This is a dedicated watch page for a single video.
Your Security team suspects that a former employee of your company gained unauthorized access to Google Cloud resources within the past 2 months by utilizing a service account key. You need to confirm the unauthorized access and analyze user activity. What should you do?