You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ There are three major components:
11
11
12
12
***Cloud Scanning**: Automatically scans all container images pushed to the registry or as soon a new task which involves a container is spawned in your account.Managed through [cloud-scanning module](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/modules/services/cloud-scanning).<br/>
13
13
14
-
For other Cloud providers check: [GCP](https://github.com/sysdiglabs/terraform-google-cloudvision), [Azure](https://github.com/sysdiglabs/terraform-azurerm-cloudvision)
14
+
For other Cloud providers check: [GCP](https://github.com/sysdiglabs/terraform-google-secure-for-cloud), [Azure](https://github.com/sysdiglabs/terraform-azurerm-secure-for-cloud)
Copy file name to clipboardExpand all lines: examples/organizational/README.md
+19-14Lines changed: 19 additions & 14 deletions
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,13 @@
1
1
# Sysdig Secure for Cloud in AWS :: Shared Organizational Trail
2
2
3
3
Deploy Sysdig Secure for Cloud sharing the Trail within an organization.
4
-
* In the **master account**
5
-
* An Organizational Cloutrail will be deployed
6
-
* When an account becomes part of an organization, AWS will create an `OrganizationAccountAccessRole`[for account management](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html), which Sysdig Secure for Cloud will use for member-account provisioning.
7
-
<br/>This Role is hardcoded ATM
8
-
* In the **user-provided member account**:
9
-
* An additional role `SysdigSecureForCloudRole` will be created within the master account, to be able to read cloudtrail-s3 bucket events
4
+
5
+
* In the **management account**
6
+
* An Organizational Cloutrail will be deployed (with required S3,SNS)
7
+
* An additional role `SysdigSecureForCloudRole` will be created
8
+
* to be able to read cloudtrail-s3 bucket events from sysdig workload member account.
9
+
* will also be used to asummeRole over other roles, and enable the process of scanning on ECR's that may be present in other member accounts.
10
+
* In the **user-provided member account**
10
11
* All the Sysdig Secure for Cloud service-related resources will be created
@@ -15,16 +16,20 @@ Deploy Sysdig Secure for Cloud sharing the Trail within an organization.
15
16
16
17
Minimum requirements:
17
18
18
-
1.Have an existing AWS account as the organization master account
19
+
1. Have an existing AWS account as the organization management account
19
20
* Organizational CloudTrail service must be enabled
20
-
1.AWS profile credentials configuration of the `master` account of the organization
21
+
2.AWS profile credentials configuration of the `management` account of the organization
21
22
* This account credentials must be [able to manage cloudtrail creation](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/creating-trail-organization.html)
22
23
> You must be logged in with the management account for the organization to create an organization trail. You must also have sufficient permissions for the IAM user or role in the management account to successfully create an organization trail.
23
-
* Sysdig Secure for Cloud organizational member account id, as input variable value
* When an account becomes part of an organization, AWS will create an `OrganizationAccountAccessRole`[for account management](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html), which Sysdig Secure for Cloud will use for member-account provisioning and role assuming.
25
+
<br/>This Role name is currently hardcoded.
26
+
3. Provide a member account ID for Sysdig Secure for Cloud workload to be deployed.
27
+
Our recommendation is for this account to be empty, so that deployed resources are not mixed up with your workload.
28
+
This input must be provided as terraform required input value
See [inputs summary](#inputs) or module [`variables.tf`](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples/organizational/variables.tf) file for more optional configuration.
46
51
47
-
To run this example you need have your [aws master-account profile configured in CLI](https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-profiles.html) and to execute:
52
+
To run this example you need have your [aws management-account profile configured in CLI](https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-profiles.html) and to execute:
0 commit comments