This is a dedicated watch page for a single video.
Your organization uses a hybrid cloud with Google Workspace and another platform, relying on third-party apps to bridge both. Following IT audits, the CIO is concerned about data leaks and wants to ensure third-party apps accessing Google Workspace data are vetted. What steps should you take to manage third-party application access?