IT administrators for medium and large businesses should follow these security best practices to help strengthen the security and privacy of company data. You'll use one or more settings in the Google Admin console to implement each best practice in this checklist.
If your business doesn't have an IT admin, see if the recommendations in the Security checklist for small businesses (1–100 users) are more appropriate for your business.
Note: Not all settings described here are available in all Google Workspace editions or Cloud Identity editions.
Security best practices
To help protect your business, Google turns on many of the settings recommended in this checklist as security best practices by default.
Contacts | Drive | Gmail | Google+ | Groups | Mobile | Sites | Vault
Protect admin accounts |
||
|
Require 2-Step Verification for admin accounts Protect your business with 2-Step Verification | Deploy 2-Step verification |
|
|
Use security keys for 2-Step Verification |
|
|
Don't use a super admin account for daily activities Administrator privilege definitions | Security best practices for administrator accounts |
|
|
Don't remain signed in to an idle super admin account |
|
Manage super admin accounts |
||
|
Set up multiple super admin accounts |
|
|
Create per-user super admin role accounts |
|
|
Delegate daily admin tasks to user accounts Assign administrator roles to a user | Security best practices for administrator accounts |
|
Manage activity on admin accounts |
||
|
Set up admin email alerts |
|
|
Review the Admin audit log |
|
Prepare for admin account recovery |
||
|
Add recovery options to admin accounts Add account recovery information to your administrator account |
|
|
Keep information on hand for super admin password reset If a super admin can’t reset their password using email or phone recovery options, and another super admin isn’t available to reset the password, they can contact Google Support. |
|
|
Enroll a spare security key |
|
|
Save backup codes ahead of time |
Enforce multifactor authentication |
||
|
Require 2-Step Verification (2SV) for users Protect your business with 2-Step Verification | Deploy 2-Step verification |
|
|
Enforce security keys, at least for admins and other high-value accounts. |
|
Protect passwords |
||
|
Help prevent password reuse with Password Alert |
|
|
Use unique passwords |
|
Help prevent and remediate compromised accounts |
||
|
Regularly review activity reports and alerts |
|
|
Set up admin email alerts |
|
|
Add user login challenges Verify a user’s identity with a login challenge | Add employee ID as a login challenge |
|
|
Identify and secure compromised accounts
|
|
|
Disable the ability to download data if circumstances warrant it |
|
Review third-party access to core services Control which third-party & internal apps access Google Workspace data |
|
|
Create a list of trusted apps Control which third-party & internal apps access Google Workspace data |
|
Limit external calendar sharing |
|
Set a desktop browser policy |
|
|
Set up basic Chrome OS and Chrome Browser policies
|
|
|
Set up advanced Chrome OS and Chrome Browser policies
|
|
|
Enable auto-update for Chrome |
|
Warn users when chatting outside their domain |
|
|
Set a chat invitation policy |
|
Don’t automatically share contact information |
Limit sharing and collaboration outside your domain |
||
|
Set sharing options for your domain |
|
|
Set the default for link sharing |
|
|
Warn users when they share a file outside the domain |
|
|
Limit file access to recipients only |
|
|
Prevent users from publishing on the web |
|
|
Require Google sign-in for external collaborators |
|
|
Control files stored on shared drives |
|
|
Control content sharing in new shared drives |
|
Limit local copies of Drive data |
||
|
Disable access to offline docs |
|
|
Disable desktop access to Drive To reduce the risk of data leaks, consider disabling desktop access to Drive. If you decide to enable desktop access, be sure that you enable it only for users with a critical business need. Deploy Backup and Sync | Turn on sync for your organization | |
|
Control access to your data by third-party apps |
||
|
Don't allow Google Docs add-ons |
Set up authentication and infrastructure |
||
|
Validate email with SPF, DKIM, and DMARC SPF, DKIM, and DMARC establish an email validation system that uses DNS settings to authenticate, digitally sign, and help prevent spoofing of your domain. Attackers sometimes forge the "From" address on email messages so they appear to come from a user in your domain. To prevent this, you can configure SPF and DKIM on all outbound email streams. Enhance security for outgoing email (DKIM) | Authorize email senders with SPF | |
|
|
Set up inbound email gateways to work with SPF |
|
|
Enforce TLS with your partner domains Require mail to be transmitted via a secure (TLS) connection |
|
|
Require sender authentication for all approved senders |
|
|
Configure MX records for correct mail flow Set up MX records for Google Workspace Gmail | Google Workspace MX records values |
|
Protect users and organizations |
||
|
Disable IMAP/POP access |
|
|
Disable automatic forwarding |
|
|
Enable comprehensive mail storage This reduces the risk of data deletion by ensuring that a copy of all sent or received messages in your domain—including messages sent or received by non-Gmail mailboxes—is stored in the associated users' Gmail mailboxes. |
|
|
Don't bypass spam filters for internal senders |
|
|
Add spam headers setting to all default routing rules For example, an administrator at a downstream server can use this information to set up rules that handle spam and phishing differently from clean mail. |
|
|
Enable enhanced pre-delivery message scanning |
|
|
Enable external recipient warnings |
|
|
Enable additional attachment protection |
|
|
Enable additional link and external content protection |
|
|
Enable additional spoofing protection |
|
Security considerations for daily Gmail tasks |
||
|
Take care when overriding spam filters Advanced Gmail settings provide detailed control of message delivery and filtering. To avoid an increase in spam, exercise thought and care if you use these settings to override Gmail’s default spam filters.
|
|
|
Don't include domains in the approved senders list |
|
|
Don't add IP addresses to your allowlist Add IP addresses to allow lists in Gmail | Set up an inbound mail gateway |
|
Automatically create Google+ profiles Manage Google+ profiles |
|
|
Control how users share and view Google+ content |
|
Set up private access to your groups |
|
|
Limit group creation to admins |
|
|
Customize your group access settings
|
|
|
Disable some access settings for internal groups
|
|
|
Enable spam moderation for your groups |
Use Google endpoint management |
||
|
Use Google endpoint management to help control your corporate data At a minimum, use basic mobile management to gain visibility and control over corporate data on iOS and Android. This reduces data leak, malware, and malicious insider risks. |
|
Control access to apps |
||
|
Create allowlists of approved business apps |
|
|
Block apps from unknown sources |
|
|
Enforce app verification |
|
|
Require managed apps on iOS devices For example, users can't back up data from a managed business app to an external entity such as iCloud. If a user creates a PDF in a managed business app, they can't open it in an unmanaged personal app. |
|
Protect accounts and data |
||
|
Enforce mobile password requirements |
|
|
Encrypt data on mobile devices |
|
|
Enable Auto Account Wipe |
|
|
Enforce Android work profiles |
|
Manage devices |
||
|
Block compromised mobile devices |
|
|
Enable mobile inactivity reports |
|
|
Block external media storage |
|
|
Disable location history |
|
Block sharing sites outside the domain Set Google Sites sharing options | Set sharing options: classic Sites |
|
Control, audit, and secure Vault accounts |
|
|
Treat accounts with Vault access as sensitive Protect your business with 2-Step Verification | Deploy 2-Step verification |