Go back

Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

Industry Insights
April 2, 2026
4m read
4m read
4m listen
4m watch
4m watch
Automating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and ActionAutomating OAuth Grant Management: Material’s Research Shows the Growing Gap between Awareness and Action
speakers
speakers
speakers
authors
Kate Hutchinson
participants
No items found.
share

New research from Material reveals a growing gap between awareness and action in OAuth security, as organizations struggle to manage app access, automation, and emerging risks like AI agents.

We recently surveyed 45 security leaders to better understand how organizations are managing OAuth applications, a key capability of the cloud workspace and a critical layer in modern attack chains. It’s easier than ever to execute an attack via a malicious OAuth grant or to hijack a legitimate but overpermissioned one, giving attackers persistent backdoor access to company data. Material’s findings point to a growing gap between awareness of the problem and the ability to automatically address this issue at scale. 

The Findings: A Gap Between Priority and Preparedness

Our research reveals three key trends:

  1. Lack of structured control over OAuth apps: Nearly half of respondents (45%) report that they’re neglecting OAuth app governance, while 33% are still relying on manual processes. Only a small minority have implemented dedicated tools or automated controls.
  2. Automating this process is a challenge: 80% of respondents rated this capability as a “significant” or “critical” priority.
  3. Exposure still exists across all maturity levels: Even when they did have a tool in place, 67% of respondents still reported elevated concern. This signals that dedicated tools aren’t solving the underlying problem, and there’s a gap between the ability to simply monitor and the ability to fix errant OAuth grants.
How companies are managing OAuth risk
Priority of automating the OAuth lifecycle

The Evolution of Attack Chains

These findings reflect a broader shift in the reality of how attacks unfold. Modern threats rarely stop at initial access. Instead, they follow a chain that takes them across the cloud workspace:

The evolution of attack chains: it's not just about initial access

In this example, email is just the starting point. Even more concerning are attacks that bypass email altogether. As demonstrated in the Salesloft / Drift breach in 2025, attackers can steal OAuth tokens from legitimate applications and use them to gain access to a treasure trove of data.

And yet, most security programs are still heavily optimized for phishing alone.

The Next Frontier: OAuth and AI Agents

Security issues aren’t limited to malicious OAuth apps and grant abuse. There’s a new element of risk that comes with the increasing adoption of AI agents, which primarily use OAuth grants to connect non-human identities to company applications. CISOs need to make sure that they understand what apps these agents are connecting to as well as the scopes they’re being given.

The Business Case for Moving Beyond Email

Taken together, this makes a compelling case for CISOs to shift their strategy to address the cloud workspace holistically, not just email security. OAuth apps provide a serious advantage when it comes to ease of connectivity and security can’t become a blocker to AI adoption. But that means addressing some hard truths.

  1. You can’t secure what you don’t manage. If organizations aren’t actively governing OAuth apps, then a significant portion of enterprise access is effectively unmonitored. That visibility gap is where serious risk lives.
  2. Manual processes don’t scale with modern risk. OAuth ecosystems are dynamic, user-driven, and constantly evolving. That quarterly audit simply can’t keep up with the speed or volume of change.
  3. Attackers and AI agents are accelerating the need to address the gap. Persistent connectivity equals persistent risk, and today that risk isn’t just coming from malicious actors anymore.

How Material Is Approaching the Problem

At Material, we see this research as validation of a broader shift. Security can’t stop at detecting malicious emails. It needs to understand how access is granted to apps, monitor how that access is used, and take the appropriate steps when risk is identified. And that needs to happen even in cases where the inbox isn’t involved. In other words, security must follow the attack chain and not stop at the entry point.

Closing the Gap

Security pros know that OAuth risk is rising, and this research shows that organizations are at an inflection point. Awareness is high, the priority is clear, but execution is lagging.

For CISOs, this creates both urgency and opportunity. Those who act now can get ahead of a class of threats that is still under-addressed, but rapidly growing.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest

The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

Material Team
5
m read
Read post
Podcast

Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest

The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

5
m listen
Listen to episode
Video

Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest

The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

5
m watch
Watch video
Downloads

Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest

The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

5
m listen
Watch video
Webinar

Email Account Takeovers Hit Healthcare's Smallest Organizations the Hardest

The third in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

5
m listen
Listen episode
blog post

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

James Juran
7
m read
Read post
Podcast

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

7
m listen
Listen to episode
Video

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

7
m watch
Watch video
Downloads

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

7
m listen
Watch video
Webinar

Fewer Entry Points, More Integration Points: A New Agent, Smarter Defaults, and a Rebuilt Integrations Experience

Material’s April updates protect the back door, proactively harden the cloud workspace, and simplify SecOps.

7
m listen
Listen episode
blog post

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

Abhishek Agrawal
7
m read
Read post
Podcast

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

7
m listen
Listen to episode
Video

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

7
m watch
Watch video
Downloads

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

7
m listen
Watch video
Webinar

Mythos Is a Rallying Cry to Think Past Detection. Email Security Is No Different.

AI is forcing the security industry to "think past detection", a lesson email account takeover has been trying to teach for years.

7
m listen
Listen episode
blog post

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

Rajan Kapoor, VP, Security
5
m read
Read post
Podcast

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m listen
Listen to episode
Video

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m watch
Watch video
Downloads

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m listen
Watch video
Webinar

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New