Overview
When you connect Incydr to Google Drive, you grant Incydr certain permissions in your Google Drive environment. This article lists the permissions Incydr requires as well as what those permissions allow Incydr to do in your Google Drive environment.
Google Drive permissions
Permissions your Google Workspace administrator needs
For more information, see Resolve Google Drive security data errors.
Permissions the Incydr service account needs
As a service account, Incydr uses delegated domain-wide authority to collect file events from Google Drive. A file event is any activity observed for a file, such as creating, modifying, sharing, renaming, moving, or deleting a file. To see this file activity, Incydr requires access to your Google Drive environment.
In the configuration steps when you connect Incydr to Google Drive, Incydr provides the following scopes for you to enter in your Google Admin console:
https://www.googleapis.com/auth/admin.directory.domain.readonly https://www.googleapis.com/auth/admin.directory.group.readonly https://www.googleapis.com/auth/admin.directory.customer.readonly https://www.googleapis.com/auth/admin.reports.usage.readonly https://www.googleapis.com/auth/drive.readonly https://www.googleapis.com/auth/drive https://www.googleapis.com/auth/admin.directory.user.readonly https://www.googleapis.com/auth/admin.reports.audit.readonly https://www.googleapis.com/auth/cloud-identity.groups https://www.googleapis.com/auth/admin.directory.group
Configuring these scopes in the Google Admin console gives the Incydr API client delegated domain-wide authority to your Google Drive environment, and follows Google's recommendation for allowing service accounts to read content from user drives. Because of this authority, audit logs of your Google Workspace environment may show the Incydr Cloud Service account impersonating the owner of each user drive in order to read its contents.
The Incydr data connection uses the /auth/drive scope to allow security analysts to:
- Temporarily view cloud storage files in an investigation
- View a cloud storage file's sharing permissions to assess risk when a file is shared either publicly or with untrusted users
Detailed permission descriptions
See below for the specific reasons Incydr requires each https://www.googleapis.com/auth/ permission listed above:
- drive.readonly: Required to request additional file metadata, stream a file for hashing, and to determine a file’s category when analyzing file activity.
- drive: Required to grant temporary access to view a file and to view and manage sharing permissions.
- admin.directory.customer.readonly: Required to verify your Google Workspace information during authorization.
- admin.directory.domain.readonly: Required to identify the primary and all alias domains for the Google Workspace, specifically to determine which user drives to monitor based on scoping.
- admin.directory.group.readonly: Required to read group information and determine group membership. This is necessary when the Incydr Cloud Service is scoped to “groups”.
- admin.directory.group: Required for preventative controls. Incydr creates and manages a group named Incydr Prevention Controls (Managed by Code42). Users on a watchlist with Block cloud sharing enabled are added to this group.
- admin.directory.user.readonly: Required to read information about a user. Specifically, if the user has a Google Drive and the UID associated with their Google Drive.
- admin.reports.usage.readonly: Required to collect Google audit events for a specific user.
- admin.reports.audit.readonly: Required to collect specific information such as create, modify, delete, and share activity from Google audit events.
- cloud-identity.groups: Required for preventative controls to read and manage all types of Google groups and associate email aliases from IAM to users.
External resources
Google documentation
Related topics
- Connect Incydr to Google Drive
- Resolve Google Drive security data errors
- Vendor license requirements for Incydr data connections
Comments
0 comments
Please sign in to leave a comment.