Locklizard
  • Products
    • DRM software
      • Safeguard PDF Security
      • Safeguard Enterprise
      • DRM Software Features
        • Restrict PDF use
        • Watermark PDF
        • Expire PDF
        • Revoke PDF
        • Disable Print
        • Track PDF
    • Secure PDF Viewers
      • Viewer Overview
      • Viewer Demo
      • Web Viewer
      • USB Viewer
    • Add-ons
      • All Add-ons
      • Web Publisher
      • Safeguard Portable USB
      • Ecommerce API
      • Command Line
      • Own Branding
      • Custom Email
    • Purchase & Pricing
    • Book a Demo
  • Solutions
    • Industry sectors
      • All Industries
      • Auctions
      • Engineering
      • Government
      • Healthcare
      • Libraries
      • Mergers & Acquisitions
      • Publishing Ebooks
      • Publishing Media
      • Publishing Standards
      • Membership Associations
      • Reports & Analysis
      • Tax Advisors
      • Training & Education
    • Vertical sectors
      • All Sectors
      • Board Documents
      • Internal Company Use
      • Large Publishers
      • Small Publishers
    • Business processes
      • Processes Overview
      • Secure Document Sharing
      • Sell Documents Securely
      • Document Retention
      • Prevent Document Leakage
      • Internal Document Control
      • Regulatory Compliance
      • Secure PDF Forms
      • Secure Data Rooms
      • Data Room Security
      • Application Integration
    • Business benefits
    • Regulatory compliance
      • Compliance Overview
      • NIST & DFAR Compliance
  • Downloads
    • Free 15 day trial
    • Viewers
      • Windows Viewer
      • Mac Viewer
      • iOS Viewer
      • Android Viewer
    • Writers
    • Manuals
  • Support
    • Support
    • FAQs
    • Guides
    • Videos
    • White papers
  • About Us
    • Contact us
    • Our customers
      • Customer Overiew
      • Case Studies
      • Testimonials
    • Our technology
      • What is DRM?
    • Blog
    • Why Locklizard?
      • Competitors
      • PDF DRM protection
      • Password protect PDF
      • Product Awards
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Google Workspace security – is it secure?

in Blog, Document Security, DRM, PDF Security

How good is Google Workspace security & privacy

The key security features of Google Workspace, plus the problems with data protection measures such as encryption, document restrictions, DLP and access rules, and how you can address them.

Google Workspace has grown from a management tool tested at a small community college to a full suite of cloud-based collaboration and productivity apps with over three billion users.  Its success in the enterprise and education spaces has been propelled partly by the reputation Alphabet Inc has built for safety and data protection – but how secure is Google Workspace really?  We’ll examine it from a document security perspective in this blog.

   Google Workspace security


Google Workspace provides a good range of security features to protect data such as 2-step verification for login, enforced SSL connections, client side encryption (CSE), security alerts and reports, password monitoring, data loss prevention (DLP) and context aware restrictions to name a few.

So, at first glance, it looks like a secure system for document collaboration.  In practice, however, how do all these components protect your organization’s data?

  Google Workspace & encryption of data

The first thing to discuss regarding Google Workspace is its encryption since there is some confusion here.  Some users aren’t sure if their emails and documents are encrypted, which type of encryption Google uses, and how secure it is.

Is Google Workspace email encrypted?


There are two options for Google Workspace encrypted email, which are the same as Gmail encryption: the default TLS encryption and S/MIME.  TLS encrypts the communication channel, protecting data in transit and preventing spoofing attacks.  The email is decrypted once it is delivered to email addresses via the mail server.

S/MIME is much better because it provides end-to-end encryption.  It encrypts emails individually when they are in transit and at rest on the mail server.  If there is an attack on the mail server, the emails and their attachments are usually still safe, with decryption occurring only at the client’s inbox when a valid private key is present.

Both types of encryption only work if all parties’ email service/mail server supports them.  With S/MIME it gets more complex, with all parties required to exchange keys in advance for encryption to work and set up in the admin console.  There is also an additional cost if certificates are purchased via a certificate authority.

