Skip to content

Commit 7b5fd83

Browse files
author
iru
authored
docs: organizational compliance role use-case (#153)
1 parent 587e6eb commit 7b5fd83

File tree

3 files changed

+49
-13
lines changed

3 files changed

+49
-13
lines changed

use-cases/README.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,10 @@ Current examples were developed for simple use-case scenarios.
4444
If not Terraform nor Cloudformation suits, take a look at the `manual-*` prefixed use-cases.
4545

4646

47+
48+
For [all-feature installation](https://docs.sysdig.com/en/docs/sysdig-secure/sysdig-secure-for-cloud/#features), check
49+
50+
4751
| | `/examples/single-*` | `/examples/organizational-*` |
4852
| --| -- | -- |
4953
| Deployment Type | all Sysdig resources will be deployed within the selected account | Most Sysdig resources will be deployed within the selected account (just one), but some features, require resources to be deployed on all of the member-accounts (for Compliance and Image Scanning) . <br />One role is needed on the management account for cloudtrail-s3 event access |
@@ -53,3 +57,11 @@ If not Terraform nor Cloudformation suits, take a look at the `manual-*` prefixe
5357
| More Info | [single-ecs](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-ecs), [single-apprunner](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-apprunner), [single-k8s](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-k8s) | [organizational](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/organizational) |
5458

5559
With both examples `single` and `org`, you can customize the desired features to de deployed with the `deploy_*` input vars to avoid deploying more than wanted.
60+
61+
<br/>
62+
63+
If you just want [CIS Unified Compliance Benchmarks](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/)
64+
you can make use of
65+
66+
- [Single-Account Compliance Role Setup](./compliance-role-single-account.md)
67+
- [Organizational Compliance Role setup](./compliance-role-organizational.md)

use-cases/single-benchmark.md renamed to use-cases/compliance-role-organizational.md

Lines changed: 6 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,10 @@
1-
# SingleAccount-CIS Benchmarks
1+
# Organizational - CIS Unified Compliance
22

33
## Use-Case explanation
44

5-
Simple single-account setu in order to get CIS Benchmark
5+
Organizational setup, in order to get [CIS Unified Compliance Benchmarks](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/)
66

7-
**Client Setup**
8-
9-
- [X] single-account setup
10-
- [ ] pre-existing resources
11-
12-
**Sysdig Secure For Cloud Features**
13-
14-
- [X] A part of Compliance, only CIS Benchmarks
15-
16-
## Suggested setup
7+
## Setup
178

189
```terraform
1910
terraform {
@@ -35,6 +26,8 @@ provider "aws" {
3526
3627
module "sysdig-sfc" {
3728
source = "sysdiglabs/secure-for-cloud/aws//module/services/cloud-bench"
38-
name = "TEST-NAME-cloudbench" # optional
29+
name = "sysdig-compliance-role" # optional
30+
31+
is_organizational=true
3932
}
4033
```
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
# Single Account - CIS Unified Compliance
2+
3+
## Use-Case explanation
4+
5+
AWS single-account setup, in order to get [CIS Unified Compliance Benchmarks](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/)
6+
7+
## Setup
8+
9+
```terraform
10+
terraform {
11+
required_providers {
12+
sysdig = {
13+
source = "sysdiglabs/sysdig"
14+
}
15+
}
16+
}
17+
18+
provider "sysdig" {
19+
sysdig_secure_url = "<SYSDIG_SECURE_URL>"
20+
sysdig_secure_api_token = "<SYSDIG_SECURE_API_TOKEN>"
21+
}
22+
23+
provider "aws" {
24+
region = "<AWS_REGION>"
25+
}
26+
27+
module "sysdig-sfc" {
28+
source = "sysdiglabs/secure-for-cloud/aws//module/services/cloud-bench"
29+
name = "sysdig-compliance-role" # optional
30+
}
31+
```

0 commit comments

Comments
 (0)