The security operations team needs access to the security-related logs for all projects in their organization. They have the following requirements:
✑ Follow the least privilege model by having only view access to logs.
✑ Have access to Admin Activity logs.
✑ Have access to Data Access logs.
✑ Have access to Access Transparency logs.
Which Identity and Access Management (IAM) role should the security operations team be granted?
mouchu
Highly Voted 2 years, 8 months agomT3
2 years, 8 months agoLittleivy
Highly Voted 2 years, 2 months agoKLei
Most Recent 7 months, 2 weeks agoale183
1 year, 4 months agoblacortik
1 year, 5 months agogcpengineer
1 year, 8 months agobruh_1
1 year, 10 months agoAzureDP900
2 years, 3 months agoAwesomeGCP
2 years, 4 months agozellck
2 years, 4 months agocloudprincipal
2 years, 8 months agoNicky1402
2 years, 9 months ago