More Info:

Ensure that Cloud SQL Data Access Logging is configured properly across all users from a project.

Risk Level

Low

Address

Security

Compliance Standards

NIST, HITRUST, SOC2, NISTCSF, PCIDSS

Triage and Remediation

Remediation

To remediate the misconfiguration “Cloud SQL data access audit logging should be enabled” for GCP using GCP console, please follow the below steps:

  1. Login to the Google Cloud Console.
  2. Navigate to the Cloud SQL instances page.
  3. Select the instance for which you want to enable audit logging.
  4. Click on the “Edit” button at the top of the page.
  5. Scroll down to the “Additional settings” section and click on it.
  6. Under the “Audit logging” section, select the checkbox next to “Audit logs” to enable audit logging.
  7. Choose the destination bucket where logs should be stored.
  8. Click on the “Save” button to save the changes.

After completing these steps, audit logs for Cloud SQL data access will be enabled and stored in the specified destination bucket.

Additional Reading: