This page lists the IAM roles and permissions for Cloud Key Management Service. To search through all roles and permissions, see the role and permission index .
Cloud Key Management Service roles
Cloud KMS Admin
( roles/
)
Provides access to Cloud KMS resources, except for access to restricted resource types and cryptographic operations.
Lowest-level resources where you can grant this role:
- CryptoKey
cloudkms.autokeyConfigs.*
-
cloudkms.autokeyConfigs.get
-
cloudkms.autokeyConfigs.update
cloudkms.
cloudkms.
cloudkms.cryptoKeyVersions.get
cloudkms.
cloudkms.
cloudkms.
cloudkms.
cloudkms.
cloudkms.cryptoKeys.*
-
cloudkms.cryptoKeys.create
-
cloudkms.cryptoKeys.get
-
cloudkms.
cryptoKeys. getIamPolicy -
cloudkms.cryptoKeys.list
-
cloudkms.
cryptoKeys. setIamPolicy -
cloudkms.cryptoKeys.update
cloudkms.ekmConfigs.*
-
cloudkms.ekmConfigs.get
-
cloudkms.
ekmConfigs. getIamPolicy -
cloudkms.
ekmConfigs. setIamPolicy -
cloudkms.ekmConfigs.update
cloudkms.ekmConnections.*
-
cloudkms.ekmConnections.create
-
cloudkms.ekmConnections.get
-
cloudkms.
ekmConnections. getIamPolicy -
cloudkms.ekmConnections.list
-
cloudkms.
ekmConnections. setIamPolicy -
cloudkms.ekmConnections.update
-
cloudkms.ekmConnections.use
-
cloudkms.
ekmConnections. verifyConnectivity
cloudkms.importJobs.*
-
cloudkms.importJobs.create
-
cloudkms.importJobs.get
-
cloudkms.
importJobs. getIamPolicy -
cloudkms.importJobs.list
-
cloudkms.
importJobs. setIamPolicy -
cloudkms.
importJobs. useToImport
cloudkms.kajPolicyConfigs.*
-
cloudkms.kajPolicyConfigs.get
-
cloudkms.
kajPolicyConfigs. update
cloudkms.keyHandles.*
-
cloudkms.keyHandles.create
-
cloudkms.keyHandles.get
-
cloudkms.keyHandles.list
cloudkms.keyRings.*
-
cloudkms.keyRings.create
-
cloudkms.
keyRings. createTagBinding -
cloudkms.
keyRings. deleteTagBinding -
cloudkms.keyRings.get
-
cloudkms.keyRings.getIamPolicy
-
cloudkms.keyRings.list
-
cloudkms.
keyRings. listEffectiveTags -
cloudkms.
keyRings. listTagBindings -
cloudkms.keyRings.setIamPolicy
cloudkms.locations.get
cloudkms.locations.list
cloudkms.
cloudkms.operations.get
cloudkms.projects.*
-
cloudkms.
projects. showEffectiveAutokeyConfig -
cloudkms.
projects. showEffectiveKajEnrollmentConfig -
cloudkms.
projects. showEffectiveKajPolicyConfig
resourcemanager.projects.get
Cloud KMS Autokey Admin
( roles/
)
Enables management of AutokeyConfig.
cloudkms.autokeyConfigs.*
-
cloudkms.autokeyConfigs.get
-
cloudkms.autokeyConfigs.update
cloudkms.
Cloud KMS Autokey User
( roles/
)
Grants ability to use KeyHandle resources.
cloudkms.keyHandles.*
-
cloudkms.keyHandles.create
-
cloudkms.keyHandles.get
-
cloudkms.keyHandles.list
cloudkms.operations.get
cloudkms.
Cloud KMS CryptoKey Decrypter
( roles/
)
Provides ability to use Cloud KMS resources for decrypt operations only.
Lowest-level resources where you can grant this role:
- CryptoKey
cloudkms.
cloudkms.locations.get
cloudkms.locations.list
resourcemanager.projects.get
Cloud KMS CryptoKey Decrypter Via Delegation
( roles/
)
Enables Decrypt operations via other Google Cloud services
Lowest-level resources where you can grant this role:
- CryptoKey
cloudkms.
cloudkms.locations.get
cloudkms.locations.list
resourcemanager.projects.get
resourcemanager.projects.list
Cloud KMS CryptoKey Encrypter
( roles/
)
Provides ability to use Cloud KMS resources for encrypt operations only.
Lowest-level resources where you can grant this role:
- CryptoKey
cloudkms.
cloudkms.locations.get
cloudkms.locations.list
resourcemanager.projects.get
Cloud KMS CryptoKey Encrypter/Decrypter
( roles/
)
Provides ability to use Cloud KMS resources for encrypt and decrypt operations only.
