Data leakage through uncontrolled sharing
RiskDocuments move through email attachments, public links, and unmanaged storage accounts. Access remains active after the original task ends.
Access rules are applied at workspace, folder, and file level. External sharing uses scoped permissions, expiration windows, and policy-bound guest access.