How can I ensure that granted access is not being used in an unauthorized way?


To monitor and guarantee authorized access, leverage the power of BigQuery audit logs. BigQuery creates log entries for actions such as creating or deleting a table, purchasing slots or running a load job.

Audit logs help answer the question 'Who did what, where, and when?' within your Google Cloud resources. They are the definitive source of information for system activity by user and access patterns and should be your primary reference for audit or security inquiries.

You can use log-based alerts to notify you whenever a specific message appears in your included logs. For example, if you want to know when an audit log records a particular data-access message, you can create a log-based alert that matches the message and notifies you when it appears. Read more about alerts

Your data security is paramount to us at OWOX BI. By implementing strict measures such as role-based access control and leveraging Google Cloud Platform security standards, we strive to provide you with a secure and reliable environment for deriving valuable insights from your data.

If you have any queries or concerns regarding data security on the OWOX BI platform, feel free to reach out to us at


Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request


Please sign in to leave a comment.