Lowest-level resources where you can grant this role:
- CryptoKey
cloudkms.
cloudkms.
cloudkms.locations.get
cloudkms.locations.list
resourcemanager.projects.get
Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation
( roles/
)
Enables Encrypt and Decrypt operations via other Google Cloud services
Lowest-level resources where you can grant this role:
- CryptoKey
cloudkms.
cloudkms.
cloudkms.locations.get
cloudkms.locations.list
resourcemanager.projects.get
resourcemanager.projects.list
Cloud KMS CryptoKey Encrypter Via Delegation
( roles/
)
Enables Encrypt operations via other Google Cloud services
Lowest-level resources where you can grant this role:
- CryptoKey
cloudkms.
cloudkms.locations.get
cloudkms.locations.list
resourcemanager.projects.get
resourcemanager.projects.list
Cloud KMS Crypto Operator
( roles/
)
Enables all Crypto Operations.
Lowest-level resources where you can grant this role:
- CryptoKey
cloudkms.
cloudkms.
cloudkms.
cloudkms.
cloudkms.
cloudkms.
cloudkms.
cloudkms.locations.get
cloudkms.locations.list
resourcemanager.projects.get
Cloud KMS CryptoKey Decapsulator Beta
( roles/
)
Enables Decapsulate and GetPublicKey operations
cloudkms.
cloudkms.
cloudkms.locations.get
cloudkms.locations.list
resourcemanager.projects.get
Cloud KMS EkmConnections Admin
( roles/
)
Enables management of EkmConnections.
cloudkms.ekmConfigs.get
cloudkms.ekmConfigs.update
cloudkms.ekmConnections.create
cloudkms.ekmConnections.get
cloudkms.ekmConnections.list
cloudkms.ekmConnections.update
cloudkms.
resourcemanager.projects.get
resourcemanager.projects.list
Cloud KMS Expert Raw AES-CBC Key Manager
( roles/
)
Enables raw AES-CBC keys management.
Lowest-level resources where you can grant this role:
- CryptoKey
cloudkms.
cloudkms.locations.get
cloudkms.locations.list
resourcemanager.projects.get
resourcemanager.projects.list
Cloud KMS Expert Raw AES-CTR Key Manager
( roles/
)
Enables raw AES-CTR keys management.
Lowest-level resources where you can grant this role:
- CryptoKey
cloudkms.
cloudkms.locations.get
cloudkms.locations.list
resourcemanager.projects.get
resourcemanager.projects.list
Cloud KMS Expert Raw PKCS#1 Key Manager
( roles/
)
Enables raw PKCS#1 keys management.
Lowest-level resources where you can grant this role:
- CryptoKey
cloudkms.
cloudkms.locations.get
cloudkms.locations.list
resourcemanager.projects.get
resourcemanager.projects.list
Cloud KMS Importer
( roles/
)
Enables ImportCryptoKeyVersion, CreateImportJob, ListImportJobs, and GetImportJob operations
cloudkms.importJobs.create
cloudkms.importJobs.get
cloudkms.importJobs.list
cloudkms.
cloudkms.locations.get
cloudkms.locations.list
resourcemanager.projects.get
Key Access Justifications Enrollment Viewer Beta
( roles/
)
Grant ability to view Key Access Justification enrollment configs of a project.
cloudkms.
Key Access Justifications Policy Config Admin Beta
( roles/
)
Grant ability to manage Key Access Justifications Policy at parent resource level.
cloudkms.kajPolicyConfigs.*
-
cloudkms.kajPolicyConfigs.get
-
cloudkms.
kajPolicyConfigs. update
cloudkms.
Cloud KMS Organization Service Agent
( roles/
)
Gives Cloud KMS organization-level service account access to managed resources.
cloudasset.
Cloud KMS Protected Resources Viewer
( roles/
)
Enables viewing protected resources.
cloudkms.
Cloud KMS CryptoKey Public Key Viewer
( roles/
)
Enables GetPublicKey operations
Lowest-level resources where you can grant this role:
- CryptoKey
cloudkms.
cloudkms.locations.get
cloudkms.locations.list
resourcemanager.projects.get
Cloud KMS Service Agent
( roles/
)
Gives Cloud KMS service account access to managed resources.
cloudasset.
Cloud KMS CryptoKey Signer
( roles/
)
Enables Sign operations
Lowest-level resources where you can grant this role:
- CryptoKey
cloudkms.
cloudkms.locations.get
cloudkms.locations.list
resourcemanager.projects.get
Cloud KMS CryptoKey Signer/Verifier
( roles/
)
Enables Sign, Verify, and GetPublicKey operations
Lowest-level resources where you can grant this role:
- CryptoKey
cloudkms.
cloudkms.
cloudkms.
cloudkms.locations.get
cloudkms.locations.list
resourcemanager.projects.get
Cloud KMS CryptoKey Verifier
( roles/
)
Enables Verify and GetPublicKey operations
Lowest-level resources where you can grant this role:
- CryptoKey
cloudkms.
cloudkms.
cloudkms.locations.get
cloudkms.locations.list
resourcemanager.projects.get
Cloud KMS Viewer
( roles/
)
Enables Get and List operations.
