Home / Blog / Article
Security Audit 5 April 2026 7 min read

What does a Google Workspace security audit actually check?

If you've been offered a free security audit and you're wondering what it actually involves — or you're considering booking one and want to know what you'll get out of it — this article is a complete breakdown of every category and the rationale behind each check.

Share

A Google Workspace security audit is a structured, manual review of your Workspace configuration against a defined set of security controls. It's not a vulnerability scan, it's not a penetration test, and it's not an automated tool that generates a report in 30 seconds. It's a person who knows the Admin Console going through your configuration live, checking each control against best practice, and documenting what's in place and what isn't.

The GetBulwark audit covers 20 controls across four categories, scored out of 215 points. The average score on a first-time audit is around 95–110. Here's what each category covers and why.

Category 1 — Identity and access (6 controls)

This category is the highest risk area for most small businesses, and it's where the most common and most serious findings appear.

"Identity controls account for roughly half of a typical audit's risk score. MFA alone, properly enforced, eliminates more attack surface than all other controls combined."

Category 2 — Email security (5 controls)

Email is the primary attack vector for small businesses. This category checks whether your domain and email configuration are correctly hardened.

A note on DMARC

A DMARC record set to p=none is technically present but does nothing protective. It's a common finding — businesses set it up following guidance, leave it at p=none "temporarily", and never advance it. The audit flags this and the fix is a DNS record change that takes about five minutes.

Category 3 — Data governance (5 controls)

This category covers how data in Google Drive and Gmail is shared, who has access to it, and whether there are controls in place to prevent accidental or malicious data exposure.

Want to see a sample audit report?

The sample report shows the scoring format, the before/after structure, and what findings look like in practice — before you commit to anything.

View sample report

Category 4 — Device management (4 controls)

Most small businesses have team members accessing Workspace from personal devices — phones in particular — with no management policy applied. This category checks what visibility and control you have over those devices.

What happens after the audit

Within 48 hours of the live review session, you receive a written PDF report with your score across all 20 controls, a breakdown of every finding (pass/amber/fail), and a prioritised remediation list. The report is yours to keep regardless of what you decide to do next.

For most businesses, the top three to five findings are the same: MFA not properly enforced, DMARC at p=none, former employee accounts still active, Drive sharing set too broadly, and mobile management not enabled. Together, these represent the majority of the real-world risk — and they're all fixable in a half-day of admin work.

If you'd rather have someone fix everything for you — running through all the remediation as a structured project, then handing you back a fully hardened Workspace — that's what the Workspace Hardening Project is for. The audit is the diagnosis. The project is the treatment.

Callum Fraser, Founder of GetBulwark
Callum Fraser
Founder, GetBulwark · Google Workspace Specialist

What to do next

Free audit

Book the free 20-point security review

45 minutes, written PDF report, no obligation — yours to keep

Sample report

See what the written report looks like

The scoring format, findings layout, and remediation structure

Most Workspace accounts have never been audited.

Find out where yours stands. 45 minutes, 20 controls reviewed, written report. The report is yours to keep.

Book your free audit