Unified ActivityEvent model
Every source — login, drive, admin, SAML, meet, calendar, token — normalizes into the same TypeScript interface. Rules and UI never branch on source type unless they explicitly want to.
Google Workspace emits massive volumes of audit logs from sixteen separate sources — and almost no out-of-the-box way to monitor them. enigma is the platform we built (and now sell) to ingest, normalize, attest and alert on Workspace activity 24/7, with SOC 2-ready evidence collected as it goes.
Live demos for qualified buyers
A glimpse of what we shipped
[email protected] → [email protected]
→ Pending acknowledgment ⏵
Workspace scheduler · OAuth client 84a2…
→ Acknowledged by [email protected]
Workspace tells you everything — if you can listen to all of it.
Google Workspace audit logs are split across the Admin SDK, Drive activity, Meet events, Calendar, SAML, Login, OAuth tokens, mobile, Chrome, Groups, GCP and more. Each has its own shape, retention and authentication. Most security teams either pay enterprise SIEM prices to centralize it, or rely on a fragment of the picture and hope. Smaller and mid-market companies — exactly the audience that needs SOC 2 cleanly — get neither option. The brief: build a platform that ingests every Workspace source, normalizes them into a single event model, runs rules against them, and tells the right human in the right tool when something matters.
enigma is three composable services. gsec-ingestor (Next.js + TypeScript) pulls each Workspace API on schedule, normalizes every event into a unified ActivityEvent shape with source, actor, category, severity, target and risk factors, then stores it in MongoDB with HashiCorp Vault holding the per-tenant credentials. gsec-attestation (Python + Prefect) runs source-specific rule engines — admin, drive, meet — over the ingested data and produces AttestationFinding documents. gsec-guardian (Python + Prefect) routes findings to Google Chat, Slack, Email or Discord with trusted-actor allowlists so the on-call ladder doesn't drown in noise. Adding a new Workspace source or a new notification channel is a small, additive change in each service.
Key decisions · 06
Every source — login, drive, admin, SAML, meet, calendar, token — normalizes into the same TypeScript interface. Rules and UI never branch on source type unless they explicitly want to.
Each tenant's GCP service account JSON lives in its own Vault path with its own AppRole. A breach in one tenant cannot read another's keys. AppRole auth is cached, never hardcoded.
Attestation and notification flows are Prefect flows with retries, alerting and observability built in. Failed runs page the operator with the artifact attached.
Channels (Google Chat, Slack, Email, Discord, WhatsApp coming) live behind a uniform interface. Per-tenant configuration picks which channels and which severities, with trusted-actor allowlists.
Workspace audit data is write-heavy and shape-varied per source. Mongo's flexible documents + indexed sources fit the access pattern better than relational rows.
The customer-facing dashboard and the ingestor live in TypeScript. The rule engines and notifiers live in Python — where the scientific stack and Prefect ecosystem are stronger.
What enigma can do · 04 surfaces
Workspace security isn't one dashboard — it's a product loop: ingest everything, surface what matters, prove the controls, investigate when something breaks. Here's how enigma does each of them.
A single overview that answers the four questions every security team wakes up to — what's normal, what's elevated, who's risky and which sources are healthy. Threat level is computed from your real events, not a static score.
16 sources · last sync 4 min ago
Every OAuth grant inside your Workspace, scored for risk, sorted by exposure, revocable in one click. The unknown calendar sync with drive.readonly access nobody noticed? Now you can.
Every OAuth grant inside acme-co.workspace · scored, paged, revocable.
SOC 2 doesn't have to be a fire drill anymore. enigma maps your live events to framework controls and collects attestations continuously — so audit prep stops being something you schedule.
257 controls across 4 frameworks · evidence collected continuously.
When a finding matters, it becomes a case. Linked findings, a typed timeline of every alert / action / comment / evidence drop, SLA tracking and watchers — so your SOC stops living in five tabs.
Opened 1h 12m ago · 3 linked findings · assigned to [email protected]
Connect a Workspace account, grant the read-only scopes, write your Vault credentials. enigma's first attestation run finishes the same hour. No agents on user devices. No new SaaS for your team to learn — alerts land where your engineers already work.
Impact
Admin, Drive, Login, SAML, Token, Meet, Calendar, Mobile, Chat, Chrome, Groups, GCP, Rules, User Accounts, Context-Aware Access, Access Transparency — all normalized into one stream.
Productized under the enigma brand and sold to third parties looking for SOC 2-aligned Workspace monitoring without enterprise SIEM bills.
OAuth + domain-wide delegation + Vault credential write. The first attestation run completes the same hour the tenant is onboarded.
Every finding, notification and revocation action is logged with timestamps and actors. SOC 2 prep stops being a quarterly fire drill.
Tech stack
Related services