Skip to content

Commit 9915c5d

Browse files
author
iru
authored
doc: permissions
1 parent 23729dd commit 9915c5d

File tree

1 file changed

+11
-15
lines changed

1 file changed

+11
-15
lines changed

README.md

Lines changed: 11 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -137,21 +137,19 @@ $ terraform apply
137137
Terraform provider credentials/token, requires `Administrative` permissions in order to be able to create the
138138
resources specified in the per-example diagram.
139139

140-
Some components may vary, and you can check full resources on each module "Resources" section in their README's, but this would be an overall schema of the **created resources**:
140+
Some components may vary, or may be deployed on different accounts (depending on the example). You can check full resources on each module "Resources" section in their README's. You can also check our source code and suggest changes.
141141

142-
- SSM Parameter for Sysdig API Token Storage
143-
- Cloudtrail / SNS / S3 / SQS
142+
This would be an overall schema of the **created resources**, for the default setup.
144143

144+
- Cloudtrail / SNS / S3 / SQS
145+
- SSM Parameter for Sysdig API Token Storage
145146
- Sysdig Workload: ECS / AppRunner creation (EKS is pre-required, not created)
146147
- each compute solution require a role to assume for execution
147-
148148
- CodeBuild for on-demand image scanning
149-
- Role for Sysdig [Benchmarks](./modules/services/cloud-bench)
149+
- Sysdig role for [Compliance](./modules/services/cloud-bench)
150150

151151
### Runtime Permissions
152152

153-
Modules create several roles to be able to manage the following permissions.
154-
155153
**General Permissions**
156154

157155
```shell
@@ -183,14 +181,12 @@ ecr: ListTagsForResource
183181
ecr: DescribeImageScanFindings
184182

185183
ecs:DescribeTaskDefinition
186-
187-
```
188-
189-
Notes:
190-
- only Sysdig workload related permissions are specified above; infrastructure internal resource permissions (such as Cloudtrail permissions to publish on SNS, or SNS-SQS Subscription)
191-
are not detailed.
192-
- For a better security, permissions are resource pinned, instead of `*`
193-
- Check [Organizational Use Case - Role Summary](./examples/organizational/README.md#role-summary) for more details
184+
```
185+
- Other Notes:
186+
- only Sysdig workload related permissions are specified above; infrastructure internal resource permissions (such as Cloudtrail permissions to publish on SNS, or SNS-SQS Subscription)
187+
are not detailed.
188+
- For a better security, permissions are resource pinned, instead of `*`
189+
- Check [Organizational Use Case - Role Summary](./examples/organizational/README.md#role-summary) for more details
194190

195191

196192
## Forcing Events

0 commit comments

Comments
 (0)