Skip to content

Commit 64aef3b

Browse files
author
iru
committed
doc: enhance permissions
1 parent 592463c commit 64aef3b

File tree

2 files changed

+8
-11
lines changed

2 files changed

+8
-11
lines changed

README.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -130,9 +130,7 @@ $ terraform apply
130130

131131
## Required Permissions
132132

133-
### Required Permissions
134-
135-
#### Provisioning Permissions
133+
### Provisioning Permissions
136134

137135
Terraform provider credentials/token, requires `Administrative` permissions in order to be able to create the
138136
resources specified in the per-example diagram.
@@ -148,7 +146,7 @@ Some components may vary, and you can check full resources on each module "Resou
148146
- CodeBuild for on-demand image scanning
149147
- Role for Sysdig [Benchmarks](./modules/services/cloud-bench)
150148

151-
#### Runtime Permissions
149+
### Runtime Permissions
152150

153151
Modules create several roles to be able to manage the following permissions.
154152

examples/organizational/README.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -26,24 +26,23 @@ Minimum requirements:
2626
* This provider credentials must be [able to manage cloudtrail creation](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/creating-trail-organization.html)
2727
> You must be logged in with the management account for the organization to create an organization trail. You must also have sufficient permissions for the IAM user or role in the management account to successfully create an organization trail.
2828
29-
3. Organizational Multi-Account Setup
30-
* An specific role is required, to enable Sysdig to impersonate and be able to provide
31-
* For scanning feature, the ability to pull ECR hosted images when they're allocated in a different account
32-
* For scanning too, the ability to query the ECS tasks that are allocated in different account, in order to fetch the image to be scanned
33-
* A solution to resolve current limitation when accessing an S3 bucket in a different region than where it's being called from
29+
3. Organizational Multi-Account Setup, ONLY IF SCANNING feature is activated, a specific role is required, to enable Sysdig to impersonate on organization member-accounts and provide
30+
* The ability to pull ECR hosted images when they're allocated in a different account
31+
* The ability to query the ECS tasks that are allocated in different account, in order to fetch the image to be scanned
32+
<!-- * A solution to resolve current limitation when accessing an S3 bucket in a different region than where it's being called from-->
3433
* By default, it uses [AWS created default role `OrganizationAccountAccessRole`](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html)
3534
* When an account is created within an organization, AWS will create an `OrganizationAccountAccessRole` [for account management](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html), which Sysdig Secure for Cloud will use for member-account provisioning and role assuming.
3635
* However, when the account is invited into the organization, it's required to [create the role manually](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html#orgs_manage_accounts_create-cross-account-role)
3736
> You have to do this manually, as shown in the following procedure. This essentially duplicates the role automatically set up for created accounts. We recommend that you use the same name, OrganizationAccountAccessRole, for your manually created roles for consistency and ease of remembering.
3837
* If role name, `OrganizationAccountAccessRole` wants to be modified, it must be done both on the `aws` member-account provider AND input value `organizational_member_default_admin_role`
3938

40-
3. Provide a member **account ID for Sysdig Secure for Cloud workload** to be deployed.
39+
5. Provide a member **account ID for Sysdig Secure for Cloud workload** to be deployed.
4140
Our recommendation is for this account to be empty, so that deployed resources are not mixed up with your workload.
4241
This input must be provided as terraform required input value
4342
```
4443
sysdig_secure_for_cloud_member_account_id=<ORGANIZATIONAL_SECURE_FOR_CLOUD_ACCOUNT_ID>
4544
```
46-
4. **Sysdig Secure** requirements, as input variable value with the `api-token`
45+
6. **Sysdig Secure** requirements, as input variable value with the `api-token`
4746
```
4847
sysdig_secure_api_token=<SECURE_API_TOKEN>
4948
```

0 commit comments

Comments
 (0)