You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
On each account where compliance wants to be checked (`AWS_ACCOUNT_ID`), we need to provide a role for Sysdig to be able to impersonate and perform `SecurityAudit` tasks.
4
+
5
+
In addition, we must make Sysdig aware of these accounts and role.
6
+
We will guide you to provide, on the Sysdig Secure SaaS backend, the following resources:
7
+
- a cloud-account for each account of your organization where compliance is wanted to be checked
8
+
- a task that will run `aws_foundations_bench-1.3.0` schema on previously defined accounts
9
+
10
+
## Sysdig Side
11
+
12
+
1.**Register cloud accounts** on Sysdig
13
+
14
+
For each account you want to provision for the Compliance feature, we need to register it on Sysdig Secure, so
15
+
it can impersonate and perform `SecurityAudit` tasks.
16
+
17
+
For Sysdig Secure backend API communication [How to use development tools](https://docs.sysdig.com/en/docs/developer-tools/). Also, we have this [AWS provisioning script](./utils/sysdig_cloud_compliance_provisioning.sh) as reference, but we will explain it here too.
For later usage, fetch `SYSDIG_AWS_EXTERNAL_ID` from one of the previously registered GCP accounts. All accounts will have same id (you only need to run it once).
Validate if Sysdig <-> Customer infra connection is properly made using [`/cloud/accounts/{accountId}/validateRole`](https://secure.sysdig.com/swagger.html#tag/Cloud/paths/~1api~1cloud~1v2~1accounts~1{accountId}~1validateRole/get)
Copy file name to clipboardExpand all lines: use-cases/manual-org-three-way.md
+2-112Lines changed: 2 additions & 112 deletions
Original file line number
Diff line number
Diff line change
@@ -263,7 +263,6 @@ If using Kubernetes, we will make use of the [Sysdig cloud-connector helm chart]
263
263
264
264
Provided the following `values.yaml` template
265
265
```yaml
266
-
-- values.yaml suggestion
267
266
sysdig:
268
267
url: "https://secure.sysdig.com"
269
268
secureAPIToken: "SYSDIG_API_TOKEN"
@@ -297,9 +296,9 @@ If using , AWS ECS (Elastic Container Service), we will create a new Fargate Tas
297
296
298
297
- TaskRole: Use previously created `SysdigComputeRole`
299
298
- Task memory (GB): 0.5 and Task CPU (vCPU: 0.25 will suffice
300
-
- Container definition:
299
+
- Container definition
301
300
- Image: `quay.io/sysdig/cloud-connector:latest`
302
-
- Port Mappings; bind port 5000:5000 tcp protocol
301
+
- Port Mappings; bind port 5000 tcp protocol
303
302
- Environment variables
304
303
- SECURE_URL
305
304
- SECURE_API_TOKEN
@@ -341,120 +340,11 @@ ExecutionRole
341
340
}
342
341
-->
343
342
344
-
## Compliance
345
-
346
-
On each member-account where compliance wants to be checked (`AWS_ACCOUNT_ID`), we need to provide a role for Sysdig to be able to impersonate and perform `SecurityAudit` tasks.
347
-
348
-
In addition, we must make Sysdig aware of this accounts and role.
349
-
We will guide you to provide, on the Sysdig Secure SaaS backend, the following resources:
350
-
- a cloud-account for each member account of your organization where compliance is wanted to be checked
351
-
- a task that will run "aws_foundations_bench-1.3.0" schema on previously defined accounts
352
-
353
-
### Sysdig Side
354
-
355
-
356
-
### 1. **Compliance setup** on Sysdig backend and AWS Accounts
357
-
358
-
1. **Register Organization accounts** on Sysdig
359
-
- For each account you want to provision for the Compliance feature, we need to register it on Sysdig Secure, so
360
-
it can impersonate and perform `SecurityAudit` tasks.
361
-
- For Sysdig Secure backend API communication [How to use development tools](https://docs.sysdig.com/en/docs/developer-tools/). Also, we have this [AWS provisioning script](./utils/sysdig_cloud_compliance_provisioning.sh) as reference, but we will explain it here too.
- For later usage, fetch `SYSDIG_AWS_EXTERNAL_ID` from one of the previously registered GCP accounts. All accounts will have same id (you only need to run it once).
Validate if Sysdig <-> Customer infra connection is properly made using [`/cloud/accounts/{accountId}/validateRole`](https://secure.sysdig.com/swagger.html#tag/Cloud/paths/~1api~1cloud~1v2~1accounts~1{accountId}~1validateRole/get)
0 commit comments