Stay organized with collections
Save and categorize content based on your preferences.
Access Transparency exclusions
Access Transparency logs are generated when Google personnel access
content that you've uploaded into an Access Transparency
supported service, except in the following scenarios:
Google is legally prohibited from notifying you of the access.
You've granted the Google personnel access to your content by
using your Identity and Access Management policy; their activities are recorded in
Cloud Audit Logs (when enabled), not Access Transparency logs.
The access doesn't target customer data; for example,
Google personnel querying for the average size of records in a database that
contains content from multiple Google Cloud customers. It is extremely rare
that such instances would result in exposure to significant quantities of
customer data.
The content in question is a public resource identifier. For example:
Google Cloud project IDs
Cloud Storage bucket names
Compute Engine VM names
Google Kubernetes Engine cluster names
BigQuery resource names (including datasets, tables,
and reservations)
The access originates from standard system code. These accesses are validated
by code authorization, which verifies that the job originates from code that
was checked into production and subject to a multi-party security and privacy
review, including a verified source code owner.