Gain visibility through logs
When you grant Labelbox access using the IAM Delegated Access method, every action our platform takes is authenticated by your cloud provider. Every time Labelbox temporarily assumes the IAM role to access a file for labeling, your cloud provider records that event in an audit log. These logs answer critical security questions:- Who made the request? (The specific Labelbox IAM role)
- What resource was accessed? (The specific file/object in your bucket)
- When did the access occur? (A precise timestamp)
- From where was the request made? (The source IP address, which will be one of Labelbox’s servers)