FrontierZero Technical Security Guides
A curated library of Technical guides exploring identity-centric security, SaaS risks, cloud governance, and human factors.
Technical Guides: Practical Security Workflows
At FrontierZero, we work with security teams managing complex SaaS environments and identity risk. Here you’ll find practical technical guides covering user offboarding, SaaS integrations, and operational security workflows.
Each guide is designed to help security teams reduce attack surface and manage identity access across the modern SaaS landscape.
HubSpot User Removal Guide
This guide explains how to securely remove users from HubSpot while maintaining operational continuity. It covers the difference between deactivation and permanent removal, a security-first offboarding checklist, and a recommended timeline for revoking access, transferring assets, and minimizing attack surface across your CRM environment.

Google Workspace Guide
This guide outlines how FrontierZero integrates with Google Workspace to provide centralized visibility into identities, OAuth applications, and account activity. It explains the required read-only API scopes, how user and audit data are consolidated, and how security teams can detect shadow SaaS access, dormant accounts, and suspicious login behavior across their environment.
