Stay organized with collectionsSave and categorize content based on your preferences.
This page guides you through creating a new folder for
Sovereign Controls by Partners. You must create this folder before
creating any other resources that are intended for use with
Sovereign Controls by Partners.
Before you begin
Before you can create a new folder, ensure that you've done the following:
Completed onboarding to Google Cloud and received an email instructing you to
create a partner-managed folder.
If your organization enforces theiam.allowedPolicyMemberDomainsorganization policy constraint, you must allow the following additional domain
IDs before creating your Sovereign Controls by Partners folder:
The partner's Google Cloud organization ID or Google Workspace customer ID
Google's customer ID, which isC02h8e9nw
By allowing these IDs, your partner and Google can grant IAM
roles in your organization as necessary to manage your workloads. If your
partner hasn't provided their organization ID or customer ID during the
onboarding process, request it from them. If you attempt to create a folder
before allowing these IDs, the operation fails with the following error:One or more users named in the policy do not belong to a permitted customer.
Clickadd_boxCREATEto go to theCreate an Assured Workloads folderpage.
In the step toAdd folder details:
InFolder name, enter a unique name for the folder, such asaw-my-folder-name. The folder name must be a minimum of 4
characters in length and a maximum of 30, and can only contain letters,
numbers, spaces, and hyphens.
InOrganization, select the organization in which to create
your folder. This location can't be changed later.
InFolder location, select the location in the resource
hierarchy where the folder will be created. A
Sovereign Controls by Partners folder can be created as a child
of an organization or of another folder.
ClickNext.
In the step toChoose a control package option, selectSovereign Controls.
Select your partner-managed solution from the drop-down menu.
Select a sub-billing account if your partner created one for you.
InSelect resource location, choose thelocationwhere
resource creation and usage will be enforced by the folder'sorganization policy.
Review the details about your selections and clickNext.
In the step toConfigure additional settings, you must create a
new project and a key ring for yourCustomer Managed Encryption Keys (CMEK). No
keys are created during this step, as Sovereign Controls by Partners
doesn't automatically create any cryptographic keys for you.
Depending on which sovereign partner you've chosen, you may have an
additionalManage partner permissionsstep. In this step, you can
choose to grant your partner access to the following data:
Monitoring: This includes permissions to viewAssured Workloads monitoringinformation about your folder. This includes any unresolved or resolved
compliance violations, and any exceptions you've granted for those
violations.
Access Transparency and emergency access logs: This includes
permissions to view Access Transparency logs and emergency access logs for
your folder.
Access Transparency support case details: This includes
permissions to include additional support case details used as an
access reason within Access Transparency logs for your folder. Permission for
Access Transparency and emergency access logs is needed for this permission to
take effect.
Access Approval information: This includes permissions
to view Access Approval logs for your folder.
For more information about how these permissions are granted or revoked, see
thePartner permissionssection.
After you've made your selections, clickNext.
In the step toReview and create folder, review the details about
your new Sovereign Controls by Partners folder and ensure that they are
correct. Then, clickCreate Folder.
After completing these steps, Sovereign Controls by Partners creates
the following resources:
A Sovereign Controls by Partners folder, which enforces security
controls onsupported Google Cloud productsto adhere with the your partner offering. These controls include setting an
organization policy thatrestricts resource usageto only those supported products, and allows creating or using resources only
inallowed locations.
A CMEK project that contains the configured CMEK key ring.
Partner permissions
If you choose to grant your partner access toAssured Workloads monitoringand access history data, you can revoke this access at any time. To grant or
revoke access for all types of data, complete the following steps:
In the Google Cloud console, go to theAssured Workloadspage.
Click the name of your Sovereign Controls by Partners folder to view
the folder's details.
From theAssured Workloads Folder Detailspage, click theConfigure Partner Permissionsbutton in theinfoPartner permissionssection.
In theConfigure partner permissionspanel, select the checkboxes to
grant or revoke permission for each type of data, and then clickSave.
Your partner's access to this data will be granted or revoked depending on your
selections.
