Access control best practices (original) (raw)

This page describes best practices for usingIdentity and Access Management (IAM)and Access Control Lists (ACLs) to manage access to your data.

IAM policies and ACLs require active management to be effective. Before you make a bucket, object, or managed folder accessible to other users, be sure you know who you want to share the resource with and what roles you want each of those people to have. Over time, changes in project management, usage patterns, and organizational ownership might require you to modify IAM or ACL settings on buckets and projects, especially if you manage Cloud Storage in a large organization or for a large group of users. As you evaluate and plan your access control settings, keep the following best practices in mind:

What's next