Google Workspace ships with strong baseline security capabilities. Most Indian enterprises use about 30% of them.
The gap is not a product limitation — it is a configuration gap. Google’s security model is layered: each layer you configure adds meaningfully to your protection, and each layer you leave at default or unconfigured is an attack surface or compliance gap waiting to materialise. Email authentication that blocks spoofing. Endpoint management that ensures only managed, compliant devices access corporate data. Context-Aware Access that enforces zero-trust principles without requiring a separate VPN. Data Loss Prevention that detects and blocks personal data leaving the organisation. These features are included in most Workspace plans. They are not enabled by default.
This guide covers each security domain in depth — what it does, why it matters in the Indian enterprise context, and the exact configuration steps to implement it. It is written for IT admins and cloud leads who want to move from a baseline-configured Workspace environment to a genuinely hardened one.
Prerequisites: Super Admin access to the Google Workspace Admin Console (admin.google.com) and DNS management access for your domain. Several configurations in this guide require Business Plus or Enterprise licences — the plan requirement is noted in each section.
1. Email Authentication: SPF, DKIM, and DMARC
Email authentication is the foundation of your email security posture. Without it, anyone can send email that appears to come from your domain — impersonating your CEO, your HR team, or your finance department. Phishing and business email compromise (BEC) attacks that exploit misconfigured or absent email authentication account for the majority of financial fraud losses in Indian enterprises.
The three standards work together: SPF authorises which mail servers can send email on behalf of your domain, DKIM adds a cryptographic signature that proves the message was not tampered with in transit, and DMARC tells receiving mail servers what to do when SPF or DKIM checks fail — and sends you reports on authentication failures across your domain.
SPF (Sender Policy Framework)
SPF is a DNS TXT record that lists the IP addresses and mail services authorised to send email from your domain. When a receiving server gets an email claiming to be from your domain, it checks your DNS for the SPF record and verifies the sending IP is on the authorised list.
For a Google Workspace-only email environment, your SPF record should look like this:
v=spf1 include:_spf.google.com ~all
The ~all at the end means soft fail — emails from unauthorised servers are marked suspicious but not rejected. For higher security, use -all (hard fail) to reject emails from unauthorised sources outright. Move to -all only after verifying that all legitimate sending sources are included in your SPF record.
⚠ Note: Indian enterprises using third-party email sending services — marketing automation platforms like Mailchimp or Zoho Campaigns, HR systems, helpdesk tools — must include those services’ SPF records as well. A common mistake is setting up SPF for Google Workspace and then discovering that transactional emails from your CRM or HR system are being rejected because those services are not authorised.
- Add the SPF TXT record to your domain’s DNS. Allow 24–48 hours for propagation.
- Verify using Google’s Toolbox (toolbox.googleapps.com → Check MX → verify SPF record format).
- List all services that send email on behalf of your domain before finalising the record. Common omissions: Zoho, Freshdesk, Salesforce, marketing platforms, ERP notification systems.
DKIM (DomainKeys Identified Mail)
DKIM adds a cryptographic signature to outgoing emails that receiving servers can verify using a public key published in your DNS. Even if a spoofed email passes SPF (because it was sent via a shared sending service), DKIM ensures the message signature can be validated against your domain’s private key.
Admin Console: Apps → Google Workspace → Gmail → Authenticate email → Generate new record. Google generates a 2048-bit DKIM key pair. Add the provided TXT record to your DNS.
- After adding the DNS record, return to the Admin Console and click Start Authentication. Google will verify the DNS entry before activating DKIM signing.
- Use a 2048-bit key, not 1024-bit — 1024-bit keys are considered insufficient for modern security requirements.
- DKIM keys should be rotated annually. Google Workspace allows you to generate a new key pair and publish the new record before deactivating the old one — ensuring continuity during the rotation.
DMARC (Domain-based Message Authentication, Reporting, and Conformance)
DMARC is the policy layer that ties SPF and DKIM together. It tells receiving servers what to do when an email fails SPF and DKIM alignment — none (monitor only), quarantine (send to spam), or reject (block delivery). DMARC also includes a reporting mechanism that sends you aggregate and forensic reports on authentication failures.
