This is a dedicated watch page for a single video.
The security operations team needs access to the security-related logs for all projects in their organization. They have the following requirements: Follow the least privilege model by having only view access to logs. Have access to Admin Activity logs. Have access to Data Access logs. Have access to Access Transparency logs. Which Identity and Access Management (IAM) role should the security operations team be granted?