How are you handling accidental Google Drive exposure in your org?

Posted by WatchNiBe@reddit | sysadmin | View on Reddit | 12 comments

We had a close call recently — a Google Drive folder containing sensitive IP was set to "Anyone with the link" without anyone realizing it. The problem is that Google gives you poor indication of a folder's sharing level.

For a small team it's manageable, but at scale it's a ticking time bomb. Once someone shares a folder externally or sets it to public, there's no persistent reminder that it's exposed.

Curious how other admins are handling this:

After our incident I ended up building a small Chrome extension for myself that just injects a color-coded banner into the Drive UI — green for private, red for public, etc. — so I can see at a glance without clicking into settings. It only uses drive.metadata.readonly and runs entirely locally. Happy to share if anyone's interested, but mostly curious what the proper enterprise-grade approach looks like for orgs managing this at scale.