You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
3. For ECS deployment, 2 internet facing IPv4 addresses for NAT availability. You can [re-use an existing ECS/VPC/Subnet](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-ecs#input_ecs_cluster_name)
40
+
4. Have an existing AWS account as the organization management account
35
41
* Within the Organization, following services must be enabled (Organization > Services)
2. Configure [Terraform **AWS** Provider](https://registry.terraform.io/providers/hashicorp/aws/latest/docs) for the `management` account of the organization
44
+
5. Configure [Terraform **AWS** Provider](https://registry.terraform.io/providers/hashicorp/aws/latest/docs) for the `management` account of the organization
39
45
* This provider credentials must be [able to manage cloudtrail creation](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/creating-trail-organization.html)
40
46
> You must be logged in with the management account for the organization to create an organization trail. You must also have sufficient permissions for the IAM user or role in the management account to successfully create an organization trail.
41
47
42
-
3. Organizational Multi-Account Setup, ONLY IF SCANNING feature is activated, a specific role is required, to enable Sysdig to impersonate on organization member-accounts and provide
48
+
6. Organizational Multi-Account Setup, ONLY IF SCANNING feature is activated, a specific role is required, to enable Sysdig to impersonate on organization member-accounts and provide
43
49
44
50
* The ability to pull ECR hosted images when they're allocated in a different account
45
51
* The ability to query the ECS tasks that are allocated in different account, in order to fetch the image to be scanned
@@ -50,16 +56,12 @@ Minimum requirements:
50
56
> You have to do this manually, as shown in the following procedure. This essentially duplicates the role automatically set up for created accounts. We recommend that you use the same name, OrganizationAccountAccessRole, for your manually created roles for consistency and ease of remembering.
51
57
* If role name, `OrganizationAccountAccessRole` wants to be modified, it must be done both on the `aws` member-account provider AND input value `organizational_member_default_admin_role`
52
58
53
-
5. Provide a member **account ID for Sysdig Secure for Cloud workload** to be deployed.
59
+
7. Provide a member **account ID for Sysdig Secure for Cloud workload** to be deployed.
54
60
Our recommendation is for this account to be empty, so that deployed resources are not mixed up with your workload.
55
61
This input must be provided as terraform required input value
0 commit comments