You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -57,7 +57,7 @@ For [complete feature installation](https://docs.sysdig.com/en/docs/sysdig-secur
57
57
58
58
With both examples `single` and `org`, you can customize the desired features to de deployed with the `deploy_*` input vars to avoid deploying more than wanted.
59
59
60
-
### Unified Compliance
60
+
### Unified Compliance
61
61
62
62
If you just want [CIS Unified Compliance Benchmarks](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/)
63
63
see [Compliance role-only deployment with Terraform](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-agentless/)
Copy file name to clipboardExpand all lines: use-cases/org-three-way-ecs.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
3
3
## Overview
4
4
5
-
This use case covers securing a multi-account AWS environment with workload on ECS, typically created with the [AWS ControlTower landing zone](https://aws.amazon.com/controltower/features/).
5
+
This use case covers securing a multi-account AWS environment with workload on ECS, typically created with the [AWS ControlTower landing zone](https://aws.amazon.com/controltower/features/).
6
6
7
7
The guidelines are terraform-based. For instruction on setting up Secure for Cloud manually, see [Manual Organizational Setup - Three-Way Cross-Account](./manual-org-three-way.md).
0 commit comments