Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Policy Intelligence menawarkan beberapa alat untuk membantu
memahami penggunaan akun layanan dalam project Anda. Alat ini dapat membantu Anda
menjawab pertanyaan berikut:
Kapan terakhir kali kunci atau akun layanan tertentu digunakan untuk
melakukan autentikasi?
Akun layanan manakah dalam project saya yang belum digunakan dalam 90 hari terakhir?
Produk Google Cloud lainnya menawarkan alat untuk membantu Anda mengenali aktivitas
akun layanan yang mencurigakan:
Cloud Monitoring menyediakan metrik penggunaan jangka panjang untuk
akun dan kunci layanan yang dapat Anda gunakan untuk mendeteksi anomali.
Event Threat Detection melaporkan saat akun layanan yang tidak aktif memicu
tindakan. Akun layanan yang tidak aktif adalah akun layanan yang telah tidak aktif
selama lebih dari 180 hari.
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-08-21 UTC."],[[["\u003cp\u003ePolicy Intelligence provides tools to help understand service account usage in your projects.\u003c/p\u003e\n"],["\u003cp\u003eThese tools help answer when a specific service account or key was last used for authentication.\u003c/p\u003e\n"],["\u003cp\u003eThese tools also identify which service accounts haven't been used in the past 90 days.\u003c/p\u003e\n"],["\u003cp\u003eCloud Monitoring offers long-term service account usage metrics to identify anomalies.\u003c/p\u003e\n"],["\u003cp\u003eEvent Threat Detection alerts you when dormant service accounts, inactive for over 180 days, are used.\u003c/p\u003e\n"]]],[],null,["# Tools to understand service account usage\n\n[Policy Intelligence](/policy-intelligence/docs/service-account-usage-tools) offers several tools to help you\nunderstand service account usage in your projects. These tools can help you\nanswer the following questions:\n\n- When was the last time that a specific service account or key was used to authenticate?\n- Which service accounts in my project have not been used in the past 90 days?\n\nOther Google Cloud products offer tools to help you recognize suspicious\nservice account activity:\n\n- [Cloud Monitoring](/iam/docs/service-account-monitoring) provides long-term usage metrics for service accounts and keys that you can use to detect anomalies.\n- [Event Threat Detection](/security-command-center/docs/concepts-event-threat-detection-overview) reports when dormant service accounts trigger actions. Dormant service accounts are service accounts that have been inactive for more than 180 days.\n\nTo learn more about these tools and their intended uses, see [Tools to\nunderstand service account usage](/policy-intelligence/docs/service-account-usage-tools) in the\nPolicy Intelligence documentation."]]