Access control with IAM

Standard, Premium, and Enterpriseservice tiers

This page describes where to find access control information forSecurity Command Center.

Security Command Center uses Identity and Access Management (IAM) to controlaccess to resources at different levels of your resource hierarchy. You useIAM roles to control who can do what with assets,findings, and security sources in your Security Command Center environment. You grantroles to individuals and applications, and each role provides specificpermissions.

The IAM roles that you need depend on the level at whichyou activated Security Command Center. You can activate Security Command Center at theorganization level or the project level. For information about the differencesbetween the two activation levels, seeOverview of activatingSecurity Command Center.

Where to find access control information

For information about the IAM roles that you need to useSecurity Command Center, see one of the following pages depending on the level atwhich you activated Security Command Center:

Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2026-02-19 UTC.