Skip to content

Commit 5ce8b2d

Browse files
author
iru
committed
doc: v0.1.2
1 parent 256e464 commit 5ce8b2d

File tree

2 files changed

+22
-17
lines changed

2 files changed

+22
-17
lines changed

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ There are three major components:
1111

1212
* **Cloud Scanning**: Automatically scans all container images pushed to the registry or as soon a new task which involves a container is spawned in your account.Managed through [cloud-scanning module](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/modules/services/cloud-scanning).<br/>
1313

14-
For other Cloud providers check: [GCP](https://github.com/sysdiglabs/terraform-google-cloudvision), [Azure](https://github.com/sysdiglabs/terraform-azurerm-cloudvision)
14+
For other Cloud providers check: [GCP](https://github.com/sysdiglabs/terraform-google-secure-for-cloud), [Azure](https://github.com/sysdiglabs/terraform-azurerm-secure-for-cloud)
1515

1616
<br/>
1717

@@ -97,8 +97,8 @@ Notice that:
9797
```
9898
[profile secure-for-cloud]
9999
region=eu-central-1
100-
role_arn=arn:aws:iam::<AWS_MASTER_ORGANIZATION_ACCOUNT>:role/OrganizationAccountAccessRole
101-
source_profile=<AWS_MASTER_ACCOUNT_PROFILE>
100+
role_arn=arn:aws:iam::<AWS_MANAGEMENT_ORGANIZATION_ACCOUNT>:role/OrganizationAccountAccessRole
101+
source_profile=<AWS_MANAGEMENT_ACCOUNT_PROFILE>
102102
```
103103
104104
- Q: How to test **cloud-scanner** image-scanning?<br/>

examples/organizational/README.md

Lines changed: 19 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,13 @@
11
# Sysdig Secure for Cloud in AWS :: Shared Organizational Trail
22

33
Deploy Sysdig Secure for Cloud sharing the Trail within an organization.
4-
* In the **master account**
5-
* An Organizational Cloutrail will be deployed
6-
* When an account becomes part of an organization, AWS will create an `OrganizationAccountAccessRole` [for account management](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html), which Sysdig Secure for Cloud will use for member-account provisioning.
7-
<br/>This Role is hardcoded ATM
8-
* In the **user-provided member account**:
9-
* An additional role `SysdigSecureForCloudRole` will be created within the master account, to be able to read cloudtrail-s3 bucket events
4+
5+
* In the **management account**
6+
* An Organizational Cloutrail will be deployed (with required S3,SNS)
7+
* An additional role `SysdigSecureForCloudRole` will be created
8+
* to be able to read cloudtrail-s3 bucket events from sysdig workload member account.
9+
* will also be used to asummeRole over other roles, and enable the process of scanning on ECR's that may be present in other member accounts.
10+
* In the **user-provided member account**
1011
* All the Sysdig Secure for Cloud service-related resources will be created
1112

1213
![organizational diagram](https://raw.githubusercontent.com/sysdiglabs/terraform-aws-secure-for-cloud/b95bf11fe513bda3c037144803d982a6e4225ce9/examples/organizational/diagram-org.png)
@@ -15,16 +16,20 @@ Deploy Sysdig Secure for Cloud sharing the Trail within an organization.
1516

1617
Minimum requirements:
1718

18-
1. Have an existing AWS account as the organization master account
19+
1. Have an existing AWS account as the organization management account
1920
* Organizational CloudTrail service must be enabled
20-
1. AWS profile credentials configuration of the `master` account of the organization
21+
2. AWS profile credentials configuration of the `management` account of the organization
2122
* This account credentials must be [able to manage cloudtrail creation](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/creating-trail-organization.html)
2223
> You must be logged in with the management account for the organization to create an organization trail. You must also have sufficient permissions for the IAM user or role in the management account to successfully create an organization trail.
23-
* Sysdig Secure for Cloud organizational member account id, as input variable value
24-
```
25-
sysdig_secure_for_cloud_member_account_id=<ORGANIZATIONAL_SECURE_FOR_CLOUD_ACCOUNT_ID>
26-
```
27-
1. Secure requirements, as input variable value
24+
* When an account becomes part of an organization, AWS will create an `OrganizationAccountAccessRole` [for account management](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html), which Sysdig Secure for Cloud will use for member-account provisioning and role assuming.
25+
<br/>This Role name is currently hardcoded.
26+
3. Provide a member account ID for Sysdig Secure for Cloud workload to be deployed.
27+
Our recommendation is for this account to be empty, so that deployed resources are not mixed up with your workload.
28+
This input must be provided as terraform required input value
29+
```
30+
sysdig_secure_for_cloud_member_account_id=<ORGANIZATIONAL_SECURE_FOR_CLOUD_ACCOUNT_ID>
31+
```
32+
4. Sysdig Secure requirements, as input variable value with the `api-token`
2833
```
2934
sysdig_secure_api_token=<SECURE_API_TOKEN>
3035
```
@@ -44,7 +49,7 @@ module "secure_for_cloud_organizational" {
4449

4550
See [inputs summary](#inputs) or module [`variables.tf`](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples/organizational/variables.tf) file for more optional configuration.
4651

47-
To run this example you need have your [aws master-account profile configured in CLI](https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-profiles.html) and to execute:
52+
To run this example you need have your [aws management-account profile configured in CLI](https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-profiles.html) and to execute:
4853
```terraform
4954
$ terraform init
5055
$ terraform plan

0 commit comments

Comments
 (0)