Ultimate access to all questions.
Your company is currently utilizing Google Cloud and sends all operational logs to Cloud Logging. The security team at your company is responsible for monitoring these logs to identify potential security incidents. To enhance the security monitoring process, your team wants to react swiftly in the event of detecting anomalies, such as unauthorized firewall changes or server breaches. Considering Google-recommended practices, what should you do?