Magento stores often connect to Cloud or SaaS services such as CRMs, ERPs, email marketing, or analytics tools. If these integrations are not protected by Access Control Lists (ACLs), any attacker who discovers the endpoint may be able to abuse it, extract data, or trigger unauthorized actions.
Restricting Cloud/SaaS integrations by ACL ensures that only authorized roles, IP ranges, or API clients can use these connections. This limits the blast radius if credentials are leaked or if extensions expose insecure endpoints.
# Inspect etc/acl.xml in extensions
app/code/Vendor/Module/etc/acl.xml
# Ensure integration endpoints are mapped to secure roles
# Example: only "Admin" or specific integration roles allowed
# Verify integration uses:
# - API keys restricted to specific IPs
# - OAuth tokens scoped with least privilege
# - ACL rules in Magento admin (System > Permissions > User Roles)
acl.xml.# etc/acl.xml
<resource id="Vendor_Module::integration" title="Integration" />
# No role restrictions — all admins and extensions can access → FAIL
# etc/acl.xml
<resource id="Vendor_Module::integration" title="Integration" parent="Magento_Backend::admin">
<resource id="Vendor_Module::restricted_integration" title="Restricted Cloud Integration"/>
</resource>
# Integration mapped only to "Integration Role"
# API key restricted by IP allow-list at SaaS provider → PASS