Check provider logo

Data Access audit logs are enabled for Cloud Storage

cloudstorage_audit_logs_enabled

Severitymedium
by Prowler

Data Access audit logs (DATA_READ and DATA_WRITE) are enabled for Cloud Storage at the project level. Unlike Admin Activity logs (enabled by default), Data Access logs must be explicitly configured to track read and write operations on Cloud Storage objects.

Risk

Without Data Access audit logs, you cannot track who accessed or modified objects in your Cloud Storage buckets, making it difficult to detect unauthorized access, data exfiltration, or compliance violations.

Run this check with Prowler CLI

prowler gcp --checks cloudstorage_audit_logs_enabled

Recommendation

Enable Data Access audit logs (DATA_READ and DATA_WRITE) for Cloud Storage at the project level to track all read and write operations on storage objects for security monitoring and compliance.

Remediation

Terraform
Other
  1. Console → IAM & Admin → Audit Logs
  2. Find 'Google Cloud Storage' in the list of services
  3. Check the boxes for 'Data Read' and 'Data Write'
  4. Click 'Save' to apply the configuration

Note: This is a project-level setting that applies to all Cloud Storage buckets in the project.

Source Code

Resource Type

cloudresourcemanager.googleapis.com/Project

References