Ensure that Google Cloud Audit Logs feature is configured to track Admin Activity logs and Data Access audit logs for all Google Cloud Platform (GCP) services and users in order to enhance overall access security and meet compliance requirements. Once configured, the feature can record all admin related activities, as well as all the read and write access requests to user data.
This rule resolution is part of the Conformity Security & Compliance tool for GCP.
Cloud Audit Logs, a feature of Google Cloud Logging service, maintains two types of audit logs for each GCP project, folder, and organization: Admin Activity logs and Data Access audit logs. Admin Activity logs contain log entries for API calls or administrative actions that modify the configuration or metadata of Google Cloud Platform (GCP) resources. Admin Activity logs are enabled for all GCP services by default and their configuration cannot be modified. Data Access audit logs contain API calls that read the configuration or metadata of GCP resources, as well as user-driven API calls that read, modify, or create user-provided resource data. There are 3 kinds of Data Access audit log information:
- - ADMIN_READ - records operations that read configuration or metadata information.
- - DATA_READ - records operations that read user-provided data.
- - DATA_WRITE - records operations that write user-provided data.
In order to maintain an effective Google Cloud audit configuration for your project, folder, and organization, all 3 types of Data Access audit logs (ADMIN_READ, DATA_READ and DATA_WRITE) must be enabled for all supported GCP services. Also, these logs should be captured for all IAM users, without exempting any of them. Exemptions let you control which users generate audit logs. When you add an exempted user to your log configuration, audit logs are not created for that user, for the selected log type(s). Data Access audit logs are disabled by default and must be explicitly enabled based on your business requirements.
Audit
To determine the Audit Logs configuration for your GCP projects, folders, and organizations, perform the following operations:
Remediation / Resolution
To configure the Audit Logs feature to track all Google Cloud service and user activities by updating the IAM policy associated with GCP projects, folders, and organizations, perform the following operations:
References
- Google Cloud Platform (GCP) Documentation
- Cloud Audit Logs overview
- Understanding audit logs
- Enable Data Access audit logs
- CIS Security Documentation
- Google Cloud Computing Platform
- GCP Command Line Interface (CLI) Documentation
- gcloud organizations list
- gcloud organizations get-iam-policy
- gcloud projects list
- gcloud projects get-iam-policy
- gcloud alpha resource-manager folders list
- gcloud alpha resource-manager folders get-iam-policy
- gcloud organizations set-iam-policy
- gcloud projects set-iam-policy
- gcloud resource-manager folders set-iam-policy