1717
1818## Suggested building-blocks
1919
20- 1 . ** Compliance setup** on Sysdig backend and AWS Accounts
20+ ### 1. ** Compliance setup** on Sysdig backend and AWS Accounts
2121
2222On each member-account where compliance wants to be checked, we need to provide a role for Sysdig to be able to impersonate and
2323perform ` SecurityAudit ` tasks.
@@ -35,7 +35,7 @@ Perform the following steps.
3535and using the values gathered in previous step.
3636<br /><br />
3737
38- 2 . Prepare ** EKS SysdigComputeRole**
38+ ### 2. Prepare ** EKS SysdigComputeRole**
3939
4040In further steps, we will deploy Sysdig compute workload inside an EKS cluster.
4141We are going to need a ` SysdigComputeRole ` , to configure some permissions to be able to fetch the required data.
@@ -45,7 +45,7 @@ QuickTest Notes:
4545- If your EKS cluster has no specific authentication setup, you can get the ` eks_nodes ` role generated by default in EKS.
4646
4747<br /><br />
48- 3 . ** Cloudtrail SQS**
48+ ### 3. ** Cloudtrail SQS**
4949
5050In order to ingest cloudtrail events we will need a queue endpoint.
5151Access your cloudtrail and activate SNS notification if it's not already available.
@@ -74,7 +74,7 @@ Use following snipped if required
7474<br /><br />
7575
7676
77- 4 . ** Cloudtrail-S3 Account AssumeRole**
77+ ### 4. ** Cloudtrail-S3 Account AssumeRole**
7878
7979This step is required when Cloudtrail-S3 bucket is stored in a different account than the cluster where we will deploy Sysdig workload.
8080We will need to create a role to assume from our workload, due to cross-account S3 restrictions.
@@ -119,7 +119,7 @@ Now we will need to perform same **permissions setup on the S3 bucket**. Add fol
119119<br /><br />
120120
121121
122- 5 . ** Sysdig Compute** Workload deployment in ** K8s**
122+ ### 5. ** Sysdig Compute** Workload deployment in ** K8s**
123123
124124First let's review permission schema.
125125![ permission schema] ( ./diagram.png )
0 commit comments