A complete audit of your Workspace tenant — from critical settings to advanced hardening

Unlock full access

google security

This checklist covers every major security configuration area in a Google Workspace Business Plus tenant. Work through it with your IT administrator using the Google Admin Console (admin.google.com). To use this checklist: you need Super Admin access to your Google Workspace tenant. Most settings are in Admin Console → Security. Some require Business Plus or higher.

This checklist covers every major security configuration area in a Google Workspace Business Plus tenant. Work through it with your IT administrator using the Google Admin Console (admin.google.com). To use this checklist: you need Super Admin access to your Google Workspace tenant. Most settings are in Admin Console → Security. Some require Business Plus or higher.

Section 1: Authentication and 2-Step Verification

  CRITICAL 

□      ☐ 2-Step Verification (2SV) is ENFORCED for all users — not just available. Verify in Admin Console → Security → 2-Step Verification that enforcement is set to 'On.'

□      ☐ New users are required to enroll in 2SV within a defined grace period (7–14 days maximum).

□      ☐ Super Admin accounts use hardware security keys (FIDO2) or Google Passkeys — not SMS or TOTP.

□      ☐ Less secure app access is DISABLED for all users in Admin Console → Security → Less Secure Apps.

  HIGH PRIORITY 

□      ☐ Allowed 2SV methods are reviewed — is SMS-only 2SV permitted? Consider restricting to authenticator app or hardware key for sensitive roles.

□      ☐ Password policy is configured: minimum 8 characters, 'Enforce strong password' enabled, no reuse for 10+ cycles.

□      ☐ Single Sign-On (SSO) is configured for critical business applications where available.

□      ☐ Third-party identity provider integration is documented if used.

  STANDARD 

□      ☐ Login challenges are enabled for suspicious sign-ins.

□      ☐ Advanced Protection Program is enrolled for highest-risk users (executives, finance, IT admins).

□      ☐ Recovery options for admin accounts are reviewed — no personal Gmail recovery emails on admin accounts.

Section score: ___ / 11   Critical items completed: ___ / 4

Section 2: Google Drive and Sharing

  CRITICAL 

□      ☐ Sharing outside the organization is restricted to 'Anyone with the link' disabled OR requires sign-in. Verify in Admin Console → Apps → Google Workspace → Drive and Docs → Sharing Settings.

□      ☐ 'Anyone on the internet (no sign-in required)' sharing is DISABLED.

  HIGH PRIORITY 

□      ☐ Link expiration is enforced for external shares (30–90 days recommended).

□      ☐ External sharing is limited to allowlisted trusted domains (partner organizations, clients with ongoing access).

□      ☐ Warning is displayed when users share outside the organization.

□      ☐ Shared Drive creation is restricted to appropriate users — not all employees by default.

□      ☐ Drive audit reports are reviewed monthly for unexpected sharing activity.

  STANDARD 

□      ☐ Drive DLP (Data Loss Prevention) rules are configured for sensitive data patterns (SSN, financial data, health information). Requires Business Plus+.

□      ☐ Drive document expiration is used for time-limited external collaborations.

□      ☐ Target audience settings are configured if you use trust levels for sharing.

Section score: ___ / 9   Critical items completed: ___ / 2

Section 3: Gmail Security

  CRITICAL 

□      ☐ SPF record is configured for your domain: 'v=spf1 include:_spf.google.com ~all' or equivalent.

□      ☐ DKIM signing is enabled for your domain in Admin Console → Apps → Google Workspace → Gmail → Authenticate Email.

□      ☐ DMARC policy is set to enforcement mode (p=quarantine or p=reject) with appropriate reporting.

□      ☐ Enhanced pre-delivery message scanning is enabled in Spam, Phishing, and Malware settings.

  HIGH PRIORITY 

□      ☐ External recipient warnings are enabled — users are alerted when sending outside the organization.

□      ☐ Attachment safety settings are enabled: scan encrypted attachments, scan before delivery.

□      ☐ Link safety scanning is enabled for all users.

□      ☐ Spoofing and authentication checks are enabled in Anti-Phishing settings.

□      ☐ Anomalous attachment protection is enabled.

  STANDARD 

□      ☐ Email routing rules are reviewed — no unexpected forwarding rules to external addresses.

□      ☐ Email delegation is audited — who has access to whose mailbox?

□      ☐ Confidential Mode is available for users who need to send time-limited, no-forward emails.

Section score: ___ / 12   Critical items completed: ___ / 4

Section 4: Endpoint Management

  CRITICAL 

□      ☐ All organization-owned devices (Macs, Windows PCs, Chromebooks) are enrolled in Google Endpoint Management or a third-party MDM.

