More Info:

Ensure that “Google Cloud Platform - Detailed Audit Logging Mode” policy is enforced at the organization level in order to enable Detailed Audit Logging feature for the supported Cloud Storage resources available within your GCP organization.

Risk Level

Medium

Address

Operational Maturity, Reliability, Security

Compliance Standards

CISGCP, CBP, GDPR, HIPAA, ISO27001

Triage and Remediation

Remediation

To remediate the misconfiguration of not enforcing detailed audit logging mode in GCP, you can follow the steps below using the GCP console:

  1. Log in to your Google Cloud Console.

  2. Navigate to the “Logging” page by clicking on the hamburger menu on the top left corner of the page and selecting “Logging” under the “TOOLS” section.

  3. Click on “Log Router” on the left-hand side of the page.

  4. Click on “Create Sink” at the top of the page.

  5. In the “Create Sink” page, enter a name for the sink in the “Name” field.

  6. In the “Sink Service” field, select the service you want to enable detailed audit logging for. For example, you can select “Cloud Storage”.

  7. In the “Sink Destination” field, select “BigQuery” or “Cloud Pub/Sub” as the destination for the logs.

  8. In the “Sink Filter” field, enter the filter expression to specify the logs you want to collect. For example, you can enter “protoPayload.serviceName=storage.googleapis.com” to collect logs related to Cloud Storage.

  9. Click on “Create Sink” to create the sink.

  10. Repeat steps 4 to 9 for each service you want to enable detailed audit logging for.

By following these steps, you will have enabled detailed audit logging mode for the selected GCP services and can now monitor and analyze the logs for security and compliance purposes.