This image shows the workflow for workload access governance.
- Create workload-specific administrator groups
- Create IAM policies for workload administrators
- Implement PAM authentication for workload-privileged users
- Create workload-specific identity requirements
- Provision users
- Implement identity federation
- Implement MFA requirements