Skip to content

Logging Controls Summary

Overview

The organization maintains comprehensive logging across all production and non-production environments, leveraging Google Cloud Audit Logs for centralized, immutable, compliance-scoped activity logging, and a separate log management process for short-term application troubleshooting logs.


Centralized Logging (Google Cloud Audit Logs)

  • Scope: Captures all administrative actions, API calls, configuration changes, and other governance-relevant activity across Google Cloud environments.
  • Retention: 1 year, in alignment with policy and industry standards (PCI DSS 4.0, NIST).
  • Controls:
    • Immutable and access-controlled storage.
    • Role-based access controls (RBAC) for log access.
    • Integration with security monitoring and alerting tools for real-time anomaly detection.
    • Periodic review of logs based on information classification and associated risk.
  • Risk Response: Detected anomalies are escalated via the organization’s incident response plan.

Application-Level Logs (Outside Google Cloud Audit Logs)

  • Scope: Certain application-level logs that do not contain regulated data (e.g., cardholder data, authentication secrets, or PCI-scoped information).
  • Retention: 1 week, supporting short-term operational troubleshooting only.
  • Controls:
    • Automatic rotation and destruction after retention period via lifecycle management policies.
    • Restricted access via RBAC.
    • No storage of compliance-scoped or regulated data.
  • Risk Justification: Short retention reduces exposure risk while maintaining operational capability.

Logging Process Alignment with Requirements

  • Administrative Activity Logging: Captured in centralized Google Cloud Audit Logs.
  • Application & Transaction-Level Logging: Security-relevant events logged to Google Cloud Audit Logs; operational events logged separately with short retention.
  • Detail & Governance Support: Level of logging supports both business operations and governance processes.
  • Review & Response: Logs reviewed periodically based on risk and classification; anomalies addressed according to the incident response plan.

Diagram: Logging Flow

┌──────────────────┐
│ GitOps │
│(Version Control + │
│ Approved Changes)│
└─────────┬────────┘
┌─────────────────────┐
│ GCP Deployment API │
└─────────┬───────────┘
┌─────────▼─────────┐
│ Google Cloud Audit │
│ Logs │
└─────────┬─────────┘
┌─────────────▼─────────────────┐
│ Security Monitoring & Alerts │
│ (SIEM / SOC review process) │
└───────────────────────────────┘
Separately:
Application Logs (non-sensitive) → Local/short-term log store → Auto-delete after 1 week