Some or all of the information on this page might not apply to Trusted Cloud by S3NS.
Security architecture and IAM
Before setting up Identity and Access Management (IAM) for your Trusted Cloud
organization, you should understand how IAM fits in to your
organization's security architecture as a whole.
To learn about Google's core security principles and find links to additional
resources, see Trusted Cloud by S3NS Well-Architected Framework: Security, privacy, and
compliance in the Cloud Architecture Center.
This information can help you architect your Trusted Cloud by S3NS deployment to meet
security best practices, as well as your business needs.
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-08-13 UTC.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-13 UTC."],[[["IAM's role in your overall security architecture should be understood before it is set up within your Google Cloud organization."],["The Google Cloud Well-Architected Framework offers information on security, privacy, and compliance to guide you."],["The framework can help meet your business needs by guiding you on security best practices for deployment in the Google Cloud."]]],[]]