Ultimate access to all questions.
Upgrade Now 🚀
Sign in to unlock AI tutor
Your organization has the Security Command Center (SCC) Premium tier activated. Several Cloud Storage buckets were inadvertently configured with public access. You need to investigate the impact of this misconfiguration and remediate it.
What should you do?
A
Remove the Identity and Access Management (IAM) granting access to all Users from the buckets.
Apply the organization policy storage.uniformBucketLevelAccess to prevent regressions.
Query the data access logs to report on unauthorized access.
B
Change permissions to limit access for authorized users.
Enforce a VPC Service Controls perimeter around all the production projects to immediately stop any unauthorized access.
Review the administrator activity audit logs to report on any unauthorized access.
C
Change the bucket permissions to limit access.
Query the bucket's usage logs to report on unauthorized access to the data.
Enforce the organization policy storage.publicAccessPrevention to avoid regressions.
D
Change bucket permissions to limit access.
Query the data access audit logs for any unauthorized access to the buckets.
After the misconfiguration is corrected, mute the finding in the Security Command Center.