□      ☐ Company-owned devices are supervised via Apple Business Manager (Macs) or equivalent enrollment program.

□      ☐ Screen lock is enforced via MDM policy on all enrolled devices.

□      ☐ Full-disk encryption (FileVault for Mac, BitLocker for Windows) is enforced and key escrowed to MDM.

  HIGH PRIORITY 

□      ☐ Context-Aware Access is configured to block or challenge access from non-compliant or unmanaged devices (Business Plus+).

□      ☐ Mobile devices (phones and tablets) accessing Google Workspace are enrolled in endpoint management.

□      ☐ Remote wipe capability is tested — can you wipe a lost device remotely?

□      ☐ App management is configured for mobile devices — approved apps deployed, prohibited apps blocked.

  STANDARD 

□      ☐ Device compliance rules are defined and enforced via Context-Aware Access.

□      ☐ OS version requirements are enforced — devices below minimum OS version are flagged or blocked.

Section score: ___ / 10   Critical items completed: ___ / 4

Section 5: Admin and Audit

  CRITICAL 

□      ☐ Super Admin accounts are dedicated accounts not used for daily email — separate from personal accounts.

□      ☐ Admin role assignments are reviewed — principle of least privilege applied. Not everyone is Super Admin.

□      ☐ Admin audit log is enabled and reviewed monthly for unexpected admin actions.

  HIGH PRIORITY 

□      ☐ Alert policies are configured: new admin added, admin password changed, suspicious login, bulk data export.

□      ☐ Alerts go to a monitored inbox — not just the primary Super Admin who may be the target of an attack.

□      ☐ Google Vault is configured with retention rules appropriate to your industry (Business Plus+).

□      ☐ Vault holds can be placed on user data for legal or compliance purposes — tested before needed.

□      ☐ Investigation Tool is used to audit unusual activity (Business Plus+).

  STANDARD 

□      ☐ Third-party application access is reviewed — OAuth-connected apps are audited in Admin Console → Security → API Controls.

□      ☐ High-risk apps (apps requesting sensitive scopes) are reviewed and restricted as appropriate.

□      ☐ Marketplace Apps are restricted to IT-approved applications only.

Section score: ___ / 11   Critical items completed: ___ / 3

Score Summary

Section

Max Score

Your Score

Critical Done?

1. Authentication

11

 

YES / NO

2. Drive and Sharing

9

 

YES / NO

3. Gmail Security

12

 

YES / NO

4. Endpoint Management

10

 

YES / NO

5. Admin and Audit

11

 

YES / NO

TOTAL

53

 

 

 

Score

Security Posture

Action

45–53

Strong

Maintain; review quarterly.

32–44

Adequate

Address all CRITICAL items. 60-day remediation plan.

20–31

At Risk

Immediate action. Engage IT provider for prioritized hardening.

0–19

High Risk

Suspend broad external sharing. Address critical items before further business use.

 


AEGITz performs Google Workspace security assessments and hardening for Phoenix businesses. Schedule an assessment at aegitz.com.

Previous

Next Article

More Articles

Written by

Sawyer Mahony

Mar 12, 2026

The AI Productivity Gain Is Real. So Is the Risk. Here’s How to Get Both.

A report on the debate about AI in business, the risk vs the gain.

AEGITz Logo

Written by

Sawyer Mahony

Mar 12, 2026

The AI Productivity Gain Is Real. So Is the Risk. Here’s How to Get Both.

A report on the debate about AI in business, the risk vs the gain.

AEGITz Logo

Written by

Steve Copeland

Mar 8, 2026

Cyber Insurance Readiness Checklist for Arizona Businesses

What underwriters require — and how to document it before your next renewal

Cyber Insurance

Written by

Steve Copeland

Mar 8, 2026

Cyber Insurance Readiness Checklist for Arizona Businesses

What underwriters require — and how to document it before your next renewal

Cyber Insurance

Written by

Wyatt Mahony

Mar 8, 2026

The Arizona Law Firm Cybersecurity & Ethics Compliance Guide

ABA obligations, State Bar requirements, and the technical controls that satisfy them

 Cybersecurity & Ethics

Written by

Wyatt Mahony

Mar 8, 2026

The Arizona Law Firm Cybersecurity & Ethics Compliance Guide

ABA obligations, State Bar requirements, and the technical controls that satisfy them

 Cybersecurity & Ethics

Written by

Wyatt Mahony

Mar 8, 2026

Incident Response Template Pack

Print this. Fill it in before you need it. Keep a copy off-site.

cyber security technology network

Written by

Wyatt Mahony

Mar 8, 2026

Incident Response Template Pack

Print this. Fill it in before you need it. Keep a copy off-site.

cyber security technology network