
Answer-first summary for fast verification
Answer: Use Cloud Audit Logs. Create log export sinks to send these logs to a security information and event management (SIEM) solution for correlation with other event sources.
Option C is the correct answer because Cloud Audit Logs provide comprehensive visibility into IAM policy changes, user activity, service account behavior, and access to sensitive projects. These logs capture detailed information about administrative activities, data access, and system events. By exporting these logs to a SIEM solution, security teams can correlate IAM events with other security data sources, enabling advanced threat detection, anomaly identification, and comprehensive security monitoring. This approach aligns with Google Cloud security best practices for IAM monitoring and provides the detailed visibility required to address the security audit findings. Option A focuses only on IAM policy changes and lacks comprehensive coverage. Option B is limited to service account authentication events only. Option D addresses VM-level system modifications but doesn't cover IAM policies, user activity, or project access monitoring.
Author: LeetQuiz Editorial Team
Ultimate access to all questions.
You need detailed visibility into IAM policy changes, user activity, service account usage, and access to sensitive projects in your Google Cloud environment. What is the recommended approach?
A
Configure Google Cloud Functions to be triggered by changes to IAM policies. Analyze changes by using the policy simulator, send alerts upon risky modifications, and store event details.
B
Enable the metrics explorer in Cloud Monitoring to follow the service account authentication events and build alerts linked on it.
C
Use Cloud Audit Logs. Create log export sinks to send these logs to a security information and event management (SIEM) solution for correlation with other event sources.
D
Deploy the OS Config Management agent to your VMs. Use OS Config Management to create patch management jobs and monitor system modifications.
No comments yet.