Skip to content

Commit fc95e5e

Browse files
author
iru
committed
docs: raise features on docs
1 parent b45d453 commit fc95e5e

File tree

1 file changed

+17
-13
lines changed

1 file changed

+17
-13
lines changed

use-cases/_questionnaire.md

Lines changed: 17 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,22 @@ Contact us with these questions answered to help us.
1313
Sysdig Secure for Cloud is served in Terraform [AWS](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud), [GCP](https://github.com/sysdiglabs/terraform-google-secure-for-cloud) and [Azure](https://github.com/sysdiglabs/terraform-azurerm-secure-for-cloud)
1414
modules, and we also offer [AWS Cloudformation templates](https://github.com/sysdiglabs/aws-templates-secure-for-cloud)
1515

16+
17+
<br/>
18+
19+
## Sysdig Features
20+
21+
In what [Sysdig For Cloud Features](https://docs.sysdig.com/en/docs/sysdig-secure/sysdig-secure-for-cloud/) are you interested in?
22+
23+
- [Runtime Threat Detection](https://docs.sysdig.com/en/docs/sysdig-secure/insights/)
24+
- [Compliance](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/) (cis benchmarks and others)
25+
- [Identity and Access Management](https://docs.sysdig.com/en/docs/sysdig-secure/posture/permissions-and-entitlements/)
26+
- [Scanning](https://docs.sysdig.com/en/docs/sysdig-secure/scanning/)
27+
- Registry/repository push-based image scanning
28+
- Runtime workload image scanning (ecs on Aws, cloudrun on GCP, or container instances on Azure)
29+
- Note: Sysdig offers many other ways of performing scanning, and we recommend you to [Check all Scanning options in the Vulnerability Management](https://docs.sysdig.com/en/docs/sysdig-secure/vulnerabilities/) to push this task as far to the left as possible (dev side)
30+
31+
1632
<br/>
1733

1834
## Client Infrastructure
@@ -52,16 +68,4 @@ modules, and we also offer [AWS Cloudformation templates](https://github.com/sys
5268
- do you use any other InfraAsCode frameworks?
5369
- if you want to use Kubernetes compute for Sysdig deployment, what's your current way of deploying helm charts?
5470

55-
<br/>
56-
57-
## Sysdig Features
58-
59-
In what [Sysdig For Cloud Features](https://docs.sysdig.com/en/docs/sysdig-secure/sysdig-secure-for-cloud/) are you interested in?
60-
61-
- [Runtime Threat Detection](https://docs.sysdig.com/en/docs/sysdig-secure/insights/)
62-
- [Compliance](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/) (cis benchmarks and others)
63-
- [Identity and Access Management](https://docs.sysdig.com/en/docs/sysdig-secure/posture/permissions-and-entitlements/)
64-
- [Scanning](https://docs.sysdig.com/en/docs/sysdig-secure/scanning/)
65-
- Registry/repository push-based image scanning
66-
- Runtime workload image scanning (ecs on Aws, cloudrun on GCP, or container instances on Azure)
67-
- Note: Sysdig offers many other ways of performing scanning, and we recommend you to [Check all Scanning options in the Vulnerability Management](https://docs.sysdig.com/en/docs/sysdig-secure/vulnerabilities/) to push this task as far to the left as possible (dev side)
71+
<br/>

0 commit comments

Comments
 (0)