
Long-Term: The primary defense against this class of attack is treating SaaS management planes with the same rigor as on-premises infrastructure. That means enforcing phishing-resistant MFA on all admin accounts, implementing just-in-time access so that standing admin permissions don't exist by default, and requiring multi-admin approval for any high-impact action. Organizations should also layer identity threat detection and response atop these controls (i.e. monitoring for account abnormalities that may indicate malicious activity).
Short-Term: Defending against this attack starts with two controls: eliminating standing admin permissions in Intune and Entra ID, and enabling multi-admin approval for destructive actions like device wipe, retire, and delete.
The Stryker attack didn't beat a security team. It inherited the trust that Stryker had already granted to its SaaS plane. Enterprises have spent years building rigorous controls around on-premises infrastructure, then extended unconditional trust to platforms like Intune and Entra ID with almost none of the same guardrails in place. Obsidian exists to close that gap: continuous visibility into enterprise application activity, privileged account monitoring, and cross-SaaS lateral movement detection across the platforms where that implicit trust lives.
Obsidian has also released a posture rule that raises the bar for such an attack, that erases an actor’s ability to execute mass device operations from Intune.
Obsidian now flags tenants where multi-admin approval is missing or disabled for high-impact Intune actions, meaning that before any destructive action can execute, a second approver is required. It breaks the binary trust model that made this attack possible: no longer can a single compromised credential, however privileged, act unilaterally against an entire device fleet.