This page lists the IAM roles and permissions for Cloud Key Management Service. To search through all roles and permissions, see the role and permission index.
Cloud Key Management Service roles
| Role | Permissions |
|---|---|
Cloud KMS Admin( Provides access to Cloud KMS resources, except for access to restricted resource types and cryptographic operations. Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Encrypter/Decrypter( Provides ability to use Cloud KMS resources for encrypt and decrypt operations only. Lowest-level resources where you can grant this role:
|
|
Cloud KMS Viewer( Enables Get and List operations. Lowest-level resources where you can grant this role:
|
|
Cloud KMS Autokey Admin( Enables management of AutokeyConfig. |
|
Cloud KMS Autokey User( Grants ability to use KeyHandle resources. |
|
Cloud KMS CryptoKey Decrypter( Provides ability to use Cloud KMS resources for decrypt operations only. Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Decrypter Via Delegation( Enables Decrypt operations via other Google Cloud services Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Encrypter( Provides ability to use Cloud KMS resources for encrypt operations only. Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation( Enables Encrypt and Decrypt operations via other Google Cloud services Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Encrypter Via Delegation( Enables Encrypt operations via other Google Cloud services Lowest-level resources where you can grant this role:
|
|
Cloud KMS Crypto Operator( Enables all Crypto Operations. Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Decapsulator Beta( Enables Decapsulate and GetPublicKey operations |
|
Cloud KMS EkmConnections Admin( Enables management of EkmConnections. |
|
Cloud KMS Expert PQ Asymmetric Signing Key Manager( Enables PQ asymmetric signing key management. |
|
Cloud KMS Expert Raw AES-CBC Key Manager( Enables raw AES-CBC keys management. Lowest-level resources where you can grant this role:
|
|
Cloud KMS Expert Raw AES-CTR Key Manager( Enables raw AES-CTR keys management. Lowest-level resources where you can grant this role:
|
|
Cloud KMS Expert Raw PKCS#1 Key Manager( Enables raw PKCS#1 keys management. Lowest-level resources where you can grant this role:
|
|
Cloud KMS single-tenant HSM Executor( Grants ability to execute SingleTenantHsmInstanceProposal resources. |
|
Cloud KMS single-tenant HSM Key Creator( Grants ability to use single-tenant HSM instances to create keys. This role must be combined with another role that grants the ability to create cryptoKeys. |
|
Cloud KMS single-tenant HSM Proposer( Grants ability to create SingleTenantHsmInstances and SingleTenantHsmInstanceProposals. |
|
Cloud KMS single-tenant HSM Quorum Member( Grants ability to approve SingleTenantHsmInstanceProposal resources. |
|
Cloud KMS Importer( Enables ImportCryptoKeyVersion, CreateImportJob, ListImportJobs, and GetImportJob operations |
|
Key Access Justifications Enrollment Viewer( Grant ability to view Key Access Justification enrollment configs of a project. |
|
Key Access Justifications Policy Config Admin( Grant ability to manage Key Access Justifications Policy at parent resource level. |
|
Cloud KMS Protected Resources Viewer( Enables viewing protected resources. |
|
Cloud KMS CryptoKey Public Key Viewer( Enables GetPublicKey operations Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Signer( Enables Sign operations Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Signer/Verifier( Enables Sign, Verify, and GetPublicKey operations Lowest-level resources where you can grant this role:
|
|
Cloud KMS CryptoKey Verifier( Enables Verify and GetPublicKey operations Lowest-level resources where you can grant this role:
|
|
Service agent roles
Service agent roles should only be granted to service agents.
| Role | Permissions |
|---|---|
Cloud KMS Organization Service Agent( Gives Cloud KMS organization-level service account access to managed resources. |
|
Cloud KMS Service Agent( Gives Cloud KMS service account access to managed resources. |
|
Cloud KMS KACLS Service Agent( Grants Cloud KMS KACLS Service Agent access to KMS resource permissions to perform DEK encryption/decryption. |
|
Cloud Key Management Service permissions
| Permission | Included in roles |
|---|---|
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Cloud KMS Autokey Admin (
Databases Admin (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User ( |
|
Owner (
Editor (
Cloud KMS Admin (
Cloud KMS Autokey Admin ( |
|
Owner (
Editor (
Cloud KMS Admin ( |
|
Owner (
Editor (
Cloud KMS Admin ( |
|
Owner (
Cloud KMS Admin ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Kubernetes Engine KMS Crypto Key User (
Databases Admin (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Security Admin (
Security Reviewer (
Databases Admin (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User ( |
|
Owner (
Cloud KMS Expert PQ Asymmetric Signing Key Manager ( |
|
Owner (
Cloud KMS Expert Raw AES-CBC Key Manager ( |
|
Owner (
Cloud KMS Expert Raw AES-CTR Key Manager ( |
|
Owner (
Cloud KMS Expert Raw PKCS#1 Key Manager ( |
|
Owner (
Cloud KMS Admin ( |
|
Owner (
Editor (
Cloud KMS Admin ( |
|
Owner (
Cloud KMS Crypto Operator (
Cloud KMS CryptoKey Decapsulator ( |
|
Owner (
Cloud KMS CryptoKey Encrypter/Decrypter (
Cloud KMS CryptoKey Decrypter (
Cloud KMS Crypto Operator (
Data Scientist (
Dev Ops ( Service agent roles
|
|
Owner (
Cloud KMS Admin (
Cloud KMS CryptoKey Decrypter Via Delegation (
Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation ( |
|
Owner (
Cloud KMS CryptoKey Encrypter/Decrypter (
Cloud KMS CryptoKey Encrypter (
Cloud KMS Crypto Operator (
Data Scientist (
Dev Ops ( Service agent roles
|
|
Owner (
Cloud KMS Admin (
Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation (
Cloud KMS CryptoKey Encrypter Via Delegation ( |
|
Owner (
Cloud KMS Crypto Operator (
Cloud KMS CryptoKey Signer (
Cloud KMS CryptoKey Signer/Verifier (
Kubernetes Engine KMS Crypto Key User ( |
|
Owner (
Cloud KMS Crypto Operator (
Cloud KMS CryptoKey Signer/Verifier (
Cloud KMS CryptoKey Verifier (
Kubernetes Engine KMS Crypto Key User ( |
|
Owner (
Cloud KMS Crypto Operator (
Cloud KMS CryptoKey Decapsulator (
Cloud KMS CryptoKey Public Key Viewer (
Cloud KMS CryptoKey Signer/Verifier (
Cloud KMS CryptoKey Verifier (
Kubernetes Engine KMS Crypto Key User ( |
|
Owner (
Editor (
Cloud KMS Admin ( Service agent roles
|
|
Owner (
Editor (
Cloud KMS Admin ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Kubernetes Engine KMS Crypto Key User (
Databases Admin (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User (
SLZ BQDW Blueprint Project Level Remediator ( Service agent roles
|
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Security Admin (
Security Reviewer (
Security Auditor (
Support User (
SLZ BQDW Blueprint Project Level Remediator ( Service agent roles
|
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Security Admin (
Security Reviewer (
Databases Admin (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User (
SLZ BQDW Blueprint Project Level Remediator ( Service agent roles
|
|
Owner (
Cloud KMS Admin (
Security Admin (
SLZ BQDW Blueprint Project Level Remediator ( Service agent roles
|
|
Owner (
Editor (
Cloud KMS Admin (
SLZ BQDW Blueprint Project Level Remediator ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Cloud KMS EkmConnections Admin (
Databases Admin (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Security Admin (
Security Reviewer (
Security Auditor (
Support User ( |
|
Owner (
Cloud KMS Admin (
Security Admin ( |
|
Owner (
Editor (
Cloud KMS Admin (
Cloud KMS EkmConnections Admin ( |
|
Owner (
Editor (
Cloud KMS Admin (
Cloud KMS EkmConnections Admin ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Cloud KMS EkmConnections Admin (
Databases Admin (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User ( Service agent roles
|
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Security Admin (
Security Reviewer (
Security Auditor (
