You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: use-cases/_questionnaire.md
+16-9Lines changed: 16 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,16 +2,18 @@
2
2
3
3
This questionnaire is aimed to help you/us find the most suitable way of deploying [Sysdig Secure for Cloud](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/).
4
4
5
-
Despite wanting only to trial it, we suggest that you deploy, and test it, in the most-similar situation to what
6
-
you have on your production environment.
5
+
Despite wanting only to trial it, we suggest that you deploy, and test it, in th **most-similar situation to what
6
+
you have on your production environment**.
7
7
8
8
We are aware that current examples don't suit all situations, and we will keep improving them to be as configurable as possible.
9
9
Contact us with these questions answered to help us.
10
10
11
-
> Sysdig Secure for Cloud is served in Terraform [AWS](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud), [GCP](https://github.com/sysdiglabs/terraform-google-secure-for-cloud) and [Azure](https://github.com/sysdiglabs/terraform-azurerm-secure-for-cloud)
11
+
<br/>
12
+
13
+
Sysdig Secure for Cloud is served in Terraform [AWS](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud), [GCP](https://github.com/sysdiglabs/terraform-google-secure-for-cloud) and [Azure](https://github.com/sysdiglabs/terraform-azurerm-secure-for-cloud)
12
14
modules, and we also offer [AWS Cloudformation templates](https://github.com/sysdiglabs/aws-templates-secure-for-cloud)
13
15
14
-
<br/><br/>
16
+
<br/>
15
17
16
18
## Client Infrastructure
17
19
@@ -23,11 +25,13 @@ modules, and we also offer [AWS Cloudformation templates](https://github.com/sys
23
25
- is it an organizational cloudtrail?
24
26
- does the cloudtrail report to an SNS? if no, could you enable it?
25
27
- if it's not organizational, does each trail report to the same s3 bucket?
26
-
- how do you handle IAM permissions? any restriction we may be aware of? do you want us to set them up for you or would you just require a guidance and you will set them yourself?
27
-
- deployment type
28
-
- are you familiar with the installation stack? Terraform, Cloudformation, AWS CDK, ...?
28
+
- how do you handle **IAM permissions**? would you let our Terraform scripts set them up for you, or you want to set them yourself manually? any restriction we may be aware of?
29
+
- how do you handle **outbound newtwork connection** securization? does your infrastructure have any customized VPC/firewally setup?
30
+
-**Deployment** type
31
+
- are you familiar with the installation stack? Terraform, Cloudformation, AWS CDK, ...? Do you use any other InfraAsCode frameworks?
29
32
- if you want to use Kubernetes compute for Sysdig deployment, what's your current way of deploying helm charts?
30
33
34
+
<br/>
31
35
32
36
## Sysdig Features
33
37
@@ -39,7 +43,7 @@ In what [Sysdig For Cloud Features](https://docs.sysdig.com/en/docs/sysdig-secur
39
43
- Scanning
40
44
- Push-based registry/repository image scanning
41
45
- Runtime workload image scanning (ecs on Aws, cloudrun on GCP, or container instances on Azure)
42
-
- Note: Sysdig offers many other ways of performing scanning, and we recommend you to [Check all Scanning options in the Vulnerability Management](https://docs.sysdig.com/en/docs/sysdig-secure/vulnerabilities/)
46
+
- Note: Sysdig offers many other ways of performing scanning, and we recommend you to [Check all Scanning options in the Vulnerability Management](https://docs.sysdig.com/en/docs/sysdig-secure/vulnerabilities/) to push this task as far to the left as possible (dev side)
43
47
44
48
45
49
<br/><br/>
@@ -55,6 +59,8 @@ In what [Sysdig For Cloud Features](https://docs.sysdig.com/en/docs/sysdig-secur
55
59
56
60
With both examples `single` and `org`, you can customize the desired features to de deployed with the `deploy_*` input vars to avoid deploying more than wanted.
57
61
62
+
<br/>
63
+
58
64
### Compute Workload Type
59
65
60
66
| Cloud | Example Options |
@@ -64,6 +70,7 @@ With both examples `single` and `org`, you can customize the desired features to
64
70
| Azure | K8S `-k8s`, AzureContainerInstances |
65
71
66
72
<br/><br/>
73
+
67
74
## Available Optionals
68
75
69
76
We enable following optionals, to allow user to re-use their pre-existing / configured resources.
@@ -74,5 +81,5 @@ We enable following optionals, to allow user to re-use their pre-existing / conf
74
81
|| ECS, VPC, Subnet |`ecs_cluster_name`, `ecs_vpc_id`, `ecs_vpc_subnets_private_ids`| if used, the three are mandatory |
0 commit comments