Most school districts have dozens, sometimes hundreds, of third-party apps connected to staff and student accounts.
Some are intentional.
Many are forgotten.
A few are risky.
These apps often have access to:
- files
- contacts
- calendars
- even full account data
And the reality is, most districts rarely review them.
This is one of the easiest ways to reduce risk without buying a single new tool.
Why This Matters
OAuth-connected apps don’t need passwords; they rely on permissions granted by users.
That means:
- A teacher clicks “Allow” once
- The app may keep access indefinitely
- IT may never know it exists
Over time, this creates:
- hidden data exposure
- unnecessary access to student information
- increased risk if an app is compromised
Cleaning this up is quick, impactful, and often overdue.
Step 1: Review OAuth Apps in Google Workspace
Navigate to:
Admin Console → Security → Access and Data Control → API Controls → App Access Control
What You’ll See:
- A list of third-party apps connected to your domain
- Permission levels (scopes)
- Number of users per app
What to Look For:
Unknown Apps
If you don’t recognize it, investigate it.
High-Risk Permissions
Apps requesting access to:
- Gmail
- Google Drive
- Classroom
- Directory data
These carry higher risk.
High User Counts
Apps used by many users may indicate:
- unofficial district-wide adoption
- or potential shadow IT
What You Can Do:
- Block risky or unapproved apps
- Mark apps as trusted if they are approved
- Restrict access levels for sensitive data
Tip: Start with the highest-risk apps, don’t try to fix everything at once.
Step 2: Review OAuth Apps in Microsoft 365 (Entra)
Navigate to:
Microsoft Entra Admin Center → Enterprise Applications
Then:
- Select “All Applications”
- Filter or search for user-consented apps
What to Review:
Click into each app and check:
Permissions (API Permissions)
Does it have access to:
- Files
- User profile data
- Directory data
User Assignment
- Who is using it?
- Is it still needed?
App Name & Publisher
- Does it look legitimate?
- Is it verified?
What to Look For:
Old or Unused Apps
No recent sign-ins or activity.
Broad Permissions
Apps with “Read/Write All” or full mailbox access.
Suspicious Naming
Generic or unfamiliar app names.
What You Can Do:
- Disable or remove unused apps
- Revoke permissions
- Restrict user consent settings (optional but recommended)
Step 3: Decide What to Keep, Remove, or Control
As you review apps, categorize them:
Keep
- Approved tools
- Known vendors
- Required for instruction
Review Further
- Apps with unclear purpose
- Tools storing sensitive data
- Anything widely used but undocumented
Remove
- Unused apps
- Duplicate tools
- High-risk or unknown apps
Step 4: Reduce Future Risk
Once you’ve cleaned things up, prevent the same problem from growing again.
In Google Workspace:
- Configure app access policies
- Restrict high-risk scopes
- Monitor new app connections regularly
In Microsoft Entra:
- Review User Consent Settings
- Consider limiting user consent to low-risk apps
- Require admin approval for higher-risk permissions
Across Both:
- Establish a simple app approval process
- Educate staff on why app access matters
Step 5: Make This a Routine
This is not a one-time task.
Recommended cadence:
- Quarterly review (ideal)
- At minimum, twice per year
Even a quick 20–30 minute review can uncover:
- forgotten apps
- unnecessary access
- hidden risk
Comments
Post a Comment