Although Microsoft 365 apps share a common login, differences in application usage, access, and settings complicate their security.
- Controls are scattered across different consoles, requiring significant time and experience to manage effectively
- Temporary admin access (e.g. Intune, Sharepoint) often turns permanent without review or enforcement of Privileged Identity Management, hiding privilege risk
- No centralized control or oversight stopping users from authorizing third-party app integrations with Microsoft to act on their behalf (e.g. Amazon Alexa that can send mail)