Go back

Email Is an Identity Layer: Why Gmail Compromise Rarely Stays “Just Email”

Gmail functions as a critical identity layer where a mailbox compromise means an attacker can become the user, enabling persistence and movement across systems via mechanisms like OAuth grants, which often survive simple password resets.

Email Security
January 14, 2026
author
Material Security Team
share

Most security teams treat email as a communications channel and secure it like one: stop phishing, reduce spam, block malware.

That’s necessary—but incomplete.

In modern companies, Gmail functions as an identity layer. It’s where password resets land, where vendor relationships live, where invoices get approved, where admin alerts arrive, and where “Sign in with Google” connects employees to dozens (or hundreds) of third-party apps.

So when an attacker gets into a mailbox, the risk isn’t “they can read some messages.” The risk is they can become the user—and use email as a launchpad to move across systems, approve access, and persist.

If you’re building a Google Workspace security program, this is the spoke that connects two big realities:

  • Account takeover is still the fastest path to business impact.

  • OAuth sprawl is the quiet path to durable access after takeover.

Why Gmail acts like identity infrastructure

Gmail sits at the intersection of three things attackers love:

1) Authentication recovery

Even if you run SSO and strong MFA, email remains a recovery channel. Many apps still allow password resets via email. Some security workflows (alerts, approvals, device logins, “new sign-in” warnings) also land in email.

Translation: If attackers control the inbox, they can often regain access elsewhere—even if you fix one compromised password.

2) Authorization and approvals

Email is where humans “authorize” things informally:

  • “Yes, approve this wire.”

  • “Sure, add them as a vendor.”

  • “Please share that folder.”

  • “Can you re-send the contract?”

Even without technical exploitation, an attacker who can convincingly reply as the user can trigger high-impact actions.

3) App access via OAuth (“Sign in with Google”)

OAuth is a convenience feature that becomes a security story at scale. Users authorize third-party apps to access:

  • Gmail scopes (read, send, modify)

  • Drive files and sharing

  • Calendar, contacts, and more

Translation: Email compromise can turn into long-lived, API-level access—even after you reset passwords—if OAuth grants remain.

The “two-phase” reality of modern mailbox compromise

Think of Gmail compromise like a two-step play:

Phase 1: Get in (account takeover)

Attackers commonly enter via targeted phishing, credential reuse, or device compromise. The goal is access—any access.

Phase 2: Stay in (persistence)

Once inside, attackers often try to make access durable and stealthy. Common persistence patterns include:

  • OAuth app grants (the “silent” way to keep access)

  • Mail forwarding rules or filters that siphon data

  • Delegated mailbox access or hidden sharing pathways

  • Credential/refresh token theft on endpoints

This is where teams get surprised: they “kick the attacker out,” but the attacker returns—because the mechanism wasn’t a password anymore.

Why OAuth risk is different from “normal” app risk

OAuth is how modern SaaS works. It isn’t inherently bad–but if not managed properly, it can pose problems. The risk comes from three strategic dynamics:

1) Authorization is easier than admins realize

Users can grant powerful scopes with a couple clicks. Many organizations don’t discover risky grants until after something goes wrong.

2) OAuth access can outlive the login session

Resetting a password doesn’t automatically revoke every OAuth token or remove every third-party integration. If you haven’t operationalized app governance and token hygiene, persistence is likely.

3) Scopes and vendors are hard to manage at scale

A small company might have 30 connected apps. A growing company can have 300+. Reviewing grants manually becomes unrealistic, so organizations default to “allow,” which slowly builds an invisible attack surface.

Strategic indicators that you have an “identity-layer” problem (not an email problem)

If any of these feel familiar, your Gmail risk is bigger than filtering:

  • You have high-value inboxes (finance, execs, HR) with no differentiated controls.

  • Users can authorize third-party apps without a clear policy or review path.

  • You don’t have a fast way to answer: “What is this account access and what did it grant?”

  • Incident response is mostly “reset password + scan inbox,” without a standard step for revoking tokens / reviewing OAuth / rules / delegation.

