Workspace Permission Audit Pipeline (GAM)
Detect, document, and remediate risky Drive sharing states at scale without manual inspection. It ingests target user/email; workspace drive ACL data; shared drive membership data and produces CSV reports; cleanup actions; audit evidence.
Illustrates security automation that detects risky sharing, produces audit evidence, and supports remediation at scale.
Purpose
Detect, document, and remediate risky Drive sharing states at scale without manual inspection.
Current state
Core pipeline works but hits edge cases with shared drive membership scans and inconsistent CSV headers.
Next step
Add a CSV normalization layer that enforces a canonical header schema every run.
Interfaces
- target user/email
- workspace drive ACL data
- shared drive membership data
- CSV reports
- cleanup actions
- audit evidence
Reality to Action trace
Contributes in this stage.
Not in scope.
Contributes in this stage.
Not in scope.
Contributes in this stage.
Core workflow
- Define target user or group scope.
- Run GAM to export Drive ACLs and shared drive membership.
- Normalize CSV headers into a canonical schema.
- Identify risky shares and MyDrive matches.
- Produce audit reports and exception lists.
- Optionally run cleanup and remediation commands.
- Archive artifacts for compliance evidence.
Data integrity and contracts
Canonical schema definitions
- Canonical Drive ACL CSV schema with normalized headers.
- Shared drive membership report schema.
- Risk classification fields for visibility and external access.
Source of truth rules
- GAM exports reflect authoritative Workspace state.
- Normalization rules define canonical header names.
- Remediation decisions are based on policy and audit review.
Data quality checks
- Validate required headers exist after normalization.
- Deduplicate entries across nested reports.
- Detect empty or partial shared-drive membership exports.
- Compare totals against expected counts.
Safe handling
- Restrict audit reports to security staff.
- Redact or minimize PII in shared artifacts.
- Use admin accounts with least-privilege scopes.
Downstream integration map
- Security and compliance reporting.
- Remediation tasks for IT.
- Policy updates and training.
Operational notes
Constraints and scars
- Shared drive membership report sometimes returns empty records.
- CSV headers can vary (permission.allowFileDiscovery appears inconsistently).
Reliability posture
Repeatable scans; normalization required for stable outputs.
Observability
- command logs
- report artifacts
Security and privacy
High; ACL data is sensitive.
Dependencies
Upstream- GAM access
- Workspace directory/drive
- remediation actions
- policy updates
Ownership
OwnersJosh Barton
UsersIT admin, security/ops, Josh Barton (owner)