Lowest-level resources where you can grant this role:
- CryptoKey
cloudkms.autokeyConfigs.get
cloudkms.cryptoKeyVersions.get
cloudkms.
cloudkms.cryptoKeys.get
cloudkms.cryptoKeys.list
cloudkms.ekmConfigs.get
cloudkms.ekmConnections.get
cloudkms.ekmConnections.list
cloudkms.importJobs.get
cloudkms.importJobs.list
cloudkms.kajPolicyConfigs.get
cloudkms.keyHandles.get
cloudkms.keyHandles.list
cloudkms.keyRings.get
cloudkms.keyRings.list
cloudkms.locations.get
cloudkms.locations.list
cloudkms.operations.get
resourcemanager.projects.get
Cloud KMS KACLS Service Agent
( roles/
)
Grants Cloud KMS KACLS Service Agent access to KMS resource permissions to perform DEK encryption/decryption.
cloudkms.
cloudkms.
cloudkms.cryptoKeys.get
Cloud Key Management Service permissions
cloudkms.autokeyConfigs.get
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS Autokey Admin
( roles/
)
Cloud KMS Viewer
( roles/
)
Databases Admin
( roles/
)
ML Engineer
( roles/
)
Security Auditor
( roles/
)
Site Reliability Engineer
( roles/
)
Support User
( roles/
)
cloudkms.autokeyConfigs.update
Owner
( roles/
)
Editor
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS Autokey Admin
( roles/
)
cloudkms.
cryptoKeyVersions.
create
cloudkms.
cryptoKeyVersions.
destroy
Owner
( roles/
)
Cloud KMS Admin
( roles/
)
cloudkms.cryptoKeyVersions.get
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS Viewer
( roles/
)
Kubernetes Engine KMS Crypto Key User
( roles/
)
Databases Admin
( roles/
)
ML Engineer
( roles/
)
Security Auditor
( roles/
)
Site Reliability Engineer
( roles/
)
Support User
( roles/
)
cloudkms.
cryptoKeyVersions.
list
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS Viewer
( roles/
)
Databases Admin
( roles/
)
ML Engineer
( roles/
)
Security Admin
( roles/
)
Security Auditor
( roles/
)
Security Reviewer
( roles/
)
Site Reliability Engineer
( roles/
)
Support User
( roles/
)
cloudkms.
cryptoKeyVersions.
manageRawAesCbcKeys
Owner
( roles/
)
Cloud KMS Expert Raw AES-CBC Key Manager
( roles/
)
cloudkms.
cryptoKeyVersions.
manageRawAesCtrKeys
Owner
( roles/
)
Cloud KMS Expert Raw AES-CTR Key Manager
( roles/
)
cloudkms.
cryptoKeyVersions.
manageRawPKCS1Keys
Owner
( roles/
)
Cloud KMS Expert Raw PKCS#1 Key Manager
( roles/
)
cloudkms.
cryptoKeyVersions.
restore
Owner
( roles/
)
Cloud KMS Admin
( roles/
)
cloudkms.
cryptoKeyVersions.
update
cloudkms.
cryptoKeyVersions.
useToDecapsulate
Owner
( roles/
)
Cloud KMS Crypto Operator
( roles/
)
Cloud KMS CryptoKey Decapsulator
( roles/
)
cloudkms.
cryptoKeyVersions.
useToDecrypt
Owner
( roles/
)
Cloud KMS CryptoKey Decrypter
( roles/
)
Cloud KMS CryptoKey Encrypter/Decrypter
( roles/
)
Cloud KMS Crypto Operator
( roles/
)
Data Scientist
( roles/
)
Dev Ops
( roles/
)
Service agent roles
- DLP API Service Agent
(
roles/
)dlp.serviceAgent - Cloud KMS KACLS Service Agent
(
roles/
)cloudkmskacls.serviceAgent
cloudkms.
cryptoKeyVersions.
useToDecryptViaDelegation
Owner
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS CryptoKey Decrypter Via Delegation
( roles/
)
Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation
( roles/
)
cloudkms.
cryptoKeyVersions.