  • You’re relying on users to notice and report anomalies rather than having a repeatable process.

A strategy that actually reduces Gmail identity-layer risk

This isn’t a “turn on 47 settings” problem. It’s a program design problem. The goal: reduce the chance of takeover, reduce the blast radius if it happens, and make persistence hard.

1) Treat high-risk mailboxes like tier-0 identities

Execs, finance, IT admins, HR, and anyone with privileged access should have stronger protections and tighter monitoring. This is where attacks concentrate because payoff is high.

Outcome you want: Compromise of a random user doesn’t equal compromise of the company.

2) Shift from “MFA on” to “phishing-resistant by default”

The strategic win isn’t “MFA exists.” It’s “phishing doesn’t work.” Push the org toward phishing-resistant authentication (security keys/passkeys) wherever feasible.

Outcome you want: A stolen password doesn’t matter, and most phishing attempts fail.

3) Govern OAuth like you govern permissions

Define what “good” looks like for app access:

  • Which apps are allowed by default?

  • What scopes are considered high risk?

  • What requires review?

  • Who owns approvals and periodic cleanup?

Outcome you want: App access becomes intentional, not accidental.

4) Build a “persistence hunt” muscle into incident response

A mailbox compromise playbook should always include a check for persistence mechanisms (especially OAuth, forwarding rules, delegation). Make this a habit, not a heroic effort.

Outcome you want: Account recovery actually sticks.

5) Measure what matters: time-to-containment, not number of settings

The best Gmail security strategy is the one that improves:

  • How quickly you can confirm impact

  • How quickly you can remove attacker access everywhere it exists

  • How often you prevent repeat compromise

Outcome you want: Less drama, fewer repeat incidents.

Want to know whether your Gmail defenses are really configured to stop today’s threats? Take the Google Workspace Scorecard for a fast, practical readout and next-step recommendations.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

Rajan Kapoor, VP, Security
5
m read
Read post
Podcast

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m listen
Listen to episode
Video

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m watch
Watch video
Downloads

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m listen
Watch video
Webinar

Taming OAuth Sprawl: What the Vercel Breach Should Teach Every Security Team

OAuth sprawl is enterprise security's most overlooked attack surface. Learn what the Vercel breach reveals — and what your team should do about it.

5
m listen
Listen episode
blog post

Try Material Free for 7 Days

See and secure the risks in your cloud workspace today.

Material Team
3
m read
Read post
Podcast

Try Material Free for 7 Days

See and secure the risks in your cloud workspace today.

3
m listen
Listen to episode
Video

Try Material Free for 7 Days

See and secure the risks in your cloud workspace today.

3
m watch
Watch video
Downloads

Try Material Free for 7 Days

See and secure the risks in your cloud workspace today.

3
m listen
Watch video
Webinar

Try Material Free for 7 Days

See and secure the risks in your cloud workspace today.

3
m listen
Listen episode
blog post

Healthcare's Email Breach Problem Is a Supply Chain Problem

The second in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

Material Team
10
m read
Read post
Podcast

Healthcare's Email Breach Problem Is a Supply Chain Problem

The second in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

10
m listen
Listen to episode
Video

Healthcare's Email Breach Problem Is a Supply Chain Problem

The second in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

10
m watch
Watch video
Downloads

Healthcare's Email Breach Problem Is a Supply Chain Problem

The second in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

10
m listen
Watch video
Webinar

Healthcare's Email Breach Problem Is a Supply Chain Problem

The second in a series analyzing HIPAA breach data from the HHS Office for Civil Rights.

10
m listen
Listen episode
blog post

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

Material Team
10
m read
Read post
Podcast

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

10
m listen
Listen to episode
Video

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

10
m watch
Watch video
Downloads

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

10
m listen
Watch video
Webinar

We Analyzed 702 HIPAA Breaches. The Problem Isn't the Phish — It's What's Already in the Inbox.

An analysis of 702 HIPAA breaches reported to HHS — and the control gap most organizations are missing.

10
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New