This is a dedicated watch page for a single video.
Your organization backs up sensitive medical data records on 5 different Cloud Storage buckets with data access logging enabled. Your audit team recently reported that an unauthorized customer service representative is viewing and downloading files from the storage. They also noticed that bucket labels are frequently changed which affects the workflow of other users. These reports prompt an investigation, and you need to quickly verify the activities of a specific user on all of the buckets. What should you do?