Secret Manager Audit Logging

This document describes audit logging for Secret Manager, which methods generate audit logs, details about the audit logs each method produces, and which methods do not produce audit logs, if any. Google Cloud generates audit logs that record administrative and access activities within your Google Cloud resources. For more information, see Cloud Audit Logs overview.

Service name

Secret Manager audit logs use the service name secretmanager.googleapis.com.

Methods by permission type

Methods that check DATA_READ, DATA_WRITE, and ADMIN_READ permissions generate logs categorized as Data Access audit logs. Methods that check ADMIN_WRITE permissions generate logs categorized as Admin Activity audit logs.

Permission type Methods
ADMIN_READ google.cloud.location.Locations.GetLocation
google.cloud.location.Locations.ListLocations
google.cloud.secretmanager.v1.SecretManagerService.GetIamPolicy
google.cloud.secretmanager.v1.SecretManagerService.GetSecret
google.cloud.secretmanager.v1.SecretManagerService.GetSecretVersion
google.cloud.secretmanager.v1.SecretManagerService.ListSecretVersions
google.cloud.secretmanager.v1.SecretManagerService.ListSecrets
ADMIN_WRITE google.cloud.secretmanager.v1.SecretManagerService.AddSecretVersion
google.cloud.secretmanager.v1.SecretManagerService.CreateSecret
google.cloud.secretmanager.v1.SecretManagerService.DeleteSecret
google.cloud.secretmanager.v1.SecretManagerService.DestroySecretVersion
google.cloud.secretmanager.v1.SecretManagerService.DisableSecretVersion
google.cloud.secretmanager.v1.SecretManagerService.EnableSecretVersion
google.cloud.secretmanager.v1.SecretManagerService.SetIamPolicy
google.cloud.secretmanager.v1.SecretManagerService.UpdateSecret
DATA_READ google.cloud.secretmanager.v1.SecretManagerService.AccessSecretVersion

Audit logs for each API interface

For information about how and which permissions are evaluated, for each method, see the Identity and Access Management documentation for Secret Manager.

google.cloud.location.Locations

The following section contains details about audit logs associated with methods belonging to google.cloud.location.Locations.

GetLocation

  • Method: google.cloud.location.Locations.GetLocation
  • Audit log type: Data access
  • Permissions:
    • secretmanager.locations.get - ADMIN_READ
  • Method is a long-running or streaming operation: No.
  • Filter for this method: protoPayload.methodName="google.cloud.location.Locations.GetLocation"

ListLocations

  • Method: google.cloud.location.Locations.ListLocations
  • Audit log type: Data access
  • Permissions:
    • secretmanager.locations.list - ADMIN_READ
  • Method is a long-running or streaming operation: No.
  • Filter for this method: protoPayload.methodName="google.cloud.location.Locations.ListLocations"

google.cloud.secretmanager.v1.SecretManagerService

The following section contains details about audit logs associated with methods belonging to google.cloud.secretmanager.v1.SecretManagerService.

AccessSecretVersion

  • Method: google.cloud.secretmanager.v1.SecretManagerService.AccessSecretVersion
  • Audit log type: Data access
  • Permissions:
    • secretmanager.versions.access - DATA_READ
  • Method is a long-running or streaming operation: No.
  • Filter for this method: protoPayload.methodName="google.cloud.secretmanager.v1.SecretManagerService.AccessSecretVersion"

AddSecretVersion

  • Method: google.cloud.secretmanager.v1.SecretManagerService.AddSecretVersion
  • Audit log type: Admin activity
  • Permissions:
    • secretmanager.versions.add - ADMIN_WRITE
  • Method is a long-running or streaming operation: No.
  • Filter for this method: protoPayload.methodName="google.cloud.secretmanager.v1.SecretManagerService.AddSecretVersion"

CreateSecret

  • Method: google.cloud.secretmanager.v1.SecretManagerService.CreateSecret
  • Audit log type: Admin activity
  • Permissions:
    • secretmanager.secrets.create - ADMIN_WRITE
  • Method is a long-running or streaming operation: No.
  • Filter for this method: protoPayload.methodName="google.cloud.secretmanager.v1.SecretManagerService.CreateSecret"

