Skip to content

Commit 19444bc

Browse files
author
iru
authored
Update README.md
1 parent 89ade23 commit 19444bc

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

README.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -190,9 +190,11 @@ ecs:DescribeTaskDefinition
190190
- Check [Organizational Use Case - Role Summary](./examples/organizational/README.md#role-summary) for more details
191191

192192

193-
## Forcing Events
193+
## Confirm the Services are Working
194194

195-
**Threat Detection**
195+
Check official documentation on [Secure for cloud - AWS, Confirm the Services are working](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-on-aws/#confirm-the-services-are-working)
196+
197+
### Forcing Events - Threat Detection
196198

197199
Terraform example module to trigger **Create IAM Policy that Allows All** event can be found on [examples/trigger-events](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples/trigger-events).
198200

@@ -211,7 +213,7 @@ If that's not working as expected, some other questions can be checked
211213
- are events consumed in the sqs queue, or are they pending?
212214
- are events being sent to sns topic?
213215

214-
**Image Scanning**
216+
### Forcing Events - Image Scanning
215217

216218
Image scanning is not activated by default. Ensure you have the [required scanning enablers](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-on-aws/#enabling-image-scanner) in place
217219

0 commit comments

Comments
 (0)