Access control with IAM

This page describes where to find access control information for Security Command Center.

Security Command Center uses Identity and Access Management (IAM) to control access to resources at different levels of your resource hierarchy. You use IAM roles to control who can do what with assets, findings, and security sources in your Security Command Center environment. You grant roles to individuals and applications, and each role provides specific permissions.

The IAM roles that you need depend on the level at which you activated Security Command Center. You can activate Security Command Center at the organization level or the project level. For information about the differences between the two activation levels, see Overview of activating Security Command Center.

Where to find access control information

For information about the IAM roles that you need to use Security Command Center, see one of the following pages depending on the level at which you activated Security Command Center:

Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.

Last updated 2026-02-20 UTC.