solutions/core-landing-zone/org/org-sink.yaml (43 lines of code) (raw):

# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. ###### # Organization sink for Security logs: Cloud Audit and Access Transparency # Destination: Cloud Logging bucket hosted inside logging project # AU-2 - Organization-defined auditable events # AU-3, AU-3(1) - Sink defined at folder that will allow all the projects underneath the organization to send the logs to the logging bucket in the logging project # AU-4(1), AU-6(4), AU-9(2) - Log sinks sending the logs to same project in same region having a logging bucket # AC-2(4) - Includes Security logs: Cloud Audit and Access Transparency # AU-12, AU-12(1) - Log Sinks defined in Log Router check each log entry against the inclusion filter and exclusion filter that determine which destinations that the log entry is sent to apiVersion: logging.cnrm.cloud.google.com/v1beta1 kind: LoggingLogSink metadata: name: org-log-sink-security-logging-project-id # kpt-set: org-log-sink-security-${logging-project-id} namespace: logging annotations: config.kubernetes.io/depends-on: logging.cnrm.cloud.google.com/namespaces/logging/LoggingLogBucket/security-log-bucket spec: organizationRef: external: "0000000000" # kpt-set: ${org-id} includeChildren: true destination: # AU-3, AU-3(1), AU-4(1), AU-6(4), AU-9(2) loggingLogBucketRef: # destination.loggingLogBucketRef # Only `external` field is supported to configure the reference. external: security-log-bucket # kpt-set: logging.googleapis.com/projects/${logging-project-id}/locations/northamerica-northeast1/buckets/security-log-bucket description: Organization sink for Security Logs # the log sink must be enabled (disabled: false) to meet the listed security controls disabled: false # AC-2(4), AU-2, AU-12, AU-12(1) # Includes Security logs: Cloud Audit and Access Transparency # Security logs help you answer "who did what, where, and when" # # Cloud Audit Logs: # Admin Activity # System Events # Policy Denied # Access Transparency # Sensitive Actions # filter: |- log_id("cloudaudit.googleapis.com/activity") OR log_id("externalaudit.googleapis.com/activity") OR log_id("cloudaudit.googleapis.com/system_event") OR log_id("externalaudit.googleapis.com/system_event") OR log_id("cloudaudit.googleapis.com/policy") OR log_id("externalaudit.googleapis.com/policy") OR log_id("cloudaudit.googleapis.com/access_transparency") OR log_id("externalaudit.googleapis.com/access_transparency") OR log_id("sensitiveaction.googleapis.com/action") --- # Organization sink for Data Access logs related to Google Workspace Login Audit # https://developers.google.com/admin-sdk/reports/v1/appendix/activity/login # Destination: Cloud Logging bucket hosted inside logging project # AU-2 - Organization-defined auditable events # AU-3, AU-3(1) - Sink defined at folder that will allow all the projects underneath the organization to send the logs to the logging bucket in the logging project # AU-4(1), AU-6(4), AU-9(2) - Log sinks sending the logs to same project in same region having a logging bucket # AC-2(4) - Includes Security logs: Data Access # AU-12, AU-12(1) - Log Sinks defined in Log Router check each log entry against the inclusion filter and exclusion filter that determine which destinations that the log entry is sent to apiVersion: logging.cnrm.cloud.google.com/v1beta1 kind: LoggingLogSink metadata: name: org-log-sink-data-access-logging-project-id # kpt-set: org-log-sink-data-access-${logging-project-id} namespace: logging annotations: config.kubernetes.io/depends-on: logging.cnrm.cloud.google.com/namespaces/logging/LoggingLogBucket/security-log-bucket spec: organizationRef: external: "0000000000" # kpt-set: ${org-id} # Set includeChildren to False to prevent routing data access logs from other sources than the organization includeChildren: False destination: # AU-3, AU-3(1), AU-4(1), AU-6(4), AU-9(2) loggingLogBucketRef: # destination.loggingLogBucketRef # Only `external` field is supported to configure the reference. external: security-log-bucket # kpt-set: logging.googleapis.com/projects/${logging-project-id}/locations/northamerica-northeast1/buckets/security-log-bucket description: Organization sink for Data Access Logs # the log sink must be enabled (disabled: false) to meet the listed security controls disabled: false # AC-2(4), AU-2, AU-12, AU-12(1) # Includes Security logs: Data Access # Security logs help you answer "who did what, where, and when" # # Cloud Audit Logs: # Data Access # filter: |- log_id("cloudaudit.googleapis.com/data_access") OR log_id("externalaudit.googleapis.com/data_access") resource.type="audited_resource" resource.labels.service="login.googleapis.com"