Allow access to Workspace only from corporate-managed devices or when connected to the office network.
→Configure Context-Aware Access. Create access levels for "Compliant device" (from endpoint management) and "Corporate IP range". Apply a policy that requires one of these levels for access.
Why: This is the core of a zero-trust model for Workspace, shifting from a network perimeter to enforcing access policies based on device and user context, regardless of location.
A user account is suspected of being compromised. Attacker may have active sessions or app access.
→Immediately: 1) Reset the user's password. 2) Revoke all third-party OAuth tokens. 3) Sign out all web sessions.
Why: This three-step process ensures the attacker is locked out of all access points: direct login, app-based access, and existing browser sessions.
Prevent users from granting corporate data access to risky or unvetted third-party OAuth applications.
→In `Security > API controls`, configure "App access control" to block unconfigured apps by default, then add specific, vetted apps to the "Trusted" list.
Why: This moves from a default-allow to a default-deny security posture for third-party apps, giving IT full control over which applications can access company data.
Implement Single Sign-On (SSO) with a third-party IdP, but ensure admin access if the IdP is down.
→Configure SAML SSO for the entire organization. Create a separate group or OU for Super Admins and configure a network mask or group setting to exclude them from the SSO requirement.
Why: Provides a critical "break-glass" procedure, allowing admins to log in with Google credentials during an IdP outage to manage the environment.
Prevent attackers from spoofing your domain in phishing attacks and improve email deliverability.
→Properly configure SPF, DKIM, and DMARC DNS records for your domain. Set the DMARC policy to `p=reject` for full enforcement.
Why: These three standards work together to authenticate your outbound mail, allowing recipient servers to confidently reject fraudulent messages impersonating your domain.
Need proactive notification of security events like suspicious logins or government-backed attack warnings.
→Regularly monitor the Alert Center. Configure alert rules to send email notifications for high-priority events to the security team.
Why: The Alert Center is the centralized hub for security-related events. Proactive notifications enable rapid incident response.
A user lost their phone and has no backup codes, locking them out of their 2SV-protected account.
→As an admin, select the user and generate one-time use backup verification codes for them to regain access.
Why: This is the standard, secure procedure for user recovery without needing to temporarily disable 2SV, which would weaken security.
Mandate the strongest form of authentication to protect high-risk users from phishing.
→Enforce a 2-Step Verification policy that requires the use of Security Keys (FIDO) only.
Why: Security keys are phishing-resistant because they use public-key cryptography and verify the origin of the login page, unlike TOTP or SMS which can be phished.