Skip to content

Commit 4cc2f42

Browse files
author
iru
authored
docs: fix
1 parent 030dcea commit 4cc2f42

File tree

1 file changed

+2
-10
lines changed

1 file changed

+2
-10
lines changed

use-cases/README.md

Lines changed: 2 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,7 @@ and for AWS in [Cloudformation](https://github.com/sysdiglabs/aws-templates-secu
2020

2121
| | `/examples/single-*` | `/examples/organizational-*` |
2222
| --| -- | -- |
23-
| Deployment Type | all Sysdig resources will be deployed within the selected account | Most Sysdig resources will
24-
be deployed within the selected account (just one), but some features, require resources to be deployed on all of
25-
the member-accounts (for Compliance and Image Scanning) . <br />One role is needed on the management account for
26-
cloudtrail-s3 event access |
23+
| Deployment Type | all Sysdig resources will be deployed within the selected account | Most Sysdig resources will be deployed within the selected account (just one), but some features, require resources to be deployed on all of the member-accounts (for Compliance and Image Scanning) . <br />One role is needed on the management account for cloudtrail-s3 event access |
2724
| Target | will only analyse current account | handles all accounts (managed and member)|
2825
| Drawbacks | cannot re-use another account Cloudtrail data (unless its deployed on the same account where the sns/s3 bucket is) | for scanning, a per-member-account access role is required |
2926
| Optional usage limitations | - | For organizational example, optional resources must exist in the management account. For other setups check
@@ -52,12 +49,7 @@ Make use of optionals to allow the re-use of pre-existing resources, and avoid i
5249

5350
| Cloud | Optionals | Related Input Vars | Other |
5451
| -- | --| -- | -- |
55-
| AWS | Cloudtrail | single: [`cloudtrail_sns_arn`](https://github.
56-
com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-ecs#input_cloudtrail_sns_arn)
57-
<br/>organizational: [`existing_cloudtrail_config`](https://github.
58-
com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/organizational#input_existing_cloudtrail_config)
59-
| For organizational example, optional resources must exist in the management account. For other setups check
60-
other alternative use-cases |
52+
| AWS | Cloudtrail | single: [`cloudtrail_sns_arn`](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-ecs#input_cloudtrail_sns_arn)<br/>organizational: [`existing_cloudtrail_config`](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/organizational#input_existing_cloudtrail_config) | For organizational example, optional resources must exist in the management account. For other setups check other alternative use-cases |
6153
| | ECS, VPC, Subnet | `ecs_cluster_name`, `ecs_vpc_id`, `ecs_vpc_subnets_private_ids` | if used, the three are mandatory |
6254
| GCP | - | - | - |
6355
| Azure | ResourceGroup | `resource_group_name` | - |

0 commit comments

Comments
 (0)