Regarding document security specifically, both of these options are of limited use.  While they will protect attachments in transit and S/MIME at rest, most users will immediately download attachments to their PCs.  At this point, they’ll be unencrypted and can be intentionally or unintentionally shared at will.  We explain this in more detail in our blog on gmail attachment encryption and how to send attachments securely.

What about Gmail confidential mode?


Gmail confidential mode attempts to address what happens after an email attachment lands in a recipient’s inbox.

However, as covered in our Gmail confidential mode blog, it is a half-hearted effort.  In our testing, it was simple to bypass controls and create unprotected versions of PDF files, copy & paste from documents, and print.  Users can easily make copies of the email body, making confidential mode a waste of time overall.

Is Google Workspace encrypted?


Unlike its emails, Google Workspace documents are encrypted in transit and at rest.  However, there are a few key points to consider regarding Workspace’s encryption.

  1. Google uses a good encryption algorithm to secure its documents, AES-256. However, encryption is still per account rather than per document; ergo, if an account’s encryption key is compromised, all its documents are.
  2. Google’s cloud key management service allows you to use your own encryption keys at rest (both hardware and software keys are supported) rather than Google managing them for you. Google calls this client-side encryption or CSE, and it enables you to gain greater control over how encryption is managed.  However, it costs extra (only Enterprise Plus plans provide client-side encryption) and requires additional configuration and management overheads since you have to store and manage keys securely.
  3. Encryption is not a substitute for the flaws we mentioned earlier with document controls. Google Workspace encryption does not protect documents in use, and therefore does not stop authorized users from sharing, printing, screenshotting, etc.

  Does DLP and Context-Aware Access prevent data loss?


Google’s DLP or Data Loss Prevention enables you to create and apply rules which control the files and content that users can share outside the organization.

Context-Aware Access enables you to create granular access control security policies for apps based on attributes such as user identity, location, device security status, and IP address.

Both of these security features are available in the Enterprise editions and help to prevent leakage of sensitive data and confidential information.

However, apart from being a large management overhead to configure and manage, restrictions or rules can often be easily bypassed by exploiting weaknesses in document controls such as those enforced by Google Docs Security.  Users can then share data with unauthorized users outsides the confines of both systems.

DLP and context-aware access can therefore only be made effective if all systems that make up the overall protection solution adequately enforce security measures to prevent copying and sharing of information.

  How secure is Google document cloud?


Another major component of Google Workspace is its cloud-based document collaboration tools.  Google Docs, Sheets, and Slides conveniently allow users to work together from any device, anywhere.  Google’s browser-based approach is key to this convenience but is also the Achilles’ heel in its security.  Though Google’s marketing material claims that it’s designed to meet stringent security standards, we did not find much evidence of that in our testing.  In fact, several key flaws in its apps would make us hesitant to recommend it:

  1. It is too easy to bypass Google Workspace security controls
    The controls to prevent editing, printing, copy-pasting, and sharing are enforced by JavaScript, which is executed partly in the user’s browser.  Bypassing them to create unprotected copies only takes a few seconds in the browser’s developer panel.  We cover this in our blog on Is Google Docs secure?
  2. Your documents are only as secure as your user accounts
    Users are bombarded with social engineering, phishing, and session hijacking attacks that may compromise their accounts.  Additionally, malicious internal users may intentionally give away their login details and share 2-step verification codes.
  3. DLP and Context Aware Access restrictions only go so far
    If there are weaknesses in other parts of the system that enable users to bypass rules then DLP and context aware access restrictions won’t be able to address that.
  4. Link-based sharing is a terrible idea
    It is commonly used in malware attacks and is why we don’t recommend link sharing in Google Drive or sharing a PDF as a link.  In addition, some admins fail to disable the “anyone with the link can view” option in documents.  This frequently leads to links accidentally or intentionally being shared with unauthorized users.
  1. Your document security is tied to Google’s server security
    Your documents are stored on a server that you do not have control over and cannot audit.  Though Google generally has a good track record, it has still had several major incidents.
  2. Google Workspace has an active vulnerability
    There is a design flaw in Workspace’s Domain-Wide Delegation that could expose customers to unauthorized access and privilege escalation.  According to Hunters’ Team Axon, this could result in the unauthorized access of emails, extraction of data from Google Drive (i.e., all your workspace files), and other illicit activities across an entire targeted Workspace domain.  Google has yet to fix this vulnerability (as of January 2024), and claims that it “does not identify an underlying security issue”.  There are proof-of-concept tools available on the open web to exploit it.
  3. Security reports and investigation tools
    While these are a great asset to have, and enable organizations to quickly find and spot security weaknesses, they cannot warn admins of issues that are part of the makeup of the system.  For example, they won’t be able to report that users have turned off JavaScript to bypass editing restrictions or made use of a vulnerability to get around DLP rules.

