You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# AWS Organizational Setup with Existing ECS Environment
2
2
3
-
## Use-Case explanation
3
+
## Overview
4
4
5
-
**Client Setup**
5
+
This usecase covers securing an AWS organizational setup consisting an existing ECS cluster with its own VPC and subnet.
6
6
7
-
-[X] organizational setup
8
-
-[X] organizational cloudtrail that reports to SNS and persists events in a managed-account stored S3 bucket
9
-
-[X] member account usage - all required and pre-existing resources exist in the same account
10
-
- cloudtrail/sns/s3 in the management account
11
-
- and pre-existing objects in the same account where Sysdig Secure for Cloud workload is to be deployed
12
-
-[ ] member account usage - all required resources are in scattered organizational member accounts
13
-
-[X] pre-existing resources
14
-
-[X] organizational cloudtrail, reporting to an SNS topic and delivering events to the S3 bucket
15
-
-[X] ecs cluster/vpc/subnet we want to use to deploy Sysdig for Cloud workload
16
-
-[ ] k8s cluster we want to use to deploy Sysdig for Cloud workload
7
+
### User Setup
17
8
18
-
**Sysdig Secure For Cloud Features**
9
+
-[X] AWS organizational account
10
+
-[X] Organizational Cloudtrail that reports to SNS and persists events in a managed-account S3 bucket
11
+
-[X] Member account usage: All the required and pre-existing resources exist in the same account
12
+
- Cloudtrail, SNS, and S3 in the Management account
13
+
- Pre-existing objects in the same account where Sysdig Secure for Cloud workload is to be deployed
14
+
-[ ] Member account usage: All the required resources reside in different member accounts
15
+
-[X] Pre-existing resources
16
+
-[X] Organizational cloudtrail reporting to an SNS topic and delivering events to the S3 bucket
17
+
-[X] ECS cluster with VPC and subnet to deploy Sysdig for Cloud workload
18
+
-[ ] Kubernetes cluster to deploy Sysdig for Cloud workload
19
19
20
-
-[X] threat Detection
21
-
-[X] all accounts of the organization (management account included)
20
+
### Sysdig Secure For Cloud Features
21
+
22
+
-[X] Threat Detection
23
+
-[X] all accounts of the organization, including the Management account
22
24
-[ ] image Scanning (?)
23
-
-[ ]ecr pushed images
24
-
-[ ]ecs running images
25
+
-[ ]ECR pushed images
26
+
-[ ]ECS running images
25
27
-[ ] CSPM/Compliance (?)
26
28
-[ ] CIEM (?)
27
29
30
+
## Preparation
28
31
32
+
For this usecase, you will use the [`./examples/organizational`](../examples/organizational/README.md) setup. In order for this setup to work, several roles and permissions are required. Before proceeding, see the [readme](../examples/organizational/README.md) and check whether you comply with the requirements.
29
33
30
-
31
-
## Suggested setup
32
-
33
-
For this use-case we're going to use the [`./examples/organizational`](../examples/organizational/README.md) setup.
34
-
In order for this setup to work, several roles and permissions are required.
35
-
Before proceeding, please read the example README and check whether you comply with requirements.
36
-
37
-
Please contact us if something requires to be adjusted.
38
-
34
+
Contact Sysdig for support.
39
35
40
36
### Step by Step Example Guide
41
37
@@ -76,17 +72,17 @@ module "utils_ecs-vpc" {
76
72
```
77
73
-->
78
74
79
-
1. Configure `AWS_PROFILE` with an organizational Administration credentials
75
+
1. Configure `AWS_PROFILE` with an organizational administration credentials.
80
76
81
-
2. Choose an Organizational **Member account for Sysdig Workload** to be deployed.
82
-
- This accountID will be provided in the `SYSDIG_SECURE_FOR_CLOUD_MEMBER_ACCOUNT_ID` parameter
83
-
-Use-case workload-related pre-existing resources (ecs,vpc,subnets) must live within this member account
77
+
2. Choose an Organizational member account for Sysdig Workload to be deployed.
78
+
-Note the account ID of this account. This value will be provided in the `SYSDIG_SECURE_FOR_CLOUD_MEMBER_ACCOUNT_ID` parameter.
