You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This questionnaire is aimed to help you/us find the most suitable way of deploying [Sysdig Secure for Cloud](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/).
3
+
This questionnaire is aimed to help you/us find the most suitable way of deploying [Sysdig Secure for Cloud](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/) in your infrastucture, as well as to understand the needs to develop new official `/examples`, for reducing the installation friction.
4
4
5
5
Despite wanting only to trial it, we suggest that you deploy, and test it, in th **most-similar situation to what
6
6
you have on your production environment**.
@@ -21,7 +21,7 @@ modules, and we also offer [AWS Cloudformation templates](https://github.com/sys
21
21
- if so, how many member accounts (aws) /projects (gcp) /subscriptions (azure) does it have?
22
22
- regarding of the number, how many accounts would be required to enroll in the secure for cloud setup?
23
23
- do you have dynamic accounts/projects/subscriptions? what's their lifecycle?
24
-
- does it have any landing such as aws control-tower?
24
+
- does it have any landing such as aws control-tower? what's event management there (if any)?
25
25
- sysdig secure for cloud is presented in different **compute workload** flavors; ecs on aws, cloudrun on gcp or azure container instances on azure, plus a K8s deployment an all three clouds, plus apprunner on aws (less resource-demaing than ecs, but region limited)
26
26
- in case of ECS or K8S, do you have an existing cluster you would like to re-use?
27
27
- (aws-only) do you have **existing aws cloudtrail**?
@@ -31,15 +31,15 @@ modules, and we also offer [AWS Cloudformation templates](https://github.com/sys
31
31
- if it's not organizational, does each trail report to the same s3 bucket?
32
32
- if so, does that S3 bucket already have any "Event Notification System"? Is it an SNS we could subscribe to? ingestor-type: `aws-cloudtrail-s3-sns-sqs`
33
33
- if so, does that S3 bucket already have an "Amazon EventBridge" system activated? ingestor-type: `aws-cloudtrail-s3-sns-sqs-eventbridge`
34
-
- whether it's organizational or not, could you give us a quick picture of the account setup in terms of purpose?
34
+
- whether it's organizational or not, could you give us a quick picture of the infra setup?
35
35
- how many **regions** do you work with?
36
-
- is secure for cloud to be deployed on the same region as your existing resources?
37
-
- if not, explain us your current region setup
38
-
- (aws-only) if in previous point you said you have a cloudtrail, cloudtrail-sns, or cloudtrail-s3, in which region is it?
36
+
- would there be any limitation for secure for cloud to be deployed in any specific region?
37
+
- if yes, explain us your current region setup
39
38
- how do you handle **IAM permissions**? would you let our Terraform scripts set them up for you, or you want to set them yourself manually? any restriction we may be aware of?
40
39
- how do you handle **outbound newtwork connection** securization? does your infrastructure have any customized VPC/firewally setup?
41
40
-**Deployment** type
42
-
- are you familiar with the installation stack? Terraform, Cloudformation, AWS CDK, ...? Do you use any other InfraAsCode frameworks?
41
+
- are you familiar with the installation stack? Terraform, Cloudformation, AWS CDK, ...? would you have any preference?
42
+
- do you use any other InfraAsCode frameworks?
43
43
- if you want to use Kubernetes compute for Sysdig deployment, what's your current way of deploying helm charts?
44
44
45
45
<br/>
@@ -52,45 +52,6 @@ In what [Sysdig For Cloud Features](https://docs.sysdig.com/en/docs/sysdig-secur
52
52
-[Compliance](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/) (cis benchmarks and others)
53
53
-[Identity and Access Management](https://docs.sysdig.com/en/docs/sysdig-secure/posture/permissions-and-entitlements/)
54
54
- Scanning
55
-
-Push-based registry/repository image scanning
55
+
-Registry/repository push-based image scanning
56
56
- Runtime workload image scanning (ecs on Aws, cloudrun on GCP, or container instances on Azure)
57
57
- Note: Sysdig offers many other ways of performing scanning, and we recommend you to [Check all Scanning options in the Vulnerability Management](https://docs.sysdig.com/en/docs/sysdig-secure/vulnerabilities/) to push this task as far to the left as possible (dev side)
58
-
59
-
60
-
<br/><br/>
61
-
62
-
## Example Selection
63
-
64
-
65
-
|| Single `single-`| Organizational `organizational-`|
66
-
| --| -- | -- |
67
-
| Deployment Type | all Sysdig resources will be deployed within the selected account | most Sysdig resources will be deployed within the selected account, but some require to be deployed on member-accounts (for Compliance and Image Scanning) and one role is needed on the management account for cloudtrail event access |
68
-
| Target | will only analyse current account | handles all accounts (managed and member)
69
-
| Drawbacks | cannot re-use another account Cloudtrail data (unless its deployed on the same account where the sns/s3 bucket is) | for scanning, a per-member-account access role is required
70
-
71
-
With both examples `single` and `org`, you can customize the desired features to de deployed with the `deploy_*` input vars to avoid deploying more than wanted.
0 commit comments