You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: examples/organizational/README.md
+9-8Lines changed: 9 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -27,14 +27,15 @@ Minimum requirements:
27
27
> You must be logged in with the management account for the organization to create an organization trail. You must also have sufficient permissions for the IAM user or role in the management account to successfully create an organization trail.
28
28
29
29
3. Organizational Multi-Account Setup, ONLY IF SCANNING feature is activated, a specific role is required, to enable Sysdig to impersonate on organization member-accounts and provide
30
-
* The ability to pull ECR hosted images when they're allocated in a different account
31
-
* The ability to query the ECS tasks that are allocated in different account, in order to fetch the image to be scanned
32
-
<!-- * A solution to resolve current limitation when accessing an S3 bucket in a different region than where it's being called from-->
33
-
* By default, it uses [AWS created default role `OrganizationAccountAccessRole`](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html)
34
-
* When an account is created within an organization, AWS will create an `OrganizationAccountAccessRole`[for account management](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html), which Sysdig Secure for Cloud will use for member-account provisioning and role assuming.
35
-
* However, when the account is invited into the organization, it's required to [create the role manually](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html#orgs_manage_accounts_create-cross-account-role)
36
-
> You have to do this manually, as shown in the following procedure. This essentially duplicates the role automatically set up for created accounts. We recommend that you use the same name, OrganizationAccountAccessRole, for your manually created roles for consistency and ease of remembering.
37
-
* If role name, `OrganizationAccountAccessRole` wants to be modified, it must be done both on the `aws` member-account provider AND input value `organizational_member_default_admin_role`
30
+
31
+
* The ability to pull ECR hosted images when they're allocated in a different account
32
+
* The ability to query the ECS tasks that are allocated in different account, in order to fetch the image to be scanned
33
+
<!-- * A solution to resolve current limitation when accessing an S3 bucket in a different region than where it's being called from-->
34
+
* By default, it uses [AWS created default role `OrganizationAccountAccessRole`](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html)
35
+
* When an account is created within an organization, AWS will create an `OrganizationAccountAccessRole`[for account management](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html), which Sysdig Secure for Cloud will use for member-account provisioning and role assuming.
36
+
* However, when the account is invited into the organization, it's required to [create the role manually](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html#orgs_manage_accounts_create-cross-account-role)
37
+
> You have to do this manually, as shown in the following procedure. This essentially duplicates the role automatically set up for created accounts. We recommend that you use the same name, OrganizationAccountAccessRole, for your manually created roles for consistency and ease of remembering.
38
+
* If role name, `OrganizationAccountAccessRole` wants to be modified, it must be done both on the `aws` member-account provider AND input value `organizational_member_default_admin_role`
38
39
39
40
5. Provide a member **account ID for Sysdig Secure for Cloud workload** to be deployed.
40
41
Our recommendation is for this account to be empty, so that deployed resources are not mixed up with your workload.
0 commit comments