Features built for Google Workspace security teams
15 security checks across 5 domains — identity, email, data, OAuth, and governance. Executive-ready score and PDF output.
Identity & Access — 40% of risk score

Super Admin Count

Flag when more than 3 super admins exist — reduces blast radius of compromised accounts.

New Admin Detection

Detect admin accounts created in the last 7 days that may indicate privilege escalation.

Admin MFA Coverage

Identify admin accounts without two-factor authentication — a primary attack vector.

Org-Wide MFA

Measure MFA adoption across all users. Flags when coverage drops below 90%.

Dormant Admins

Find admin accounts inactive 90+ days that still hold elevated privileges.

Dormant Users

Identify inactive user accounts that increase attack surface and should be reviewed.

Email Security — 20% of risk score

SPF Record

Verify SPF DNS record exists and includes Google Workspace — prevents email spoofing.

DKIM Signing

Check DKIM DNS record is configured — ensures outbound email is cryptographically signed.

DMARC Policy

Verify DMARC policy is set to quarantine or reject — not the weak default of none.

Email Forwarding

Detect auto-forwarding to external addresses on high-risk accounts (CEO, CFO, admin).

Legacy Protocols

Flag IMAP/POP access that bypasses modern OAuth security controls.

Data Exposure — 20% of risk score

External Sharing

Scan Drive for files shared publicly or with external domains without restriction.

Public Link Sharing

Find files with "anyone with the link" access — no authentication required to view.

OAuth & Third-Party Risk — 10% of risk score

High-Risk OAuth Apps

Detect third-party apps with dangerous scopes (mail, drive, admin) that could exfiltrate data.

Governance & Logging — 10% of risk score

Audit Logging

Verify admin audit logs are active and generating events — required for SOC 2 and ISO 27001.

Alert Center

Check for unresolved security alerts in Google Workspace Alert Center.

Suspicious Logins

Detect users with 3+ failed login attempts in 7 days — potential brute force or credential stuffing.

Platform Features

Security Baseline

Establish a baseline scan and detect drift in subsequent checks.

Executive Reports

One-click PDF reports with A–F grades, compliance tags, and remediation steps.

Compliance Mapping

Every finding maps to CIS Benchmarks, SOC 2, and ISO 27001 controls.

Read-Only OAuth

We never modify settings. All checks are strictly read-only.