Start with a monitoring-only policy to understand your email sending landscape before enforcing rejections:
v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com; ruf=mailto:dmarc-forensic@yourdomain.com; fo=1
After 2–4 weeks of reviewing reports and confirming all legitimate email sources pass authentication, move the policy to quarantine, then reject:
v=DMARC1; p=reject; rua=mailto:dmarc-reports@yourdomain.com; pct=100
🇮🇳 India Context: Business Email Compromise (BEC) attacks targeting Indian enterprises have grown significantly since 2023, with attackers impersonating senior management to authorise fraudulent fund transfers. A DMARC policy of p=reject, properly implemented, eliminates domain spoofing as an attack vector entirely. This is one of the highest-return security configurations available — it costs nothing beyond DNS changes and significantly reduces the most financially damaging class of email attacks.
- Add the DMARC TXT record to _dmarc.yourdomain.com in DNS.
- Monitor DMARC reports for 2–4 weeks using a DMARC reporting tool — Google Postmaster Tools (postmaster.google.com) provides free reporting for your own domain.
- Progress from p=none → p=quarantine → p=reject over 4–8 weeks as you validate that all legitimate email sources pass authentication.
- Once at p=reject, set sp=reject as well to cover subdomains — a common attack vector that DMARC’s base policy does not automatically cover.
2. Endpoint Management: Controlling Device Access to Workspace
Every device that accesses Google Workspace — laptops, phones, tablets — is a potential entry point to your organisation’s data. Without endpoint management, there is no way to enforce minimum security requirements on those devices: no way to ensure they have screen locks enabled, are encrypted, are running current OS versions, or can be remotely wiped if lost or stolen.
Google Workspace includes two levels of endpoint management: Basic mobile management (available on all plans) and Advanced mobile management (Business Plus and above). For Windows and macOS laptops, Google Endpoint Management provides Windows device management via a Chrome Browser policy and macOS management via a configuration profile.
Basic vs. Advanced Mobile Management
Basic mobile management automatically enrolls Android and iOS devices when users set up their Workspace account. It provides basic visibility — device inventory, last sync time, OS version — and allows remote account wipe (removing Workspace data from the device without wiping personal data).
Advanced mobile management (Business Plus / Enterprise) adds policy enforcement: require screen lock, enforce encryption, block rooted/jailbroken devices, require password complexity, and perform full device wipe. It also enables Android work profiles — separating corporate and personal data on BYOD devices.
Admin Console: Devices → Mobile & endpoints → Settings → Universal settings. Enable Advanced mobile management for all OUs where it applies.
Key Policies to Configure
- Require device encryption: Devices → Mobile & endpoints → Settings → Android settings → Device security → Require device encryption. This ensures data at rest on mobile devices is encrypted.
- Require screen lock with minimum complexity: Settings → Universal settings → Screen lock → Require screen lock, set minimum PIN length to 6 digits or alphanumeric.
- Block compromised devices: Android settings → Security → Block compromised devices (rooted Android, jailbroken iOS). A rooted device bypasses the OS security model that Workspace’s data separation relies on.
- Set automatic wipe on sign-out: when a user’s Workspace account is suspended or removed, configure automatic remote wipe of Workspace data from their enrolled devices.
Laptop and Desktop Endpoint Management
For Windows devices, Google Workspace provides management via the Chrome Browser Cloud Management policy — enforcing Chrome Browser policies, blocking certain extensions, and requiring Google’s endpoint verification agent. For full Windows MDM, Google Workspace integrates with third-party MDM solutions via the BeyondCorp Enterprise API.
- Deploy the Google Endpoint Verification extension to all Chrome browsers used for Workspace access. This agent reports device health signals — OS version, disk encryption status, screen lock — to the Admin Console.
- Admin Console → Devices → Endpoint verification. Review the device inventory and identify unmanaged devices accessing Workspace. Use this data to enforce Context-Aware Access policies (covered in the next section).
- For macOS, deploy a configuration profile via your MDM tool (Jamf, Mosyle, or equivalent) that enforces FileVault encryption, screen lock, and installs the Endpoint Verification agent.
🇮🇳 India Context: BYOD (Bring Your Own Device) is extremely common in Indian enterprises, particularly in startups and mid-market companies where providing managed devices to all employees is cost-prohibitive. Google Workspace’s Android work profile support is the most practical solution for BYOD in India — it creates a fully isolated work container on the employee’s personal Android device, ensuring corporate data never mixes with personal apps. When the employee leaves, only the work profile is removed. Personal data is untouched.
