You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Enterprise Example: SCC-WP with App Config and Trusted Profiles
1
+
# Enterprise example with CSPM enabled
2
2
3
-
> Only supported in an enterprise account.
3
+
The following example shows how to configure IBM Cloud Security and Compliance Center Workload Protection for Cloud Security Posture Management (CSPM) in an enterprise.
4
4
5
-
This example demonstrates a full deployment using modular Terraform code, including:
6
-
7
-
-**IBM Cloud App Configuration** (App Config)
8
-
-**IBM Cloud Security and Compliance Center Workload Protection** (SCC-WP)
9
-
-**IAM Trusted Profiles** for secure integration
10
-
-**Resource Group** creation or reuse
11
-
-**Configuration Aggregator** to link SCC-WP with App Config
12
-
13
-
---
14
-
15
-
## Module Overview
16
-
17
-
-**Resource Group Module**
18
-
Creates or reuses a resource group for all resources.
19
-
20
-
-**SCC Workload Protection Module**
21
-
Deploys the SCC-WP instance, attaches tags, and (optionally) enables CSPM and trusted profiles based on input variables.
22
-
23
-
-**App Config Module**
24
-
Deploys an App Config instance with enterprise plan, tags, and enables the configuration aggregator with a trusted profile.
25
-
26
-
---
27
-
28
-
## Flow Overview
29
-
30
-
1.**Resource Group**
31
-
A resource group is created or reused for all resources.
32
-
33
-
2.**App Config**
34
-
Deploys App Config with the enterprise plan, tags, and enables the configuration aggregator with a trusted profile.
35
-
36
-
3.**SCC Workload Protection**
37
-
Deploys SCC-WP with the `graduated-tier` plan, attaches resource and access tags, and (optionally) enables CSPM and trusted profiles for secure integration.
38
-
39
-
4.**Trusted Profiles**
40
-
Trusted profiles are created and linked as needed for App Config and SCC-WP, with enterprise access policies conditionally included if enabled.
41
-
42
-
5.**Configuration Aggregator**
43
-
Connects SCC-WP to App Config using the trusted profile and template ID for secure access across the enterprise.
44
-
45
-
---
46
-
47
-
## Notes
48
-
49
-
- The `trusted_profile_links` block in each trusted profile links the profile to a specific CRN (e.g., VSI or App Config instance), enabling the identity to assume the trusted profile.
50
-
- Enterprise-specific access policies are conditionally added based on input variables (e.g., `enterprise_enabled`).
51
-
52
-
---
53
-
54
-
## Usage
55
-
56
-
```bash
57
-
terraform init
58
-
terraform apply
59
-
```
60
-
61
-
---
5
+
- Use the App Config module to create an App Config instance with configuration aggregator enabled. This module will also create a trusted profile with viewer / reader access for all Account Management and Identity and Access enabled services. It will also create a trusted profile template which will be applied to the given enterprise sub-accounts to scan the resources in those accounts.
6
+
- Use the Security and Compliance Center Workload Protection module to create a new instance of SCC Workload Protection with Cloud Security Posture Management (CSPM) enabled. The module will also create a trusted profile with viewer access to the App Config instance in order to be able to populate the inventory.
config_aggregator_enterprise_account_group_ids_to_assign=["all"] # supports passing list of account groups. Use 'config_aggregator_enterprise_account_ids_to_assign' to pass individual accounts
Copy file name to clipboardExpand all lines: examples/enterprise/provider.tf
+1-2Lines changed: 1 addition & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -5,9 +5,8 @@ provider "ibm" {
5
5
6
6
data"ibm_iam_auth_token""auth_token" {}
7
7
8
-
# Null resource replaced with restapi_object to enable CSPM
9
8
provider"restapi" {
10
-
uri="https://resource-controller.cloud.ibm.com"
9
+
uri="https://resource-controller.cloud.ibm.com"# See https://cloud.ibm.com/apidocs/resource-controller/resource-controller#endpoint-url for all possible endpoints
0 commit comments