Support User ( Service agent roles
|
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Security Admin (
Security Reviewer (
Cloud KMS EkmConnections Admin (
Databases Admin (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User ( Service agent roles
|
|
Owner (
Cloud KMS Admin (
Security Admin ( |
|
Owner (
Editor (
Cloud KMS Admin (
Cloud KMS EkmConnections Admin ( |
|
Owner (
Editor (
Cloud KMS Admin ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS EkmConnections Admin (
Support User ( Service agent roles
|
|
Owner (
Editor (
Cloud KMS Admin (
Cloud KMS Importer ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Cloud KMS Importer (
Databases Admin (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Security Admin (
Security Reviewer (
Security Auditor (
Support User ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Security Admin (
Security Reviewer (
Cloud KMS Importer (
Databases Admin (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User ( |
|
Owner (
Cloud KMS Admin (
Security Admin ( |
|
Owner (
Editor (
Cloud KMS Admin (
Cloud KMS Importer ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Key Access Justifications Policy Config Admin (
Databases Admin (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User ( |
|
Owner (
Editor (
Cloud KMS Admin (
Key Access Justifications Policy Config Admin ( |
|
Owner (
Editor (
AlloyDB Admin (
Artifact Registry Administrator (
BigQuery Admin (
Bigtable Administrator (
Cloud KMS Admin (
Cloud SQL Admin (
Composer Administrator (
Compute Admin (
Compute Instance Admin (beta) (
Compute Instance Admin (v1) (
Compute Storage Admin (
Dataflow Admin (
Dataproc Administrator (
Dataproc Editor (
Firebase Admin (
Pub/Sub Admin (
Pub/Sub Editor (
Cloud Memorystore Redis Admin (
Secret Manager Admin (
Secure Source Manager Admin (
Cloud Spanner Admin (
Storage Admin (
BigQuery Data Editor (
BigQuery Data Owner (
BigQuery Studio Admin (
BigQuery Studio User (
BigQuery User (
Cloud KMS Autokey User (
Environment and Storage Object Administrator (
Composer Worker (
Dataflow Developer (
Dataproc Serverless Editor (
DLP Organization Data Profiles Driver (
DLP Project Data Profiles Driver (
Firebase Develop Admin (
Data Scientist (
Databases Admin (
Dev Ops (
Infrastructure Administrator (
ML Engineer (
Network Administrator (
Site Reliability Engineer (
Notebooks Legacy Admin (
Cloud Run Source Developer (
Secure Source Manager Instance Owner (
Cloud Spanner Database Admin ( |
|
Owner (
Editor (
Viewer (
AlloyDB Admin (
Artifact Registry Administrator (
BigQuery Admin (
Bigtable Administrator (
Cloud KMS Admin (
Cloud KMS Viewer (
Cloud SQL Admin (
Composer Administrator (
Compute Admin (
Compute Instance Admin (beta) (
Compute Instance Admin (v1) (
Compute Storage Admin (
Dataflow Admin (
Dataproc Administrator (
Dataproc Editor (
Firebase Admin (
Pub/Sub Admin (
Pub/Sub Editor (
Cloud Memorystore Redis Admin (
Secret Manager Admin (
Secure Source Manager Admin (
Cloud Spanner Admin (
Storage Admin (
BigQuery Data Editor (
BigQuery Data Owner (
BigQuery Studio Admin (
BigQuery Studio User (
BigQuery User (
Cloud KMS Autokey User (
Environment and Storage Object Administrator (
Composer Worker (
Dataflow Developer (
Dataproc Serverless Editor (
DLP Organization Data Profiles Driver (
DLP Project Data Profiles Driver (
Firebase Develop Admin (
Data Scientist (
Databases Admin (
Dev Ops (
Infrastructure Administrator (
ML Engineer (
Network Administrator (
Security Auditor (
Site Reliability Engineer (
Support User (
Notebooks Legacy Admin (
Cloud Run Source Developer (
Secure Source Manager Instance Owner (
Cloud Spanner Database Admin ( |
|
Owner (
Editor (
Viewer (
AlloyDB Admin (
Artifact Registry Administrator (
BigQuery Admin (
Bigtable Administrator (
Cloud KMS Admin (
Cloud KMS Viewer (
Cloud SQL Admin (
Composer Administrator (
Compute Admin (
Compute Instance Admin (beta) (
Compute Instance Admin (v1) (
Compute Storage Admin (
Dataflow Admin (
Dataproc Administrator (
Dataproc Editor (
Firebase Admin (
Security Admin (
Security Reviewer (
Pub/Sub Admin (
Pub/Sub Editor (
Cloud Memorystore Redis Admin (
Secret Manager Admin (
Secure Source Manager Admin (
Cloud Spanner Admin (
