Ultimate access to all questions.
Your company manages highly sensitive personally identifiable information (PII) data of its clients using Bigtable. The security team requires that all read or write operations, including any metadata or configuration reads of this database table, be logged and stored in the company's Security Information and Event Management (SIEM) system. What is the best approach to achieve this?