
Ultimate access to all questions.
Your company operates an e-commerce business on Google Cloud Platform (GCP). The payment processing application generates structured JSON logs with the schema.
The jsonPayload.user_email field contains personally identifiable information (PII), and the security team requires that only they have access to this field. The engineering team must retain access to non-PII log data for operational purposes. How should you configure GCP to prevent the engineering team from accessing PII while allowing the security team exclusive access to the user_email field?

A
Apply the conditional role binding resource.name.extract("locations/global/buckets/{bucket}/") == "_Default" to the _Default bucket.
B
Apply a jsonPayload.user_email restricted field to the _Default bucket. Grant the Log Field Accessor role to the security team members.
C
Apply a jsonPayload.user_email exclusion filter to the _Default bucket.
D
Modify the application to toggle inclusion of user_email when the LOG_USER_EMAIL environment variable is set to true. Restrict the engineering team members who can change the production environment variable by using the CODEOWNERS file._