Control access to features in the Security Operations console

To control access to threat investigation capabilities, you use the Security Operations console to grant IAM roles and their permissions to users and groups, and then you configure SOAR. To complete these tasks, do the following:

  1. Configure access to Security Operations console features using IAM.
  2. See Security Operations console permissions in IAM for information about roles and permissions that control access to Security Operations console features.
  3. Map and authorize users using IAM.