Skip to main content

🧠 Google Cloud Audit Logging is not configured properly - prod.logic.yaml 🟒

Flags​

Input Type​

TypeAPI NameExtractsExtract FilesLogic Files
πŸ”’πŸ“• Google ProjectCA10__CaGoogleProject__c2116

Uses​

Test Results πŸŸ’β€‹

Generated at: 2025-04-24T23:47:07.461289223Z Open

ResultIdCondition IndexCondition TextRuntime Error
🟒a4p1βœ”οΈ 199βœ”οΈ CA10__Google_Resource_Manager_Projects__r.has(COMPLIANT)βœ”οΈ null
🟒a4p2βœ”οΈ 199βœ”οΈ CA10__Google_Resource_Manager_Projects__r.has(COMPLIANT)βœ”οΈ null
🟒a4p3βœ”οΈ 199βœ”οΈ CA10__Google_Resource_Manager_Projects__r.has(COMPLIANT)βœ”οΈ null
🟒a4p3INβœ”οΈ 200βœ”οΈ otherwiseβœ”οΈ null
🟒a4p3IN2βœ”οΈ 200βœ”οΈ otherwiseβœ”οΈ null
🟒a4p3IN3βœ”οΈ 200βœ”οΈ otherwiseβœ”οΈ null
🟒a4p3IN4βœ”οΈ 200βœ”οΈ otherwiseβœ”οΈ null

Generation​

FileMD5
Open/ce/ca/google/logging/audit-logging-configuration/policy.yamlE55CD7A05B0A5527B600AD75893A83B9
Open/ce/ca/google/logging/audit-logging-configuration/prod.logic.yaml764353DED76D44977BC681241C2EC41A
Open/ce/ca/google/logging/audit-logging-configuration/test-data.json30885C3FD59875830B95D5779DDAD77C
Open/types/CA10__CaGoogleIamPolicyAuditConfig__c/object.extracts.yamlC0AFDAABBCA4E60A368C5953D05809DF
Open/types/CA10__CaGoogleIamPolicyAuditLogConfig__c/object.extracts.yaml48FDC97ADBDBBB58265E84134754A471
Open/types/CA10__CaGoogleProject__c/object.extracts.yaml8EB422663BF4493D44ABA5FEC0FB9AD4

Generate FULL script​

java -jar repo-manager.jar policies generate FULL /ce/ca/google/logging/audit-logging-configuration/prod.logic.yaml

Generate DEBUG script​

java -jar repo-manager.jar policies generate DEBUG /ce/ca/google/logging/audit-logging-configuration/prod.logic.yaml

Generate CAPTURE_TEST_DATA script​

java -jar repo-manager.jar policies generate CAPTURE_TEST_DATA /ce/ca/google/logging/audit-logging-configuration/prod.logic.yaml

Generate TESTS script​

java -jar repo-manager.jar policies generate TESTS /ce/ca/google/logging/audit-logging-configuration/prod.logic.yaml

Execute tests​

java -jar repo-manager.jar policies test /ce/ca/google/logging/audit-logging-configuration/prod.logic.yaml

