Security architecture and IAM
Before setting up Identity and Access Management (IAM) for your Trusted Cloud
organization, you should understand how IAM fits in to your
organization's security architecture as a whole.
To learn about Google's core security principles and find links to additional
resources, see Trusted Cloud by S3NS Well-Architected Framework: Security, privacy, and
compliance in the Cloud Architecture Center.
This information can help you architect your Trusted Cloud by S3NS deployment to meet
security best practices, as well as your business needs.
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-09-30 UTC.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-30 UTC."],[],[],null,[]]