このドキュメントでは、 Google Cloud リソースを管理する権限を Config Controller に付与する方法について説明します。
最小権限
Google Cloud は、Identity and Access Management を安全に使用するために、最小権限のベスト プラクティスに従うことを推奨しています。本番環境では、どのようなユーザー・アカウントやプロセスであれ、意図した機能を実行するために必要不可欠な権限のみを付与するようにしてください。
Config Connector の IAM 権限
IAM は、Config Connector が Google Cloud リソースに対してアクションを実行することを認可します。
[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-08-30 UTC。"],[],[],null,["# IAM permissions for Config Controller\n\nThis document describes how to grant Config Controller permissions to manage\nyour Google Cloud resources.\n\nLeast privilege\n---------------\n\nTo use Identity and Access Management securely, Google Cloud recommends following the\n[least privilege](/iam/docs/using-iam-securely#least_privilege)\nbest practice. In production environments, give any user accounts or processes\nonly those privileges which are essentially vital to perform its intended\nfunctions.\n\nIAM permissions for Config Connector\n------------------------------------\n\nIAM authorizes Config Connector to take actions on Google Cloud resources.\n\n### (Recommended) Predefined or custom roles\n\nTo follow the least privilege best practice, grant the most limited\n[predefined roles](/iam/docs/understanding-roles#predefined_roles)\nor\n[custom roles](/iam/docs/understanding-custom-roles)\nthat meet your needs. For example, if you need Config Connector to manage your\nGKE cluster creation, grant the\n[Kubernetes Engine Cluster Admin role](/kubernetes-engine/docs/how-to/iam#predefined)\n(`roles/container.clusterAdmin`).\n\nYou can use\n[role recommendations](/iam/docs/recommender-overview)\nto determine which roles to grant instead. You can also use the\n[Policy Simulator](/iam/docs/understanding-simulator)\nto ensure that changing the role won't affect the principal's access.\n\n### Basic roles\n\nIt is recommended to have the same permissions in a non-production environment\nthat you have in a production environment, following the least privilege best\npractice. Having the same permissions has the benefit of testing the production\nconfigurations in non-production, and detecting issues earlier.\n\nThat said, for certain situations you may want to speed up experimenting with\nConfig Connector. For non-production environments, you can use one of the basic roles\nas an experiment, before deciding on the most limited permissions.\n| **Caution:** Basic roles include thousands of permissions across all Google Cloud services. In production environments, don't grant basic roles unless there is no alternative. Instead, grant the most limited [predefined roles](/iam/docs/understanding-roles#predefined_roles) or [custom roles](/iam/docs/understanding-custom-roles) that meet your needs.\n\nThe\n[Owner role](/iam/docs/understanding-roles#basic)\n(`roles/owner`) allows Config Connector to manage most of Google Cloud resources in\nyour project, including IAM resources.\n\nThe\n[Editor role](/iam/docs/understanding-roles#basic)\n(`roles/editor`) allows most Config Connector capabilities except Project or\nOrganization-wide configurations such as IAM modifications.\n\nTo learn more about IAM permissions for Config Connector:\n\n- Read [IAM permissions for Config Connector](/config-connector/docs/how-to/configure-iam-permissions).\n- Read [Config Connector permission troubleshooting guide](/config-connector/docs/troubleshooting#error_403_caller_is_missing_iam_permission)."]]