When the Control Plane Becomes the Battlefield: Lessons from the Stryker Incident

by

The cybersecurity community has been closely following the events at Stryker, the medtech giant with 56,000 employees across 61 countries. On March 11, 2026, Stryker disclosed a significant cyberattack that caused widespread disruption to its global Microsoft environment, wiping managed devices, halting manufacturing operations and forcing the company to file an SEC disclosure. No ransomware. No exotic zero-day. Reportedly, the attackers leveraged Microsoft Intune, an enterprise device management tool trusted by IT teams worldwide, to issue remote wipe commands at scale.

The incident is still under investigation, and we don't yet have the full picture. But the pattern it represents is worth discussing openly — not to sensationalize, but because the security community learns from moments like this. That learning is ultimately what helps organizations protect themselves.

The Shift: From Malware to Management

For years, the dominant mental model of a cyberattack involved malware detonating on endpoints, triggering alerts, and prompting incident response. The Stryker incident — if the reported Intune vector holds — reflects something different: attackers using the tools you already trust to do the damage for you.

Intune is designed to be powerful. It can remotely wipe devices, enforce policies, and reach across every managed endpoint in an enterprise. Those capabilities exist for legitimate, critical reasons. But they also mean that anyone who gains privileged access to that management layer inherits all of that capability — instantly and at scale.

This is the control plane problem. Modern enterprise environments run on deeply interconnected administrative tooling: identity providers, MDM platforms, cloud consoles and these platforms don't operate as islands. They are woven together through trust relationships: a user account in Entra ID that holds a role in Intune that has authority over every enrolled device in the organization. That chain of relationships is what makes modern IT efficient. It's also what makes a single privileged account compromise so potentially catastrophic.

As many security professionals have noted in the wake of this incident: identity is the new perimeter. But more precisely, the privilege layer on top of identity, who has admin rights, what those rights can touch and whether anyone is watching, is where modern attacks increasingly land.

The Visibility Problem: You Can't Defend a Graph You Can't See

Here's the uncomfortable truth about environments like the one Stryker was running: the attack surface isn't a list of assets. It's a web of relationships. An Intune admin role isn't dangerous in isolation — it's dangerous because of what it connects to. Understanding that danger requires understanding the full chain: which identity holds the role, what trust relationships that identity has elsewhere in the environment, what devices fall within its blast radius and what the recovery path looks like if that role is abused.

Traditional security tools were built for a world of lists: inventories of endpoints, spreadsheets of accounts, tables of policy violations. They're not designed to answer relationship questions. And relationship questions are exactly what modern attacks exploit.

This is where a knowledge graph architecture fundamentally changes what's possible. JupiterOne models your entire environment: identities, devices, cloud resources, applications, policies and the relationships between all of them — as a connected graph. That means every asset exists in context. A privileged account isn't just a row in a table; it's a node with edges showing what roles it holds, what resources it can reach, what devices it can manage and what the downstream impact of its compromise would be.

Seeing the Blast Radius Before the Attacker Does

When an incident like Stryker's unfolds, one of the hardest early questions is: how bad is this? In a wiper-style attack enabled by a management platform, the answer depends entirely on the scope of what that platform touches. How many devices were enrolled? Which business units? Which geographies? Are there segmentation controls in place, or is it a flat management domain?

With JupiterOne, that question becomes answerable in seconds — not days. Because the graph already knows which accounts hold Intune admin roles, which device groups fall under those roles and what organizational context surrounds each device, you can visualize the potential blast radius before an incident occurs. More importantly, you can identify and close the gaps before an attacker maps the same path.

Security teams can ask JupiterOne questions in plain English — no query language required — using JupiterOne AI. Ask "which users have Intune admin roles and no conditional access policy enforced?" or "show me all devices enrolled in Intune that haven't checked in within the last 7 days" and get an immediate answer with full relationship context. For teams that prefer to go deeper, J1QL provides a precise query layer to explore any relationship chain across your environment.

The result isn't just a list. It's a visual map — a graph you can navigate — that shows the actual attack path from a compromised credential to its furthest point of impact across your identity, device and infrastructure layers. That's the difference between knowing you have a problem and understanding the shape of it.

Questions Worth Raising With Your Team This Week

Most organizations are running similar environments to Stryker's. Microsoft Intune, Entra ID, Okta — these platforms are core to how IT and security teams operate at scale. That's not a vulnerability in itself; it's the right architecture for modern work. The question is whether the controls and visibility around those platforms match the level of trust we've placed in them.

A few questions worth raising with your team this week:

  • When did you last test a restore of your identity configurations? If your Entra or Okta tenant were wiped or corrupted tonight, could you restore it? From what backup? How recent?
  • If your Entra or Okta tenant was wiped tonight, how long would recovery take? Hours? Days? Do you have a documented runbook, or would you be starting from scratch?
  • Do you have a documented rollback point from before a breach? Many organizations can restore data, but restoring identity state — group memberships, role assignments, conditional access policies, device trust relationships — is a different and harder challenge.

These aren't gotcha questions. They're the kind of operational readiness checks that separate organizations that navigate an incident from those that spend weeks in full reconstruction.

Building for Resilience, Not Just Response

Resilience in modern environments requires more than strong perimeter defenses. It requires treating your management infrastructure — the identity layer, the MDM plane, the cloud consoles — as a target, because attackers increasingly do. Global admin and Intune admin roles should be treated like production-critical assets: protected with strict least privilege, phishing-resistant MFA, PAM controls and continuous monitoring. And organizations need the ability to visualize, in real time, what the full impact of a compromise at any node in that graph would look like.

We don't know all the details of what happened at Stryker and the investigation is ongoing. What we do know is that the pattern — control-plane compromise, legitimate tools turned into weapons, destructive over extortive intent — is one the security community has been anticipating. The organizations best positioned to respond to this pattern are the ones that have already mapped their administrative relationships, identified the highest-risk paths and built the visibility to detect when something in that graph changes unexpectedly.

That's the work. And the good news is it doesn't require starting over — it requires seeing what's already there.

If you want to see how JupiterOne maps your identity and device management assets, visualizes your blast radius and helps you ask the right questions before an incident forces them, we're happy to walk you through it.

John Le
John Le

John is the Director of Product Marketing at JupiterOne. He is an experienced cybersecurity product marketer and excels in crafting consistent messaging, extracting valuable insights from data, and connecting different teams to ensure alignment across the organization. Outside the office, John enjoys wakesurfing, carving down slopes, and supporting his beloved Texas Longhorns and Austin FC.

Keep Reading

Compliance Automation Without Coding: How AI Is Making Continuous Controls Monitoring a Team Sport | JupiterOne
March 13, 2026
Blog
Compliance Automation Without Coding: How AI Is Making Continuous Controls Monitoring a Team Sport

Discover how AI compliance automation is making continuous controls monitoring accessible to every team member

CNAPP Meets the Graph: Why Cloud-Native Security Needs Asset Context | JupiterOne
February 18, 2026
Blog
CNAPP Meets the Graph: Why Cloud-Native Security Needs Asset Context

JupiterOne's new integration with Upwind brings runtime CNAPP data into the asset graph

Bridge the Gap: How the JupiterOne Collector Brings On-Prem Visibility Into Your Security Graph | JupiterOne
February 11, 2026
Blog
Bridge the Gap: How the JupiterOne Collector Brings On-Prem Visibility Into Your Security Graph

Most security teams can see their cloud but not what's behind the firewall. Learn how the JupiterOne Collector bridges on-prem visibility into your security graph.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.