You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+6-4Lines changed: 6 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -130,10 +130,7 @@ Check official documentation on [Secure for cloud - AWS, Confirm the Services ar
130
130
131
131
### Forcing Events - Threat Detection
132
132
133
-
Terraform example module to trigger **Create IAM Policy that Allows All** event can be found on [examples/trigger-events](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples/trigger-events).
134
-
135
-
In another case, you can do it manually. Choose one of the rules contained in the `AWS Best Practices` policy and execute it in your AWS account.
136
-
133
+
Choose one of the rules contained in an activated Runtime Policies for AWS, such as `Sysdig AWS Activity Logs` policy and execute it in your AWS account.
137
134
ex.: 'Delete Bucket Public Access Block' can be easily tested going to an
@@ -147,6 +144,11 @@ If that's not working as expected, some other questions can be checked
147
144
- are events consumed in the sqs queue, or are they pending?
148
145
- are events being sent to sns topic?
149
146
147
+
148
+
In `Secure > Events` you should see the event coming through, but beware you may need to activate specific levels such as `Info` depending on the rule you're firing.
149
+
150
+
Alternativelly, use Terraform example module to trigger **Create IAM Policy that Allows All** event can be found on [examples/trigger-events](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples/trigger-events).
151
+
150
152
### Forcing Events - Image Scanning
151
153
152
154
Image scanning is not activated by default. Ensure you have the [required scanning enablers](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-on-aws/#enabling-image-scanner) in place
0 commit comments