File tree Expand file tree Collapse file tree 1 file changed +1
-1
lines changed
examples-internal/organizational-k8s-threat-reuse_cloudtrail_s3 Expand file tree Collapse file tree 1 file changed +1
-1
lines changed Original file line number Diff line number Diff line change 7
7
- An existing cloudtrail is used, but instead of sending events directly to an SNS topic (disabled), we will make use of a topic (SQS)
8
8
which will be subscribed to the multiple possible SNS topics listening to the cloudtrail-S3 bucket changes.
9
9
10
- ![ diagram] ( https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples-internal/organizational-k8s-threat-reuse_cloudtrail /diagram.png )
10
+ ![ diagram] ( https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples-internal/organizational-k8s-threat-reuse_cloudtrail_s3 /diagram.png )
11
11
12
12
All the required resources and workloads will be run under the same AWS account, held in a member-account of the organization.
13
13
You can’t perform that action at this time.
0 commit comments