Ultimate access to all questions.
Upgrade Now 🚀
Sign in to unlock AI tutor
To grant your company's security team read-only access to Data Access audit logs in the _Required bucket while adhering to the principle of least privilege and Google-recommended practices, what steps should you take?
_Required
A
Assign the roles/logging.viewer role to each member of the security team.
B
Assign the roles/logging.viewer role to a group with all the security team members.
C
Assign the roles/logging.privateLogViewer role to each member of the security team.
D
Assign the roles/logging.privateLogViewer role to a group with all the security team members.