Google Cloud Workspace
About the Device
Google Workspace is a productivity solution designed to help you safely connect, create and collaborate with tools like Gmail, Docs, Meet and more. You can Connect with teammates wherever they are using Gmail, Voice, Calender, Groups, Chat, Meet etc.
Device Information
Entity | Particulars |
---|---|
Vendor Name | |
Product Name | Cloud Workspace |
Type of Device | Cloud |
Collection Method
Direct Ingestion:
Log Type | Ingestion label | Preferred Logging Protocol - Format | Log collection method | Data Source |
---|---|---|---|---|
Google Workspace Activity logs | WORKSPACE_ACTIVITY | Cloud Log Stream - JSON | C2C - Push | https://cloud.google.com/chronicle/docs/ingestion/cloud/workspace-to-chronicle |
Only Google Workspace Activity logs can be ingested through Google Workspace to Google Security Operations Direct Ingestion Method based on License Requirements as mentioned in Pre-requisites under Device configuration Steps.
Direct ingestion collects a wider range of workspace data compared to other feed methods. For example, other feed methods cannot ingest gmail application logs.
Feed Ingestion:
Log Type | Ingestion label | Preferred Logging Protocol - Format | Log collection method | Data Source |
---|---|---|---|---|
Workspace Activities Workspace Alerts Workspace Users Workspace Groups Workspace Privileges Workspace Mobile Devices Workspace ChromeOS Devices | WORKSPACE_ACTIVITY WORKSPACE_ALERTS WORKSPACE_USERS WORKSPACE_GROUPS WORKSPACE_PRIVILEGES WORKSPACE_MOBILE WORKSPACE_CHROMEOS | API - JSON | C2C - API | https://cloud.google.com/chronicle/docs/ingestion/default-parsers/collect-workspace-logs |
Device Configuration
Google Provides two types of Log Ingestion Methods to integrate Google Workspace to Google Security Operations.
Method 1: Direct Ingestion
To send google workspace data to Google Security Operations
Follow below steps to use direct ingestion to ingest Google Workspace Activity logs (WORKSPACE_ACTIVITIES) into your Google Security Operations instance for the supported Google application types.
Prerequisites:
You must have Google Workspace Enterprise Standard or Enterprise Plus edition to access this integration. If you don't, you can refer to Feed Ingestion Method (Method 2) to ingest Google Workspace Activity logs.
You must have Google Workspace Customer ID. It should be procured from the Google Workspace Admin console (Account > Account Settings > Profile).
Step1: Obtain your Google Security Operations instance ID and token
share the Google Workspace Customer ID with the Adaptive MxDR Onboarding Team.
Step 2: Link Google Workspace to your Google Security Operations instance
Login to the Google Workspace Admin console.
Click Reporting > Data Integrations.
Select Google Security Operations export, and then click Connect to Google Security Operations. This opens the Connect to Google Security Operations page.
Paste the token copied from your Google Security Operations account into the indicated field. Click Connect.
Export audit data to Google Security Operations should now display On. Your Google Workspace account is now linked to your Google Security Operations instance and will begin sending your Google Workspace data.
Click Go to Google Security Operations to open your Google Security Operations instance and begin to monitor your Google Workspace data from Google Security Operations.
Method 2: Feed Ingestion via Third Party API
Follow below steps to collect Google Workspace logs by setting up a Google Security Operations feed using Third Party API.
Prerequisites:
You must use Google Workspace Business Standard or Business Plus edition as these editions are supported via Google Parsers.
Ensure that you have a Google Workspace Administrator account.
Ensure that you have a Super Admin role for GCP account.
You must have Customer ID. It should be procured from the Google Admin console (Account > Account Settings > Profile).
Step 1: Enable Admin SDK API and Google Workspace Alert center API
Login to your Google Cloud Platform Console
Navigate to APIs and services and select a project.
Click Library
Search for Admin SDK API and then click ENABLE
Repeat for Google Workspace Alert Center API
Step 2: Create a service account which is used to authenticate with Workspace APIs.
Required roles: To create service accounts, you should have the Create Service Accounts (roles/iam.serviceAccountCreator) IAM role on the project.
In your GCP Console navigate to IAM & Admin > Service Accounts
Click Create Service Account
Provide the service account a name and click DONE
The service account's name appears in the email address that is provisioned during creation, in the format SERVICE_ACCOUNT_NAME@PROJECT_ID.iam.gserviceaccount.com.
Click the newly created service account
Copy and save the Unique ID displayed on the screen.
Select KEYS
Click ADD Key > Create new key
Select JSON and click Create
Save this JSON key
Step 3: Create a Domain-wide delegation API control for the service account and grant the required scopes to access the data.
