Container Security API audit logging Stay organized with collections Save and categorize content based on your preferences.
This document describes audit logging for Container Security API. Google Cloud servicesgenerate audit logs that record administrative and access activities within your Google Cloud resources.For more information about Cloud Audit Logs, see the following:
- Types of audit logs
- Audit log entry structure
- Storing and routing audit logs
- Cloud Logging pricing summary
- Enable Data Access audit logs
Notes
This API cannot be called directly, and is only accessible through the dashboard in the Google Cloud console.
Service name
Container Security API audit logs use the service namecontainersecurity.googleapis.com.Filter for this service:
protoPayload.serviceName="containersecurity.googleapis.com"
Methods by permission type
Each IAM permission has atype property, whose value is an enumthat can be one of four values:ADMIN_READ,ADMIN_WRITE,DATA_READ, orDATA_WRITE. When you call a method,Container Security API generates an audit log whose category is dependent on thetype property of the permission required to perform the method.Methods that require an IAM permission with thetype property valueofDATA_READ,DATA_WRITE, orADMIN_READ generateData Access audit logs.Methods that require an IAM permission with thetype property valueofADMIN_WRITE generateAdmin Activity audit logs.
| Permission type | Methods |
|---|---|
DATA_READ | google.cloud.containersecurity.v1beta.ContainerSecurity.ListFindingsgoogle.cloud.containersecurity.v1beta.ContainerSecurity.SearchClusterFindingSummaries |
API interface audit logs
For information about how and which permissions are evaluated for each method,see the Identity and Access Management documentation for Container Security API.
google.cloud.containersecurity.v1beta.ContainerSecurity
The following audit logs are associated with methods belonging togoogle.cloud.containersecurity.v1beta.ContainerSecurity.
ListFindings
- Method:
google.cloud.containersecurity.v1beta.ContainerSecurity.ListFindings - Audit log type:Data access
- Permissions:
containersecurity.findings.list - DATA_READ
- Method is a long-running or streaming operation:No.
- Filter for this method:
protoPayload.methodName="google.cloud.containersecurity.v1beta.ContainerSecurity.ListFindings"
SearchClusterFindingSummaries
- Method:
google.cloud.containersecurity.v1beta.ContainerSecurity.SearchClusterFindingSummaries - Audit log type:Data access
- Permissions:
containersecurity.clusterSummaries.list - DATA_READ
- Method is a long-running or streaming operation:No.
- Filter for this method:
protoPayload.methodName="google.cloud.containersecurity.v1beta.ContainerSecurity.SearchClusterFindingSummaries"
Methods that don't produce audit logs
A method might not produce audit logs for one or more of the followingreasons:
- It is a high volume method involving significant log generation and storage costs.
- It has low auditing value.
- Another audit or platform log already provides method coverage.
The following methods don't produce audit logs:
google.cloud.location.Locations.GetLocationgoogle.cloud.location.Locations.ListLocations
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-12-15 UTC.