3. Context-Aware Access: Zero-Trust for Google Workspace
Context-Aware Access (CAA) is Google Workspace’s implementation of zero-trust network access — allowing or denying access to Workspace applications based not just on identity (who you are) but on context (where you are, what device you are using, and whether that device meets your security requirements).
Without Context-Aware Access, any user who can authenticate — from any device, any network, any location — can access all Workspace applications. A stolen credential from an unmanaged device in an unrecognised location grants the same access as a trusted employee on a corporate laptop in the office. Context-Aware Access closes this gap.
Context-Aware Access is available on Business Plus and Enterprise plans.
Access Levels
Access levels define the conditions under which access is permitted. You create access levels based on device attributes, IP range, or geographic location, then assign them to applications for specific Organisational Units.
- Device policy access level: Requires the device to pass endpoint verification checks — screen lock enabled, OS version above a minimum, disk encryption active. Apply this to all users accessing Drive and Gmail from outside the corporate network.
- IP range access level: Restricts access to specific IP addresses or CIDR ranges — useful for enforcing that admin console access only occurs from the corporate network or a VPN.
- Geographic access level: Restricts access from specific countries. Apply with care — if your employees travel internationally, a blanket country block will lock them out. Use as an additional layer for admin accounts or sensitive applications rather than a primary control.
Implementing a Baseline CAA Policy
Admin Console: Security → Access and data control → Context-Aware Access → Access levels → New access level.
- Create an access level called ‘Managed Device’ that requires: Device is verified by endpoint verification, OS encryption is active, and screen lock is enabled.
- Assign this access level to Drive, Gmail, and Admin Console for all users outside your corporate IP range.
- Test in ‘Monitor’ mode first — CAA supports a dry-run mode that logs what would have been blocked without actually blocking access. Run for one week before enforcing.
- Apply stricter access levels to the Admin Console specifically: require corporate IP range AND managed device. This ensures admin operations can only be performed from trusted, controlled environments.
⚠ Note: Context-Aware Access, once enforced, will immediately block users on non-compliant devices. Before enabling enforcement, ensure your Endpoint Verification rollout is complete across all user devices. A phased rollout by OU — starting with IT and admin accounts, then expanding to all users — reduces the risk of locking out legitimate users.
🇮🇳 India Context: India’s remote and hybrid work patterns create a distinct CAA design challenge. Many Indian enterprises have employees working from home networks, coworking spaces, and third-party client locations — environments where IP-based access controls are impractical. Device-based access levels are more appropriate than IP-based controls in this context. The combination of Endpoint Verification (device health) and 2SV enforcement (identity verification) provides a zero-trust baseline that works regardless of network location.
4. Data Loss Prevention: Protecting Personal and Sensitive Data
Data Loss Prevention (DLP) in Google Workspace detects sensitive content in Gmail messages and Drive files and takes automatic action — logging, warning the user, or blocking the action outright. It is available on Business Plus and Enterprise plans for Gmail, and on Enterprise plans for Drive.
For Indian enterprises, DLP is the primary technical control for DPDP Act compliance within the Workspace environment. Without DLP rules, users can email customer Aadhaar numbers, PAN data, bank account details, or DPDP-classified personal data to external recipients without any alert or block.
Gmail DLP
Admin Console: Apps → Google Workspace → Gmail → Compliance → Content compliance → Add rule.
Gmail DLP rules scan outbound and inbound messages for defined content patterns. Google Workspace includes built-in detector templates for common sensitive data types. For India-specific data types, you will need to configure custom detectors.
- Use the built-in detector ‘Credit card number’ to detect payment card data in outbound emails.
- Create a custom detector for Aadhaar numbers using a regular expression: the Aadhaar format is a 12-digit number, typically written as XXXX XXXX XXXX. A basic regex: \b[2-9]{1}[0-9]{3}\s?[0-9]{4}\s?[0-9]{4}\b
- Create a custom detector for PAN numbers using the standard PAN format regex: [A-Z]{5}[0-9]{4}[A-Z]{1}
- For each detector, configure the action: Audit (log only), Warn (show user a warning but allow send), or Block (prevent the email from being sent and notify the admin).
