Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Pengecualian Transparansi Akses
Log Transparansi Akses dibuat saat personel Google mengakses konten yang telah Anda upload ke layanan yang didukung Transparansi Akses, kecuali dalam skenario berikut:
Secara hukum, Google dilarang memberi tahu Anda tentang akses tersebut. Untuk mengetahui detailnya,
lihat
Laporan Transparansi Google Cloud.
Anda telah memberikan akses ke konten Anda kepada personel Google menggunakan kebijakan Identity and Access Management (IAM); aktivitas mereka dicatat dalam Log Audit Cloud (jika diaktifkan), bukan log Transparansi Akses.
Akses tersebut tidak menargetkan Data Pelanggan; misalnya,
personel Google membuat kueri untuk ukuran rata-rata data dalam database yang
berisi konten dari beberapa Google Cloud pelanggan.
Konten yang dimaksud adalah ID resource publik atau
nama resource. Contoh:
Google Cloud project ID
Nama bucket Cloud Storage
Nama VM Compute Engine
Nama cluster Google Kubernetes Engine
Nama resource BigQuery (termasuk set data, tabel, dan
reservasi)
Akses berasal dari sistem dan kode otomatis standar Google.
Akses sistem ini divalidasi oleh otorisasi kode, yang memverifikasi
bahwa tugas berasal dari kode yang diperiksa ke dalam produksi dan
tunduk pada peninjauan keamanan dan privasi multi-pihak, termasuk pemilik kode sumber
yang terverifikasi.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-08-18 UTC."],[[["\u003cp\u003eAccess Transparency logs are generated when Google personnel access your content in supported services, with specific exceptions.\u003c/p\u003e\n"],["\u003cp\u003eAccess is not logged if Google is legally prohibited from notifying you, as detailed in the Google Cloud Transparency Report.\u003c/p\u003e\n"],["\u003cp\u003eAccess by Google personnel granted through your Identity and Access Management (IAM) policy is logged in Cloud Audit Logs, not Access Transparency logs.\u003c/p\u003e\n"],["\u003cp\u003eAccess to data that isn't considered Customer Data, such as aggregated resource sizes, will not generate Access Transparency logs.\u003c/p\u003e\n"],["\u003cp\u003eAccess from Google's standard automated systems and code, verified through code authorization and security reviews, are excluded from Access Transparency logs.\u003c/p\u003e\n"]]],[],null,["# Access Transparency exclusions\n==============================\n\nAccess Transparency logs are generated when Google personnel access content that you've\nuploaded into an Access Transparency\n[supported service](/assured-workloads/access-transparency/docs/supported-services),\n**except** in the following scenarios:\n\n1. Google is legally prohibited from notifying you of the access. For details,\n refer to Google Cloud's\n [Transparency Report](https://transparencyreport.google.com/user-data/enterprise?enterprise_legal_process_breakdown=product:1;authority:;series:requests,accounts,compliance&lu=enterprise_legal_process_breakdown).\n\n2. You've granted the Google personnel access to your content by using your\n Identity and Access Management (IAM) policy; their activities are recorded in\n [Cloud Audit Logs](/logging/docs/audit) (when enabled), not Access Transparency logs.\n\n3. The access doesn't target [Customer Data](/terms/service-terms); for example,\n Google personnel querying for the average size of records in a database that\n contains content from multiple Google Cloud customers.\n\n4. The content in question is a public resource identifier or a\n [resource name](https://google.aip.dev/122). For example:\n\n - Google Cloud project IDs\n - Cloud Storage bucket names\n - Compute Engine VM names\n - Google Kubernetes Engine cluster names\n - BigQuery resource names (including datasets, tables, and reservations)\n5. The access originates from Google's standard automated systems and code.\n These system accesses are validated by code authorization, which verifies\n that the job originates from code that was checked into production and\n subject to a multi-party security and privacy review, including a verified\n source code owner.\n\nWhat's next\n-----------\n\n- Learn about the [services that Access Transparency supports](/assured-workloads/access-transparency/docs/supported-services)."]]