Skip to content

Commit b2ca346

Browse files
author
iru
authored
doc: clarify force events
1 parent e982926 commit b2ca346

File tree

1 file changed

+6
-4
lines changed

1 file changed

+6
-4
lines changed

README.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -130,10 +130,7 @@ Check official documentation on [Secure for cloud - AWS, Confirm the Services ar
130130

131131
### Forcing Events - Threat Detection
132132

133-
Terraform example module to trigger **Create IAM Policy that Allows All** event can be found on [examples/trigger-events](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples/trigger-events).
134-
135-
In another case, you can do it manually. Choose one of the rules contained in the `AWS Best Practices` policy and execute it in your AWS account.
136-
133+
Choose one of the rules contained in an activated Runtime Policies for AWS, such as `Sysdig AWS Activity Logs` policy and execute it in your AWS account.
137134
ex.: 'Delete Bucket Public Access Block' can be easily tested going to an
138135
`S3 bucket > Permissions > Block public access (bucket settings) > edit >
139136
uncheck 'Block all public access'`
@@ -147,6 +144,11 @@ If that's not working as expected, some other questions can be checked
147144
- are events consumed in the sqs queue, or are they pending?
148145
- are events being sent to sns topic?
149146

147+
148+
In `Secure > Events` you should see the event coming through, but beware you may need to activate specific levels such as `Info` depending on the rule you're firing.
149+
150+
Alternativelly, use Terraform example module to trigger **Create IAM Policy that Allows All** event can be found on [examples/trigger-events](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples/trigger-events).
151+
150152
### Forcing Events - Image Scanning
151153

152154
Image scanning is not activated by default. Ensure you have the [required scanning enablers](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-on-aws/#enabling-image-scanner) in place

0 commit comments

Comments
 (0)