Help expand visibility and control over your cloud provider with admin access logs and approval controls.
Customer data is not accessed for any reason other than to fulfill contractual obligations
Valid business justification required for any access by support or engineering personnel
Near real-time logs offer insight when Google Cloud administrators access your content
Approve or dismiss requests for access by Google employees working to support your service
Benefits
Inability to audit cloud provider access can be a barrier to cloud migration. Access Transparency enables verification of cloud provider access, bringing your audit controls closer to on-premises conditions.
Access Approval lets you approve or dismiss requests for access by Google employees working to support your service.
Access Transparency logs are available through Cloud Logging and can be integrated directly into existing analysis pipelines or tool exports you have already set up.
Key features
Explicitly approve access to your data or configurations on Google Cloud. Access Approval requests, when combined with Access Transparency logs, can be used to audit an end-to-end chain from support ticket to access request to approval, to eventual access.
View the reason for each access, including references to specific support tickets where relevant.
Identify the exact resources accessed by administrators and the methods run.
Documentation
All features
Access approval | Explicitly approve access to your data or configurations on Google Cloud. Access Approval requests, when combined with Access Transparency logs, can be used to audit an end-to-end chain from support ticket to access request to approval, to eventual access. |
Access justifications | View the reason for each access, including references to specific support tickets where relevant. |
Resource and method identification | Identify the exact resources accessed by administrators and the methods run. |
Cloud Logging integration | Integrate seamlessly into your existing Cloud Logging configuration. |
Accessor location | View the country in which the administrator performing the action was based. |
Data protection controls | Take advantage of Google’s data-protection controls designed to limit support and engineering’s ability to access your data unless necessary. |
Near real-time publication |