logo svg
logo

October 18, 2025

Google CASA 2025: Complete Guide to Cloud Application Security Assessment

A 2025 deep dive into Google’s CASA security framework tiers, costs, approved labs, and how to pass your audit for restricted scope API access.

Mohammed Khalil

Mohammed Khalil

Featured Image

What Is Google CASA?

“Futuristic security auditor analyzing a holographic CASA shield showing Tier 1–3 verification levels, with data streams linking a cloud app and Google services in a digital control center.”

Google’s Cloud Application Security Assessment CASA is a standardized security review for cloud apps, created by the App Defense Alliance, an industry consortium led by Google . In practice, CASA is a security audit framework built on OWASP ASVS Application Security Verification Standard.

It defines a consistent set of baseline controls access control, architecture, cryptography, etc. that any Google integrated app must meet. CASA uses a risk based, multi tier approach: apps are classified by user count, OAuth scopes, data sensitivity, etc., and then tested accordingly.

Practically, CASA serves as a high assurance pentest for cloud apps. A Google empaneled lab performs a time limited, functional audit of your app’s externally accessible interfaces. This means the lab will do DAST dynamic analysis, review code SAST, and other checks but only on the app layer, not the cloud infrastructure.

The goal is to show that your app handles Google data securely and can promptly delete it on request.

Figure: Google Workspace Marketplace shows an Independent security verification badge on apps that passed a Tier 3 CASA audit.

Why CASA Matters in 2025

“Security engineer examining a glowing CASA Tier 3 badge hologram connected to cloud data streams, symbolizing compliance and trust in 2025.”

User trust and compliance Google now requires CASA for any app that requests restricted OAuth scopes those that provide broad access to Gmail, Drive, Calendar, Contacts, and other sensitive data.

In Google’s words, apps accessing restricted data… must undergo an annual security assessment by a Google approved third party. In short, if your app handles Google user data at scale, CASA is mandatory.

The stakes are high. Apps passing Tier 3 CASA earn a coveted security verification badge in the Google Workspace Marketplace. This badge signals to customers that the app has been rigorously audited.

In contrast, apps failing CASA may be denied API access or removed from listings. With 2025’s focus on data privacy and tightening API policies, CASA compliance is now a go/no go for Google integrations. It’s especially critical for enterprise or SaaS vendors who live and die by API trustworthiness.

Standardization and industry alignment CASA fills a big gap. Over the past decade, cloud infrastructure security has improved dramatically but application layer security still lags.

By aligning with OWASP ASVS and sponsoring a tiered framework, Google and the ADA are pushing the industry toward a common standard for app security.

In 2025, knowing CASA means you’re on the forefront of app sec best practices, not scrambling after a breach.

Who Needs a CASA Assessment?

“Developer reviewing a holographic network of apps connected to a glowing cloud, symbolizing which applications require CASA compliance.”

Key point: Don’t confuse CASA with generic pen testing. It’s specifically for Google bound applications. If you only use non Google cloud services AWS, Azure or have no restricted scopes, CASA doesn’t apply. But if Google APIs are involved, CASA is the official requirement.

CASA Tiers and Requirements

“Futuristic pyramid glowing in blue and gold hues, symbolizing CASA’s three-tier audit framework for cloud application security.”

CASA uses a three tier system to scale the assessment effort to the app’s risk.

Figure: The CASA framework uses three risk based tiers for cloud apps. Each level has defined ASVS based requirements and testing scope.

All tiers share some common rules: the assessment focuses on the app itself not the cloud infra, and results must be updated annually.

Google requires each approved app to revalidate every 12 months. That means even after you pass, plan for a yearly retest. Also, any time you add new restricted scopes, you might need an updated CASA review.

CASA vs Regular Pen Testing

“Split-screen image comparing CASA’s structured audit with a red-team pentest environment, highlighting compliance versus broad attack simulation.”

It’s worth noting how CASA differs from a generic pentest. CASA is narrower in scope: it tests the application layer according to OWASP ASVS controls. It doesn’t include, for example, attacking the cloud network or physical data centers.

For most Tier 3 audits, labs focus on web/API endpoints, mobile backends, and data storage as used by the app. Some OWASP categories like error handling or threat modeling are emphasized, whereas things like network sniffing are out of scope. In that sense, CASA is like a specialized web/mobile app pentest tailored for Google’s data integration scenario.

For cloud apps, you should still do broader pentests infrastructure, network, etc. separately. CASA compliments those efforts by guaranteeing coverage of key app controls. If you already have regular pentesting, you’ll find many overlaps. But don’t assume a generic pentest alone will satisfy Google: only a CASA report from an authorized lab gets you the official LOV.

How the CASA Assessment Works

“Futuristic holographic flow diagram showing CASA assessment stages from developer preparation to Google verification.”

