Google Security-Operations-Engineer Question Answer
During a proactive threat hunting exercise, you discover that a critical production project has an external identity with a highly privileged IAM role. You suspect that this is part of a larger intrusion, and it is unknown how long this identity has had access. All logs are enabled and routed to a centralized organization-level Cloud Logging bucket, and historical logs have been exported to BigQuery datasets.
You need to determine whether any actions were taken by this external identity in your environment.
What should you do?
Google Security-Operations-Engineer Summary
- Vendor: Google
- Product: Security-Operations-Engineer
- Update on: Dec 19, 2025
- Questions: 60

