Security Glossary

What is Tenant Compromise?

Tenant compromise is when an attacker gains administrative control over your organization's cloud environment — your Microsoft 365 tenant, Google Workspace, or AWS account. Unlike stealing a single employee's password, this gives the attacker the keys to everything: every email, every file, every application, and every user account in your cloud infrastructure. It is the most devastating outcome of a successful credential attack.

How a Tenant Compromise Attack Works

1

Compromise an initial account

The attacker gains access to any user account — often through credential stuffing or phishing — then looks for ways to escalate their privileges within the cloud environment.

2

Escalate to administrative access

They exploit misconfigured permissions, target admin accounts with MFA fatigue, or abuse OAuth application permissions to gain tenant-level control.

3

Establish persistent access

The attacker creates hidden admin accounts, registers rogue applications, or modifies authentication settings to ensure they can get back in even if the original compromised account is discovered.

4

Execute the objective

With full tenant control, the attacker can read all email, exfiltrate sensitive documents, intercept communications, deploy BEC attacks from legitimate accounts, or hold the entire environment for ransom.

Real-World Example

A technology company's Microsoft 365 environment was fully compromised after attackers phished a mid-level manager and discovered their account had been incorrectly granted global admin privileges. Within 48 hours, the attackers had read the CEO's email, downloaded the customer database, created hidden forwarding rules on the finance team's mailboxes, and registered malicious OAuth apps that survived password resets.

How AiVERSARY Detects Tenant Compromise Risk

AiVersary's reports assess your cloud environment's external exposure: publicly visible admin portals, misconfigured authentication endpoints, exposed API keys, and cloud service configurations that attackers enumerate during reconnaissance. The report identifies the entry points and misconfigurations that could lead to a full tenant compromise.

Is your organization exposed to tenant compromise?

AiVERSARY scans your public footprint and identifies the exact data attackers would use against you. $499 per report.

Get Your Threat Report