Skip to content

Groups

Groups are the building blocks of our identity and access model. Every group follows the prv-{team}-{type}-{qualifier} naming pattern and falls into one of several categories based on its purpose.

CategoryPurposeGrants Access?
People rostersTrack who is in a lifecycle state (active, offboarded, etc.)No
Identity rostersTrack non-human accounts (service accounts, bots)No
DepartmentsDurable organizational units that own budget and policyIndirectly (via nesting)
TeamsDay-to-day collaboration units where individuals belongIndirectly (via nesting)
RolesGrant specific permissions to specific systemsYes
Automation accountsBot and service account identifiersNo (helper groups)

Understanding the group hierarchy is critical:

  1. People are placed in People rosters based on their lifecycle state (OU placement).
  2. People join Teams based on their function.
  3. Teams nest into exactly one Department.
  4. Roles grant access to systems and are assigned to individuals (not teams or departments).
People rosters → "who exists and in what state"
Teams → "who works together day-to-day"
Departments → "who shares budget/policy scope"
Roles → "who can do what in which system"

Key rule: Privileges flow only through Role groups. Teams and Departments organize people — they don’t directly grant system access.

Every group is labeled as either Security or Non-security:

  • Security ON: Groups that are used on ACLs, drive permissions, or system access grants. This includes Departments, Teams, and Roles.
  • Security OFF: Groups used for communication, routing, or roster tracking. This includes People rosters, Identity rosters, Mail, Intake, Alerts, and Infra pipes.

Warning: The Security label is irreversible in Google Workspace. If you enable it and later need it off, you must recreate the group.

Every group must have at least two owners from durable admin cohorts. Typical owners:

  • prv-plt-team-wks (Platform — Workspace team)
  • prv-sec-team-grc (Security — GRC team)

Single-owner groups are a compliance risk. Automation should flag any group with fewer than two owners.

All groups use name-first with en dash format:

PRV – {Type} – {Department} – {Specifics}

Examples:

  • PRV – Department – Engineering
  • PRV – Team – Platform Engineering – Workspace
  • PRV – Role – PLT – AWS – IDC – PRD – Admin

Descriptions start with the exact display name, followed by a colon, then structured metadata:

{Name}: {purpose} | {audience} | {usage notes} | {trailer}

The trailer is mandatory and must be one of:

  • Security group ({concise purpose})
  • Non-security group ({concise purpose})
  • Optionally add: Locked group ({reason})