Required IAM Policies for Scanning
Create IAM policies to control who has access to Oracle Cloud Infrastructure Vulnerability Scanning Service resources, and to control the type of access for each group of users.
Use the links in this section to learn about the required IAM policies for scanning. For a list of resource types, supported variables, permissions required for each API operation, and policy examples, see Vulnerability Scanning IAM Policies.
- Recipes
- Targets
- Scanning Reports
- Vulnerability Reports
- Scanning Metrics