Monitoring
To enable partner access to your folder's Assured Workloads monitoring
data, an Identity and Access Management (IAM) role is granted to
theCloud Controls Partner Service Agent. Likeall service agents, the Cloud
Controls Partner Service Agent acts on behalf of Sovereign Controls by Partners. It is visible
in the IAM policy for your Sovereign Controls by Partners folder, and uses the
following email format, whereFOLDER_IDis the ID of that folder:
The service agent is granted theCloud Controls Partner Monitoring Service Agent(roles/cloudcontrolspartner.monitoringServiceAgent) IAM role on
your folder. See theIAM referencefor more information about this role and its permissions.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[],[],null,["# Create a partner-managed folder\n\nThis page guides you through creating a new folder for\nSovereign Controls by Partners. You must create this folder before\ncreating any other resources that are intended for use with\nSovereign Controls by Partners.\n\nBefore you begin\n----------------\n\nBefore you can create a new folder, ensure that you've done the following:\n\n- Completed onboarding to Google Cloud and received an email instructing you to create a partner-managed folder.\n- If your organization enforces the `iam.allowedPolicyMemberDomains`\n organization policy constraint, you must allow the following additional domain\n IDs before creating your Sovereign Controls by Partners folder:\n\n - The partner's Google Cloud organization ID or Google Workspace customer ID\n - Google's customer ID, which is `C02h8e9nw`\n\n By allowing these IDs, your partner and Google can grant IAM\n roles in your organization as necessary to manage your workloads. If your\n partner hasn't provided their organization ID or customer ID during the\n onboarding process, request it from them. If you attempt to create a folder\n before allowing these IDs, the operation fails with the following error:\n `One or more users named in the policy do not belong to a permitted customer.`\n\n See the\n [Restricting identities by domain](/resource-manager/docs/organization-policy/restricting-domains#predefined-constraint)\n page for more information about updating the `iam.allowedPolicyMemberDomains`\n constraint.\n- Ensure that you understand the restrictions and limitations associated with\n the control package your partner is offering.\n\nCreate a new folder\n-------------------\n\n1. In the Google Cloud console, go to the **Assured Workloads** page.\n\n\n [Go to Assured Workloads](https://console.cloud.google.com/compliance/assuredworkloads)\n2. If prompted, select your organization.\n3. Click add_box**CREATE** to go to the **Create an Assured Workloads folder** page. **Note:** Sovereign Controls by Partners is an Assured Workloads offering, and shares similar capabilities and features.\n4. In the step to **Add folder details** :\n - In **Folder name** , enter a unique name for the folder, such as `aw-my-folder-name`. The folder name must be a minimum of 4 characters in length and a maximum of 30, and can only contain letters, numbers, spaces, and hyphens. **Tip:** When you name your Assured Workloads folders for Sovereign Controls by Partners, consider the following:\n | - To identify the folder as an Assured Workloads folder, include a prefix in its name (such as `aw-`). This identifier can help you locate the folder from a list of other resources. If you have existing Assured Workloads folders, consider using another naming convention to differentiate your Sovereign Controls by Partners folder from them.\n | - Don't include sensitive data or personally identifiable information (PII) in the folder name.\n - In **Organization**, select the organization in which to create your folder. This location can't be changed later.\n - In **Folder location**, select the location in the resource hierarchy where the folder will be created. A Sovereign Controls by Partners folder can be created as a child of an organization or of another folder.\n - Click **Next**.\n5. In the step to **Choose a control package option** , select **Sovereign Controls**.\n6. Select your partner-managed solution from the drop-down menu.\n7. Select a sub-billing account if your partner created one for you.\n8. In **Select resource location** , choose the [location](/sovereign-controls-by-partners/docs/locations) where resource creation and usage will be enforced by the folder's [organization policy](/resource-manager/docs/organization-policy/defining-locations).\n9. Review the details about your selections and click **Next**.