Content​

Open File

---

inputType: "CA10__CaGoogleProject__c"
testData:
- file: test-data.json
importExtracts:
- file: /types/CA10__CaGoogleProject__c/object.extracts.yaml
conditions:
- status: "COMPLIANT"
currentStateMessage: "Cloud Audit Logging is configured to track all admin activities and read, write access to user data."
check:
RELATED_LIST_HAS:
status: "COMPLIANT"
relationshipName: "CA10__Google_Resource_Manager_Projects__r"
otherwise:
status: "INCOMPLIANT"
currentStateMessage: "Cloud Audit Logging is not configured to track all admin activities and read, write access to user data."
remediationMessage: "Configure Cloud Audit Logging to track all admin activities and read, write access to user data."
relatedLists:
- relationshipName: "CA10__Google_Resource_Manager_Projects__r"
importExtracts:
- file: /types/CA10__CaGoogleIamPolicyAuditConfig__c/object.extracts.yaml
- file: /types/CA10__CaGoogleIamPolicyAuditLogConfig__c/object.extracts.yaml
conditions:
- status: "COMPLIANT"
currentStateMessage: "Cloud Audit Logging is configured to track all admin activities and read, write access to user data."
check:
OR:
args:
- RELATED_LIST_HAS:
status: "COMPLIANT"
relationshipName: "CA10__Google_IAM_Policy_Audit_Configs__r"
- RELATED_LIST_HAS:
status: "COMPLIANT"
relationshipName: "CA10__resourceManagerFolder__r.CA10__Google_IAM_Policy_Audit_Configs__r"
- RELATED_LIST_HAS:
status: "COMPLIANT"
relationshipName: "CA10__resourceManagerOrganization__r.CA10__Google_IAM_Policy_Audit_Configs__r"
otherwise:
status: "INCOMPLIANT"
currentStateMessage: "Resource Manager Project is not configured to track all admin activities and read, write access to user data."
relatedLists:
# PROJECT level
- relationshipName: "CA10__Google_IAM_Policy_Audit_Configs__r"
recordTypes:
- "caGoogleIamPolicyAuditConfigProject"
conditions:
- status: "COMPLIANT"
currentStateMessage: "Project Audit Config is configured to track all admin activities and read, write access to user data."
check:
AND:
args:
- IS_EQUAL:
left:
RELATED_LIST_COUNT:
status: "COMPLIANT"
relationshipName: "CA10__Google_IAM_Policy_Audit_Log_Config1__r"
right:
NUMBER: 2.0
- IS_EMPTY:
arg:
EXTRACT: "CA10__exemptedMembers__c" # Audit_Configs
- IS_EQUAL:
left:
EXTRACT: "CA10__service__c"
right:
TEXT: "allServices"
otherwise:
status: "INCOMPLIANT"
currentStateMessage: "Project Audit Config is not configured to track all admin activities and read, write access to user data."
relatedLists:
- relationshipName: "CA10__Google_IAM_Policy_Audit_Log_Config1__r"
conditions:
- status: "COMPLIANT"
currentStateMessage: "COMPLIANT Audit Log Configs"
check:
AND:
args:
- OR:
args:
- IS_EQUAL:
left:
EXTRACT: "CA10__logType__c"
right:
TEXT: "DATA_WRITE"
- IS_EQUAL:
left:
EXTRACT: "CA10__logType__c"
right:
TEXT: "DATA_READ"
- IS_EMPTY:
arg:
EXTRACT: "CA10__exemptedMembers__c" # Audit_Log_Config
otherwise:
status: "INCOMPLIANT"
currentStateMessage: "INCOMPLIANT Audit Log Configs"
# FOLDER level
- relationshipName: "CA10__resourceManagerFolder__r.CA10__Google_IAM_Policy_Audit_Configs__r"
recordTypes:
- "caGoogleIamPolicyAuditConfigFolder"
conditions:
- status: "COMPLIANT"
currentStateMessage: "Folder Audit Config is configured to track all admin activities and read, write access to user data."
check:
AND:
args:
- IS_EQUAL:
left:
RELATED_LIST_COUNT:
status: "COMPLIANT"
relationshipName: "CA10__Google_IAM_Policy_Audit_Log_Config1__r"
right:
NUMBER: 2.0
- IS_EMPTY:
arg:
EXTRACT: "CA10__exemptedMembers__c" # Audit_Configs
- IS_EQUAL:
left:
EXTRACT: "CA10__service__c"
right:
TEXT: "allServices"
otherwise:
status: "INCOMPLIANT"
currentStateMessage: "Folder Audit Config is not configured to track all admin activities and read, write access to user data."
relatedLists:
- relationshipName: "CA10__Google_IAM_Policy_Audit_Log_Config1__r"
conditions:
- status: "COMPLIANT"
currentStateMessage: "COMPLIANT Audit Log Configs"
check:
AND:
args:
- OR:
args:
- IS_EQUAL:
left:
EXTRACT: "CA10__logType__c"
right:
TEXT: "DATA_WRITE"
- IS_EQUAL:
left:
EXTRACT: "CA10__logType__c"
right:
TEXT: "DATA_READ"
- IS_EMPTY:
arg:
EXTRACT: "CA10__exemptedMembers__c" # Audit_Log_Config
otherwise:
status: "INCOMPLIANT"
currentStateMessage: "INCOMPLIANT Audit Log Configs"
# ORG level
- relationshipName: "CA10__resourceManagerOrganization__r.CA10__Google_IAM_Policy_Audit_Configs__r"
recordTypes:
- "caGoogleIamPolicyAuditConfigOrganization"
conditions:
- status: "COMPLIANT"
currentStateMessage: "Organization Audit Config is configured to track all admin activities and read, write access to user data."
check:
AND:
args:
- IS_EQUAL:
left:
RELATED_LIST_COUNT:
status: "COMPLIANT"
relationshipName: "CA10__Google_IAM_Policy_Audit_Log_Config1__r"
right:
NUMBER: 2.0
- IS_EMPTY:
arg:
EXTRACT: "CA10__exemptedMembers__c" # Audit_Configs
- IS_EQUAL:
left:
EXTRACT: "CA10__service__c"
right:
TEXT: "allServices"
otherwise:
status: "INCOMPLIANT"
currentStateMessage: "Organization Audit Config is not configured to track all admin activities and read, write access to user data."
relatedLists:
- relationshipName: "CA10__Google_IAM_Policy_Audit_Log_Config1__r"
conditions:
- status: "COMPLIANT"
currentStateMessage: "COMPLIANT Audit Log Configs"
check:
AND:
args:
- OR:
args:
- IS_EQUAL:
left:
EXTRACT: "CA10__logType__c"
right:
TEXT: "DATA_WRITE"
- IS_EQUAL:
left:
EXTRACT: "CA10__logType__c"
right:
TEXT: "DATA_READ"
- IS_EMPTY:
arg:
EXTRACT: "CA10__exemptedMembers__c" # Audit_Log_Config
otherwise:
status: "INCOMPLIANT"
currentStateMessage: "INCOMPLIANT Audit Log Configs"