saas-attacks
saas-attacks copied to clipboard
Adding Guest user access misconfiguration
Adding new Guest user access misconfiguration in Initial Access section.
Hi @CharanRoot. First of all, thanks for making the time to make a new technique submission! This is definitely relevant information in the SaaS space.
My main concern with the current version though is that it is "weakness-focused" as opposed to "attack-focused". When first making the matrix, we tried as best we could to keep it focused on attack techniques rather than security/configuration weaknesses. For example, "Credential stuffing" as opposed to "weak/shared/compromised passwords". Obviously, there are sometimes 1:1 mappings between attack techniques and exploitable weaknesses, but that's not always the case.
This might be as simple as some naming and wording tweaks, but perhaps there are also some wider points to consider to turn this into more of an attack-focused technique?