/
GCP Security Center - AUDIT_LOGGING_DISABLED

GCP Security Center - AUDIT_LOGGING_DISABLED

Overview

You should enable Cloud Audit Logging for all services to track all Admin activities, read access, and write access to user data.

Remediation

Go to https://console.cloud.google.com/iam-admin/audit/allservices and under "LOG TYPE" select "Admin read", "Data read", and "Data write", and then click "SAVE". 

Make sure there are no exempted users configured.



References

https://cloud.google.com/logging/docs/audit

Related content

Ensure that Cloud Audit Logging is configured properly across all services and all users from a project
Ensure that Cloud Audit Logging is configured properly across all services and all users from a project
More like this
Ensure log metric filter and alerts exists for Audit Configuration Changes
Ensure log metric filter and alerts exists for Audit Configuration Changes
More like this
Monitor for brute force attacks against GCP Console
Monitor for brute force attacks against GCP Console
More like this
Ensure log metric filter and alerts exists for Custom Role changes
Ensure log metric filter and alerts exists for Custom Role changes
More like this
Ensure that Cloud Storage bucket is not anonymously or publicly accessible
Ensure that Cloud Storage bucket is not anonymously or publicly accessible
More like this
Monitor for instances deletion
Monitor for instances deletion
More like this