Security architecture and IAM

Before setting up Identity and Access Management (IAM) for your Google Cloudorganization, you should understand how IAM fits in to yourorganization's security architecture as a whole.

To learn about Google's core security principles and find links to additionalresources, seeGoogle Cloud Well-Architected Framework: Security, privacy, andcompliance in the Cloud Architecture Center.This information can help you architect your Google Cloud deployment to meetsecurity best practices, as well as your business needs.

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2025-12-15 UTC.