Applications frequently need to use `secrets`—small bits of sensitive information—during either the build or run phases. An administrator handling these secrets on GCP aims to monitor `who performed what action, in which location, and at what time` within their GCP projects. Which two logging streams would give the administrator the desired information? (Select two.)