Cloud Audit Logs

Overview

Cloud Audit Logs = “who did what, where, when” across org/folder/project.

Types: Admin Activity, System Event, Data Access, Policy Denied.

Default retention: Admin/System = 400 days (free), Data Access = 30 days (when enabled), Policy Denied = on by default, storage billed.

Logs Explorer에서 cloudaudit 로 빠르게 필터. Access Transparency = human Googler access logs (별개).

Log types

Type Captures Default Retention Cost View IAM
Admin Activity Config/metadata writes (ex: create VM, change IAM) Always on 400 days Free roles/logging.viewer or Project Viewer
System Event Google-managed admin changes (system-initiated) Always on 400 days Free roles/logging.viewer or Project Viewer
Data Access Reads of config/metadata (admin-read) + reads/writes of user data Off by default (except BigQuery) 30 days (default when enabled) Ingestion billed (~$0.50/GB) roles/logging.privateLogViewer (or Project Owner)
Policy Denied When access is denied by policy On by default Project lifecycle Storage billed roles/logging.viewer

Where to look / filter (Logs Explorer)

Access Transparency (AT) vs Cloud Audit Logs

Data Access logs — enabling & scope