Login to the Google Admin console (admin.google.com)
Select Security > Access and Data Controls > API Controls > Domain-wide delegation and then click Manage Domain-Wide Delegation
Click ADD NEW
Enter the Client ID (unique ID obtained in Step 2)
For OAuth scopes, enter the list of scopes mentioned below:
https://www.googleapis.com/auth/apps.alerts, https://www.googleapis.com/auth/admin.directory.user.readonly, https://www.googleapis.com/auth/admin.directory.group.readonly, https://www.googleapis.com/auth/admin.reports.audit.readonly, https://www.googleapis.com/auth/admin.directory.device.mobile.readonly, https://www.googleapis.com/auth/admin.directory.device.chromeos.readonly, https://www.googleapis.com/auth/admin.directory.rolemanagement.readonly
Click Authorize
Step 4: Create a user who is used for impersonation and grant the user the required privileges.
Login to Google Admin console.
Select Directory > Users and then click Add new user.
Enter the user details.
Name the user and create a primary email address. Click Create > Done
Click on the newly created user
Click Admin roles and privileges > Create Custom Role > Create new role and give this role a name
Grant the following privileges to the role:
Privileges > Reports
Privileges > Services > Alert Center > Full Access > View access
Privileges > Services > Mobile Device Management > Manage Devices and Settings
Privileges > Services > Chrome Management > Settings
Admin API > Privileges > Users > Read
Admin API > Privileges > Groups > Read
Click Continue and then Create role.
Click Assign users, select the user to assign the role.
Click Assign role.
Ensure that the created user has the Super Admin role
Step 5: Share the following items with Adaptive MxDR Onboarding team to proceed with configuration of the Google Workspace integration:
JSON token (Step 2)
User email (Step 4)
Customer ID (prerequisites)
Integration Parameters
Integration Parameters required for Direct Ingestion Method
Property | Default Value | Description |
---|---|---|
Google Workspace Customer ID | N/A | Used to generate Token and Instance ID. |
Integration Parameters required for Feed Configuration
Property | Default Value | Description |
---|---|---|
OAuth JWT endpoint | N/A | Specify the token_uri value from the service account JSON key. |
JWT claims issuer | N/A | Specify the client_email value from the service account JSON key |
JWT claims subject | N/A | Primary Email address of the user that was created in the Google Workspace Admin console |
JWT claims audience | N/A | Specify the token_uri value from the service account JSON key. |
RSA private key | N/A | Key in PEM format. The PEM key is available in the service account key file. When you enter the private key, include the BEGIN PRIVATE KEY header and the END PRIVATE KEY footer and replace all instances of the \n token with an actual Enter keystroke in the text box. |
Customer ID | N/A | Except for the Alerts log type, All log types requires the customer ID field with a leading 'C' character. If the customer ID field does not contain a leading 'C' character, then prepend the value with a 'C' character. |
Applications | N/A | Only Applicable for Feed Configuration of Workspace Activities. |
About Accenture:
Accenture is a leading global professional services company that helps the world’s leading businesses, governments and other organizations build their digital core, optimize their operations, accelerate revenue growth and enhance citizen services—creating tangible value at speed and scale. We are a talent and innovation led company with 738,000 people serving clients in more than 120 countries. Technology is at the core of change today, and we are one of the world’s leaders in helping drive that change, with strong ecosystem relationships. We combine our strength in technology with unmatched industry experience, functional expertise and global delivery capability. We are uniquely able to deliver tangible outcomes because of our broad range of services, solutions and assets across Strategy & Consulting, Technology, Operations, Industry X and Accenture Song. These capabilities, together with our culture of shared success and commitment to creating 360° value, enable us to help our clients succeed and build trusted, lasting relationships. We measure our success by the 360° value we create for our clients, each other, our shareholders, partners and communities. Visit us at www.accenture.com.
About Accenture Security
Accenture Security is a leading provider of end-to-end cybersecurity services, including advanced cyber defense, applied cybersecurity solutions and managed security operations. We bring security innovation, coupled with global scale and a worldwide delivery capability through our network of Advanced Technology and Intelligent Operations centers. Helped by our team of highly skilled professionals, we enable clients to innovate safely, build cyber resilience and grow with confidence. Follow us @AccentureSecure on Twitter or visit us at www.accenture.com/security.
Legal notice: Accenture, the Accenture logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Accenture and its subsidiaries in the United States and in foreign countries. All trademarks are properties of their respective owners. This document is intended for general informational purposes only and does not take into account the reader’s specific circumstances, and may not reflect the most current developments. Accenture disclaims, to the fullest extent permitted by applicable law, any and all liability for the accuracy and completeness of the information in this presentation and for any acts or omissions made based on such information. Accenture does not provide legal, regulatory, audit, or tax advice. Readers are responsible for obtaining such advice from their own legal counsel or other licensed professionals.