Home / Blog / Article
Data Governance 17 March 2026 6 min read

Google Workspace Shared Drive permissions: what most businesses get wrong

Shared Drive access is almost always set too broadly. Everyone can see everything, or one wrong sharing setting means a client folder is accessible to a contractor who left six months ago. Here's how to audit your permissions and get them right — without taking access away from people who actually need it.

Share

Google Shared Drives are one of the most powerful tools in Google Workspace — and one of the most commonly misconfigured. The problem isn't that they're complicated. It's that permissions accumulate silently over time. Someone joins, gets access to everything. A freelancer is added for a project, never removed. An external sharing link gets created for convenience and forgotten. And nobody ever goes back to review who can see what.

This article covers how Google Shared Drive permissions actually work, the most common mistakes, and how to audit and tighten your access in a systematic way.

How Shared Drive permissions work

Shared Drives differ from My Drive in one important way: files belong to the drive, not to an individual. This means when someone leaves and their account is deleted, their files aren't lost — they stay in the Shared Drive. This is a significant advantage for business continuity.

Access to a Shared Drive is controlled by membership roles. There are five:

For most employees, Contributor is the right level. Content Manager is appropriate for team leads who need to restructure content. Manager should be limited to one or two admins only.

"Most businesses have every employee as a Manager on every Shared Drive. That means anyone can add external members, change the drive's settings, or delete folders permanently."

The three most common mistakes

Everyone is a Manager

When a Shared Drive is created, the creator is a Manager by default. Most businesses then add other team members as Managers too — it's the easiest option and avoids any complaints about not being able to do something. The result is that every employee can add external users to the drive, change sharing settings, and delete content permanently.

External sharing is on by default

Under each Shared Drive's settings, there's an option to allow external people to be added as members. In many configurations, this is on. It means any team member with Contributor access or above can add a person outside your organisation to the drive — with no admin approval or audit trail beyond the activity log.

How to check and fix this

Right-click on a Shared Drive → Manage membersShared Drive settings. Review the sharing permissions. For most businesses: external members should require admin approval. "Anyone with a link can access content in this drive" should be off unless you have a specific reason for it.

Former team members and contractors still have access

This is the most common data governance failure. A contractor finishes a project. Their Workspace account might be deleted — but if they were added as an external member to a Shared Drive, that access persists independently of their Workspace account. Their personal Gmail can still access the files.

How to audit external members

Go to each Shared Drive → Manage members. Look for anyone listed with an external email address (not your domain). For each one, ask: do they still need this access? If in doubt, remove. They can always be re-added if needed — but you can't un-read something they've already seen.

Not sure how your Shared Drives are configured?

The free GetBulwark audit covers data sharing settings, Drive permissions, and external access as part of the 20-point review. Written report, no obligation.

Book the free audit

The right structure for most small businesses

A sensible Shared Drive structure for a 5–30 person business typically has three to five drives, each with clearly defined membership:

The principle throughout: people get access to what they need for their role, and nothing more. Review membership quarterly, and make leavers a mandatory trigger for an access review.

One Admin Console setting that controls everything

In the Admin Console under Apps → Google Workspace → Drive and Docs → Sharing settings, you can control whether users can share files outside your organisation, and whether "anyone with the link" sharing is permitted. These settings apply organisation-wide and set the ceiling for what individual Shared Drive settings can allow.

For most small businesses handling client data, the right configuration is: external sharing restricted to specific approved domains, with link sharing limited to people within your organisation. Individual exceptions can be made for specific drives where external collaboration is genuinely needed.

If you're not sure what your current org-wide settings are, this is one of the things checked in a full security audit. It's consistently one of the top findings — and one of the easiest to fix.

Callum Fraser, Founder of GetBulwark
Callum Fraser
Founder, GetBulwark · Google Workspace Specialist

Read next

Access Control

What happens to your data when an employee leaves

The offboarding steps most businesses skip

Admin & Setup

8 Admin Console settings most businesses get wrong

The full checklist of security settings to review

Most Workspace accounts have never been audited.

Find out where yours stands. 45 minutes, 20 controls reviewed, written report. The report is yours to keep.

Book your free audit