Storage Admin (
BigQuery Data Editor (
BigQuery Data Owner (
BigQuery Studio Admin (
BigQuery Studio User (
BigQuery User (
Cloud KMS Autokey User (
Environment and Storage Object Administrator (
Composer Worker (
Dataflow Developer (
Dataproc Serverless Editor (
DLP Organization Data Profiles Driver (
DLP Project Data Profiles Driver (
Firebase Develop Admin (
Data Scientist (
Databases Admin (
Dev Ops (
Infrastructure Administrator (
ML Engineer (
Network Administrator (
Security Auditor (
Site Reliability Engineer (
Support User (
Notebooks Legacy Admin (
Cloud Run Source Developer (
Secure Source Manager Instance Owner (
Cloud Spanner Database Admin ( |
|
Owner (
Editor (
Cloud KMS Admin ( Service agent roles
|
|
Owner (
Cloud KMS Admin (
Tag User (
DLP Organization Data Profiles Driver (
DLP Project Data Profiles Driver ( |
|
Owner (
Cloud KMS Admin (
Tag User (
DLP Organization Data Profiles Driver (
DLP Project Data Profiles Driver ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Databases Admin (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User ( Service agent roles
|
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Security Admin (
Security Reviewer (
Security Auditor (
Support User (
SLZ BQDW Blueprint Project Level Remediator ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Security Admin (
Security Reviewer (
Databases Admin (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User ( Service agent roles
|
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Tag User (
Tag Viewer (
DLP Organization Data Profiles Driver (
DLP Project Data Profiles Driver (
Security Auditor (
Support User ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Tag User (
Tag Viewer (
DLP Organization Data Profiles Driver (
DLP Project Data Profiles Driver (
Security Auditor (
Support User ( |
|
Owner (
Cloud KMS Admin (
Security Admin (
SLZ BQDW Blueprint Project Level Remediator ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Crypto Operator (
Support User ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS CryptoKey Encrypter/Decrypter (
Cloud KMS Viewer (
Cloud KMS CryptoKey Decrypter (
Cloud KMS CryptoKey Decrypter Via Delegation (
Cloud KMS CryptoKey Encrypter (
Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation (
Cloud KMS CryptoKey Encrypter Via Delegation (
Cloud KMS Crypto Operator (
Cloud KMS CryptoKey Decapsulator (
Cloud KMS Expert PQ Asymmetric Signing Key Manager (
Cloud KMS Expert Raw AES-CBC Key Manager (
Cloud KMS Expert Raw AES-CTR Key Manager (
Cloud KMS Expert Raw PKCS#1 Key Manager (
Cloud KMS Importer (
Cloud KMS CryptoKey Public Key Viewer (
Cloud KMS CryptoKey Signer (
Cloud KMS CryptoKey Signer/Verifier (
Cloud KMS CryptoKey Verifier (
Kubernetes Engine KMS Crypto Key User (
Data Scientist (
Databases Admin (
Dev Ops (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User ( Service agent roles
|
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS CryptoKey Encrypter/Decrypter (
Cloud KMS Viewer (
Security Admin (
Security Reviewer (
Cloud KMS CryptoKey Decrypter (
Cloud KMS CryptoKey Decrypter Via Delegation (
Cloud KMS CryptoKey Encrypter (
Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation (
Cloud KMS CryptoKey Encrypter Via Delegation (
Cloud KMS Crypto Operator (
Cloud KMS CryptoKey Decapsulator (
Cloud KMS Expert PQ Asymmetric Signing Key Manager (
Cloud KMS Expert Raw AES-CBC Key Manager (
Cloud KMS Expert Raw AES-CTR Key Manager (
Cloud KMS Expert Raw PKCS#1 Key Manager (
Cloud KMS Importer (
Cloud KMS CryptoKey Public Key Viewer (
Cloud KMS CryptoKey Signer (
Cloud KMS CryptoKey Signer/Verifier (
Cloud KMS CryptoKey Verifier (
Kubernetes Engine KMS Crypto Key User (
Data Scientist (
Databases Admin (
Dev Ops (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User ( Service agent roles
|
|
Owner (
Cloud KMS Admin ( |
|
Owner (
Editor (
Viewer (
AlloyDB Admin (
Artifact Registry Administrator (
BigQuery Admin (
Bigtable Administrator (
Cloud KMS Admin (
Cloud KMS Viewer (
Cloud SQL Admin (
Composer Administrator (
Compute Admin (
Compute Instance Admin (beta) (
Compute Instance Admin (v1) (
Compute Storage Admin (
Dataflow Admin (
Dataproc Administrator (
Dataproc Editor (