useToEncrypt
Owner
( roles/
)
Cloud KMS CryptoKey Encrypter
( roles/
)
Cloud KMS CryptoKey Encrypter/Decrypter
( roles/
)
Cloud KMS Crypto Operator
( roles/
)
Data Scientist
( roles/
)
Dev Ops
( roles/
)
Service agent roles
- Cloud KMS KACLS Service Agent
(
roles/
)cloudkmskacls.serviceAgent
cloudkms.
cryptoKeyVersions.
useToEncryptViaDelegation
Owner
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation
( roles/
)
Cloud KMS CryptoKey Encrypter Via Delegation
( roles/
)
cloudkms.
cryptoKeyVersions.
useToSign
Owner
( roles/
)
Cloud KMS Crypto Operator
( roles/
)
Cloud KMS CryptoKey Signer
( roles/
)
Cloud KMS CryptoKey Signer/Verifier
( roles/
)
Kubernetes Engine KMS Crypto Key User
( roles/
)
cloudkms.
cryptoKeyVersions.
useToVerify
Owner
( roles/
)
Cloud KMS Crypto Operator
( roles/
)
Cloud KMS CryptoKey Signer/Verifier
( roles/
)
Cloud KMS CryptoKey Verifier
( roles/
)
Kubernetes Engine KMS Crypto Key User
( roles/
)
cloudkms.
cryptoKeyVersions.
viewPublicKey
Owner
( roles/
)
Cloud KMS Crypto Operator
( roles/
)
Cloud KMS CryptoKey Decapsulator
( roles/
)
Cloud KMS CryptoKey Public Key Viewer
( roles/
)
Cloud KMS CryptoKey Signer/Verifier
( roles/
)
Cloud KMS CryptoKey Verifier
( roles/
)
Kubernetes Engine KMS Crypto Key User
( roles/
)
cloudkms.cryptoKeys.create
Owner
( roles/
)
Editor
( roles/
)
Cloud KMS Admin
( roles/
)
Service agent roles
- Assured Workloads Service Agent
(
roles/
)assuredworkloads.serviceAgent
cloudkms.cryptoKeys.get
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS Viewer
( roles/
)
Kubernetes Engine KMS Crypto Key User
( roles/
)
Databases Admin
( roles/
)
ML Engineer
( roles/
)
Security Auditor
( roles/
)
Site Reliability Engineer
( roles/
)
Support User
( roles/
)
SLZ BQDW Blueprint Project Level Remediator
( roles/
)
Service agent roles
- Cloud KMS KACLS Service Agent
(
roles/
)cloudkmskacls.serviceAgent - Cloud Security Compliance Service Agent
(
roles/
)cloudsecuritycompliance.serviceAgent - Audit Manager Auditing Service Agent
(
roles/
)auditmanager.serviceAgent
cloudkms.
cryptoKeys.
getIamPolicy
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Security Admin
( roles/
)
Security Auditor
( roles/
)
Security Reviewer
( roles/
)
Support User
( roles/
)
SLZ BQDW Blueprint Project Level Remediator
( roles/
)
cloudkms.cryptoKeys.list
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS Viewer
( roles/
)
Databases Admin
( roles/
)
ML Engineer
( roles/
)
Security Admin
( roles/
)
Security Auditor
( roles/
)
Security Reviewer
( roles/
)
Site Reliability Engineer
( roles/
)
Support User
( roles/
)
SLZ BQDW Blueprint Project Level Remediator
( roles/
)
Service agent roles
- Cloud Security Compliance Service Agent
(
roles/
)cloudsecuritycompliance.serviceAgent - Audit Manager Auditing Service Agent
(
roles/
)auditmanager.serviceAgent
cloudkms.
cryptoKeys.
setIamPolicy
Owner
( roles/
)
Cloud KMS Admin
( roles/
)
Security Admin
( roles/
)
SLZ BQDW Blueprint Project Level Remediator
( roles/
)
cloudkms.cryptoKeys.update
Owner
( roles/
)
Editor
( roles/
)
Cloud KMS Admin
( roles/
)
SLZ BQDW Blueprint Project Level Remediator
( roles/
)
cloudkms.ekmConfigs.get
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS EkmConnections Admin
( roles/
)
Cloud KMS Viewer
( roles/
)
Databases Admin
( roles/
)
ML Engineer
( roles/
)
Security Auditor
( roles/
)
Site Reliability Engineer
( roles/
)
Support User
( roles/
)
cloudkms.
ekmConfigs.
getIamPolicy
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Security Admin
( roles/
)
Security Auditor
( roles/
)
Security Reviewer
( roles/
)
Support User
( roles/
)
cloudkms.
ekmConfigs.
