Assess the Risk of Browser Extensions Installed in Your Browser. Add to Chrome.×
Home » Spin.AI Blog » Cybersecurity » Google Workspace » How to Find & Disable Risky Apps in Your Google Workspace
February 16, 2021 | Updated on: April 23, 2024 | Reading time 7 minutes

How to Find & Disable Risky Apps in Your Google Workspace

Author:
Avatar photo

Product Manager

Do you know how many apps and extensions actually have access to your Google Workspace data? On average, an SMB uses about 1,000 applications. And only 10% of them are known to the IT department. The rest remain in shadow, creating one of the greatest gaps in your cybersecurity.

Unlike Office 365, Google Workspace (formerly G Suite) has very limited functionality to monitor or control unauthorized apps and extensions. That’s why SecOps teams spend tremendous amounts of time and money mitigating the associated risks.

That’s when our G Suite CASB solution SpinOne comes in handy. It enables you to:

  • identify all the apps and extensions with access to your Google Workspace
  • automate their risk assessment
  • grant or revoke app access to your data
  • hit your compliance goals
  • protect the cloud from malware attacks
  • increase the efficiency of your SecOps while decreasing their costs.

Learn what problems CASBs solve in detail or find out more about how you can secure your Google Workspace with SpinOne below.

How SpinOne Finds Apps and Defines Which Ones Are Risky

Google Workspace (formerly G Suite) logs every event that takes place within the cloud. This includes granting access to an application or extension. G Suite Admin can view these events in the Audit Log Section of Admin Console. 

However, identifying a cyber incident in the daily flow of events, even in a small organization, is problematic. You need a tool that will cherry-pick the app-related logs and turn them into comprehendible data.

That’s exactly what SpinOne does. It accesses the Google Workspace logs via API to compile and analyze them. Then, it represents the results of the analysis in the form of a report. Since our tool works 24/7 all year round, SecOps always get their hands on the fresh data. 

The AI at the core of SpinOne uses:

  • information from multiple sources, e.g., the database of 100,000+ apps;
  • the complex score calculation algorithm;
  • the risk criteria.

Here are the app risk assessment criteria that SpinOne applies:

  1. Business operation risks:
    • App rating;
    • Category (business, entertainment, productivity);
    • Update frequencies;
    • Developer reputation;
    • The number of users.
  2. Security Risks:
    • Scope of permissions;
    • SSL certificate status;
    • Domain history;
    • Known vulnerabilities;
    • Data Transmission Encryption 
  3. Compliance Risks:
    • Privacy policy 
    • Compliance and audit reports 
    • Developer Jurisdiction

Each criterion has a certain number of scores assigned to it; the higher – the more secure. The maximum score an app or extension can get is 100. 

Apart from scores, SpinOne provides extensive risk assessment reports on each application. Google Workspace Admins can see the assessment criteria there to make a final decision on revoking or keeping the access.

Let’s take a closer look at SpinOne risk assessment reports in our next section.

How To Monitor And Control Risky Apps And Extensions In Your Google Workspace With SpinOne

You can check which apps have access to your G Suite in 2 sections of the SpinOne Admin Panel: Risk Assessment and User Audit. Each of them contains extensive app reports and black/whitelisting functionality.

Risk Assessment

This section gives you a birds-eye view of all the apps and extensions that have access to your Google Workspace via OAuth:

How to Find & Disable Risky Apps in Your Google Workspace

You can see here the list of apps with their scores, type, block state, number of users, and date of access. In addition to that, SpinOne provides filters for easier management and enables you to download the list.

By clicking on an App, you can get an in-depth report that begins with the general overview:

If you scroll down, you can see more details on each category (Business operation, Security, and Compliance). 

Check out the application’s scope of permissions in the screenshot below. It is enormous. Not only does it have access to your data, but it also can alter it. SpinOne considers such scope risky for the cybersecurity of a company. That’s why the app will get a low score in the respective category.

Let’s see other sections of the report. As you can see, there’s no information about the SSL certificate or domain history. Meanwhile, the app’s category is business, which means it is most likely to be used in a daily workflow.

Finally, there are the compliance risks as the app never provided a privacy policy or compliance audit reports.

If you consider this app dangerous, you can easily revoke its access to your Google Workspace right on the spot:

Nick Harrahill - Director of Customer Support Spin.AI

However, before revoking access, we suggest you look at who is using it in the User section of the report:

Sometimes, you will need to restrict access for some users. It can be easily achieved by making a block or allow lists:

Just tick some users or organization units in the Blocklist section, and they’ll permanently lose their access to the application.

Users Audit 

This section enables you to see what apps and extensions a certain User of your Google Workspace can access via OAuth. 

All you need to do is click on the user name. You’ll be redirected to their page. Click on the Risk Assessment tab and check out all the apps of this user:

You can click on the app and get a detailed report similar to the one we described above.

Was this helpful?

Thanks for your feedback!
Avatar photo

Written by

Product Manager at Spin.AI

Will Tran is the Product Manager at Spin.AI, where he guides the product's strategic direction, oversees feature development and ensures that the solution solves his clients’ cybersecurity needs.

Will is a security professional who started his career at Lockheed Martin where he worked on National Security Space programs in business development and product management.

Will holds a BA in Economics and Mathematics from UCSB and an MBA with a specialization in Technology Management and Marketing from UCLA Anderson School of Management.

At Lockheed Martin, Will developed the multi-year strategy campaign and supported the product development of a national security satellite program for the United States Air Force, which resulted in a multi-billion dollar contract.

During business school, Will consulted 2 non-profit organizations as part of a series of national consulting case competitions. He set strategic priorities, optimized business operations, and developed a process to qualify new revenue streams for his non-profit clients. These initiatives resulted in 15-20% increase in annual surplus.

In his spare time, Will can be found at local coffee shops around Los Angeles, traveling to different countries, or hanging out with his cat.

How Can You Maximize SaaS Security Benefits?

Let's get started with a live demo

Latest blog posts

Brewing Trouble: How a Starbucks Ransomware Attack Poured Cold Wate...

Cybercriminals often carry out attacks around holidays as this helps to ensure the most amount...

Avatar photo

Vice President of Product

Read more

Data Loss Prevention Techniques for 2025 and Beyond

It’s painstakingly clear that data loss is a major challenge facing businesses today. Our experts...

Avatar photo

Vice President of Product

Read more

What is SaaS Security? Challenges & Best Practices

Businesses increasingly rely on Software as a Service (SaaS) for increased efficiency, collaborativeness, and scalability....

Avatar photo

CEO and Founder

Read more