Discover over-privileged OAuth grants, stale app access, and shadow AI tool sprawl across Google Workspace, Microsoft 365, and GitHub. Runs entirely inside your tenant boundary. Zielgruppe: Security engineers, identity and access management teams, platform engineers. Typische Einrichtungszeit: 5 minutes.
Bevor Sie beginnen
Obtain a provider OAuth token: Google Workspace access token (ya29.*) or Microsoft Graph access token.
For GitHub AI discovery: create a GitHub PAT with read:org and read:packages scopes.
Create a separate ingestion API key for SaaS scanner in Settings → API Keys.
Schritt für Schritt
Schritt 1
Choose your provider and runtime
Pick the SaaS provider to scan and the cloud runtime that fits your environment.
OAuth inventory: google_workspace (Google Workspace) or microsoft_graph (Microsoft 365).
AI asset discovery: github_code (scans GitHub org for AI/LLM package sprawl).
AWS runtime: Lambda + EventBridge — use deploy/aws-saas-scanner/ CDK stack.
GCP runtime: Cloud Run Job + Cloud Scheduler — use deploy/gcp-saas-scanner/ Terraform module.
Kubernetes: CronJob manifest in the Developer Guide.
Schritt 2
Store credentials and deploy
Store provider tokens securely, then deploy with one CDK or Terraform command.
Google Workspace — store in Secrets Manager: { SECPLATFORM_API_KEY, SAAS_ACCESS_TOKEN, GOOGLE_CUSTOMER_ID }
Microsoft 365 — store in Secrets Manager: { SECPLATFORM_API_KEY, SAAS_ACCESS_TOKEN }
GitHub — store GITHUB_TOKEN and SECPLATFORM_API_KEY as Kubernetes Secrets or Secrets Manager entries.
AWS Lambda deploy: SAAS_SCAN_PROVIDER=google_workspace SECRET_NAME=secplatform/saas-scanner/google cdk deploy --require-approval never
GCP Cloud Run deploy: TF_VAR_saas_scan_provider=google_workspace terraform apply -auto-approve
Schritt 3
Validate OAuth findings
Confirm grant inventory is flowing and review over-privileged apps immediately.
Run a one-shot Docker command first to validate before deploying: docker run --rm -e SAAS_SCAN_MODE=oauth -e SAAS_SCAN_PROVIDER=google_workspace ...
Open the platform and filter Findings by scanner=saas to see OAuth grant inventory.
Review findings flagged as over_privileged, high_risk_scope, or stale_grant — these need immediate attention.
Schedule scans at least daily to catch new grant additions.
Get the source bundle
Download the exact source files referenced on this page, or run the one-command installer to write them locally before following the deployment steps.
AWS SaaS scanner source
Creates the AWS CDK project under `deploy/aws-saas-scanner/` so the Lambda deployment commands on this page work unchanged.
deploy/aws-saas-scanner/
bash
bash <(curl -fsSL https://stg-blackshield.chaplau.com/source-bundles/aws-saas-scanner.sh)
cd deploy/aws-saas-scanner