   Google Workspace privacy: is it all it’s cracked up to be?


Google makes a lot of noise about protecting privacy in Google Workspace – probably because it’s the biggest ad provider in the world and everybody knows user data is its lifeblood.

However, Google’s actions speak louder than its marketing material.  In 2022, it changed some of its Web & App Activity controls for Workspace users and took advantage of the change to enable tracking features that users had previously opted out of. This also made it so that admins cannot control search privacy settings – only individual users.  A clear downgrade in privacy.

Some organizations complain that Google’s privacy controls are intentionally misleading and unintuitive for confidentiality purposes.  Indeed, it has been the subject of several lawsuits for precisely this accusation.  Privacy settings are obfuscated by several categories that don’t always make logical sense, and Google often bundles settings together rather than allowing individual control.

Ultimately, you have to decide whether to trust a company that makes almost 80% of its revenue from data-driven ads with your privacy.  This might be a risk worth taking for personal accounts, but businesses sharing sensitive and confidential documents might want to think twice.

  What are the alternatives to Google Workspace security?


Google Workspace security is barely worth the (digital) paper that it’s written on.  Though its self-managed encryption keys are a good addition, poorly enforced document controls fail to prevent sharing regardless of encryption in both email attachments and regular documents.  Organizations that regularly process confidential and sensitive information will want to look elsewhere if they are serious about preventing leaks and need to share documents securely.

  Microsoft 365 vs Google Workspace security


The natural inclination is to go with Workspace’s main competitor, Microsoft 365.  Business Premium subscriptions include Azure Information Protection (a component of Azure Rights Management).  Admittedly, AIP controls aren’t quite as easy to bypass as Google Docs’, but there are still major flaws.  As covered in how secure is Azure Rights Management, users with the right to view a document can strip its copying, editing, printing, and sharing controls using a freely available program.  Seemingly, you are introducing a lot more complexity for a minor upgrade in protection.

A DRM solution may be the best choice if you’re just looking for simple but effective document security.  These can offer strong per-document encryption in specific file formats and enforce controls in dedicated viewer apps so they cannot be easily bypassed or removed.

  Locklizard PDF DRM vs Google Workspace security


Locklizard Safeguard is DRM software that protects PDFs through a combination of AES 256-bit encryption, a secure viewer application, and document controls.

Here’s how it works:

  1. You export or save as a PDF from the application of your choice and encrypt it with printing, editing, screenshot, saving, and copy-paste controls using the Safeguard Writer application.
  2. Optionally, you can add dynamic watermarks to identify whichever user opens/prints the document.
  3. You then choose which users want to have access via your admin portal.  These users are sent an email with a license file, which can be registered to one device by default.  Once they install the license, decryption keys are securely transmitted to an encrypted keystore which users cannot access or share.
  4. You provide the encrypted PDF to users via any method (Google Drive, Workspace email, message, etc.). The security of the sharing method is not as important since the individual documents are encrypted, and only authorized users can open them.
  5. Your documents receive strong protection against unauthorized sharing and modification. Sharing the PDF file with others is useless (as they will be unable to open it), keys are locked to devices, and document controls ensure users can’t make unprotected copies or edit them.

For additional security, admins can lock documents to specific locations and IP addresses (for example, the office).  They can also expire documents based on several criteria and manually revoke both documents and users at any point.  Finally, optional document tracking lets you see who viewed and printed what documents.

Follow this step-by-step process – protect a PDF from being copied – to apply security to your files.

