The Identity Supply Chain Nobody Is Securing
- Martin Snyder

- 4 days ago
- 3 min read
Third-party apps, OAuth integrations, and service accounts form an invisible identity supply chain. Most organizations don’t inventory it — and attackers know it.

We Secured the Software Supply Chain. Then We Stopped.
After years of breaches traced to vulnerable dependencies, organizations learned to scrutinize their software supply chain. Packages are scanned. Builds are signed. Dependencies are tracked.
But while attention shifted left, a new supply chain quietly expanded — one almost no one is securing:
the identity supply chain.
It’s not made of libraries or containers.
It’s made of access.
What the Identity Supply Chain Actually Is
The identity supply chain is every external or indirect way access is granted to your systems and data, including:
OAuth applications and delegated permissions
SaaS-to-SaaS integrations
Service accounts and API keys
Contractors, agencies, and partners
AI assistants and automation tools
None of these look like “users.” All of them can act like insiders.
And most of them are invisible to traditional IAM reviews.
Why This Supply Chain Is So Hard to See
Identity governance tools evolved to manage employees. Modern environments rely on ecosystems.
According to Waldo Security’s 2025 SaaS & Cloud Discovery Report:
97% of SaaS applications are unknown to IT
1% of SaaS apps use OAuth, with <0.2% requesting high-risk scopes
100% of organizations have unauthorized cloud accounts
Every unknown app and integration represents a supplier in your identity chain — one granting access without centralized oversight.
OAuth Is the New Trusted Vendor
OAuth is often framed as a convenience feature. In reality, it’s a supplier relationship.
When a user clicks “Allow,” they’re granting:
Persistent access
Often broad scopes
With no expiration by default
Outside MFA enforcement
CISA’s Secure Cloud Business Applications (SCuBA) guidance explicitly warns that unmanaged OAuth permissions create long-lived access paths that survive offboarding and evade monitoring: https://www.cisa.gov/secure-cloud-business-applications-scuba
Once granted, that access becomes infrastructure — rarely revisited, rarely revoked.
The Partner and Agency Blind Spot
Marketing agencies. Payroll processors. Consultants. Temporary developers.
These identities often:
Use local SaaS accounts
Authenticate outside your IdP
Persist after contracts end
Access sensitive systems indirectly
They don’t appear in employee lifecycle workflows — but they’re part of your operational fabric.
If identity is the new perimeter, partners are part of the wall.
Compliance Already Assumes This Is a Risk
Modern frameworks don’t distinguish between “direct” and “delegated” access.
The NIST Privacy Framework and ISO/IEC 27001 require:
Accountability for all access paths
Traceability across systems
Evidence of revocation
If you can’t enumerate OAuth apps, service accounts, and third-party identities, you can’t demonstrate control.
Auditors don’t care how access was granted — only that it exists.
Why Identity Supply Chain Attacks Work
Attackers don’t need to break authentication when they can inherit it.
Compromise a third-party app. Abuse an over-privileged OAuth token. Reuse a forgotten service account.
These paths bypass:
Firewalls
VPNs
Endpoint security
The CISA Zero Trust Maturity Model addresses this directly: trust must be continuously verified — including for applications and integrations, not just users. https://www.cisa.gov/zero-trust-maturity-model
What Securing the Identity Supply Chain Requires
This isn’t solved by tighter password policies.
It requires:
Discovery — enumerate every identity, token, and integration
Classification — understand scope, data reach, and ownership
Governance — enforce least privilege and expiration
Continuous review — identity supply chains change daily
Security teams that skip step one end up governing a fraction of reality.
How Waldo Security Fits
Waldo Security’s SaaS & Cloud Discovery Engine focuses on the identity supply chain most tools miss by:
Discovering all SaaS and Shadow CSP accounts
Surfacing OAuth apps and delegated access
Mapping non-human identities and service connections
Providing continuous visibility for audits and Zero Trust programs
It doesn’t replace IAM — it gives IAM the map it’s been missing.
Conclusion: Trust Is Now Transitive
In modern environments, trust flows.
From users to apps. From apps to other apps. From vendors to your data.
If you don’t understand your identity supply chain, you don’t understand who you’re trusting.
And if identity is the new perimeter, the weakest supplier defines its strength.
👉 See how organizations are uncovering and securing their identity supply chain in the 2025 SaaS & Cloud Discovery Report.
About Waldo Security
Waldo Security helps organizations discover, classify, and secure every SaaS and cloud service in use — known or unknown. By illuminating OAuth risk, third-party access, and unmanaged identities, Waldo enables security teams to defend the identity perimeter that actually exists.



Comments