Discover over-privileged OAuth grants, stale app access, and shadow AI tool sprawl across Google Workspace, Microsoft 365, and GitHub. Runs entirely inside your tenant boundary. Público: Security engineers, identity and access management teams, platform engineers. Tempo típico de configuração: 5 minutes.
quickstart
Use isto se
Discover over-privileged OAuth grants, stale app access, and shadow AI tool sprawl across Google Workspace, Microsoft 365, and GitHub. Runs entirely inside your tenant boundary.
Audience
Security engineers, identity and access management teams, platform engineers
Typical time
5 minutes
Antes de começar
Obtain a provider OAuth token: Google Workspace access token (ya29.*) or Microsoft Graph access token.
For GitHub AI discovery: create a GitHub PAT with read:org and read:packages scopes.
Create a separate ingestion API key for SaaS scanner in Settings → API Keys.
Caminho rápido
Copy a working starter, run it in your environment, then come back here for the deeper rollout details.
Obtém o bundle de código fonte
Descarrega os ficheiros exatos usados neste guia ou executa o instalador de um só comando para os escrever localmente antes do deploy.
AWS SaaS scanner source
Creates the AWS CDK project under `deploy/aws-saas-scanner/` so the Lambda deployment commands on this page work unchanged.
deploy/aws-saas-scanner/
bash
bash <(curl -fsSL https://blackshield.chaplau.com/source-bundles/aws-saas-scanner.sh)
cd deploy/aws-saas-scanner
Creates the Terraform module under `deploy/gcp-saas-scanner/` and prefills the current platform API URL so the Cloud Run deployment commands on this page work unchanged.
Store provider tokens securely, then deploy with one CDK or Terraform command.
Google Workspace — store in Secrets Manager: { BLACKSHIELD_API_KEY, SAAS_ACCESS_TOKEN, GOOGLE_CUSTOMER_ID }
Microsoft 365 — store in Secrets Manager: { BLACKSHIELD_API_KEY, SAAS_ACCESS_TOKEN }
GitHub — store GITHUB_TOKEN and BLACKSHIELD_API_KEY as Kubernetes Secrets or Secrets Manager entries.
AWS Lambda deploy: SAAS_SCAN_PROVIDER=google_workspace SECRET_NAME=blackshield/saas-scanner/google cdk deploy --require-approval never
GCP Cloud Run deploy: bootstrap the source bundle first so `deploy/gcp-saas-scanner/` is created with `BLACKSHIELD_API_URL` prefilled, then run TF_VAR_saas_scan_provider=google_workspace terraform apply -auto-approve
Como é o sucesso
GCP Cloud Run deploy: bootstrap the source bundle first so `deploy/gcp-saas-scanner/` is created with `BLACKSHIELD_API_URL` prefilled, then run TF_VAR_saas_scan_provider=google_workspace terraform apply -auto-approve