You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+18-5
Original file line number
Diff line number
Diff line change
@@ -66,11 +66,11 @@ This would be an overall schema of the **created resources**, for the default se
66
66
- Sysdig Workload: ECS / AppRunner creation (K8s cluster is pre-required, not created)
67
67
- each compute solution require a role to assume for execution
68
68
- CodeBuild for on-demand image scanning
69
-
- Sysdig role for [Compliance](./modules/services/cloud-bench)
69
+
- Sysdig role for [Compliance](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/modules/services/cloud-bench)
70
70
71
71
### Runtime Permissions
72
72
73
-
**General Permissions**
73
+
**Threat-Detection specific**
74
74
75
75
```shell
76
76
ssm: GetParameters
@@ -85,8 +85,14 @@ s3: GetObject
85
85
**Image-Scanning specific**
86
86
87
87
```shell
88
+
89
+
# all type scanning
88
90
codebuild: StartBuild
89
91
92
+
# deploy_image_scanning_ecr
93
+
ecs:DescribeTaskDefinition
94
+
95
+
# deploy_image_scanning_ecs
90
96
ecr: GetAuthorizationToken
91
97
ecr: BatchCheckLayerAvailability
92
98
ecr: GetDownloadUrlForLayer
@@ -99,14 +105,13 @@ ecr: GetLifecyclePolicy
99
105
ecr: GetLifecyclePolicyPreview
100
106
ecr: ListTagsForResource
101
107
ecr: DescribeImageScanFindings
102
-
103
-
ecs:DescribeTaskDefinition
104
108
```
105
109
- Other Notes:
110
+
-[Runtime AWS IAM permissions on JSON Statement format](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/resources/policy-single-account-k8s-aws.json)
106
111
- only Sysdig workload related permissions are specified above; infrastructure internal resource permissions (such as Cloudtrail permissions to publish on SNS, or SNS-SQS Subscription)
107
112
are not detailed.
108
113
- For a better security, permissions are resource pinned, instead of `*`
109
-
- Check [Organizational Use Case - Role Summary](./examples/organizational/README.md#role-summary) for more details
114
+
- Check [Organizational Use Case - Role Summary](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/examples/organizational/README.md#role-summary) for more details
110
115
111
116
112
117
<br/>
@@ -155,6 +160,14 @@ When scanning is activated, should see following lines on the cloud-connector co
155
160
```
156
161
157
162
- For ECR image scanning, upload any image to an ECR repository of AWS. Can find CLI instructions within the UI of AWS
163
+
164
+
It may take some time, but you should see logs detecting the new image in the ECR repository
{"component":"ecr-action","message":"starting ECR scanning for ***.dkr.ecr.us-east-1.amazonaws.com/myimage:tag at account ‘***’ region ‘us-east-1’"}
168
+
```
169
+
and a CodeBuild project being launched successfully
170
+
158
171
- For ECS running image scanning, deploy any task in your own cluster, or the one that we create to deploy our workload (ex.`amazon/amazon-ecs-sample` image).
159
172
160
173
It may take some time, but you should see logs detecting the new image in the ECS cloud-connector task
| <aname="input_cloudtrail_is_multi_region_trail"></a> [cloudtrail\_is\_multi\_region\_trail](#input\_cloudtrail\_is\_multi\_region\_trail)| true/false whether cloudtrail will ingest multiregional events. testing/economization purpose. |`bool`|`true`| no |
117
119
| <aname="input_cloudtrail_kms_enable"></a> [cloudtrail\_kms\_enable](#input\_cloudtrail\_kms\_enable)| true/false whether s3 should be encrypted. testing/economization purpose. |`bool`|`true`| no |
118
120
| <aname="input_cloudtrail_sns_arn"></a> [cloudtrail\_sns\_arn](#input\_cloudtrail\_sns\_arn)| ARN of a pre-existing cloudtrail\_sns. If defaulted, a new cloudtrail will be created. If specified, deployment region must match Cloudtrail S3 bucket region |`string`|`"create"`| no |
121
+
| <aname="input_deploy_aws_iam_user"></a> [deploy\_aws\_iam\_user](#input\_deploy\_aws\_iam\_user)| true/false whether to deploy an iam user. if set to false, check [required role permissions](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/resources/policy-single-account-k8s-aws.json)|`bool`|`true`| no |
119
122
| <aname="input_deploy_benchmark"></a> [deploy\_benchmark](#input\_deploy\_benchmark)| Whether to deploy or not the cloud benchmarking |`bool`|`true`| no |
120
123
| <aname="input_deploy_image_scanning_ecr"></a> [deploy\_image\_scanning\_ecr](#input\_deploy\_image\_scanning\_ecr)| true/false whether to deploy the image scanning on ECR pushed images |`bool`|`false`| no |
121
124
| <aname="input_deploy_image_scanning_ecs"></a> [deploy\_image\_scanning\_ecs](#input\_deploy\_image\_scanning\_ecs)| true/false whether to deploy the image scanning on ECS running images |`bool`|`false`| no |
Copy file name to clipboardExpand all lines: examples/single-account-k8s/variables.tf
+9
Original file line number
Diff line number
Diff line change
@@ -68,3 +68,12 @@ variable "benchmark_regions" {
68
68
description="List of regions in which to run the benchmark. If empty, the task will contain all aws regions by default."
69
69
default=[]
70
70
}
71
+
72
+
#
73
+
# aws iam user configuration
74
+
#
75
+
variable"deploy_aws_iam_user" {
76
+
type=bool
77
+
description="true/false whether to deploy an iam user. if set to false, check [required role permissions](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/resources/policy-single-account-k8s-aws.json)"
0 commit comments