\n10. In the step to **Configure additional settings** , you must create a new project and a key ring for your [Customer Managed Encryption Keys (CMEK)](/kms/docs/cmek). No keys are created during this step, as Sovereign Controls by Partners doesn't automatically create any cryptographic keys for you. **Note** : Once your key management project has been created, complete the steps to create a [coordinated external key](/kms/docs/create-external-key#create-coordinated). When you create a coordinated external key for Cloud EKM, note that manually created key versions aren't automatically set as the primary key version. To set it as a primary key, see [Rotate a key](/kms/docs/rotate-key#set_primary).\n11. Depending on which sovereign partner you've chosen, you may have an additional **Manage partner permissions** step. In this step, you can choose to grant your partner access to the following data:\n - **Monitoring** : This includes permissions to view [Assured Workloads monitoring](/assured-workloads/docs/monitor-folder) information about your folder. This includes any unresolved or resolved compliance violations, and any exceptions you've granted for those violations.\n - **Access Transparency and emergency access logs**: This includes permissions to view Access Transparency logs and emergency access logs for your folder.\n - **Access Transparency support case details**: This includes permissions to include additional support case details used as an access reason within Access Transparency logs for your folder. Permission for Access Transparency and emergency access logs is needed for this permission to take effect.\n - **Access Approval information**: This includes permissions to view Access Approval logs for your folder.\n\n For more information about how these permissions are granted or revoked, see the [Partner permissions](#partner-permissions) section.\n12. After you've made your selections, click **Next**.\n13. In the step to **Review and create folder** , review the details about your new Sovereign Controls by Partners folder and ensure that they are correct. Then, click **Create Folder**.\n\nAfter completing these steps, Sovereign Controls by Partners creates\nthe following resources:\n\n- A Sovereign Controls by Partners folder, which enforces security controls on [supported Google Cloud products](/sovereign-controls-by-partners/docs/supported-products) to adhere with the your partner offering. These controls include setting an organization policy that [restricts resource usage](/resource-manager/docs/organization-policy/restricting-resources) to only those supported products, and allows creating or using resources only in [allowed locations](/resource-manager/docs/organization-policy/defining-locations).\n- A CMEK project that contains the configured CMEK key ring. **Note**: Folder creation does not automatically create keys for you. After creating the folder, you must create an encryption key before adding any resources.\n\nPartner permissions\n-------------------\n\nIf you choose to grant your partner access to\n[Assured Workloads monitoring](/assured-workloads/docs/monitor-folder)\nand access history data, you can revoke this access at any time. To grant or\nrevoke access for all types of data, complete the following steps:\n\n1. In the Google Cloud console, go to the **Assured Workloads** page.\n\n [Go to Assured Workloads](https://console.cloud.google.com/compliance/assuredworkloads)\n2. Click the name of your Sovereign Controls by Partners folder to view\n the folder's details.\n\n3. From the **Assured Workloads Folder Details** page, click the\n **Configure Partner Permissions** button in the\n info **Partner permissions**\n section.\n\n4. In the **Configure partner permissions** panel, select the checkboxes to\n grant or revoke permission for each type of data, and then click **Save**.\n\nYour partner's access to this data will be granted or revoked depending on your\nselections.\n\n### Monitoring\n\nTo enable partner access to your folder's Assured Workloads monitoring\ndata, an Identity and Access Management (IAM) role is granted to\nthe **Cloud Controls Partner Service Agent** . Like\n[all service agents](/iam/docs/service-account-types#service-agents), the Cloud\nControls Partner Service Agent acts on behalf of Sovereign Controls by Partners. It is visible\nin the IAM policy for your Sovereign Controls by Partners folder, and uses the\nfollowing email format, where \u003cvar translate=\"no\"\u003eFOLDER_ID\u003c/var\u003e is the ID of that folder:\n\n`\nservice-folder-[`\u003cvar translate=\"no\"\u003eFOLDER_ID\u003c/var\u003e`]@gcp-sa-cloudcontrolspartner.iam.gserviceaccount.com\n`\n\nThe service agent is granted the\n**Cloud Controls Partner Monitoring Service Agent**\n(`roles/cloudcontrolspartner.monitoringServiceAgent`) IAM role on\nyour folder. See the\n[IAM reference](/iam/docs/understanding-roles#cloudcontrolspartner.monitoringServiceAgent)\nfor more information about this role and its permissions.\n\nNext steps\n----------\n\n- Learn how to [configure partner-managed KMS](/sovereign-controls-by-partners/docs/configure-kms)"]]