Stay organized with collections
Save and categorize content based on your preferences.
This page describes where to find access control information for
Security Command Center.
Security Command Center uses Identity and Access Management (IAM) to control
access to resources at different levels of your resource hierarchy. You use
IAM roles to control who can do what with assets,
findings, and security sources in your Security Command Center environment. You grant
roles to individuals and applications, and each role provides specific
permissions.
The IAM roles that you need depend on the level at which
you activated Security Command Center. You can activate Security Command Center at the
organization level or the project level. For information about the differences
between the two activation levels, see Overview of activating
Security Command Center.
Where to find access control information
For information about the IAM roles that you need to use
Security Command Center, see one of the following pages depending on the level at
which you activated Security Command Center:
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-25 UTC."],[],[],null,["# Access control with IAM\n\n| Standard, Premium, and Enterprise [service tiers](/security-command-center/docs/service-tiers)\n\nThis page describes where to find access control information for\nSecurity Command Center.\n\nSecurity Command Center uses Identity and Access Management (IAM) to control\naccess to resources at different levels of your resource hierarchy. You use\nIAM roles to control who can do what with assets,\nfindings, and security sources in your Security Command Center environment. You grant\nroles to individuals and applications, and each role provides specific\npermissions.\n\nThe IAM roles that you need depend on the level at which\nyou activated Security Command Center. You can activate Security Command Center at the\norganization level or the project level. For information about the differences\nbetween the two activation levels, see [Overview of activating\nSecurity Command Center](/security-command-center/docs/activate-scc-overview).\n\nWhere to find access control information\n----------------------------------------\n\nFor information about the IAM roles that you need to use\nSecurity Command Center, see one of the following pages depending on the level at\nwhich you activated Security Command Center:\n\n- [IAM for organization-level activations of\n Security Command Center](/security-command-center/docs/access-control-org)\n\n- [IAM for project-level activations of\n Security Command Center](/security-command-center/docs/access-control-project)"]]