๐Ÿ“Š Dashboard ๐ŸŸข Pulse โœ‰ Inbox Shield ๐Ÿ“ก Vendor Watch ๐Ÿ”— Integrations ๐ŸŽฃ PhishSim ๐Ÿ“‹ Compliance ๐Ÿ›ก๏ธ BrandGuard

Google Workspace Security Audit: 8 Misconfigurations to Fix in 2026

Google Workspace's default settings optimise for ease of collaboration โ€” which means they often leave security gaps wide open. These eight checks take under an hour and cover the misconfigurations most commonly exploited in Google Workspace breaches.

Google Workspace is used by millions of small businesses, and the Google Admin console has powerful security controls โ€” most of which are either off by default or buried three levels deep in settings. The result is that most tenants are running with significant gaps they don't know about.

This checklist is based on the controls we scan automatically for every Google Workspace tenant enrolled in Workspace Posture Pro. Each item includes exactly where to find the setting and what to change.

The 8-Point Google Workspace Security Checklist

1
2-Step Verification enforced for all users Critical
Go to Admin console โ†’ Security โ†’ Authentication โ†’ 2-step verification. Set "Allow users to turn on 2-step verification" to Enforcement on, not just "Allow". This forces all users to enrol in 2SV โ€” a setting that's available by default but almost never turned on in small business tenants. Pay special attention to admin accounts: these should also be enrolled in hardware security keys, not just TOTP apps.
2
Third-party app access to Google account data Critical
Navigate to Admin console โ†’ Security โ†’ Access and data control โ†’ API controls โ†’ Manage third-party app access. Review every connected app. Any app with access to Gmail, Drive, Calendar, or Contacts data that you don't actively use should be revoked. OAuth phishing campaigns specifically trick users into granting these permissions โ€” the attacker then has persistent access even after a password change.
3
External Drive sharing settings High
Check Admin console โ†’ Apps โ†’ Google Workspace โ†’ Drive and Docs โ†’ Sharing settings. The "Sharing outside of [domain]" option should be set to "Allowed with warning" at most โ€” ideally "Only people in [domain] can access". The most dangerous setting is "Anyone with the link can view/edit" applied as the default sharing behaviour. Also check whether users can share items with people outside the organisation without approval.
4
Email forwarding to external addresses High
In the Admin console โ†’ Apps โ†’ Google Workspace โ†’ Gmail โ†’ End User Access, check whether "Allow per-user outbound gateways" is enabled (it usually shouldn't be). Also audit individual accounts: in the Admin console โ†’ Users โ†’ [user] โ†’ Email โ†’ Gmail settings, check for forwarding addresses that send to external domains. Unexpected external forwarding is a primary indicator of account compromise.
5
Stale super admin accounts High
Go to Admin console โ†’ Account โ†’ Admin roles โ†’ Super Admin โ†’ Admins. Any account with Super Admin that hasn't been active in 30+ days โ€” especially from former employees or contractors โ€” should have admin rights revoked immediately. Super Admin gives full tenant control including the ability to reset other passwords, access all data, and modify all security settings. Former employees with super admin access is one of the most common and most serious findings in Workspace tenants.
6
Less secure app access blocked High
In Admin console โ†’ Security โ†’ Less secure apps, ensure "Disable access to less secure apps for all users" is selected. Less secure apps use basic auth (username + password only) to access Gmail and Google Calendar โ€” this bypasses 2SV entirely. Google has been phasing this out since 2021, but many tenants still have it enabled for legacy applications. Audit which apps depend on it before enforcing.
7
Alert centre monitoring active Medium
Check Admin console โ†’ Security โ†’ Alert centre. Google's built-in alert centre notifies you of suspicious activity โ€” account hijacking attempts, malware in Drive, government-backed attacks, and data exfiltration warnings. Ensure critical alerts are configured to send email notifications to admin accounts. Many Google Workspace tenants have never opened the alert centre.
8
Login audit logs and data export enabled Medium
In Admin console โ†’ Reporting โ†’ Audit and investigation โ†’ Login audit, verify that login events are being recorded. Also check Account โ†’ Account settings โ†’ Legal and compliance โ†’ Data export โ€” this controls whether you can export data in case of incident response or legal requirements. Audit log retention depends on your Google Workspace edition (Business Starter: 180 days, Business Standard/Plus: 6 months, Enterprise: up to 10 years).

Google-specific risks to know about

Unlike M365, Google Workspace has a few security quirks that catch admins off guard:

๐Ÿ’ก Quick win: Google's Security Health page (Admin console โ†’ Security โ†’ Security health) gives you an instant overview of the most critical settings and flags anything that's at risk. Check it first โ€” it takes 30 seconds.

How often should you audit?

Configuration drift is the enemy. A setting that was correct last quarter can change when:

Running this checklist monthly is better than quarterly. Automating it is better than monthly. The value isn't in the initial audit โ€” it's in catching the change that happened two Tuesdays ago before it becomes a breach.

๐Ÿ“ฌ

Get the EdgeIQ weekly security digest

Practical tips, new threat intel, and product updates. No spam โ€” unsubscribe anytime.

Run this audit automatically every month

Workspace Posture Pro connects read-only to your Google Workspace tenant and runs all 8 checks monthly. You get a plain-English digest with your posture score, what changed since last month, and prioritised remediation steps. Setup takes 2 minutes โ€” no IT ticket needed.

Start Workspace Posture Pro โ€” $19/mo โ†’