Skip to content

Commit 8189151

Browse files
committed
add
1 parent 58fa8e4 commit 8189151

3 files changed

Lines changed: 20 additions & 0 deletions

File tree

src/images/workspace_oauth.png

277 KB
Loading

src/pentesting-cloud/workspace-security/README.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,18 @@ If you have compromised some credentials or the session of the user check these
5050
gws-persistence.md
5151
{{#endref}}
5252

53+
## Context-Aware Access
54+
55+
- **Context-Aware Access**: This is a security feature that allows organizations to enforce access policies based on the context of the user, device, and location. It enables granular control over who can access specific application within Google Workspace, enhancing security by ensuring that only trusted users and devices can access sensitive data.
56+
57+
It requires specific **licenses to be able to use it.**
58+
59+
This service basically allows you to create **Context-Aware access levels** which allow to configure different conditions that must be met. Access-level conditions contain attributes you can select, such as device policy, IP subnet, or another access level.
60+
61+
Then, it's possible to **assign these access levels to apps**. It's possible to assign more than one access level to an app, and the user must meet all the conditions of all the access levels assigned to that app.
62+
63+
64+
5365
## Account Compromised Recovery
5466

5567
- Log out of all sessions

src/pentesting-cloud/workspace-security/gws-google-platforms-phishing/README.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -157,6 +157,14 @@ It's possible to do something using gcloud instead of the web console, check:
157157
../../gcp-security/gcp-privilege-escalation/gcp-clientauthconfig-privesc.md
158158
{{#endref}}
159159

160+
#### OAuth app protections
161+
162+
By default it's configured that any user inside a Workspace organization **can accecpt any OAuth app with any permissions**, but it's possible to restrict those to only apps that only request basic info needed for Sign in with Google or to not allow any third-party apps.
163+
164+
Moreover, even not alowing to trust external third-party apps it's possible to allow to **trust any internal apps** (apps created inside the organization). This trust is configured by **default**.
165+
166+
<figure><img src="../../../images/workspace_oauth.png" alt=""><figcaption></figcaption></figure>
167+
160168
## References
161169

162170
- [https://www.youtube-nocookie.com/embed/6AsVUS79gLw](https://www.youtube-nocookie.com/embed/6AsVUS79gLw) - Matthew Bryant - Hacking G Suite: The Power of Dark Apps Script Magic

0 commit comments

Comments
 (0)