Achieving CASA compliance is a multi step process. Here’s a high level how to for Google integrated apps:

  1. Determine your tier and requirements. Check the App Defense Alliance or Google documentation to see which CASA tier applies. Factors include the number of users, user data sensitivity, and scopes. Use the CASA Accelerator if available: this tool lets you enter your existing certifications ISO 27001, PCI, etc. or test results to minimize duplicate checks. The goal is to map your app to the required OWASP ASVS controls for that tier.
  2. Prepare internally. Before involving a lab, run your own vulnerability scans and code reviews. Ensure you’ve implemented the core ASVS Level 1 controls secure authentication, input validation, encryption at rest, etc.. Fix obvious issues and have evidence ready. This step often involves working with developers to address findings from SAST/DAST and threat models.
  3. Engage an authorized CASA lab. Only Google approved labs can issue CASA Letters of Validation. Examples include TAC Security, Leviathan, DEKRA, Bishop Fox, etc.. Contact the lab with your app details. They will guide you through submitting your app URLs, credentials for testing.
  4. Undergo the assessment. The lab will perform the tests corresponding to your tier. For Tier 3, expect manual tests on all 14 OWASP ASVS categories for ASVS 4.0, per CASA requirements. The lab will document vulnerabilities and advise on fixes some lab packages include remediation support. They then compile a report.
  5. Receive and submit the Letter of Validation LOV. If you pass, the lab issues a signed LOV certifying CASA compliance. For Marketplace apps, this is your security verification badge pass. You submit the LOV and any other required docs to Google via the Cloud Console’s OAuth App Verification process.
  6. Annual revalidation. After approval, plan to repeat the security assessment yearly. Google typically notifies you when it’s time. Keep your contact info updated so the right devs get the re certification reminder. Make necessary fixes during the year to stay in compliance.

Quick tip: Turnaround can be relatively fast. For example, one provider TAC Security advertises Tier 2 reassessment in 1- 3 weeks and Tier 3 in 2- 4 weeks once the lab has everything. However, delays in finding issues can add time. Budget a couple of months to be safe.

CASA Compliance Checklist

“Holographic digital checklist with security icons glowing above a cloud application, symbolizing CASA compliance readiness.”

See our web application penetration testing services and cloud penetration testing posts for deeper pentesting methodology insights.

CASA Tier 2 vs Tier 3: A Quick Comparison

“Split-screen image comparing CASA Tier 2’s automated mid-level audit with Tier 3’s full manual lab validation using blue-to-gold visual progression.”

Real World Example: Qlik’s Google Integration

“Holographic enterprise cloud dashboard with a glowing CASA Tier 3 badge and Google Cloud–style data sphere, representing verified compliance.”

Major data platforms have already gone through CASA.

For instance, Qlik Cloud achieved CASA Tier 3 certification for its integration with Google. Qlik’s trust page confirms

CASA Tier 3 is a security assessment framework based on OWASP ASVS that is mandated by Google Marketplace when cloud applications access sensitive scope data in Google Cloud.

In other words, Qlik proved its app security to Google’s standards and earned the independent security badge. This shows CASA is not just theory, it's a real requirement for enterprise cloud apps in production.

Common Myths and FAQs

“Holographic scene showing a split between myths and verified facts, with a golden beam symbolizing CASA truth and compliance.”

In 2025, CASA compliance isn’t optional, it's essential for Google integrated apps. By adopting the CASA framework as used by leaders like Qlik and mandated by Google, developers ensure their cloud applications are hardened against common threats and meet Google’s strict OAuth requirements.

The tiered approach means you can start small Tier 1 scans and work up as your app grows, but ultimately Tier 3 is the gold standard for maximum trust.

We hope this guide has clarified what CASA is, why it matters, and how to navigate its requirements. Remember: the goal is not just getting a badge, but truly securing your users’ data.

Ready to Strengthen Your Defenses? The security threats of 2025 demand readiness. If you’re integrating with Google APIs and need to validate your security posture, identify hidden risks, or build a resilient defense strategy, DeepStrike can help.

“Cybersecurity professionals in a futuristic command center surrounded by holographic security dashboards and a glowing digital globe, symbolizing readiness and defense.”

Our team of experienced practitioners provides clear, actionable guidance on penetration testing and security assessments.

Explore our penetration testing services to see how we uncover vulnerabilities before attackers do. Drop us a line we’re always ready to dive in.

About the AuthorMohammed Khalil is a Cybersecurity Architect at DeepStrike, specializing in advanced penetration testing and offensive security operations. With certifications including CISSP, OSCP, and OSWE, he has led numerous red team engagements for Fortune 500 companies, focusing on cloud security, application vulnerabilities, and adversary emulation. His work involves dissecting complex attack chains and developing resilient defense strategies for clients in the finance, healthcare, and technology sectors.

Frequently Asked Questions

background
Let's hack you before real hackers do

Stay secure with DeepStrike penetration testing services. Reach out for a quote or customized technical proposal today

Contact Us