The request for the audit came at 9:03 a.m., and the team knew the Oauth scopes were a mess. Some tokens had sweeping access they didn’t need. Others were missing rights for core workflows. For SOC 2 compliance, that chaos is a liability you can’t afford.
Oauth scopes management is about strict control over what each token can do. In SOC 2, the principle of least privilege isn’t optional. Every user, service, and integration must have the smallest set of scopes needed to perform their role. This minimizes blast radius, reduces exposure, and keeps auditors from flagging gaps.
Start with an inventory. Map every Oauth client, user, and system account. Record which scopes they have, and which systems those scopes touch. Eliminate unused clients and stale tokens. Revoke any scope that is broader than necessary. Maintain one source of truth for scopes to prevent drift between environments.