You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Secure for cloud is served through Terraform for [AWS](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud)
4
-
[GCP](https://github.com/sysdiglabs/terraform-google-secure-for-cloud) and [Azure](https://github.com/sysdiglabs/terraform-azurerm-secure-for-cloud) clouds,
5
-
and for AWS in [Cloudformation](https://github.com/sysdiglabs/aws-templates-secure-for-cloud) too.
3
+
Secure for cloud is installed in AWS either by using [terraform](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud) or by using a [Cloudformation](https://github.com/sysdiglabs/aws-templates-secure-for-cloud) template.
6
4
7
5
8
6
### Feature Summary
@@ -15,15 +13,15 @@ and for AWS in [Cloudformation](https://github.com/sysdiglabs/aws-templates-secu
15
13
16
14
17
15
18
-
**Compute Deployment wise, which should I choose?**
19
-
<br/>There are no preffered way, just take a technology you're familiar with. Otherwise, prefer non K8S, as it will be harder to maintain.
20
-
<br/>For AWS, beware of [AppRunner region limitations](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples/single-account-apprunner/README.md#prerequisites)
21
-
<br/><br/>
16
+
## Which Compute Deployment Should I Choose?
22
17
18
+
There are no preffered way, just take a technology you're familiar with. Otherwise, prefer non-K8S, as it will be harder to maintain.
19
+
For AWS, beware of [AppRunner region limitations](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples/single-account-apprunner/README.md#prerequisites).
23
20
24
-
## Available Optionals
25
21
26
-
Make use of optionals to allow the re-use of pre-existing resources, and avoid incurring in more costs.
22
+
## Available Options
23
+
24
+
Make use of optionals to reuse pre-existing resources and prevent incurring in more costs.
27
25
28
26
| Cloud | Optionals | Related Input Vars | Other |
29
27
| -- | --| -- | -- |
@@ -34,22 +32,17 @@ Make use of optionals to allow the re-use of pre-existing resources, and avoid i
@@ -62,10 +55,10 @@ For [all-feature installation](https://docs.sysdig.com/en/docs/sysdig-secure/sys
62
55
63
56
With both examples `single` and `org`, you can customize the desired features to de deployed with the `deploy_*` input vars to avoid deploying more than wanted.
64
57
65
-
<br/>
66
58
67
-
### Unified-compliance only
59
+
60
+
### Unified Compliance
68
61
69
62
If you just want [CIS Unified Compliance Benchmarks](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/)
70
-
check our guide on[Compliance role-only deployment with Terraform](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-agentless/)
71
-
Alternatively, you can [configure it manually](./manual-compliance.md)
63
+
see[Compliance role-only deployment with Terraform](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-agentless/)
64
+
<br/>Alternatively, you can [configure it manually](./manual-compliance.md)
0 commit comments