Back to controls

Ensure aggregated log sinks are configured at org or folder scope

Centralized logging helps ensure forensic and audit evidence is retained even if project-level settings change.

Category

Controls

Medium

Applies to

Google Cloud

Coverage

null controls, 1 queries

Asset types

1 covered

Overview

Centralized logging helps ensure forensic and audit evidence is retained even if project-level settings change.

Remediation guidance

Google Cloud Remediation

Service-Wide (Recommended)

Configure aggregated sinks at org/folder scope that include children and route audit/security logs centrally.

Google Cloud Console (Asset-Level)

  1. Open Cloud Logging Logs Router at org/folder scope.
  2. Create sink with Include children enabled.
  3. Route logs to centralized project, bucket, or SIEM destination.

Google Cloud CLI (Service-Wide)

gcloud logging sinks create <sink-name> <destination> --organization=<org-id> --include-children --log-filter="<filter>"

References

  • https://cloud.google.com/logging/docs/export/configure_export_v2

Query logic

These are the stored checks tied to this control.

Missing aggregated log sinks

Connectors

Google Cloud

Covered asset types

LogSink

Expected check: eq []

{ logSinks(where: { OR: [ { includeChildren: false }, { destination: "" } ] }) { ...AssetFragment } }
Cyscale Logo
Cyscale is an agentless cloud-native application protection platform (CNAPP) that automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Stay connected

Receive new blog posts and product updates from Cyscale

By clicking Subscribe, I agree to Cyscale’s Privacy Policy


© 2026 Cyscale Limited

LinkedIn icon
Twitter icon
Facebook icon
crunch base icon
angel icon