Security architecture and IAM

Before setting up Identity and Access Management (IAM) for your Trusted Cloud organization, you should understand how IAM fits in to your organization's security architecture as a whole.

To learn about Google's core security principles and find links to additional resources, see Trusted Cloud by S3NS Well-Architected Framework: Security, privacy, and compliance in the Cloud Architecture Center. This information can help you architect your Trusted Cloud by S3NS deployment to meet security best practices, as well as your business needs.