Stay organized with collections
Save and categorize content based on your preferences.
Access Transparency exclusions
Access Transparency logs are generated when Google personnel access content that you've
uploaded into an Access Transparency
supported service,
except in the following scenarios:
Google is legally prohibited from notifying you of the access. For details,
refer to Google Cloud's
Transparency Report.
You've granted the Google personnel access to your content by using your
Identity and Access Management (IAM) policy; their activities are recorded in
Cloud Audit Logs (when enabled), not Access Transparency logs.
The access doesn't target Customer Data; for example,
Google personnel querying for the average size of records in a database that
contains content from multiple Google Cloud customers.
The content in question is a public resource identifier. For example:
Google Cloud project IDs
Cloud Storage bucket names
Compute Engine VM names
Google Kubernetes Engine cluster names
BigQuery resource names (including datasets, tables, and
reservations)
The access originates from Google's standard automated systems and code.
These system accesses are validated by code authorization, which verifies
that the job originates from code that was checked into production and
subject to a multi-party security and privacy review, including a verified
source code owner.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-05 UTC."],[[["Access Transparency logs are generated when Google personnel access your content in supported services, with specific exceptions."],["Access is not logged if Google is legally prohibited from notifying you, as detailed in the Google Cloud Transparency Report."],["Access by Google personnel granted through your Identity and Access Management (IAM) policy is logged in Cloud Audit Logs, not Access Transparency logs."],["Access to data that isn't considered Customer Data, such as aggregated resource sizes, will not generate Access Transparency logs."],["Access from Google's standard automated systems and code, verified through code authorization and security reviews, are excluded from Access Transparency logs."]]],[]]