Overview
The organization maintains comprehensive logging across all production and non-production environments, leveraging Google Cloud Audit Logs for centralized, immutable, compliance-scoped activity logging, and a separate log management process for short-term application troubleshooting logs.
Centralized Logging (Google Cloud Audit Logs)
-
Scope: Captures all administrative actions, API calls, configuration changes, and other governance-relevant activity across Google Cloud environments.
-
Retention: 1 year, in alignment with policy and industry standards (PCI DSS 4.0, NIST).
-
Controls:
-
Immutable and access-controlled storage.
-
Role-based access controls (RBAC) for log access.
-
Integration with security monitoring and alerting tools for real-time anomaly detection.
-
Periodic review of logs based on information classification and associated risk.
-
-
Risk Response: Detected anomalies are escalated via the organization’s incident response plan.
Application-Level Logs (Outside Google Cloud Audit Logs)
-
Scope: Certain application-level logs that do not contain regulated data (e.g., cardholder data, authentication secrets, or PCI-scoped information).
-
Retention: 1 week, supporting short-term operational troubleshooting only.
-
Controls:
-
Automatic rotation and destruction after retention period via lifecycle management policies.
-
Restricted access via RBAC.
-
No storage of compliance-scoped or regulated data.
-
-
Risk Justification: Short retention reduces exposure risk while maintaining operational capability.
Logging Process Alignment with Requirements
-
Administrative Activity Logging: Captured in centralized Google Cloud Audit Logs.
-
Application & Transaction-Level Logging: Captured where appropriate; security-relevant events logged to Google Cloud Audit Logs, operational events logged separately with short retention.
-
Detail & Governance Support: Level of logging supports both business operations and governance processes.
-
Review & Response: Logs reviewed periodically based on risk and classification; anomalies addressed according to the incident response plan.
Diagram: Logging Flow
┌──────────────────┐
│ GitOps │
│(Version Control + │
│ Approved Changes)│
└─────────┬────────┘
│
▼
┌─────────────────────┐
│ GCP Deployment API │
└─────────┬───────────┘
│
┌─────────▼─────────┐
│ Google Cloud Audit │
│ Logs │
└─────────┬─────────┘
│
┌─────────────▼─────────────────┐
│ Security Monitoring & Alerts │
│ (SIEM / SOC review process) │
└───────────────────────────────┘
Separately:
Application Logs (non-sensitive) → Local/short-term log store → Auto-delete after 1 week