generated from terraform-ibm-modules/terraform-ibm-module-template
-
Notifications
You must be signed in to change notification settings - Fork 2
Fix the enterprise example #262
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Changes from all commits
Commits
Show all changes
7 commits
Select commit
Hold shift + click to select a range
4abaa97
fix(deps): update terraform restapi to v2
terraform-ibm-modules-ops 32a08af
bump provider
ocofaigh 38a1549
resolve conflicts
ocofaigh b112704
bump
ocofaigh 13c8778
rebase CDA
ocofaigh eb89a8e
fix the enterprise example
ocofaigh d006a78
Merge branch 'main' of github.com:terraform-ibm-modules/terraform-ibm…
ocofaigh File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,61 +1,6 @@ | ||
| # Enterprise Example: SCC-WP with App Config and Trusted Profiles | ||
| # Enterprise example with CSPM enabled | ||
|
|
||
| > Only supported in an enterprise account. | ||
| The following example shows how to configure IBM Cloud Security and Compliance Center Workload Protection for Cloud Security Posture Management (CSPM) in an enterprise. | ||
|
|
||
| This example demonstrates a full deployment using modular Terraform code, including: | ||
|
|
||
| - **IBM Cloud App Configuration** (App Config) | ||
| - **IBM Cloud Security and Compliance Center Workload Protection** (SCC-WP) | ||
| - **IAM Trusted Profiles** for secure integration | ||
| - **Resource Group** creation or reuse | ||
| - **Configuration Aggregator** to link SCC-WP with App Config | ||
|
|
||
| --- | ||
|
|
||
| ## Module Overview | ||
|
|
||
| - **Resource Group Module** | ||
| Creates or reuses a resource group for all resources. | ||
|
|
||
| - **SCC Workload Protection Module** | ||
| Deploys the SCC-WP instance, attaches tags, and (optionally) enables CSPM and trusted profiles based on input variables. | ||
|
|
||
| - **App Config Module** | ||
| Deploys an App Config instance with enterprise plan, tags, and enables the configuration aggregator with a trusted profile. | ||
|
|
||
| --- | ||
|
|
||
| ## Flow Overview | ||
|
|
||
| 1. **Resource Group** | ||
| A resource group is created or reused for all resources. | ||
|
|
||
| 2. **App Config** | ||
| Deploys App Config with the enterprise plan, tags, and enables the configuration aggregator with a trusted profile. | ||
|
|
||
| 3. **SCC Workload Protection** | ||
| Deploys SCC-WP with the `graduated-tier` plan, attaches resource and access tags, and (optionally) enables CSPM and trusted profiles for secure integration. | ||
|
|
||
| 4. **Trusted Profiles** | ||
| Trusted profiles are created and linked as needed for App Config and SCC-WP, with enterprise access policies conditionally included if enabled. | ||
|
|
||
| 5. **Configuration Aggregator** | ||
| Connects SCC-WP to App Config using the trusted profile and template ID for secure access across the enterprise. | ||
|
|
||
| --- | ||
|
|
||
| ## Notes | ||
|
|
||
| - The `trusted_profile_links` block in each trusted profile links the profile to a specific CRN (e.g., VSI or App Config instance), enabling the identity to assume the trusted profile. | ||
| - Enterprise-specific access policies are conditionally added based on input variables (e.g., `enterprise_enabled`). | ||
|
|
||
| --- | ||
|
|
||
| ## Usage | ||
|
|
||
| ```bash | ||
| terraform init | ||
| terraform apply | ||
| ``` | ||
|
|
||
| --- | ||
| - Use the App Config module to create an App Config instance with configuration aggregator enabled. This module will also create a trusted profile with viewer / reader access for all Account Management and Identity and Access enabled services. It will also create a trusted profile template which will be applied to the given enterprise sub-accounts to scan the resources in those accounts. | ||
| - Use the Security and Compliance Center Workload Protection module to create a new instance of SCC Workload Protection with Cloud Security Posture Management (CSPM) enabled. The module will also create a trusted profile with viewer access to the App Config instance in order to be able to populate the inventory. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
what is an enterprise id? Is it just an cloud account id?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
https://cloud.ibm.com/docs/enterprise-management?topic=enterprise-management-what-is-enterprise