  Final verdict – is Google Workspace secure?


Google Workspace security might be okay for day-to-day use and Google Meet calls, but we certainly wouldn’t trust it for sensitive data and confidential information.  A combination of poor document controls, cloud hosting security issues, and open unauthorized access and privilege escalation vulnerabilities leaves too many ways for information to leak.

If you need protection of confidential and sensitive documents, it’s best to use DRM software such as Locklizard Safeguard.  This offers a simple way to prevent unauthorized sharing and misuse from internal and external users.

Take a 15-day free trial of our DRM software to see how it compares to Google Workspace security for the protection and sharing of confidential documents.

   FAQs

What is Google Workspace?

Google Workspace is a suite of cloud-based productivity and collaboration tools such as Gmail, Docs, Drive, Meet, Sheets, Slides, Forms, Calendar, Sites, etc. that enable businesses and private users to create, store, manage and share files, emails and data.

How do I make my Google Workspace secure?

You can better secure Google Workspace by securing sensitive and confidential documents with a DRM solution before you upload them.  This will prevent unauthorized sharing and modification both in Google Drive and for email attachments.

How much does Google Workspace cost?

Workspace has four plans: business starter at $6/user/month, standard at $12, and business plus at $18.  The business plus plan is required for enhanced security, while the enterprise plan, which has an undisclosed price, offers the best security.

What are Google Workspace’s security features?

Workspace offers context-aware account access, DLP and IRM tools, email spam, phishing and malware defenses, AI classification for Drive files, and encryption of data in transit and at rest.

What are the Google Workspace security best practices?

Google has a long list of best practices that you can read here.  Some key points include: strong protection on admin accounts, MFA for additional login security, good password hygiene, client-side encryption, turning off sharing options, data loss protection, email encryption, etc.

What’s the difference between Google Workspace and Google Cloud?

Google Cloud is the name for the large suite of cloud products Google offers, including Google servers, cloud storage, AI tuning, load balancing, Workspace, and more.  So, Workspace falls under the Cloud offering, but Cloud is much more than just Workspace.

Is Google Login or sign in secure?

Google login or sign in is as secure as the password you use to protect the account, so a strong password is essential.  Organizations can apply password rules, add two factor authentication (2FA) and Single Sign On (SSO) to boost security and help prevent social engineering and phishing attacks.

Does Lockizard protect sheets, docs, and slides?

Locklizard can protect documents from any application that can export as PDF, including Google Slides, Docs, and Sheets.  We do not support protection in native Workspace formats  however, only as PDF.

Tags: Confidential information, Context aware access, data protection, DLP, encryption, Google Workspace, Privacy, Protection, Restrictions, Secure, Security, Sensitive data
Share this entry
  • Share on Facebook
  • Share on X
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Reddit
  • Share by Mail

Free Trial

“Fantastic product… outstanding support.”

“We would recommend Locklizard to others”

“The clear leader for PDF DRM protection”

“Our ebook sales have gone through the roof”

“Simple & secure – protects IPR from theft”

Trusted by:

Protect IPR

See why thousands of companies use Locklizard to safeguard their documents and increase revenue streams.

  • Our Customers
  • Customer Testimonials
  • Customer Case Studies
  • Locklizard vs Competitors

Latest Posts

  • Cloud Document Collaboration & Document SecurityFebruary 18, 2025 - 10:22 am
  • Stopping Screen Sharing & Recording of DocumentsJanuary 30, 2025 - 10:58 pm
  • ISO 9001 and Document SecurityJanuary 8, 2025 - 9:02 pm
  • How to expire links for file sharing and downloadsDecember 17, 2024 - 10:14 pm
  • Digital Libraries, Controlled Digital Lending & eBook DRMNovember 30, 2024 - 4:19 pm
PDF DRM Features
  • Protect PDF files
  • Stop PDF sharing
  • Stop PDF copying
  • Restrict PDF editing
  • Add PDF watermarks
  • Disable PDF printing
  • Stop screenshots
  • Expire PDF files
  • Revoke PDF files
  • Lock PDF to devices
  • Lock PDF to IP
  • Track PDF opens