- Start in Audit mode to understand baseline data flows before enabling Block actions — blocking legitimate emails at the start of a DLP deployment damages user trust and creates helpdesk volume.
Drive DLP
Drive DLP (Enterprise plans) scans files stored in and shared from Google Drive for sensitive content. Unlike Gmail DLP which acts in real-time on message sending, Drive DLP inspects file content and can restrict sharing actions based on what a file contains.
Admin Console: Apps → Google Workspace → Drive and Docs → Data protection → Manage rules → Create rule.
- Create rules that trigger on files containing Aadhaar numbers, PAN numbers, or financial account data, and restrict sharing to ‘People in your organisation only’ for files matching these patterns.
- Configure Drive DLP to generate alerts when files containing sensitive data are shared externally — even if the share is not blocked, the alert gives your security team visibility.
- Use the Drive DLP report (Reports → Data protection) to audit existing files containing sensitive data patterns across all Shared Drives.
🇮🇳 India Context: The DPDP Act classifies Aadhaar numbers, biometric data, financial information, and health data as personal data requiring heightened protection. DLP rules that detect and restrict the movement of these data types are the most direct technical implementation of the ‘reasonable security safeguards’ requirement under the Act. Configuring DLP and retaining evidence of its configuration is also audit evidence that your organisation has taken proactive steps to protect personal data — relevant in any regulatory inquiry.
5. Advanced Gmail Security Settings
Beyond SPF, DKIM, and DMARC, Google Workspace provides a range of Gmail-specific security settings that significantly reduce phishing and malware risk. These are configured in the Admin Console and apply across the organisation.
Enhanced Pre-Delivery Message Scanning
Admin Console: Apps → Google Workspace → Gmail → Safety → Enhanced pre-delivery message scanning.
When enabled, Gmail holds suspicious emails for up to four minutes to perform additional analysis before delivering them to the inbox. This is particularly effective against zero-hour phishing attacks that leverage newly registered domains or fresh malicious URLs that have not yet been added to threat intelligence feeds.
- Enable ‘Improved detection of suspicious content prior to delivery.’ This is a single toggle with no configuration required.
Attachment Safety
Admin Console: Apps → Google Workspace → Gmail → Safety → Attachments.
- Enable ‘Protect against encrypted attachments from untrusted senders’ — encrypted archives are a common malware delivery mechanism because they cannot be scanned by standard AV engines.
- Enable ‘Protect against attachments with scripts from untrusted senders’ — Office macros and script-based payloads delivered via email are a primary ransomware delivery vector.
- Enable ‘Protect against anomalous attachment types in emails’ — alerts on unusual file types that are not typically sent to your domain.
Link and External Image Safety
Admin Console: Apps → Google Workspace → Gmail → Safety → Links and external images.
- Enable ‘Identify links behind shortened URLs’ — phishing emails frequently use URL shorteners to disguise malicious destinations.
- Enable ‘Warn users that click on links to untrusted domains’ — displays a warning page when a user clicks a link to a domain that Google’s Safe Browsing has not classified as trusted.
- Enable ‘Apply future recommended settings automatically’ — ensures new Google safety features are activated as they are released without requiring manual re-configuration.
Spoofing and Authentication Protection
Admin Console: Apps → Google Workspace → Gmail → Safety → Spoofing and authentication.
- Enable ‘Protect against domain spoofing based on similar domain names’ — detects emails from domains that are visually similar to your domain (e.g., c1oudfirst.in vs cloudfirst.in) and moves them to spam.
- Enable ‘Protect against spoofing of employee names’ — detects emails where the display name matches an internal employee but the sending address is external.
- Enable ‘Protect against inbound emails spoofing your domain’ — applies even when the sending server passes SPF, if the From header contains your domain but the message was not sent via authorised Google Workspace servers.
- Enable ‘Protect against any unauthenticated emails’ — moves emails that fail SPF and DKIM to spam rather than inbox delivery.
🇮🇳 India Context: Spear phishing attacks targeting Indian BFSI, manufacturing, and technology enterprises have increased significantly since 2024. Attackers increasingly use display name spoofing — where the email appears to be from the CFO or CEO by name, even though the actual sending address is external. The Gmail spoofing protection settings above directly address this vector. Combined with DMARC at p=reject, they eliminate the most common email-based impersonation techniques used against Indian enterprises.
