As the security administrator of your company, you're tasked with managing access to a Cloud Storage bucket containing 3,000 objects. You aim to avoid handling access to each object individually and prevent uploaders from having full control over their uploads. However, you intend to utilize Cloud Audit Logs for access management. What action should you take?