Resource: SocRole
This service is available for customers who migrated SOAR to a customer managed project and have the Chronicle API enabled. Conventionally, different access rights are assigned to different SOC roles, but within your organization, you can experiment with the permission levels and environments to determine the full scope of responsibility for each user group in the Google Security Operations platform. The Google Security Operations platform comes with predefined SOC roles but customized roles can be added.
JSON representation |
---|
{ "name": string, "displayName": string, "defaultRole": boolean, "additionalRolesAccess": [ string ] } |
Fields | |
---|---|
name |
Identifier. The unique name(ID) of the SocRole. Format: projects/{project}/locations/{location}/instances/{instance}/socRoles/{socRole} |
displayName |
Required. Name of the soc-role. MAX_NAME_LENGTH = 256. |
defaultRole |
Optional. One of the roles can be set as default. The default role will have all new cases automatically assigned to it. Note, there may not be any default role, but the default role cannot be deleted once set. Once a role is set as default the previous one will become non-default. |
additionalRolesAccess[] |
Optional. Additional roles users associated with this role will have access to. This will affect which cases they can see in the Google Security Operations platform. |
Methods |
|
---|---|
|
Creates a SocRole. |
|
Deletes a SocRole. |
|
Gets a SocRole. |
|
Lists SocRoles. |
|
Updates a SocRole. |