setIamPolicy
Owner
( roles/
)
Cloud KMS Admin
( roles/
)
Security Admin
( roles/
)
cloudkms.ekmConfigs.update
Owner
( roles/
)
Editor
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS EkmConnections Admin
( roles/
)
cloudkms.ekmConnections.create
Owner
( roles/
)
Editor
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS EkmConnections Admin
( roles/
)
cloudkms.ekmConnections.get
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS EkmConnections Admin
( roles/
)
Cloud KMS Viewer
( roles/
)
Databases Admin
( roles/
)
ML Engineer
( roles/
)
Security Auditor
( roles/
)
Site Reliability Engineer
( roles/
)
Support User
( roles/
)
Service agent roles
- Cloud Controls Partner EKM Service Agent
(
roles/
)cloudcontrolspartner.ekmServiceAgent
cloudkms.
ekmConnections.
getIamPolicy
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Security Admin
( roles/
)
Security Auditor
( roles/
)
Security Reviewer
( roles/
)
Support User
( roles/
)
Service agent roles
- Cloud Controls Partner EKM Service Agent
(
roles/
)cloudcontrolspartner.ekmServiceAgent
cloudkms.ekmConnections.list
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS EkmConnections Admin
( roles/
)
Cloud KMS Viewer
( roles/
)
Databases Admin
( roles/
)
ML Engineer
( roles/
)
Security Admin
( roles/
)
Security Auditor
( roles/
)
Security Reviewer
( roles/
)
Site Reliability Engineer
( roles/
)
Support User
( roles/
)
Service agent roles
- Cloud Controls Partner EKM Service Agent
(
roles/
)cloudcontrolspartner.ekmServiceAgent
cloudkms.
ekmConnections.
setIamPolicy
Owner
( roles/
)
Cloud KMS Admin
( roles/
)
Security Admin
( roles/
)
cloudkms.ekmConnections.update
Owner
( roles/
)
Editor
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS EkmConnections Admin
( roles/
)
cloudkms.ekmConnections.use
cloudkms.
ekmConnections.
verifyConnectivity
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS EkmConnections Admin
( roles/
)
Support User
( roles/
)
Service agent roles
- Cloud Controls Partner EKM Service Agent
(
roles/
)cloudcontrolspartner.ekmServiceAgent
cloudkms.importJobs.create
Owner
( roles/
)
Editor
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS Importer
( roles/
)
cloudkms.importJobs.get
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS Importer
( roles/
)
Cloud KMS Viewer
( roles/
)
Databases Admin
( roles/
)
ML Engineer
( roles/
)
Security Auditor
( roles/
)
Site Reliability Engineer
( roles/
)
Support User
( roles/
)
cloudkms.
importJobs.
getIamPolicy
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Security Admin
( roles/
)
Security Auditor
( roles/
)
Security Reviewer
( roles/
)
Support User
( roles/
)
cloudkms.importJobs.list
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS Importer
( roles/
)
Cloud KMS Viewer
( roles/
)
Databases Admin
( roles/
)
ML Engineer
( roles/
)
Security Admin
( roles/
)
Security Auditor
( roles/
)
Security Reviewer
( roles/
)
Site Reliability Engineer
( roles/
)
Support User
( roles/
)
cloudkms.
importJobs.
setIamPolicy
Owner
( roles/
)
Cloud KMS Admin
( roles/
)
Security Admin
( roles/
)
cloudkms.
importJobs.
useToImport
Owner
( roles/
)
Editor
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS Importer
( roles/
)
cloudkms.kajPolicyConfigs.get
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Key Access Justifications Policy Config Admin
( roles/
)
Cloud KMS Viewer
( roles/
)
Databases Admin
( roles/
)
ML Engineer
( roles/
)
Security Auditor
( roles/
)
Site Reliability Engineer
( roles/
)
Support User
( roles/
)
cloudkms.
kajPolicyConfigs.
