Purism

Purism

Beautiful, Secure, Privacy-Respecting Laptops, Tablets, PCs, and Phones
Purism

The Salesforce–Salesloft Breach and the Case for Supply Chain Hygiene

On September 8th, Check Point Research confirmed what many of us in the privacy and security trenches have been warning about for years: the weakest link in your security posture may not be your systems at all — it may be the invisible web of third-party integrations you’ve tacitly approved, often without full visibility into their downstream dependencies.

The latest example? A supply chain breach involving Salesloft’s Drift integration to Salesforce. Threat actor UNC6395 exploited compromised OAuth tokens to access Salesforce CRM systems, siphoning off:

  • Contact details
  • Account records
  • Support case data
  • Authentication tokens and cloud secrets

Victims include some of the most security-conscious organizations in the world — Cloudflare, Zscaler, Palo Alto Networks, Workiva — and potentially over 700 organizations in total.

This wasn’t a brute-force attack on Salesforce itself. It was a precision strike through an approved integration — a trusted bridge that became a backdoor.

The Hygiene Problem in the Supply Chain

In physical supply chains, hygiene is about ensuring every supplier, transporter, and handler meets your quality and safety standards. In digital supply chains, hygiene is about knowing and controlling every integration, API, and token that touches your data.

The Salesforce–Salesloft incident is a textbook case of poor supply chain hygiene:

  • Overextended Trust – OAuth tokens granted broad, persistent access without granular controls or short lifespans.
  • Opaque Dependencies – Many customers didn’t even know their Salesforce data was accessible via Salesloft’s Drift integration.
  • Lack of Continuous Verification – Once an integration was approved, it was rarely re-audited for necessity, scope, or security posture.

Purism’s Take: The “Invisible Dependency” Trap

At Purism, we’ve been calling this out for years: when your data lives in someone else’s cloud, every integration you approve extends your attack surface — often without your users’ awareness or consent.

The danger isn’t just the primary vendor. It’s the vendor’s vendors, the SaaS tools they connect to, and the integrations those tools connect to in turn. Each hop is another potential breach vector.

Operationalizing Supply Chain Hygiene

If you’re serious about defending your organization — and your customers — from this class of attack, you need to treat supply chain hygiene as a continuous operational discipline, not a one-time procurement checklist.

Here’s a framework to follow:

  1. Inventory Every Integration
  • Maintain a live map of all third-party integrations, their scopes, and the data they can access.
  • Include indirect integrations — the “friends of friends” in your SaaS ecosystem.
  1. Apply Least Privilege to OAuth Tokens
  • Scope tokens to the minimum data and actions required.
  • Set short expiration windows and require re-authorization.
  1. Continuous Verification
  • Quarterly (or more frequent) audits of all integrations.
  • Remove unused or low-value connections immediately.
  1. Vendor-to-Vendor Risk Assessment
  • Don’t just vet your vendors — vet their vendors.
  • Require contractual obligations for breach notification and security posture transparency.
  1. User Awareness
  • Make invisible dependencies visible to your internal stakeholders.
  • Train teams to understand that “clicking approve” on an integration request is a security decision.

The Strategic Imperative

The Salesforce–Salesloft breach isn’t an anomaly — it’s a preview. As SaaS ecosystems grow denser and more interconnected, attackers will increasingly target the links rather than the nodes.

If you don’t have a supply chain hygiene program, you’re not just vulnerable — you’re already exposed.

The lesson is clear: Security isn’t just about defending your perimeter. It’s about defending every bridge you’ve built to someone else’s.

Purism Products and Availability Chart

 ModelStatusLead Time 
USB Security Token Purism Librem KeyLibrem Key

(Made in USA)
In Stock
($59+)
10 business days
Purism Liberty Phone with Made in USA ElectronicsLiberty Phone
(Made in USA Electronics)
In Stock
($1,999+)
4GB/128GB
10 business days
Librem 5In Stock
($799+)
3GB/32GB
10 business days
Librem 11In Stock
($999+)
8GB/1TB
10 business days
Most Secure Laptop Purism Librem 14Librem 14Out of stockNew Version in Development
Most Secure PC Purism Librem Mini
Librem MiniOut of stockNew Version in Development
Most Secure Server Purism Librem ServersLibrem ServerIn Stock
($2,999+)
45 business days
Purism Librem PQC EncryptorLibrem PQC EncryptorAvailable Now, contact sales@puri.sm90 business days
Purism Librem PQC Comms ServerLibrem PQC Comms ServerAvailable Now, contact sales@puri.sm90 business days
The current product and shipping chart of Purism products, updated on Aug 20th, 2025

Recent Posts

Related Content

Tags