You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: use-cases/README.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ If not Terraform nor Cloudformation suits, take a look at the `manual-*` prefixe
46
46
| Deployment Type | all Sysdig resources will be deployed within the selected account | Most Sysdig resources will be deployed within the selected account (just one), but some features, require resources to be deployed on all of the member-accounts (for Compliance and Image Scanning) . <br />One role is needed on the management account for cloudtrail-s3 event access |
47
47
| Target | will only analyse current account | handles all accounts (managed and member)|
48
48
| Drawbacks | cannot re-use another account Cloudtrail data (unless its deployed on the same account where the sns/s3 bucket is) | for scanning, a per-member-account access role is required |
49
-
| Optional resources usage limitations | - | For organizational example, Cloudtrail optional resources must exist in the management account. For other setups check other alternative use-cases</br><ul><li>[manual deployment; cloudtrail-s3 bucket in another member account](./manual-org-three-way.md)</li><li>[terraform-based deployment; cloudtrail with cloudtrail-s3 bucket in another member account. k8s flavor](./org-s3-k8s-filtered-account.md)</li><li>[terraform-based deployment; cloudtrail with cloudtrail-s3 bucket in another member account. ecs flavor](./org-three-cross-account-s3-event-forward.md)</li></ul>|
49
+
| Optional resources usage limitations | - | For organizational example, Cloudtrail optional resources must exist in the management account. For other setups check other alternative use-cases</br><ul><li>[manual deployment; cloudtrail-s3 bucket in another member account](./manual-org-three-way.md)</li><li>[terraform-based deployment; cloudtrail with cloudtrail-s3 bucket in another member account. k8s flavor](./org-three-way-k8s.md)</li><li>[terraform-based deployment; cloudtrail with cloudtrail-s3 bucket in another member account. ecs flavor](./org-three-way-ecs.md)</li></ul>|
50
50
| More Info |[single-ecs](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-ecs), [single-apprunner](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-apprunner), [single-k8s](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-k8s)|[organizational](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/organizational)|
51
51
52
52
With both examples `single` and `org`, you can customize the desired features to de deployed with the `deploy_*` input vars to avoid deploying more than wanted.
# OrganizationalSetup - Three way Cross-Account - K8S
2
2
3
3
## Use-Case explanation
4
4
5
-
**Current User Setup**
6
-
7
-
-[X] organizational setup
8
-
-[ ] organizational cloudtrail that reports to SNS and persists events in a managed-account stored S3 bucket
9
-
-[X] centralized S3 bucket with cloudtrail-events
10
-
-[ ] member account usage - all required and pre-existing resources exist in the same account
11
-
-[X] member account usage - all required resources are in scattered
12
-
-[X] pre-existing resources
13
-
-[ ] k8s cluster we want to use to deploy Sysdig for Cloud workload
14
-
-[ ] organizational cloudtrail, reporting to an SNS topic and delivering events to the S3 bucket
15
-
-[ ] ecs cluster/vpc/subnet we want to use to deploy Sysdig for Cloud workload
16
-
17
-
18
-
**Sysdig Secure For Cloud Features**
19
-
20
-
-[X] threat-detection
21
-
-[X] account-specific
22
-
-[ ] all accounts of the organization (management account included)
23
-
-[ ] image-scanning (WIP?)
24
-
-[ ] compliance (WIP?)
25
-
-[ ] CIEM (WIP?)
26
-
27
-
**Other Requirements**
28
-
29
-
-[X] pre-existing kubernetes management vía service account (WIP)
30
-
<br/>this has not been tested yet, we rely on an `accessKey` created specifically for Sysdig-For-Cloud.
31
-
<!--
32
-
Skip step 4 and remove `aws_access_key_id` and `aws_secret_access_key` parameters from `org_k8s_threat_reuse_cloudtrail` module
33
-
-->
5
+
This use case will cover a three-way cross-account setup (typical from AWS ControlTower landing page).
6
+
With EKS as workload-type.
7
+
<br/>This is terraform-based guidelines, but can also check [Manual Organizational Setup - Three-Way Cross-Account ](./manual-org-three-way.md)
8
+
9
+
-**User Infrastructure Setup**:
10
+
1. Management Account
11
+
- Organizational Cloudtrail with no SNS activation
12
+
2. Log Archive Account
13
+
- Cloudtrail-S3 bucket, with event notification to an SNS > SQS
14
+
3. Member Account
15
+
- Sysdig Secure for cloud deployment
16
+
- Existing K8S Cluster
17
+
- permission setup rely on an `accessKey/secretAccessKey` parameters of the workload, but can setup the
18
+
service-account manually and ignore those two parameters.
19
+
20
+
- Required **Sysdig Secure For Cloud [Features](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/)**
21
+
- Threat-Detection
22
+
-:warning: Posture; Compliance + Identity Access Management not delivered with this use-case. Can use [manual compliance setup](./manual-compliance.md)
23
+
-:warning: Cloud image scanning is not supported yet
0 commit comments