Skip to content

Commit 4cc2b2f

Browse files
author
iru
committed
doc: add use-case for three-way cross-account setup
1 parent d4c513d commit 4cc2b2f

File tree

1 file changed

+7
-3
lines changed

1 file changed

+7
-3
lines changed

use-cases/org-three-cross-account-setup.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@
66

77
- AWS Organization Setup
88
- AWS Organizational Cloudtrail within the managed account, with Cloudtrail-SNS activation + reporting to another member-account S3 bucket
9+
- This setup is popular with user that are under AWS Control Tower Setup
910
- Existing VPC network setup.
1011

1112
**Sysdig Secure For Cloud [Features](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/)**
@@ -18,15 +19,18 @@
1819
## Suggested setup
1920

2021
We're going to use existing use case [/use-cases/org-existing-cloudtrail-ecs-vpc-subnet.md](./org-existing-cloudtrail-ecs-vpc-subnet.md), with some permission-related changes, due to the three-way cross-account scenario.
21-
This setup is popular with user that are under AWS Control Tower Setup
22+
23+
Final scenario would be:
2224

2325
- Management Account
24-
- the Cloudtrail-SNS
26+
- Cloudtrail-SNS
2527
- Log-Archive Account
26-
- the Cloudtrail-S3 bucket
28+
- Cloudtrail-S3 bucket
2729
- Member Account
2830
- Sysdig Secure for Cloud deployment
2931

32+
It's important that all three resources (cloudtrail-sns, cloudtrail-s3 and sysdig workload), is **within same AWS_REGION**. Otherwise, contact us so we can alleviate this limitation.
33+
3034
For network setup, please refer to [Sysdig SASS Region and IP Ranges Documentation](https://docs.sysdig.com/en/docs/administration/saas-regions-and-ip-ranges/).
3135

3236
Before proceeding, please read the referenced use-cases and examples and check whether you comply with requirements.

0 commit comments

Comments
 (0)