6. Gemini AI Governance in Google Workspace
Gemini AI features are now embedded across Google Workspace — in Gmail, Drive, Docs, Sheets, Meet, and NotebookLM. Each integration involves processing content from users’ Workspace environments to generate responses, summaries, and outputs. For Indian enterprises, deploying Gemini without a governance framework is a DPDP Act compliance gap and a data leakage risk.
What Gemini Accesses
- Gemini in Gmail: Reads email content to generate summaries, draft replies, and provide context for Q&A queries.
- Gemini in Drive/Docs/Sheets: Analyses file content to answer questions, generate summaries, and create new content based on existing documents.
- Gemini in Meet: Transcribes meeting audio and generates summaries and action items from recorded sessions.
- NotebookLM: Processes user-uploaded documents (including Drive files) as a private knowledge base for AI-generated responses.
Each of these involves personal data processing under the DPDP Act — meeting transcripts contain participants’ names and spoken content, emails contain personal data, Drive files may contain customer or employee personal information.
Controlling Gemini Access by OU
Admin Console: Apps → Additional Google Services → Gemini for Google Workspace → Service status.
Gemini can be enabled or disabled at the Organisational Unit level. This is the most important governance control — it allows you to enable Gemini for specific teams (IT, product) while keeping it disabled for teams handling sensitive data (HR, finance, legal) pending a full governance review.
- Set Gemini service status to OFF at the top-level OU as the default.
- Create a pilot OU (e.g., IT team, product team) and enable Gemini for that OU only.
- Define your AI usage policy before expanding: which features are permitted, which data categories must not be processed by Gemini, and what training employees need before access is granted.
Google’s Data Processing Terms for Gemini
For Enterprise plans, Google’s terms confirm that customer data is not used to train foundation models. This must be verified in the applicable Data Processing Amendment (DPA) — not assumed. For Business plans, the terms differ and should be reviewed carefully.
- Admin Console → Account → Legal → Data Processing Amendment. Review and accept the DPA, which governs Google’s role as a Data Processor under DPDP.
- Review the Gemini-specific data processing terms within the DPA. For Enterprise plans, confirm the model training opt-out is active for your tenant.
- Update your organisation’s privacy notice to disclose that AI-assisted processing occurs via Google Workspace tools, including Gemini. This is a DPDP Act disclosure requirement.
🇮🇳 India Context: A common concern among Indian enterprises is whether Gemini outputs — particularly Meet transcripts and email summaries — are stored by Google and for how long. Under the Enterprise agreement, Gemini-generated content is stored in the user’s Workspace account (e.g., Meet transcripts go to Drive) under the same data retention policies as any other Workspace content. This means your existing Vault retention rules apply to Gemini outputs — ensuring they are not inadvertently retained beyond your DPDP deletion timelines.
7. Security Centre, Audit Logs, and Ongoing Monitoring
Hardening your Workspace environment is a point-in-time activity. Maintaining security posture over time requires continuous monitoring — detecting new threats, identifying configuration drift, and surfacing user behaviour that warrants investigation.
Security Dashboard
Admin Console: Security → Security centre → Dashboard.
The Security Dashboard provides an overview of your domain’s security health — authentication events, suspicious login attempts, phishing and malware detections, and data exfiltration indicators. It is available on Enterprise plans. For Business Standard and Plus, the Security Alert Centre provides a subset of this functionality.
- Review the Security Dashboard weekly as a standing IT routine. Set a calendar reminder — ad hoc reviews happen less reliably than scheduled ones.
- Configure the Dashboard to show your most relevant metrics: failed authentication attempts, external sharing events, and Drive download volumes are the three most actionable indicators for most Indian enterprise environments.
Audit Logs
Admin Console: Reporting → Audit and investigation → [Service].
Google Workspace maintains audit logs for Admin Console actions, Gmail events, Drive events, Login events, and User Account events. These logs are the primary forensic resource for incident investigation and the evidence trail for CERT-In compliance.
- Admin activity logs are retained for 6 months by default. For compliance purposes, consider exporting logs to a long-term storage destination — BigQuery, Cloud Storage, or a SIEM — to meet CERT-In’s 180-day log retention requirement.
- Configure custom alerts for high-risk events: Admin Console → Reporting → Manage alerts → Create custom rule. Recommended alerts: suspicious login (new device or location), large Drive download (>500 files in 1 hour), external sharing from sensitive Shared Drives, and Super Admin login.