How To Guides

How to stop sharing screen
How to expire download links
How to sell study notes
How to print to PDF
How to protect Autocad files
How to protect a document
How to unlock a protected PDF
How to expire Excel files
How to watermark in Excel
How to protect Excel files
Save a Google Doc as PDF
How to share a PDF online
How to insert PDF into Word
How to edit a protected PDF
How to convert ePub to PDF
How to prevent PDF download
How to share Google Docs
How to prevent PDF download
Enforce do not copy distribute
Share sell PDF in WordPress
How to remove a watermark
How to add security to PDF
Publish digital publications
How to share a PDF as a link
How to timestamp a PDF
Insert PDF into Google Doc
How to convert Word to PDF
How to convert PDF to Word
Share securely in SharePoint
How to encrypt email in Gmail
How to encrypt PDF files
How to recall unsend an email
How to watermark PowerPoint
How to lock a Word document
How to santize PDF files
How to lock a Google doc
Prevent PDF security removal
Protect Word without password
Add a dynamic watermark
Password protect Google Doc
Add a watermark in Word
Make a PDF non editable
How to create a stamped PDF
How to prevent ebook piracy
Password protect a Word doc
How to protect a PDF securely
How to revoke document access
Change PDF security settings
How to disable printing of PDFs
Sell online courses securely
How to add security to a PDF
Encrypt a PDF without Acrobat
Share documents securely
How to prevent PDF sharing
Protect confidential documents
How to publish ebooks securely
How to restrict PDF editing
How to password protect a PDF
How to protect ebooks
How to sell Reports securely
How to make a PDF read only
How to send a PDF securely
How to watermark a PDF
How to lock a PDF from editing
How to encrypt a PDF
How to make a PDF expire
How to password protect a PDF
How to protect online courses
How to email a PDF securely

Try Safeguard today

Start protecting your PDF files and documents from sharing & piracy

PRODUCTS

DRM Software
Safeguard
Safeguard Enterprise

Add-ons

  • eCommerce API
  • Command Line
  • USB Protect
  • Web Publisher
  • Own Branding
  • Custom Email

Secure PDF Viewers

  • Web Viewer
  • USB Viewer

SECURITY FEATURES

Stop copying, editing, saving
Disable PDF Prints
Block Screenshots
Disable Copy Paste
Dynamic Watermarks
Expiry & Self Destruct
Revoke Documents
Device Locking
Location Locking
Track PDF Use

PRICING

Purchase & Pricing

RESOURCES

FAQs
Locklizard Blog
Knowledgebase
Security Guides
White Papers
Viewer Demo
Videos

DOWNLOADS

Secure Viewers

  • Windows
  • Mac OS X
  • iOS
  • Android

Writers
Product Manuals
FREE Trial

DOCUMENT SECURITY

Share Documents Securely
Protect Online Courses
Stop Ebook Piracy
Document Encryption
Secure PDF Distribution
Protect Confidential Documents
Ebook DRM

Protect PDF Files

  • PDF Copy Protection
  • Lock PDF files
  • Encrypt PDF
  • Secure PDF
  • PDF DRM

INDUSTRY SECTORS

Training & Elearning
Publishing Ebooks
Publishing Standards
Online Libraries
Membership Associations
Engineering
Government
Healthcare
Mergers & Acquisitions
Secure Reports From Theft

  ABOUT US

About Us

Our DRM Technology

  • What is DRM?

Customers

  • Case Studies
  • Testimonials

Locklizard vs Competitors

  • Secure Data Rooms

Company Brochure

  CONTACT

sales@locklizard.com
support@locklizard.com

Business Hours:
US: 8AM to 17.00PM EST
UK: 9AM to 17.30PM GMT

© Copyright 2004-2025 Locklizard Limited. All rights reserved.Privacy Policy|GDPR Policy|Cookie Policy|SITE MAP

Link to: Why using JavaScript in PDF files is a security risk Link to: Why using JavaScript in PDF files is a security risk Why using JavaScript in PDF files is a security riskLink to: How to unlock a password protected PDF Link to: How to unlock a password protected PDF How to unlock a password protected PDF
Scroll to top Scroll to top Scroll to top