You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: examples/organizational/README.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,10 +3,10 @@
3
3
Deploy Sysdig Secure for Cloud using an Organizational Cloudtrail that will fetch events from all organization member accounts (and the managed one too).
4
4
5
5
* In the **management account**
6
-
* An Organizational Cloutrail will be deployed (with required S3,SNS)
7
-
* An additional role `SysdigSecureForCloudRole` will be created
8
-
* to be able to read cloudtrail-s3 bucket events from sysdig workload member account.
9
-
* will also be used to asummeRole over other roles, and enable the process of scanning on ECR's that may be present in other member accounts.
6
+
* An Organizational Cloutrail will be deployed (with required S3,SNS)
7
+
* An additional role `SysdigSecureForCloudRole` will be created
8
+
* to be able to read cloudtrail-s3 bucket events from sysdig workload member account.
9
+
* will also be used to asummeRole over other roles, and enable the process of scanning on ECR's that may be present in other member accounts.
10
10
* In the **user-provided member account**
11
11
* All the Sysdig Secure for Cloud service-related resources/workload will be created
12
12
@@ -24,7 +24,7 @@ Minimum requirements:
24
24
> You must be logged in with the management account for the organization to create an organization trail. You must also have sufficient permissions for the IAM user or role in the management account to successfully create an organization trail.
25
25
* When an account is created within an organization, AWS will create an `OrganizationAccountAccessRole`[for account management](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html), which Sysdig Secure for Cloud will use for member-account provisioning and role assuming.
26
26
* However, when the account is invited into the organization, it's required to [create the role manually](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html#orgs_manage_accounts_create-cross-account-role)
27
-
> You have to do this manually, as shown in the following procedure. This essentially duplicates the role automatically set up for created accounts. We recommend that you use the same name, OrganizationAccountAccessRole, for your manually created roles for consistency and ease of remembering.
27
+
> You have to do this manually, as shown in the following procedure. This essentially duplicates the role automatically set up for created accounts. We recommend that you use the same name, OrganizationAccountAccessRole, for your manually created roles for consistency and ease of remembering.
28
28
* This role name, `OrganizationAccountAccessRole`, is currently hardcoded on the module.
29
29
3. Provide a member **account ID for Sysdig Secure for Cloud workload** to be deployed.
30
30
Our recommendation is for this account to be empty, so that deployed resources are not mixed up with your workload.
| <aname="input_benchmark_regions"></a> [benchmark\_regions](#input\_benchmark\_regions)| List of regions in which to run the benchmark. If empty, the task will contain all aws regions by default. |`list(string)`|`[]`| no |
60
60
| <aname="input_is_organizational"></a> [is\_organizational](#input\_is\_organizational)| whether secure-for-cloud should be deployed in an organizational setup |`bool`|`false`| no |
61
61
| <aname="input_name"></a> [name](#input\_name)| The name of the IAM Role that will be created. |`string`|`"sfc-cloudbench"`| no |
62
+
| <aname="input_provision_in_management_account"></a> [provision\_in\_management\_account](#input\_provision\_in\_management\_account)| Whether to deploy the stack in the management account |`bool`|`true`| no |
62
63
| <aname="input_region"></a> [region](#input\_region)| Default region for resource creation in organization mode |`string`|`"eu-central-1"`| no |
0 commit comments