Control access to features in the Security Operations console

Certain threat investigation capabilities in the Enterprise tier of Security Command Center are powered by Google Security Operations.

You control access to features in the Security Operations console by assigning IAM roles and permissions to users and groups, and then performing additional configuration of SOAR settings. See the following for information about how to do this:

  1. Configure access to Security Operations console features using IAM.
  2. See Security Operations console permissions in IAM for information about roles and permissions that control access to Security Operations console features.
  3. Map and authorize users using IAM.