The security operations team needs access to the security-related logs for all projects in their organization. They have the following requirements:
✑ Follow the least privilege model by having only view access to logs.
✑ Have access to Admin Activity logs.
✑ Have access to Data Access logs.
✑ Have access to Access Transparency logs.
Which Identity and Access Management (IAM) role should the security operations team be granted?
mouchu
Highly Voted 2 years, 7 months agomT3
2 years, 7 months agoLittleivy
Highly Voted 2 years, 1 month agoKLei
Most Recent 5 months, 3 weeks ago[Removed]
12 months agoale183
1 year, 2 months agoblacortik
1 year, 3 months agogcpengineer
1 year, 7 months agobruh_1
1 year, 8 months agoAzureDP900
2 years, 1 month agoAwesomeGCP
2 years, 2 months agozellck
2 years, 2 months agocloudprincipal
2 years, 6 months agoNicky1402
2 years, 7 months ago