Firebase Admin (
Pub/Sub Admin (
Pub/Sub Editor (
Cloud Memorystore Redis Admin (
Secret Manager Admin (
Secure Source Manager Admin (
Cloud Spanner Admin (
Storage Admin (
BigQuery Data Editor (
BigQuery Data Owner (
BigQuery Studio Admin (
BigQuery Studio User (
BigQuery User (
Cloud KMS Autokey User (
Cloud KMS single-tenant HSM Executor (
Cloud KMS single-tenant HSM Proposer (
Cloud KMS single-tenant HSM Quorum Member (
Environment and Storage Object Administrator (
Composer Worker (
Dataflow Developer (
Dataproc Serverless Editor (
DLP Organization Data Profiles Driver (
DLP Project Data Profiles Driver (
Firebase Develop Admin (
Data Scientist (
Databases Admin (
Dev Ops (
Infrastructure Administrator (
ML Engineer (
Network Administrator (
Security Auditor (
Site Reliability Engineer (
Support User (
Notebooks Legacy Admin (
Cloud Run Source Developer (
Secure Source Manager Instance Owner (
Cloud Spanner Database Admin ( |
|
Owner (
Editor (
Viewer (
AlloyDB Admin (
Artifact Registry Administrator (
BigQuery Admin (
Bigtable Administrator (
Cloud KMS Admin (
Cloud SQL Admin (
Composer Administrator (
Compute Admin (
Compute Instance Admin (beta) (
Compute Instance Admin (v1) (
Compute Storage Admin (
Dataflow Admin (
Dataproc Administrator (
Dataproc Editor (
Firebase Admin (
Pub/Sub Admin (
Pub/Sub Editor (
Cloud Memorystore Redis Admin (
Secret Manager Admin (
Secure Source Manager Admin (
Cloud Spanner Admin (
Storage Admin (
BigQuery Data Editor (
BigQuery Data Owner (
BigQuery Studio Admin (
BigQuery Studio User (
BigQuery User (
Cloud KMS Autokey Admin (
Cloud KMS Autokey User (
Environment and Storage Object Administrator (
Composer Worker (
Dataflow Developer (
Dataproc Serverless Editor (
DLP Organization Data Profiles Driver (
DLP Project Data Profiles Driver (
Firebase Develop Admin (
Data Scientist (
Databases Admin (
Dev Ops (
Infrastructure Administrator (
ML Engineer (
Network Administrator (
Site Reliability Engineer (
Support User (
Notebooks Legacy Admin (
Cloud Run Source Developer (
Secure Source Manager Instance Owner (
Cloud Spanner Database Admin ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Key Access Justifications Enrollment Viewer (
Support User ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Key Access Justifications Policy Config Admin (
Support User ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Protected Resources Viewer (
Support User ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Databases Admin (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Security Admin (
Security Reviewer (
Databases Admin (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User ( |
|
Owner (
Editor (
Cloud KMS single-tenant HSM Quorum Member ( |
|
Owner (
Editor (
Cloud KMS single-tenant HSM Proposer ( |
|
Owner (
Editor (
Cloud KMS Admin (
Cloud KMS single-tenant HSM Proposer ( |
|
Owner (
Editor (
Cloud KMS single-tenant HSM Executor ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Cloud KMS single-tenant HSM Executor (
Cloud KMS single-tenant HSM Proposer (
Cloud KMS single-tenant HSM Quorum Member (
Databases Admin (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Security Admin (
Security Reviewer (
Cloud KMS single-tenant HSM Executor (
Cloud KMS single-tenant HSM Proposer (
Cloud KMS single-tenant HSM Quorum Member (
Databases Admin (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User ( |
|
Owner (
Editor (
Cloud KMS Admin (
Cloud KMS single-tenant HSM Proposer ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Cloud KMS single-tenant HSM Executor (
Cloud KMS single-tenant HSM Key Creator (
Cloud KMS single-tenant HSM Proposer (
Cloud KMS single-tenant HSM Quorum Member (
Databases Admin (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User ( |
|
Owner (
Editor (
Viewer (
Cloud KMS Admin (
Cloud KMS Viewer (
Security Admin (
Security Reviewer (
Cloud KMS single-tenant HSM Executor (
Cloud KMS single-tenant HSM Key Creator (
Cloud KMS single-tenant HSM Proposer (
Cloud KMS single-tenant HSM Quorum Member (
Databases Admin (
ML Engineer (
Security Auditor (
Site Reliability Engineer (
Support User ( |
|
Owner (
Editor (
Cloud KMS Admin (
Cloud KMS single-tenant HSM Key Creator ( |