Access control with IAM

This page describes where to find access control information for Security Command Center.

Security Command Center uses Identity and Access Management (IAM) to control access to resources at different levels of your resource hierarchy. You use IAM roles to control who can do what with assets, findings, and security sources in your Security Command Center environment. You grant roles to individuals and applications, and each role provides specific permissions.

The IAM roles that you need depend on the level at which you activated Security Command Center. You can activate Security Command Center at the organization level or the project level. For information about the differences between the two activation levels, see Overview of activating Security Command Center.

Where to find access control information

For information about the IAM roles that you need to use Security Command Center, see one of the following pages depending on the level at which you activated Security Command Center: