Google Cloud Audit Logs

Cloud & SaaSCloud InfrastructureGoogle CloudCloud Control PlaneSIEM / Log Aggregator

Location

Google Cloud Logging > Logs Explorer > cloudaudit.googleapis.com/*

Description

Control-plane audit logs for Google Cloud resources, including Admin Activity, Data Access, Policy Denied, and System Event logs routed through Cloud Logging.

Forensic Value

Cloud Audit Logs are the primary source for reconstructing attacker actions in Google Cloud. They identify the principal, service, method, resource name, and request metadata behind IAM changes, service configuration changes, and destructive actions across projects and folders.

Tools Required

Google Cloud Consolegcloud CLILogs ExplorerSIEM

Collection Commands

gcloud CLI

gcloud logging read "logName:("cloudaudit.googleapis.com%2Factivity" OR "cloudaudit.googleapis.com%2Fdata_access") AND timestamp>="2026-03-01T00:00:00Z"" --format=json > gcp_audit_logs.json

Logs Explorer

Query cloudaudit.googleapis.com/activity and cloudaudit.googleapis.com/data_access for the incident window, then export the results to JSON or BigQuery

Collection Constraints

  • Admin Activity and System Event logs are available by default, but many Data Access events must be explicitly enabled before the incident.
  • Retention depends on Cloud Logging sinks, buckets, or downstream exports; the console alone may not preserve long-term history.

MITRE ATT&CK Techniques

T1098T1578T1078.004

Related Blockers