AI Security · M365 · OAuth Security · Zero Trust
Securing the Claude Enterprise M365 Connector: What the Permission Model Doesn't Tell You
The connector is read-only and delegated. That framing is accurate and insufficient. The gaps are in aggregation behaviour, token persistence, tenant-wide search scope, and the DM surface most security reviews never look at.
Read →