Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Halaman ini menjelaskan tempat menemukan informasi kontrol akses untuk Security Command Center.
Security Command Center menggunakan Identity and Access Management (IAM) untuk mengontrol
akses ke resource di berbagai tingkat hierarki resource Anda. Anda menggunakan
peran IAM untuk mengontrol siapa yang dapat melakukan apa pada aset,
temuan, dan sumber keamanan di lingkungan Security Command Center Anda. Anda memberikan
peran kepada individu dan aplikasi, dan setiap peran memberikan
izin tertentu.
Peran IAM yang Anda perlukan bergantung pada level tempat Anda mengaktifkan Security Command Center. Anda dapat mengaktifkan Security Command Center di level organisasi atau level project. Untuk mengetahui informasi tentang perbedaan
antara dua tingkat aktivasi, lihat Ringkasan aktivasi
Security Command Center.
Tempat menemukan informasi kontrol akses
Untuk mengetahui informasi tentang peran IAM yang Anda perlukan untuk menggunakan
Security Command Center, lihat salah satu halaman berikut, bergantung pada level tempat Anda mengaktifkan Security Command Center:
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-08-19 UTC."],[],[],null,["# Access control with IAM\n\n| Standard, Premium, and Enterprise [service tiers](/security-command-center/docs/service-tiers)\n\nThis page describes where to find access control information for\nSecurity Command Center.\n\nSecurity Command Center uses Identity and Access Management (IAM) to control\naccess to resources at different levels of your resource hierarchy. You use\nIAM roles to control who can do what with assets,\nfindings, and security sources in your Security Command Center environment. You grant\nroles to individuals and applications, and each role provides specific\npermissions.\n\nThe IAM roles that you need depend on the level at which\nyou activated Security Command Center. You can activate Security Command Center at the\norganization level or the project level. For information about the differences\nbetween the two activation levels, see [Overview of activating\nSecurity Command Center](/security-command-center/docs/activate-scc-overview).\n\nWhere to find access control information\n----------------------------------------\n\nFor information about the IAM roles that you need to use\nSecurity Command Center, see one of the following pages depending on the level at\nwhich you activated Security Command Center:\n\n- [IAM for organization-level activations of\n Security Command Center](/security-command-center/docs/access-control-org)\n\n- [IAM for project-level activations of\n Security Command Center](/security-command-center/docs/access-control-project)"]]