Data Security Posture Management roles and permissions Stay organized with collections Save and categorize content based on your preferences.
This page lists the IAM roles and permissions for Data Security Posture Management. Tosearch through all roles and permissions, see therole andpermission index.
Data Security Posture Management roles
| Role | Permissions |
|---|---|
Data Security Posture Management Admin( Full access to Data Security Posture Management resources. |
|
DSPM Service Agent( Gives DSPM Service Account access to consumer resources. Warning: Do not grant service agent roles to any principals exceptservice agents. |
|
Data Security Posture Management Viewer( Readonly access to Data Security Posture Management resources. |
|
Data Security Posture Management permissions
| Permission | Included in roles |
|---|---|
| Owner ( Editor ( Viewer ( Data Security Posture Management Admin ( Data Security Posture Management Viewer ( Security Auditor ( Support User ( Security Center Admin ( Security Center Admin Editor ( Security Center Admin Viewer ( |
| Owner ( Editor ( Viewer ( Data Security Posture Management Admin ( Data Security Posture Management Viewer ( Security Auditor ( Support User ( Security Center Admin ( Security Center Admin Editor ( Security Center Admin Viewer ( |
| Owner ( Editor ( Viewer ( Data Security Posture Management Admin ( Data Security Posture Management Viewer ( Security Auditor ( Support User ( Security Center Admin ( Security Center Admin Editor ( Security Center Admin Viewer ( |
| Owner ( Editor ( Viewer ( Data Security Posture Management Admin ( Data Security Posture Management Viewer ( Security Auditor ( Support User ( Security Center Admin ( Security Center Admin Editor ( Security Center Admin Viewer ( |
| Owner ( Editor ( Viewer ( Data Security Posture Management Admin ( Data Security Posture Management Viewer ( Security Auditor ( Support User ( Security Center Admin ( Security Center Admin Editor ( Security Center Admin Viewer ( |
| Owner ( Editor ( Viewer ( Data Security Posture Management Admin ( Data Security Posture Management Viewer ( Security Auditor ( Support User ( Security Center Admin ( Security Center Admin Editor ( Security Center Admin Viewer ( |
| Owner ( Editor ( Viewer ( Data Security Posture Management Admin ( Data Security Posture Management Viewer ( Security Admin ( Security Auditor ( Security Reviewer ( Support User ( Security Center Admin ( Security Center Admin Editor ( Security Center Admin Viewer ( |
| Owner ( Editor ( Data Security Posture Management Admin ( Security Center Admin ( |
| Owner ( Editor ( Data Security Posture Management Admin ( Security Center Admin ( |
| Owner ( Editor ( Viewer ( Data Security Posture Management Admin ( Data Security Posture Management Viewer ( Security Auditor ( Support User ( Security Center Admin ( Security Center Admin Editor ( Security Center Admin Viewer ( |
| Owner ( Editor ( Viewer ( Data Security Posture Management Admin ( Data Security Posture Management Viewer ( Security Admin ( Security Auditor ( Security Reviewer ( Support User ( Security Center Admin ( Security Center Admin Editor ( Security Center Admin Viewer ( |
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-12-15 UTC.