update
Owner
( roles/
)
Editor
( roles/
)
Cloud KMS Admin
( roles/
)
Key Access Justifications Policy Config Admin
( roles/
)
cloudkms.keyHandles.create
Owner
( roles/
)
Editor
( roles/
)
Cloud AlloyDB Admin
( roles/
)
Artifact Registry Administrator
( roles/
)
BigQuery Admin
( roles/
)
BigQuery Data Editor
( roles/
)
BigQuery Data Owner
( roles/
)
BigQuery Studio Admin
( roles/
)
BigQuery User
( roles/
)
Bigtable Administrator
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS Autokey User
( roles/
)
Cloud SQL Admin
( roles/
)
Composer Administrator
( roles/
)
Environment and Storage Object Administrator
( roles/
)
Composer Worker
( roles/
)
Compute Admin
( roles/
)
Compute Instance Admin (beta)
( roles/
)
Compute Instance Admin (v1)
( roles/
)
Compute Storage Admin
( roles/
)
Dataflow Admin
( roles/
)
Dataflow Developer
( roles/
)
DLP Organization Data Profiles Driver
( roles/
)
DLP Project Data Profiles Driver
( roles/
)
Firebase Admin
( roles/
)
Firebase Develop Admin
( roles/
)
Data Scientist
( roles/
)
Databases Admin
( roles/
)
Infrastructure Administrator
( roles/
)
ML Engineer
( roles/
)
Network Administrator
( roles/
)
Site Reliability Engineer
( roles/
)
Notebooks Legacy Admin
( roles/
)
Cloud Memorystore Redis Admin
( roles/
)
Secret Manager Admin
( roles/
)
Cloud Spanner Admin
( roles/
)
Cloud Spanner Database Admin
( roles/
)
Storage Admin
( roles/
)
cloudkms.keyHandles.get
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud AlloyDB Admin
( roles/
)
Artifact Registry Administrator
( roles/
)
BigQuery Admin
( roles/
)
BigQuery Data Editor
( roles/
)
BigQuery Data Owner
( roles/
)
BigQuery Studio Admin
( roles/
)
BigQuery User
( roles/
)
Bigtable Administrator
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS Autokey User
( roles/
)
Cloud KMS Viewer
( roles/
)
Cloud SQL Admin
( roles/
)
Composer Administrator
( roles/
)
Environment and Storage Object Administrator
( roles/
)
Composer Worker
( roles/
)
Compute Admin
( roles/
)
Compute Instance Admin (beta)
( roles/
)
Compute Instance Admin (v1)
( roles/
)
Compute Storage Admin
( roles/
)
Dataflow Admin
( roles/
)
Dataflow Developer
( roles/
)
DLP Organization Data Profiles Driver
( roles/
)
DLP Project Data Profiles Driver
( roles/
)
Firebase Admin
( roles/
)
Firebase Develop Admin
( roles/
)
Data Scientist
( roles/
)
Databases Admin
( roles/
)
Infrastructure Administrator
( roles/
)
ML Engineer
( roles/
)
Network Administrator
( roles/
)
Security Auditor
( roles/
)
Site Reliability Engineer
( roles/
)
Support User
( roles/
)
Notebooks Legacy Admin
( roles/
)
Cloud Memorystore Redis Admin
( roles/
)
Secret Manager Admin
( roles/
)
Cloud Spanner Admin
( roles/
)
Cloud Spanner Database Admin
( roles/
)
Storage Admin
( roles/
)
cloudkms.keyHandles.list
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud AlloyDB Admin
( roles/
)
Artifact Registry Administrator
( roles/
)
BigQuery Admin
( roles/
)
BigQuery Data Editor
( roles/
)
BigQuery Data Owner
( roles/
)
BigQuery Studio Admin
( roles/
)
BigQuery User
( roles/
)
Bigtable Administrator
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS Autokey User
( roles/
)
Cloud KMS Viewer
( roles/
)
Cloud SQL Admin
( roles/
)
Composer Administrator
( roles/
)
Environment and Storage Object Administrator
( roles/
)
Composer Worker
( roles/
)
Compute Admin
( roles/
)
Compute Instance Admin (beta)
( roles/
)
Compute Instance Admin (v1)
( roles/
)
Compute Storage Admin
( roles/
)
Dataflow Admin
( roles/
)
Dataflow Developer
( roles/
)
DLP Organization Data Profiles Driver
( roles/
)
DLP Project Data Profiles Driver
( roles/
)
Firebase Admin
( roles/
)
Firebase Develop Admin
( roles/
)
Data Scientist
( roles/
)
Databases Admin
( roles/
)
Infrastructure Administrator
( roles/
)
ML Engineer
( roles/
)
Network Administrator
( roles/
)
Security Admin
( roles/
)
Security Auditor
( roles/
)
Security Reviewer
( roles/
)
Site Reliability Engineer
( roles/
)
Support User
( roles/
)
Notebooks Legacy Admin
( roles/
)
Cloud Memorystore Redis Admin
( roles/
)
Secret Manager Admin
( roles/
)
Cloud Spanner Admin
( roles/
)
Cloud Spanner Database Admin
( roles/
)
Storage Admin
( roles/
)
cloudkms.keyRings.create
Owner
( roles/
)
Editor
( roles/
)
Cloud KMS Admin
( roles/
)
Service agent roles
- Assured Workloads Service Agent
(
roles/
)assuredworkloads.serviceAgent
cloudkms.
keyRings.
createTagBinding
Owner
( roles/
)
Cloud KMS Admin
( roles/
)
DLP Organization Data Profiles Driver
( roles/
)
DLP Project Data Profiles Driver
( roles/
)
Tag User
( roles/
)
cloudkms.
keyRings.
