Home Services Results Contact Tower Zero โ†— Book Free Consultation โ†’ ๐Ÿ“ž 203-558-8645
Google Workspace Security

Your GWS tenant.
Exposed.

A hands-on security assessment of your Google Workspace environment โ€” admin console, Gmail, Drive, OAuth, and identity controls. We find what attackers look for first.

GWS Assessment

If it's in Google,
we audit it.

Full review of your Workspace admin configuration, user access controls, OAuth app exposure, Gmail routing, Drive sharing policies, and 2-Step Verification enforcement. We deliver findings your IT team can act on โ€” not a compliance checkbox.

48 hr
Report delivery
on standard engagements
100%
Manual review โ€”
no automated-only scans
6 domains
Assessment scope:
Admin ยท Gmail ยท Drive ยท OAuth ยท Identity ยท Audit
Google Workspace
Multi-platform
IR coverage available
Assessment Scope

Admin Console Audit

Super admin account review, admin role assignments, organizational unit structure, and security policy enforcement across your tenant.

Super Admin Review Role Assignments Org Unit Policy

Gmail Security

SPF, DKIM, DMARC validation, mail routing rules, external forwarding exposure, phishing/spam filter configuration, and suspicious routing rules.

SPF / DKIM / DMARC Mail Routing Forwarding Rules

Drive DLP Controls

External sharing settings, Drive DLP policy review, "anyone with link" exposure audit, and Shared Drive permissions across your organization.

Sharing Policies DLP Rules Shared Drives

OAuth App Review

Third-party app access audit, OAuth token exposure, connected apps with broad permission scopes, and marketplace app risk assessment.

OAuth Tokens App Permissions High-Risk Apps

Identity & 2-Step Enforcement

2-SV enrollment gaps, phishing-resistant MFA coverage, compromised account signals, session length policies, and password policy enforcement.

2-SV Coverage MFA Gaps Session Policy

Alert Center & Audit Logs

Alert Center configuration review, audit log retention settings, admin activity logging gaps, and detection coverage across your Workspace environment.

Alert Rules Audit Retention Log Coverage

A report you can
actually use.

Every finding is rated by severity, tied to a specific misconfiguration, and paired with a remediation step your team can execute. No fluff. No generic best-practices list.

  • Executive summary with risk rating and business impact narrative
  • Technical findings report with severity-ranked issues (Critical / High / Medium / Low)
  • Screenshot evidence and configuration-level detail for each finding
  • Step-by-step remediation guidance mapped to GWS admin console
  • 30-day follow-up call to validate remediation progress
  • Post-assessment IR readiness brief for your Workspace environment
01 โ€”

Scoping Call

30-minute call to confirm tenant access requirements, user count, and any known concerns. No NDA required to start.

02 โ€”

Read-Only Access Provisioning

You grant read-only admin or auditor access. We don't need write access โ€” ever.

03 โ€”

Manual Assessment

Our team works across all six domains in your GWS environment. Typically completed within 1โ€“2 business days.

04 โ€”

Report Delivery + Walkthrough

Full report delivered with a live walkthrough call. Your team leaves knowing exactly what to fix and in what order.

Who This Is For
โš–๏ธ

Law Firms

Client data, privileged communications, and wire instructions in Gmail. GWS misconfigurations are a direct path to BEC and data theft.

๐Ÿงพ

CPA Firms

Tax documents and financial data in Drive. OAuth apps and forwarding rules are the most common attack vectors we find in accounting environments.

๐Ÿข

Insurance Firms

Policy data, claims, and PII across shared drives. Overly permissive sharing settings and weak 2-SV enforcement are high-risk exposures.

๐Ÿก

Real Estate

Wire fraud risk is extreme. Gmail routing and OAuth app access are the two most common compromise vectors in real estate BEC cases.

Ready to see what's
exposed in your tenant?

Book a free 30-minute consultation. We'll scope your assessment and tell you what to expect โ€” no obligation. Direct line to a security engineer. No ticket queue.