The modern attacker’s mantra isn’t “break in” – it’s “log in.” Advanced groups, such as Volt Typhoon, demonstrate that identities, not endpoints, are now the primary attack surface. By exploiting legitimate credentials, operational complexity and now AI assistants, they stay hidden in plain sight.
Recent Articles By Author
For enterprise security teams, nowhere is this risk more apparent than in Microsoft SharePoint and Teams. These platforms power business collaboration, but their permissions sprawl faster than most teams can track. Files and sites get shared through nested groups, Microsoft 365 entities, and external links. What looks “secure” in an admin console can, in practice, be wide open.
Identity governance and administration (IGA) was supposed to prevent exactly this. But legacy IGA solutions — built for static, on-premises applications — weren’t designed for the messy reality of cloud collaboration.
Ask any security team to map who has access to their most sensitive SharePoint sites. The honest answer? They probably can’t — at least not with confidence.
Legacy IGA tools claim to track access through “users,” “roles,” and “groups.” But in modern Microsoft environments, effective permissions rarely map neatly to these categories:
The result? Quarterly access reviews become compliance theater. Business owners certify “groups” without understanding what SharePoint documents can actually be viewed, edited, or exfiltrated.
What your business leaders think they’re reviewing ≠ what’s actually accessible.
While Volt Typhoon targeted critical infrastructure, their techniques mirror what we see in enterprise breaches daily. As detailed in my previous analysis, they didn’t deploy sophisticated malware — they used valid credentials and native tools to maintain persistence.
Consider how this plays out in enterprise environments: An attacker compromises one account through phishing. Using that foothold, they discover SharePoint sites containing M&A documents, customer data, or intellectual property. Through poorly governed permissions — that external vendor who still has access, those nested groups no one understands — they move laterally without triggering alerts.
The SOC sees normal SharePoint activity. The SIEM shows authorized access. But competitive advantage walks out the door.
If SharePoint access isn’t governed, it’s not just a compliance gap — it’s the next breach waiting to happen.
The gap isn’t in team effort — it’s in tooling built for yesterday’s IT environment. Legacy IGA was designed when:
But businesses don’t operate that way anymore. Legacy IGA simply:
The identity governance challenge in SharePoint becomes exponentially more complex with the introduction of AI assistants. Microsoft Copilot for SharePoint exemplifies this new risk dimension — it’s not just another user, it’s a non-human identity (NHI) with the ability to search, interpret, and surface data at unprecedented scale.
Consider what happens when Copilot encounters typical SharePoint environments:
Recent security research reveals consistently that attackers can use Copilot to exfiltrate sensitive content without triggering traditional security alerts. The AI assistant operates within existing permissions, making these activities appear legitimate. When asked to “find documents with passwords,” Copilot dutifully complies — no malware required.
This represents a fundamental shift in the threat landscape. Organizations aren’t just dealing with human users anymore—they’re managing AI agents that:
The multiplication effect is real. One over-privileged user account becomes an over-privileged AI assistant with the ability to surface every piece of sensitive data that the account can theoretically access — including content the human user never knew existed.
For organizations already struggling with SharePoint permission sprawl, AI assistants transform a governance challenge into a potential crisis. Legacy IGA tools, already blind to effective permissions in SharePoint, have no concept of these AI agents as distinct identities requiring their own governance.
Solving this isn’t about restricting collaboration—businesses depend on it. It’s about giving security teams the visibility and control they need. Modern identity security platforms address the SharePoint challenge by:
SharePoint sprawl reflects a larger truth about identity debt in organizations. Every merger leaves behind access. Every project creates new shares. Every departure leaves orphaned permissions.
If sophisticated attackers can navigate SharePoint permissions better than internal teams, organizations operate at a disadvantage. Attackers see the accumulated access, the forgotten external shares, the permission paths that tools miss.
The techniques Volt Typhoon used against infrastructure work just as well against enterprises. The difference? When nation-states target infrastructure, it makes headlines. When they target intellectual property, companies might never know.
For enterprise security leaders, the message is clear: Identity governance isn’t a compliance checkbox — it’s operational resilience. And SharePoint might be where that resilience is tested first.