Ultimate access to all questions.
Your company manages highly sensitive personally identifiable information (PII) data of its clients using Bigtable. The security team requires that all read or write operations, including any metadata or configuration reads of this database table, be logged and stored in the company's Security Information and Event Management (SIEM) system. What is the best approach to achieve this?
Explanation:
Option C is correct because it involves enabling Admin Write logs in the Audit Logs page for the Bigtable instance, which logs all read or write operations. Additionally, it suggests setting up a Cloud Functions instance to export these logs from Cloud Logging to the SIEM system, fulfilling the requirement. Options A, B, and D do not fully meet the requirement or suggest incorrect methods for logging the specified operations.