deleteTagBinding
Owner
( roles/
)
Cloud KMS Admin
( roles/
)
DLP Organization Data Profiles Driver
( roles/
)
DLP Project Data Profiles Driver
( roles/
)
Tag User
( roles/
)
cloudkms.keyRings.get
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS Viewer
( roles/
)
Databases Admin
( roles/
)
ML Engineer
( roles/
)
Security Auditor
( roles/
)
Site Reliability Engineer
( roles/
)
Support User
( roles/
)
cloudkms.keyRings.getIamPolicy
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Security Admin
( roles/
)
Security Auditor
( roles/
)
Security Reviewer
( roles/
)
Support User
( roles/
)
SLZ BQDW Blueprint Project Level Remediator
( roles/
)
cloudkms.keyRings.list
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS Viewer
( roles/
)
Databases Admin
( roles/
)
ML Engineer
( roles/
)
Security Admin
( roles/
)
Security Auditor
( roles/
)
Security Reviewer
( roles/
)
Site Reliability Engineer
( roles/
)
Support User
( roles/
)
Service agent roles
- Cloud Security Compliance Service Agent
(
roles/
)cloudsecuritycompliance.serviceAgent - Audit Manager Auditing Service Agent
(
roles/
)auditmanager.serviceAgent
cloudkms.
keyRings.
listEffectiveTags
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
DLP Organization Data Profiles Driver
( roles/
)
DLP Project Data Profiles Driver
( roles/
)
Security Auditor
( roles/
)
Support User
( roles/
)
Tag User
( roles/
)
Tag Viewer
( roles/
)
cloudkms.
keyRings.
listTagBindings
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
DLP Organization Data Profiles Driver
( roles/
)
DLP Project Data Profiles Driver
( roles/
)
Security Auditor
( roles/
)
Support User
( roles/
)
Tag User
( roles/
)
Tag Viewer
( roles/
)
cloudkms.keyRings.setIamPolicy
Owner
( roles/
)
Cloud KMS Admin
( roles/
)
Security Admin
( roles/
)
SLZ BQDW Blueprint Project Level Remediator
( roles/
)
cloudkms.
locations.
generateRandomBytes
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Crypto Operator
( roles/
)
Support User
( roles/
)
cloudkms.locations.get
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS CryptoKey Decrypter
( roles/
)
Cloud KMS CryptoKey Decrypter Via Delegation
( roles/
)
Cloud KMS CryptoKey Encrypter
( roles/
)
Cloud KMS CryptoKey Encrypter/Decrypter
( roles/
)
Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation
( roles/
)
Cloud KMS CryptoKey Encrypter Via Delegation
( roles/
)
Cloud KMS Crypto Operator
( roles/
)
Cloud KMS CryptoKey Decapsulator
( roles/
)
Cloud KMS Expert Raw AES-CBC Key Manager
( roles/
)
Cloud KMS Expert Raw AES-CTR Key Manager
( roles/
)
Cloud KMS Expert Raw PKCS#1 Key Manager
( roles/
)
Cloud KMS Importer
( roles/
)
Cloud KMS CryptoKey Public Key Viewer
( roles/
)
Cloud KMS CryptoKey Signer
( roles/
)
Cloud KMS CryptoKey Signer/Verifier
( roles/
)
Cloud KMS CryptoKey Verifier
( roles/
)
Cloud KMS Viewer
( roles/
)
Kubernetes Engine KMS Crypto Key User
( roles/
)
Data Scientist
( roles/
)
Databases Admin
( roles/
)
Dev Ops
( roles/
)
ML Engineer
( roles/
)
Security Auditor
( roles/
)
Site Reliability Engineer
( roles/
)
Support User
( roles/
)
Service agent roles
- DLP API Service Agent
(
roles/
)dlp.serviceAgent
cloudkms.locations.list
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS CryptoKey Decrypter
( roles/
)
Cloud KMS CryptoKey Decrypter Via Delegation
( roles/
)
Cloud KMS CryptoKey Encrypter
( roles/
)
Cloud KMS CryptoKey Encrypter/Decrypter
( roles/
)
Cloud KMS CryptoKey Encrypter/Decrypter Via Delegation
( roles/
)
Cloud KMS CryptoKey Encrypter Via Delegation
( roles/
)
Cloud KMS Crypto Operator
( roles/
)
Cloud KMS CryptoKey Decapsulator
( roles/
)
Cloud KMS Expert Raw AES-CBC Key Manager
( roles/
)
Cloud KMS Expert Raw AES-CTR Key Manager
( roles/
)
Cloud KMS Expert Raw PKCS#1 Key Manager
( roles/
)
Cloud KMS Importer
( roles/
)
Cloud KMS CryptoKey Public Key Viewer
( roles/
)
Cloud KMS CryptoKey Signer
( roles/
)
Cloud KMS CryptoKey Signer/Verifier
( roles/
)
Cloud KMS CryptoKey Verifier
( roles/
)
Cloud KMS Viewer
( roles/
)
Kubernetes Engine KMS Crypto Key User
( roles/
)
Data Scientist
( roles/
)
Databases Admin
( roles/
)
Dev Ops
( roles/
)
ML Engineer
( roles/
)
Security Admin
( roles/
)
Security Auditor
( roles/
)
Security Reviewer
( roles/
)
Site Reliability Engineer
( roles/
)
Support User
( roles/
)
Service agent roles
- DLP API Service Agent
(
roles/
)dlp.serviceAgent
cloudkms.
