The security operations team needs access to the security-related logs for all projects in their organization. They have the following requirements:
✑ Follow the least privilege model by having only view access to logs.
✑ Have access to Admin Activity logs.
✑ Have access to Data Access logs.
✑ Have access to Access Transparency logs.
Which Identity and Access Management (IAM) role should the security operations team be granted?
mouchu
Highly Voted 2 years, 5 months agomT3
2 years, 5 months agoLittleivy
Highly Voted 1 year, 11 months agoKLei
Most Recent 4 months, 1 week ago[Removed]
10 months, 2 weeks agoale183
1 year, 1 month agoblacortik
1 year, 2 months agogcpengineer
1 year, 5 months agobruh_1
1 year, 7 months agoAzureDP900
1 year, 12 months agoAwesomeGCP
2 years agozellck
2 years, 1 month agocloudprincipal
2 years, 4 months agoNicky1402
2 years, 5 months ago