For compliance, how should you handle application log duplication to a restricted project?

Disable ads (and more) with a premium pass for a one time $4.99 payment

Prepare for the Google Cloud Professional Cloud Developer Test. Benefit from mock assessments featuring flashcards and multiple-choice format, each furnished with hints and detailed explanations. Excel in your exam with confidence!

Routing logs using a Cloud Logging sink to log buckets in the security project is the best approach for handling application log duplication to a restricted project, particularly when compliance is a concern.

Using a Cloud Logging sink allows you to create a reliable and efficient pipeline for transferring logs from your application project to a separate security project. This separation enhances security, as sensitive log data can be stored in a project with stricter access controls, ensuring that only authorized personnel or services can access it. Additionally, this method allows for real-time log management and analysis, which is critical for compliance monitoring and incident response.

Log sinks can be configured to filter and route only the necessary logs, minimizing unnecessary data transfer while maintaining compliance with data governance policies. This ensures that even if logs contain sensitive information, the transfer to a secure location adheres to organizational policies around data protection and integrity.

In contrast, creating a job to copy logs periodically may introduce delays and potential data inconsistency, while modifying existing log bucket configurations could disrupt the existing logging setup and complicate log management. Using IAM roles to manage log access is essential for security but does not address the compliance requirement of maintaining log integrity in a restricted project. Instead, it complements the primary action of routing logs efficiently.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy