Ensure that "Google Cloud Platform - Detailed Audit Logging Mode" policy is enforced at the organization level in order to enable Detailed Audit Logging feature for the supported Cloud Storage resources available within your GCP organization.
When Detailed Audit Logging is enforced, both the request and response are included in Cloud Audit logs. Logged information includes query parameters, path parameters, and request body parameters but excludes certain parts that are associated with sensitive information such as credentials, encryption keys, secrets, and other privacy-related data. Enabling "Google Cloud Platform - Detailed Audit Logging Mode" organization policy is highly encouraged in coordination with Bucket Lock feature when seeking compliances such as SEC Rule 17a-4(f), CFTC Rule 1.31(c)-(d), and FINRA Rule 4511(c).
Audit
To determine if "Google Cloud Platform - Detailed Audit Logging Mode" policy is enforced at the GCP organization level, perform the following operations:
Remediation / Resolution
To enable Detailed Audit Logging mode for the supported Google Cloud Storage resources deployed within your GCP organization, enable the "Google Cloud Platform - Detailed Audit Logging Mode" organization policy by performing the following operations:
References
- Google Cloud Platform (GCP) Documentation
- Organization policy constraints for Cloud Storage
- Organization policy constraints
- Using constraints
- GCP Command Line Interface (CLI) Documentation
- gcloud organizations list
- gcloud alpha resource-manager org-policies describe
- gcloud alpha resource-manager org-policies enable-enforce