More Info:

Ensure that Cloud Audit Logging is configured properly across all services and all users from a project.

Risk Level

Medium

Address

Security

Compliance Standards

CISGCP, CBP, GDPR, NIST, HIPAA, ISO27001, SOC2, NISTCSF, PCIDSS, FedRAMP

Triage and Remediation

Remediation

To remediate the “Cloud Audit Logging Should Be Enabled” misconfiguration for GCP using the GCP console, follow the steps below:

  1. Open the GCP Console and navigate to the project for which you want to enable audit logging.

  2. Click on the “Navigation Menu” button in the top left corner of the console and select “Logging” under the “TOOLS” section.

  3. In the Logging page, click on the “Log-based Metrics” tab.

  4. Click on the ”+ CREATE METRIC” button to create a new metric.

  5. In the “Create a Metric” page, enter a name for the metric (e.g., “audit-logs”), select “Admin Activity” under the “Log” dropdown menu, and select “Global” under the “Resource type” dropdown menu.

  6. Click on the “CREATE METRIC” button to create the metric.

  7. Click on the “Create Sink” button to create a new sink.

  8. In the “Create a Sink” page, enter a name for the sink (e.g., “audit-logs-sink”), select “BigQuery” under the “Sink Service” dropdown menu, and select the destination dataset and table where you want to store the audit logs.

  9. Click on the “CREATE SINK” button to create the sink.

  10. Click on the “View Sink” button to view the sink details.

  11. In the sink details page, click on the “EDIT” button to edit the sink configuration.

  12. In the “Edit a Sink” page, select “Include All Logs” under the “Filter” section and select the metric you created earlier under the “Log Metric” section.

  13. Click on the “SAVE” button to save the sink configuration.

  14. You have now enabled audit logging for your GCP project. The audit logs will be stored in the destination BigQuery table you specified in the sink configuration.