Skip to content

Commit b95bf11

Browse files
author
iru
committed
chore(doc): moar
1 parent 179f81c commit b95bf11

File tree

4 files changed

+15
-6
lines changed

4 files changed

+15
-6
lines changed

README.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,12 @@ Terraform module that deploys the **Sysdig Secure for Cloud** stack in **AWS**.
55

66
There are three major components:
77

8-
* **Cloud Threat Detection**: Tracks abnormal and suspicious activities in your cloud environment based on Falco language.<br/>Managed through cloud-connector.<br/><br/>
9-
* **CSPM/Compliance**: It evaluates periodically your cloud configuration, using Cloud Custodian, against some benchmarks and returns the results and remediation you need to fix.<br/>Managed through cloud-bench.<br/><br/>
10-
* **Cloud Scanning**: Automatically scans all container images pushed to the registry or as soon a new task which involves a container is spawned in your account.<br/>Managed through cloud-scanning.<br/><br/>
8+
* **Cloud Threat Detection**: Tracks abnormal and suspicious activities in your cloud environment based on Falco language.<br/>Managed through [cloud-connector module](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/modules/services/cloud-connector).<br/><br/>
9+
10+
11+
* **CSPM/Compliance**: It evaluates periodically your cloud configuration, using Cloud Custodian, against some benchmarks and returns the results and remediation you need to fix.<br/>Managed through [cloud-bench module](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/modules/services/cloud-bench).<br/><br/>
12+
13+
* **Cloud Scanning**: Automatically scans all container images pushed to the registry or as soon a new task which involves a container is spawned in your account.<br/>Managed through [cloud-scanning module](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/modules/services/cloud-scanning).<br/><br/>
1114

1215
For other Cloud providers check: [GCP](https://github.com/sysdiglabs/terraform-google-cloudvision), [Azure](https://github.com/sysdiglabs/terraform-azurerm-cloudvision)
1316

examples/single-account/README.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,10 @@
11
# Sysdig Secure for Cloud in AWS :: Single-Account
22

3-
Deploy Sysdig Secure for Cloud in a single AWS account. All the required resources and workloads will be run
4-
under the same AWS account.
3+
4+
5+
Deploy Sysdig Secure for Cloud in a single AWS account.
6+
7+
All the required resources and workloads will be run under the same AWS account.
58

69
![single-account diagram](https://raw.githubusercontent.com/sysdiglabs/terraform-aws-secure-for-cloud/7cee298cc8955c256be32b1b58c8c99a7095e788/examples/single-account/diagram-single.png)
710

10.7 KB
Loading

examples/single-account/diagram-single.py

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,9 @@
7575
sds_account = General("cloud-bench")
7676
sds = Custom("Sysdig Secure", "../../resources/diag-sysdig-icon.png")
7777

78-
cloud_bench_role << sds_account
78+
sds - Edge(label="aws_foundations_bench\n schedule on 0 6 * * *") >> sds_account
79+
80+
7981
cloud_connector >> sds
8082
cloud_scanning >> sds
83+
sds_account >> Edge(color="darkgreen", xlabel="assumeRole") >> cloud_bench_role

0 commit comments

Comments
 (0)