Ensure that data access audit logging is enabled for all critical service APIs in your Google Cloud project for security, compliance, and troubleshooting purposes. The critical service APIs that you can enable for your GCP project include but are not limited to Identity and Access Management (IAM) API (iam.googleapis.com), Compute Engine API (compute.googleapis.com), Cloud Storage (storage-component.googleapis.com), Google Cloud Pub/Sub API (pubsub.googleapis.com), Cloud Key Management Service (KMS) API (cloudkms.googleapis.com), and Cloud Logging API (logging.googleapis.com).
optimisation
efficiency
excellence
Enabling data access audit logs for all critical service APIs within Google Cloud Platform (GCP) is essential for achieving compliance, enhancing security measures, establishing accountability, and facilitating efficient troubleshooting. By proactively monitoring and meticulously analyzing the activity occurring within your service APIs, you gain invaluable insights that empower you to swiftly identify and respond to potential security incidents. In Google Cloud, data access audit logs contain API calls that read the configuration or metadata of resources, as well as user-driven API calls that create, modify, or read user-provided resource data.
Audit
To determine if data access audit logs are enabled for all critical service APIs within your GCP project, perform the following operations:
Remediation / Resolution
To enable data access audit logging for all critical service APIs by updating the IAM policy associated with GCP projects, perform the following operations:
References
- Google Cloud Platform (GCP) Documentation
- Google Cloud APIs
- Cloud Audit Logs overview
- Understanding audit logs
- Enable Data Access audit logs
- GCP Command Line Interface (CLI) Documentation
- gcloud projects list
- gcloud projects get-iam-policy
- gcloud organizations set-iam-policy