Skip to content

Commit 0d2a3cb

Browse files
author
iru
authored
docs: clarify questionnaire and remove selection guides (will restore them)
1 parent a16d6b1 commit 0d2a3cb

File tree

1 file changed

+8
-47
lines changed

1 file changed

+8
-47
lines changed

use-cases/_questionnaire.md

Lines changed: 8 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Use-Case Questionnaire
22

3-
This questionnaire is aimed to help you/us find the most suitable way of deploying [Sysdig Secure for Cloud](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/).
3+
This questionnaire is aimed to help you/us find the most suitable way of deploying [Sysdig Secure for Cloud](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/) in your infrastucture, as well as to understand the needs to develop new official `/examples`, for reducing the installation friction.
44

55
Despite wanting only to trial it, we suggest that you deploy, and test it, in th **most-similar situation to what
66
you have on your production environment**.
@@ -21,7 +21,7 @@ modules, and we also offer [AWS Cloudformation templates](https://github.com/sys
2121
- if so, how many member accounts (aws) /projects (gcp) /subscriptions (azure) does it have?
2222
- regarding of the number, how many accounts would be required to enroll in the secure for cloud setup?
2323
- do you have dynamic accounts/projects/subscriptions? what's their lifecycle?
24-
- does it have any landing such as aws control-tower?
24+
- does it have any landing such as aws control-tower? what's event management there (if any)?
2525
- sysdig secure for cloud is presented in different **compute workload** flavors; ecs on aws, cloudrun on gcp or azure container instances on azure, plus a K8s deployment an all three clouds, plus apprunner on aws (less resource-demaing than ecs, but region limited)
2626
- in case of ECS or K8S, do you have an existing cluster you would like to re-use?
2727
- (aws-only) do you have **existing aws cloudtrail**?
@@ -31,15 +31,15 @@ modules, and we also offer [AWS Cloudformation templates](https://github.com/sys
3131
- if it's not organizational, does each trail report to the same s3 bucket?
3232
- if so, does that S3 bucket already have any "Event Notification System"? Is it an SNS we could subscribe to? ingestor-type: `aws-cloudtrail-s3-sns-sqs`
3333
- if so, does that S3 bucket already have an "Amazon EventBridge" system activated? ingestor-type: `aws-cloudtrail-s3-sns-sqs-eventbridge`
34-
- whether it's organizational or not, could you give us a quick picture of the account setup in terms of purpose?
34+
- whether it's organizational or not, could you give us a quick picture of the infra setup?
3535
- how many **regions** do you work with?
36-
- is secure for cloud to be deployed on the same region as your existing resources?
37-
- if not, explain us your current region setup
38-
- (aws-only) if in previous point you said you have a cloudtrail, cloudtrail-sns, or cloudtrail-s3, in which region is it?
36+
- would there be any limitation for secure for cloud to be deployed in any specific region?
37+
- if yes, explain us your current region setup
3938
- how do you handle **IAM permissions**? would you let our Terraform scripts set them up for you, or you want to set them yourself manually? any restriction we may be aware of?
4039
- how do you handle **outbound newtwork connection** securization? does your infrastructure have any customized VPC/firewally setup?
4140
- **Deployment** type
42-
- are you familiar with the installation stack? Terraform, Cloudformation, AWS CDK, ...? Do you use any other InfraAsCode frameworks?
41+
- are you familiar with the installation stack? Terraform, Cloudformation, AWS CDK, ...? would you have any preference?
42+
- do you use any other InfraAsCode frameworks?
4343
- if you want to use Kubernetes compute for Sysdig deployment, what's your current way of deploying helm charts?
4444

4545
<br/>
@@ -52,45 +52,6 @@ In what [Sysdig For Cloud Features](https://docs.sysdig.com/en/docs/sysdig-secur
5252
- [Compliance](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/) (cis benchmarks and others)
5353
- [Identity and Access Management](https://docs.sysdig.com/en/docs/sysdig-secure/posture/permissions-and-entitlements/)
5454
- Scanning
55-
- Push-based registry/repository image scanning
55+
- Registry/repository push-based image scanning
5656
- Runtime workload image scanning (ecs on Aws, cloudrun on GCP, or container instances on Azure)
5757
- Note: Sysdig offers many other ways of performing scanning, and we recommend you to [Check all Scanning options in the Vulnerability Management](https://docs.sysdig.com/en/docs/sysdig-secure/vulnerabilities/) to push this task as far to the left as possible (dev side)
58-
59-
60-
<br/><br/>
61-
62-
## Example Selection
63-
64-
65-
| | Single `single-` | Organizational `organizational-` |
66-
| --| -- | -- |
67-
| Deployment Type | all Sysdig resources will be deployed within the selected account | most Sysdig resources will be deployed within the selected account, but some require to be deployed on member-accounts (for Compliance and Image Scanning) and one role is needed on the management account for cloudtrail event access |
68-
| Target | will only analyse current account | handles all accounts (managed and member)
69-
| Drawbacks | cannot re-use another account Cloudtrail data (unless its deployed on the same account where the sns/s3 bucket is) | for scanning, a per-member-account access role is required
70-
71-
With both examples `single` and `org`, you can customize the desired features to de deployed with the `deploy_*` input vars to avoid deploying more than wanted.
72-
73-
<br/>
74-
75-
### Compute Workload Type
76-
77-
| Cloud | Example Options |
78-
| - | - |
79-
| AWS | K8S `-k8s`, ECS `-ecs`, AppRunner `-apprunner` |
80-
| GCP | K8S `-k8s`, CloudRun |
81-
| Azure | K8S `-k8s`, AzureContainerInstances |
82-
83-
<br/><br/>
84-
85-
## Available Optionals
86-
87-
We enable following optionals, to allow user to re-use their pre-existing / configured resources.
88-
89-
| Cloud | Optionals | Related Input Vars | Other |
90-
| -- | --| -- | -- |
91-
| AWS | Cloudtrail | single: [`cloudtrail_sns_arn`](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-ecs#input_cloudtrail_sns_arn)<br/>organizational: [`existing_cloudtrail_config`](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/organizational#input_existing_cloudtrail_config) | - |
92-
| | ECS, VPC, Subnet | `ecs_cluster_name`, `ecs_vpc_id`, `ecs_vpc_subnets_private_ids` | if used, the three are mandatory |
93-
| GCP | - | - | - |
94-
| Azure | ResourceGroup | `resource_group_name` | - |
95-
| | ACR | `registry_name`, `registry_resource_group_name` | - |
96-
| * | Compute Workload | - | All clouds allow Sysdig Secure for cloud to be deployed on a pre-existing K8S cluster|

0 commit comments

Comments
 (0)