DeleteSecret

  • Method: google.cloud.secretmanager.v1.SecretManagerService.DeleteSecret
  • Audit log type: Admin activity
  • Permissions:
    • secretmanager.secrets.delete - ADMIN_WRITE
  • Method is a long-running or streaming operation: No.
  • Filter for this method: protoPayload.methodName="google.cloud.secretmanager.v1.SecretManagerService.DeleteSecret"

DestroySecretVersion

  • Method: google.cloud.secretmanager.v1.SecretManagerService.DestroySecretVersion
  • Audit log type: Admin activity
  • Permissions:
    • secretmanager.versions.destroy - ADMIN_WRITE
  • Method is a long-running or streaming operation: No.
  • Filter for this method: protoPayload.methodName="google.cloud.secretmanager.v1.SecretManagerService.DestroySecretVersion"

DisableSecretVersion

  • Method: google.cloud.secretmanager.v1.SecretManagerService.DisableSecretVersion
  • Audit log type: Admin activity
  • Permissions:
    • secretmanager.versions.disable - ADMIN_WRITE
  • Method is a long-running or streaming operation: No.
  • Filter for this method: protoPayload.methodName="google.cloud.secretmanager.v1.SecretManagerService.DisableSecretVersion"

EnableSecretVersion

  • Method: google.cloud.secretmanager.v1.SecretManagerService.EnableSecretVersion
  • Audit log type: Admin activity
  • Permissions:
    • secretmanager.versions.enable - ADMIN_WRITE
  • Method is a long-running or streaming operation: No.
  • Filter for this method: protoPayload.methodName="google.cloud.secretmanager.v1.SecretManagerService.EnableSecretVersion"

GetIamPolicy

  • Method: google.cloud.secretmanager.v1.SecretManagerService.GetIamPolicy
  • Audit log type: Data access
  • Permissions:
    • secretmanager.secrets.getIamPolicy - ADMIN_READ
  • Method is a long-running or streaming operation: No.
  • Filter for this method: protoPayload.methodName="google.cloud.secretmanager.v1.SecretManagerService.GetIamPolicy"

GetSecret

  • Method: google.cloud.secretmanager.v1.SecretManagerService.GetSecret
  • Audit log type: Data access
  • Permissions:
    • secretmanager.secrets.get - ADMIN_READ
  • Method is a long-running or streaming operation: No.
  • Filter for this method: protoPayload.methodName="google.cloud.secretmanager.v1.SecretManagerService.GetSecret"

GetSecretVersion

  • Method: google.cloud.secretmanager.v1.SecretManagerService.GetSecretVersion
  • Audit log type: Data access
  • Permissions:
    • secretmanager.versions.get - ADMIN_READ
  • Method is a long-running or streaming operation: No.
  • Filter for this method: protoPayload.methodName="google.cloud.secretmanager.v1.SecretManagerService.GetSecretVersion"

ListSecretVersions

  • Method: google.cloud.secretmanager.v1.SecretManagerService.ListSecretVersions
  • Audit log type: Data access
  • Permissions:
    • secretmanager.versions.list - ADMIN_READ
  • Method is a long-running or streaming operation: No.
  • Filter for this method: protoPayload.methodName="google.cloud.secretmanager.v1.SecretManagerService.ListSecretVersions"

ListSecrets

  • Method: google.cloud.secretmanager.v1.SecretManagerService.ListSecrets
  • Audit log type: Data access
  • Permissions:
    • secretmanager.secrets.list - ADMIN_READ
  • Method is a long-running or streaming operation: No.
  • Filter for this method: protoPayload.methodName="google.cloud.secretmanager.v1.SecretManagerService.ListSecrets"

SetIamPolicy

  • Method: google.cloud.secretmanager.v1.SecretManagerService.SetIamPolicy
  • Audit log type: Admin activity
  • Permissions:
    • secretmanager.secrets.setIamPolicy - ADMIN_WRITE
  • Method is a long-running or streaming operation: No.
  • Filter for this method: protoPayload.methodName="google.cloud.secretmanager.v1.SecretManagerService.SetIamPolicy"

UpdateSecret

  • Method: google.cloud.secretmanager.v1.SecretManagerService.UpdateSecret
  • Audit log type: Admin activity
  • Permissions:
    • secretmanager.secrets.update - ADMIN_WRITE
  • Method is a long-running or streaming operation: No.
  • Filter for this method: protoPayload.methodName="google.cloud.secretmanager.v1.SecretManagerService.UpdateSecret"