This image shows the workflow for workload access governance.
- Create workload-specific administrator groups
                  - Create IAM policies for workload administrators
 
- Implement PAM authentication for workload-privileged users
- Create workload-specific identity requirements
                  - Provision users
- Implement identity federation
- Implement MFA requirements