locations.
optOutKeyDeletionMsa
Owner
( roles/
)
Cloud KMS Admin
( roles/
)
cloudkms.operations.get
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud AlloyDB Admin
( roles/
)
Artifact Registry Administrator
( roles/
)
BigQuery Admin
( roles/
)
BigQuery Data Editor
( roles/
)
BigQuery Data Owner
( roles/
)
BigQuery Studio Admin
( roles/
)
BigQuery User
( roles/
)
Bigtable Administrator
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS Autokey User
( roles/
)
Cloud KMS Viewer
( roles/
)
Cloud SQL Admin
( roles/
)
Composer Administrator
( roles/
)
Environment and Storage Object Administrator
( roles/
)
Composer Worker
( roles/
)
Compute Admin
( roles/
)
Compute Instance Admin (beta)
( roles/
)
Compute Instance Admin (v1)
( roles/
)
Compute Storage Admin
( roles/
)
Dataflow Admin
( roles/
)
Dataflow Developer
( roles/
)
DLP Organization Data Profiles Driver
( roles/
)
DLP Project Data Profiles Driver
( roles/
)
Firebase Admin
( roles/
)
Firebase Develop Admin
( roles/
)
Data Scientist
( roles/
)
Databases Admin
( roles/
)
Infrastructure Administrator
( roles/
)
ML Engineer
( roles/
)
Network Administrator
( roles/
)
Security Auditor
( roles/
)
Site Reliability Engineer
( roles/
)
Support User
( roles/
)
Notebooks Legacy Admin
( roles/
)
Cloud Memorystore Redis Admin
( roles/
)
Secret Manager Admin
( roles/
)
Cloud Spanner Admin
( roles/
)
Cloud Spanner Database Admin
( roles/
)
Storage Admin
( roles/
)
cloudkms.
projects.
showEffectiveAutokeyConfig
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud AlloyDB Admin
( roles/
)
Artifact Registry Administrator
( roles/
)
BigQuery Admin
( roles/
)
BigQuery Data Editor
( roles/
)
BigQuery Data Owner
( roles/
)
BigQuery Studio Admin
( roles/
)
BigQuery User
( roles/
)
Bigtable Administrator
( roles/
)
Cloud KMS Admin
( roles/
)
Cloud KMS Autokey Admin
( roles/
)
Cloud KMS Autokey User
( roles/
)
Cloud SQL Admin
( roles/
)
Composer Administrator
( roles/
)
Environment and Storage Object Administrator
( roles/
)
Composer Worker
( roles/
)
Compute Admin
( roles/
)
Compute Instance Admin (beta)
( roles/
)
Compute Instance Admin (v1)
( roles/
)
Compute Storage Admin
( roles/
)
Dataflow Admin
( roles/
)
Dataflow Developer
( roles/
)
DLP Organization Data Profiles Driver
( roles/
)
DLP Project Data Profiles Driver
( roles/
)
Firebase Admin
( roles/
)
Firebase Develop Admin
( roles/
)
Data Scientist
( roles/
)
Databases Admin
( roles/
)
Infrastructure Administrator
( roles/
)
ML Engineer
( roles/
)
Network Administrator
( roles/
)
Site Reliability Engineer
( roles/
)
Support User
( roles/
)
Notebooks Legacy Admin
( roles/
)
Cloud Memorystore Redis Admin
( roles/
)
Secret Manager Admin
( roles/
)
Cloud Spanner Admin
( roles/
)
Cloud Spanner Database Admin
( roles/
)
Storage Admin
( roles/
)
cloudkms.
projects.
showEffectiveKajEnrollmentConfig
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Key Access Justifications Enrollment Viewer
( roles/
)
Support User
( roles/
)
cloudkms.
projects.
showEffectiveKajPolicyConfig
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Admin
( roles/
)
Key Access Justifications Policy Config Admin
( roles/
)
Support User
( roles/
)
cloudkms.
protectedResources.
search
Owner
( roles/
)
Editor
( roles/
)
Viewer
( roles/
)
Cloud KMS Protected Resources Viewer
( roles/
)
Support User
( roles/
)