- Review login audit logs monthly for dormant accounts with recent login activity — this can indicate a credential compromise where an attacker is using a legitimate account that the organisation believes is inactive.
Security Health Page
Admin Console: Security → Security centre → Security health.
The Security Health page is a checklist of Google’s recommended security configurations for your domain, with status indicators showing which recommendations are implemented and which are not. It is the fastest way to identify remaining gaps after completing an initial hardening exercise.
- Work through the Security Health page after completing the configurations in this guide. Treat any remaining amber or red items as a prioritised remediation backlog.
- The Security Health page is updated by Google as new security recommendations are added — revisit it quarterly to catch new recommendations that postdate your initial hardening.
🇮🇳 India Context: CERT-In’s 2022 and 2024 directives require Indian organisations to report cybersecurity incidents within 6 hours and maintain logs for 180 days. Google Workspace’s default log retention of 6 months meets the 180-day requirement for most log types, but Admin Console audit logs are retained for only 6 months in standard plans. Exporting to BigQuery or Cloud Storage — available via Admin Console → Reports → Export to BigQuery — extends retention indefinitely and provides queryable log data for incident investigation.
Security Hardening Checklist: Prioritised Implementation Order
Implement these controls in order. Earlier items have higher impact per unit of effort and are prerequisites for later configurations.
PHASE 1 — IMMEDIATE (DAY 1–7)
- Enforce 2-Step Verification for all users (Admin Console → Security → Authentication → 2-Step Verification)
- Enable SPF DNS record for your domain
- Enable and activate DKIM signing (Admin Console → Apps → Gmail → Authenticate email)
- Set DMARC to p=none with reporting addresses to begin monitoring
- Disable ‘Anyone with the link’ Drive sharing domain-wide
- Enable all Gmail Safety settings (spoofing protection, attachment safety, link safety)
PHASE 2 — SHORT TERM (WEEK 2–4)
- Review DMARC reports and progress policy from p=none to p=quarantine
- Deploy Endpoint Verification agent to all managed devices
- Enable Advanced Mobile Management for all OUs (Business Plus / Enterprise)
- Configure device policies: screen lock, encryption, block compromised devices
- Accept Google’s Data Processing Amendment (Admin Console → Account → Legal)
- Enable unified audit logging and configure export to BigQuery for 180-day retention
PHASE 3 — MEDIUM TERM (MONTH 2–3)
- Progress DMARC to p=reject after validating all legitimate sending sources
- Create Context-Aware Access levels based on device compliance (Business Plus / Enterprise)
- Enable Context-Aware Access in Monitor mode, validate for 1 week, then enforce
- Configure Gmail DLP rules for Aadhaar, PAN, and financial data patterns
- Define Gemini AI usage policy and enable per OU (not domain-wide)
- Configure custom Security Alert Centre rules for high-risk events
PHASE 4 — ONGOING
- Review Security Health page quarterly for new recommendations
- Rotate DKIM keys annually
- Review OAuth app grants quarterly — remove unused or unrecognised apps
- Audit Vault retention rules against current DPDP Act and industry-specific requirements
- Conduct annual Security Dashboard review with IT leadership
Security Is Configuration, Not Just Subscription
Google Workspace is not inherently secure or insecure out of the box — it is configurable. The difference between a Workspace environment that gets compromised and one that does not is almost never the plan tier or the licence cost. It is the configurations described in this guide.
The most consequential controls — SPF, DKIM, and DMARC for email authentication; 2SV enforcement; disabling public Drive sharing — cost nothing beyond the time to configure them. The DPDP Act compliance controls — DLP policies, the Data Processing Amendment, Gemini governance, audit log retention — are available on plans most Indian enterprises are already paying for.
Use the phased checklist at the end of this guide as your implementation roadmap. Phase 1 can be completed in a single day by a capable IT admin. Phases 2 and 3 require 2–3 weeks of deliberate effort. Phase 4 becomes a recurring operational rhythm.
The cumulative effect of completing all four phases is a Workspace environment that is genuinely difficult to compromise — one where email impersonation is blocked at the DNS level, where device access is enforced rather than assumed, where sensitive data movement is detected and controlled, and where the audit trail for incident investigation and regulatory compliance is continuous and retained.

