devops-engineer video for in granting the security team read-only access to Data Access audit logs in the _Required bucket, while adhering to the principle of
In granting the security team read-only access to Data Access audit logs in the _Required bucket, while adhering to the principle of least privilege and Google-recommended practices, what's the optimal approach?