You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+5-3Lines changed: 5 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -190,9 +190,11 @@ ecs:DescribeTaskDefinition
190
190
- Check [Organizational Use Case - Role Summary](./examples/organizational/README.md#role-summary) for more details
191
191
192
192
193
-
## Forcing Events
193
+
## Confirm the Services are Working
194
194
195
-
**Threat Detection**
195
+
Check official documentation on [Secure for cloud - AWS, Confirm the Services are working](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-on-aws/#confirm-the-services-are-working)
196
+
197
+
### Forcing Events - Threat Detection
196
198
197
199
Terraform example module to trigger **Create IAM Policy that Allows All** event can be found on [examples/trigger-events](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples/trigger-events).
198
200
@@ -211,7 +213,7 @@ If that's not working as expected, some other questions can be checked
211
213
- are events consumed in the sqs queue, or are they pending?
212
214
- are events being sent to sns topic?
213
215
214
-
**Image Scanning**
216
+
### Forcing Events - Image Scanning
215
217
216
218
Image scanning is not activated by default. Ensure you have the [required scanning enablers](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-on-aws/#enabling-image-scanner) in place
0 commit comments