Go back

How to Control External Access to Offboarded Users’ Shared Files

Employee offboarding is a task that HR, IT, and Security teams handle today more often than ever before. As worker mobility continues to increase–both in the form of voluntary job changes and what NIST gently terms “unfriendly” terminations–the ability to seamlessly and securely offboard employees is critical, and failing to do so has serious security implications.

Product
June 24, 2024
5m read
5m read
5m listen
5m watch
5m watch
circles inside a blue-green background
speakers
speakers
speakers
authors
Nate Abbott
participants
No items found.
share

Employee offboarding is a task that HR, IT, and Security teams handle today more often than ever before. As worker mobility continues to increase–both in the form of voluntary job changes and what NIST gently terms “unfriendly” terminations–the ability to seamlessly and securely offboard employees is critical, and failing to do so has serious security implications.

As the use of file sharing platforms like Google Drive has grown and the volume of sensitive data stored within has increased along with it, businesses need to consider a range of compliance and policy-related issues when files are shared outside of the organization–and these issues often become even more pressing when an employees is offboarding and their shared files are transferred.

Don’t Let Shared Files Get Lost in the Shuffle

There are a range of best practices as part of a securing cloud data during the offboarding process, from monitoring file downloading and data exfiltration to preventing external email forwarding. But one task that’s often underestimated in its complexity is understanding and securing the access to departing users’ shared files.

Even relatively short-tenured employees can build up substantial libraries of shared documents shared with partners, customers, and other external users. The most common procedure for handling an offboarded user’s shared files is to simply transfer ownership of those files to their manager as-is. That manager is then responsible for ensuring the security of those files–most critically any external permissions.

Even if a manager is only inheriting a handful of shared files, this can be a tricky task–and if the departing user shared large volumes of files the lift gets even heavier. Does the manager know what types of files are moving under their control, and their sensitivity? How familiar are they with company policy or compliance requirements on who should have access externally? Are there any files the departing user shared recently that might be particularly risky? These considerations are key to understanding what is and isn’t acceptable sharing–but none of them are core functions of most managers.

Adding to the risk are the cases where a manual review workflow can inadvertently leave unnoticed security gaps. For example, even the most meticulous manager with all the free time in the world likely won’t catch a departed user’s deleted externally-shared files. Deleted files often aren’t migrated upon offboarding, but their sharing permissions can linger, leaving orphaned files unseen by the organization but still visible externally. This leaves you with files within your footprint with external access but no internal stewardship–a recipe for unwanted and potentially unseen visitors into your environment.

With relatively limited visibility into Drive and so many potentially-dangerous edge cases to consider, even the most meticulous manager with all the time in the world on their hands will struggle to ensure the file transfer process is followed exactly. This is where Material can help.

Material Security Simplifies the Offboarding Process

Material’s Data Protection for Google Drive makes the offboarding process simpler and more secure by automatically revoking external sharing permissions of files through our integration with Okta Workflows, Tines, and other vendors.

Upon suspension of the user in Okta - the initiation of offboarding - Material’s automations kick into gear and begin the process of cleaning up the user’s shared files:

  • The system gathers information about that user and constructs a query to find all the externally-shared files they own–by default, Material looks for any shares with specific external email addresses, as well as “anyone with link” permissions.
  • The Revoke Google Drive File Access API is called for each externally-shared file
  • This process loops through all the externally-shared files and revokes those permissions. Whether a few dozen or a few thousand shared files, those permissions will be revoked within minutes of the workflow being triggered.

The end result is that any external access to an offboarded user’s files are automatically revoked, without any manual intervention from the manager, security, or HR teams beyond suspending the user in Okta. The files may then be transferred to the departing user’s manager or follow whatever process your offboarding procedures require, safe in the knowledge that no one outside the organization can access them any longer.

Control Risky Sharing with Data Protection for Google Drive

Understanding what types of files your employees are sharing, the sensitive data they contain, and who those files are shared with–is critical for security and regulatory and policy compliance. And when an employee leaves, sensitive data in their shared files can become an overlooked risk in the offboarding process–but remediating that risk doesn’t have to be difficult.

Material Security’s Data Protection for Google Drive seamlessly finds and fixes risky sharing of your users’ files from their first day to their last.

Want to learn more? Schedule a personal demo with our team today.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

New in Material: Detections, Remediations, Reports & More

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.

Patrick Duffy
4
m read
Read post
Podcast

New in Material: Detections, Remediations, Reports & More

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.

4
m listen
Listen to episode
Video

New in Material: Detections, Remediations, Reports & More

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.

4
m watch
Watch video
Downloads

New in Material: Detections, Remediations, Reports & More

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.

4
m listen
Watch video
Webinar

New in Material: Detections, Remediations, Reports & More

As the days grow shorter and the weather gets colder, Material’s ready with a steady stream of hot platform updates to keep you warm.

4
m listen
Listen episode
blog post

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

Josh Donelson
5
m read
Read post
Podcast

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

5
m listen
Listen to episode
Video

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

5
m watch
Watch video
Downloads

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

5
m listen
Watch video
Webinar

Identifying Risk in Google Workspace with Material & SADA, An Insight Company

Partnering with SADA, An Insight company, companies big and small can get deep insights into the types of risk that live inside of Google Workspace, powered by a data-driven analysis of user behaviors, sensitive data in email and files, and posture settings by the Material Security platform.

5
m listen
Listen episode
blog post

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Material Team
10
m read
Read post
Podcast

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Rajan Kapoor
10
m listen
Listen to episode
Video

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Rajan Kapoor
10
m watch
Watch video
Downloads

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Rajan Kapoor
10
m listen
Watch video
Webinar

Risky Biz Podcast Interview with Rajan & Dan

Dan Ayala, Chief Security & Trust Officer from Dotmatics joins Rajan Kapoor, Field CISO from Material on Risky Business to discuss how to wrangle securing data that ends up in corporate cloud email and file stores.

Rajan Kapoor
10
m listen
Listen episode
blog post

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Material Team
35
m read
Read post
Podcast

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Abhishek Agrawal
35
m listen
Listen to episode
Video

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Abhishek Agrawal
35
m watch
Watch video
Downloads

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Abhishek Agrawal
35
m listen
Watch video
Webinar

Material Product Demo: Securing Google Workspace & M365

Abhishek Agrawal gives an in-depth product demo walkthrough on Risky Business

Abhishek Agrawal
35
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.