cloud or SIEM graph. We built a one-of-a-kind Knowledge Graph purpose-built for SaaS and extended the intelligence for the world of AI. It’s designed to represent how access, identity and behavior actually interact in dynamic, multi-tenant environments. 

That deep, normalized model, powered by an AI-native security engine, is capable of reasoning over complex relationships, understanding how risk propagates, and surfaces the signals that matter most. It’s how Obsidian turns SaaS chaos into clarity, making automation safe, policy portable, and security decisions explainable. 

If we’ve piqued your interest, here are a few resources to get you started:

Frequently Asked Questions (FAQs)

What is a SaaS knowledge graph and why is it important for security?

A SaaS knowledge graph is a data architecture that connects entities like users, accounts, permissions, tokens, and applications in a web of relationships, providing a contextual and dynamic map of access across SaaS environments. Unlike traditional data tables, it models the real-world links between identities, privileges, and activities. This visibility helps security teams understand how risk forms and spreads, enabling more effective detection, governance, and automation of security controls.

How does the Obsidian Knowledge Graph address SaaS sprawl and access risk?

The Obsidian Knowledge Graph collects and normalizes data from hundreds of SaaS APIs, admin consoles, and even browser telemetry to map every identity, entitlement, integration, and activity across your SaaS estate. It version-controls every relationship to track changes over time, surfacing dormant accounts, over-privileged tokens, and unauthorized access paths. This allows organizations to proactively govern access, reduce privilege creep, and identify risky configurations before they lead to breaches.

Why can't traditional security graphs or SIEMs effectively secure SaaS environments?

Traditional security graphs and SIEMs were designed for endpoint or infrastructure monitoring and focus on hosts, events, and static configurations. SaaS environments revolve around identities, roles, and dynamic integrations that frequently cross systems and vendors, creating complex and nested access relationships. These legacy tools lack the ability to trace relationships across multiple SaaS platforms, leading to blind spots in permissions, third-party exposures, and privilege inheritance that only a purpose-built SaaS knowledge graph can fully capture.

How does the Obsidian Knowledge Graph enable governance of AI agent access in SaaS?

As organizations increasingly use AI agents that automate actions across multiple SaaS platforms, the Obsidian Knowledge Graph extends its modeling to include these agents, their privileges, and activity patterns. It can map the chain of permissions and inter-app actions for each agent, detect "toxic combinations" of sensitive data and broad privileges, and make it possible for defenders to understand, visualize, and limit agent access based on concrete evidence. This allows for safe automation without sacrificing governance or introducing unmonitored risks.

You May Also Like

Get Started

Start in minutes and secure your critical SaaS applications with continuous monitoring and data-driven insights.

get a demo