/
GCP Security Center - AUDIT_LOGGING_DISABLED
GCP Security Center - AUDIT_LOGGING_DISABLED
Overview
You should enable Cloud Audit Logging for all services to track all Admin activities, read access, and write access to user data.
Remediation
Go to https://console.cloud.google.com/iam-admin/audit/allservices and under "LOG TYPE" select "Admin read", "Data read", and "Data write", and then click "SAVE".
Make sure there are no exempted users configured.
References
, multiple selections available,
Related content
Ensure that Cloud Audit Logging is configured properly across all services and all users from a project
Ensure that Cloud Audit Logging is configured properly across all services and all users from a project
More like this
Ensure log metric filter and alerts exists for Audit Configuration Changes
Ensure log metric filter and alerts exists for Audit Configuration Changes
More like this
Monitor for brute force attacks against GCP Console
Monitor for brute force attacks against GCP Console
More like this
Ensure log metric filter and alerts exists for Custom Role changes
Ensure log metric filter and alerts exists for Custom Role changes
More like this
Ensure that Cloud Storage bucket is not anonymously or publicly accessible
Ensure that Cloud Storage bucket is not anonymously or publicly accessible
More like this
Monitor for instances deletion
Monitor for instances deletion
More like this