You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-:warning: Cloud image scanning is not supported yet
26
+
-:warning: Cloud image scanning is not available for this use-case
29
27
<br/><br/>
30
28
31
29
32
30
## Suggested setup
33
31
34
32
- Default `organizational` example is pre-configured to work with managed-account level resources (cloudtrail, s3, sns and sqs resources).
35
-
- We will make use of an alternative event ingestion vía S3 Event Notification through an SNS-SQS.
36
-
- It's important that all existing resources (cloudtrail-s3, cloudtrail-s3-sns-sqs, and sysdig workload), are **within same AWS_REGION**. Otherwise, contact us, so we can alleviate this limitation.
37
-
- We will need some permission setup, in order to let Sysdig Modules to be able to read resources from customer's infrastructure setup.
38
-
-For existing VPC/Subnet usage, we will make use of the optional variables. Right now these two fields also require an ECS cluster to be configured.
33
+
- We will make use of an **alternative event ingestion vía S3 Event Notification, with a SNS-SQS forwarder**.
34
+
- It's important that all existing resources (cloudtrail-s3, cloudtrail-s3-sns-sqs, and sysdig workload), are **within same AWS_REGION**.
35
+
- If cross-account resources are to be accessed, we will need to set up some IAM Roles.
36
+
-Optionally, for **existing VPC/Subnet** usage, we will make use of the optional variables. Right now these two fields also require an ECS cluster to be configured.
#### 1. Configure `AWS_PROFILE` with an organizational Administration credentials
90
88
91
-
Module is intended to create resources on your management account, as well as member-accounts.
89
+
Sysdig Secure for cloud will create resources both on your management account, and member-accounts.
92
90
93
91
Refer to [General Permissions](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud#required-permissions) to get more detail on what's required,
94
92
and [Organizational Role Summary](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/organizational#role-summary) for this specific use-case scenario.
@@ -99,15 +97,18 @@ This accountID will be required in the `SYSDIG_SECURE_FOR_CLOUD_MEMBER_ACCOUNT_I
99
97
100
98
#### 3. Pre-Terraform Requirements
101
99
102
-
#### 3.1 ECS Cluster
100
+
#### 3.1 (Optional) Re-use of existing VPC/Subnet
103
101
104
102
- Create an ECS cluster and configure it with the existing VPC/Subnet/... network configuration suiting your needs.
105
103
- Refer to [Sysdig SASS Region and IP Ranges Documentation](https://docs.sysdig.com/en/docs/administration/saas-regions-and-ip-ranges/) to get Sysdig SaaS endpoint and allow both outbound (for compute vulnerability report) and inbound (for scheduled compliance checkups)
106
104
- ECS type deployment will create following [security-group setup](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/modules/services/cloud-connector-ecs/sec-group.tf)
- Fetch the created role arn as `CLOUDTRAIL_S3_ROLE_ARN`
126
127
127
-
#### 4. Launch Terraform
128
128
129
-
We will use this Terraform Manifest. Get detailed explanation of each variable bellow.
129
+
#### 3.3 Cloudtrail S3 ingestion through Event-Forward
130
+
131
+
When Cloudtrail-SNS is not available, or the Cloudtrail-S3 events are in an account different to the management
132
+
account, we will rely on a S3 Event Forwarder, to allow the workload to ingest events more easily.
133
+
134
+
Secure for Cloud requires an SQS queue from which it can ingest events, and this will provide
135
+
`CLOUDTRAIL_S3_SNS_SQS_ARN` and `CLOUDTRAIL_S3_SNS_SQS_URL` for later installation.
136
+
137
+
We provide a module to create this
138
+
[Cloudtrail S3 bucket event-forwarder into an SNS>SQS](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/modules/infrastructure/cloudtrail_s3-sns-sqs)
139
+
but you can do it manually too.
140
+
141
+
General usage is described within the module source, and will be explained in the next point, with the variables to
142
+
be used.
143
+
144
+
#### 4. Launch Terraform Manifest
145
+
146
+
Let's create the Terraform manifest module parametrization, based on `examples/organizational`.
-`CLOUDTRAIL_S3_SNS_SQS_ARN` ARN of the queue, for us to setup ECSTaskRole to be able to access SQS
197
-
-`CLOUDTRAIL_S3_SNS_SQS_URL` URL of the queue from were to ingest events in the cloud-connector compute deployment
198
-
-`CLOUDTRAIL_S3_ROLE_ARN` ARN of the `SysdigSecureForCloud-S3AccessRole` created in step 3.2, for ECSTaskRole to assumeRole and access S3
199
250
200
-
#### 5. Use-Case Specific Permissions
251
+
#### 5.Optional. Permission setup when S3_BUCKET_ACCOUNT_ID != SYSDIG_SECURE_FOR_CLOUD_MEMBER_ACCOUNT_ID
201
252
202
253
When applying Terraform manifest it will create resources, and we should have no errors there.
203
254
However, deployed compute will fail (can check the logs in the ECS Task) due to permissions.
@@ -211,8 +262,9 @@ Let's fix that; we need to allow S3 and SQS resources to be accessed by the comp
211
262
Get this ARN at hand, because it's what you'll use to configure your pre-existing CLOUDTRAIL_S3 and CLOUDTRAIL_S3_SNS_SQS permissions to allow SysdigWorkload to operate with it.
212
263
213
264
Default `SYSDIG_ECS_TASK_ROLE_ARN` should be `arn:aws:iam::<SYSDIG_SECURE_FOR_CLOUD_MEMBER_ACCOUNT_ID>:role/sfc-organizational-ECSTaskRole`
214
-
but you can check its value accessing the ECS Cluster and checking deployed Task definition, or launching following CLI:
215
-
```terraform
265
+
but you can check its value accessing the ECS Cluster and checking deployed Task definition, or launching following CLI
266
+
267
+
```bash
216
268
$ terraform state list | grep aws_iam_role.connector_ecs_task
217
269
<RESULTING_RESOURCE>
218
270
@@ -260,12 +312,5 @@ We should not need to restart ECSTask as this changes will be applied on runtime
260
312
261
313
### 6. Check-up
262
314
263
-
Suggested steps
264
-
265
-
1. Access ECS logs for the SecureForCloud task
266
-
- check that there are no errors and events are being ingested
267
-
2. If logs are OK, check in Sysdig Secure
268
-
- Integrations > Data Sources - Cloud Accounts
269
-
- Posture > Identity and Access Management - Overview
270
-
- Posture > Compliance - AWS
271
-
- Insights > Cloud Activity
315
+
- Access ECS logs for the SecureForCloud task and check that there are no errors and events are being ingested
316
+
- If logs are ok, [Sysdig Secure Docs - Secure for cloud - AWS - Confirm services are working](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-on-aws/#confirm-the-services-are-working)
0 commit comments