79
+
-Ensure that workloadresources (ECS, VPC, subnets) exist in this member account.
84
80
85
-
3. Use `organizational` example snippet with following parameters
81
+
3. Use the `organizational` example snippet with following parameters:
86
82
87
83
- General
88
-
-`AWS_REGION` Same region is to be used for both organizational managed account and Sysdig workload member account resources.
89
-
-`SYSDIG_SECURE_FOR_CLOUD_MEMBER_ACCOUNT_ID` where Sysdig Workload is to be deployed under the pre-existing ECS
84
+
-`AWS_REGION`: Same region is to be used for both organizational managed account and Sysdig workload member account resources.
85
+
-`SYSDIG_SECURE_FOR_CLOUD_MEMBER_ACCOUNT_ID`: where Sysdig Workload is to be deployed under the pre-existing ECS
90
86
91
87
- Existing Organizational Cloudtrail Setup
92
88
-`CLOUDTRAIL_SNS_ARN`
@@ -103,7 +99,6 @@ module "utils_ecs-vpc" {
103
99
-`ECS_VPC_ID` ex.: "vpc-0e91bfef6693f296b"
104
100
-`ECS_VPC_SUBNET_PRIVATE_ID_X` Two subnets for the VPC. ex.: "subnet-0c7d803ecdc88437b"<br/><br/>
Copy file name to clipboardExpand all lines: use-cases/org-single-account.md
+23-19Lines changed: 23 additions & 19 deletions
Original file line number
Diff line number
Diff line change
@@ -1,35 +1,39 @@
1
-
# OrganizationSetup - Single-Account deployment
1
+
# Organization Setup: SingleAccount Deployment
2
2
3
-
## Use-Case explanation
3
+
## Overview
4
4
5
-
This use case will cover the way of deploying `examples/organizational`within a more limited scope (single-account)
5
+
This use case will leverage the [`examples/organizational`](./examples/organizational/README.md) setup within a more limited scope (single-account). Therefore, the CloudTrail you will set up will be organizational.
6
6
7
-
> Being able to **allow/deny member accounts** where SecureForCloud is deployed, in organizational example, is under
8
-
> feature-request.
7
+
> Being able to allow/deny member accounts where Secure for Cloud is deployed is under development.
9
8
10
-
### Scope and Limitations
9
+
### Features
11
10
12
-
- While the feature-request is being developed, this workaround will only cover following [features](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud#sysdig-secure-for-cloud-in-aws)
13
-
-[x] Thread Detection
14
-
-[x] Compliance
15
-
-[x] Identity and Access Management
16
-
-[ ] Image scanning
17
-
- Because we will still rely on organizational setup, the **cloudtrail will still be organizational**
11
+
This use case provides the following [Sysdig Secure For Cloud](https://docs.sysdig.com/en/docs/sysdig-secure/sysdig-secure-for-cloud/#features) features:
| <aname="input_deploy_benchmark_organizational"></a> [deploy\_benchmark\_organizational](#input\_deploy\_benchmark\_organizational)| true/false whether benchmark module should be deployed on organizational or single-account mode (1 role per org accounts if true, 1 role in default aws provider account if false)</li></ul> |`bool`|`true`| no |
28
+
| <aname="input_deploy_benchmark_organizational"></a> [deploy\_benchmark\_organizational](#input\_deploy\_benchmark\_organizational)| Determines if the benchmark module should be deployed on organizational or single-account mode. Creates one role per org accounts if true. Creates one role in the default aws provider account if false)</li></ul> |`bool`|`true`| no |
29
+
30
+
### AWS Terraform Providers
31
+
32
+
You will work on the following setups: default and member terraform providers.
28
33
34
+
1. Member account: Use the [default use-case snippet](#terraform-snippet) to deploy compute and compliance role in a member account.
35
+
2. Management account: Use the [default use-case snippet](#terraform-snippet) to deploy compute on the Management account.
29
36
30
-
- the two aws terraform providers (default, member); here we will work two setups
31
-
1. to deploy compute and compliance role **just in one member account**, use [default use-case snippet](#terraform-snippet)
32
-
1. to deploy compute part **on management account**, use following provider setup on the [default use-case snippet](#terraform-snippet)<br/>
0 commit comments