|
1 |
| -# Sysdig Secure for Cloud in AWS |
2 |
| - |
3 |
| -Terraform module that deploys the [**Sysdig Secure for Cloud** stack in **AWS**](https://docs.sysdig.com/en/docs/installation/sysdig-secure-for-cloud/deploy-sysdig-secure-for-cloud-on-aws). |
4 |
| -<br/> |
5 |
| - |
6 |
| -Provides unified threat-detection, compliance, forensics and analysis through these major components: |
7 |
| - |
8 |
| -* **[Threat Detection](https://docs.sysdig.com/en/docs/sysdig-secure/insights/)**: Tracks abnormal and suspicious activities in your cloud environment based on Falco language. Managed through `cloud-connector` module. <br/> |
9 |
| - |
10 |
| -* **[Compliance](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/)**: Enables the evaluation of standard compliance frameworks. Requires just `cloud-bench` module. <br/> |
11 |
| - |
12 |
| -* **[Identity and Access Management](https://docs.sysdig.com/en/docs/sysdig-secure/posture/identity-and-access/)**: Analyses user access overly permissive policies. Requires both modules `cloud-connector` and `cloud-bench`. <br/> |
13 |
| - |
14 |
| -* **[Image Scanning](https://docs.sysdig.com/en/docs/sysdig-secure/scanning/)**: Automatically scans all container images pushed to the registry (ECR) and the images that run on the AWS workload (currently ECS). Managed through `cloud-connector`. <br/>Disabled by Default, can be enabled through `deploy_image_scanning_ecr` and `deploy_image_scanning_ecs` input variable parameters.<br/> |
15 |
| - |
16 |
| -For other Cloud providers check: [GCP](https://github.com/sysdiglabs/terraform-google-secure-for-cloud), [Azure](https://github.com/sysdiglabs/terraform-azurerm-secure-for-cloud) |
17 |
| - |
18 |
| -<br/> |
| 1 | +# Sunset Notice |
19 | 2 |
|
| 3 | +> [!CAUTION] |
| 4 | +> Sysdig released a new onboarding experience for AWS in September 2024. We recommend connecting your cloud accounts by [following these instructions](https://docs.sysdig.com/en/docs/sysdig-secure/connect-cloud-accounts/). |
| 5 | +> |
| 6 | +> This repository should be used solely in cases where Agentless Threat Detection cannot be used. |
20 | 7 |
|
21 | 8 | ## Usage
|
22 | 9 |
|
23 |
| -There are several ways to deploy Secure for Cloud in you AWS infrastructure, |
24 |
| -- **[`/examples`](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples)** for the most common scenarios |
| 10 | +There are several ways to deploy Agent based Cloud Detection and Response (CDR) in your AWS infrastructure: |
25 | 11 | - [Single Account on ECS](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-ecs/)
|
26 | 12 | - [Single Account on AppRunner](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-apprunner/)
|
27 | 13 | - [Single-Account with a pre-existing Kubernetes Cluster](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-k8s/)
|
28 | 14 | - [Organizational](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/organizational/)
|
29 |
| - - Many module,examples and use-cases, we provide ways to **re-use existing resources (as optionals)** in your |
30 |
| - infrastructure. Check input summary on each example/module. |
31 |
| - |
32 |
| -- **[`/use-cases`](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/use-cases)** with self-baked customer-specific alternative scenarios. |
33 |
| -<br/> |
34 |
| - |
35 |
| -Find specific overall service arquitecture diagrams attached to each example/use-case. |
36 | 15 |
|
37 |
| -In the long-term our purpose is to evaluate those use-cases and if they're common enough, convert them into examples to make their usage easier. |
38 |
| - |
39 |
| -If you're unsure about what/how to use this module, please fill the [questionnaire](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/blob/master/use-cases/_questionnaire.md) report as an issue and let us know your context, we will be happy to help. |
40 |
| - |
41 |
| -### Notice |
42 |
| - |
43 |
| -* [AWS regions](https://docs.aws.amazon.com/general/latest/gr/rande.html#regional-endpoints) |
44 |
| -* **Resource creation inventory** Find all the resources created by Sysdig examples in the resource-group `sysdig-secure-for-cloud` (AWS Resource Group & Tag Editor) <br/> |
45 |
| -* All Sysdig Secure for Cloud features but [Image Scanning](https://docs.sysdig.com/en/docs/sysdig-secure/scanning/) are enabled by default. You can enable it through `deploy_scanning` input variable parameters.<br/> |
46 |
| - - **Management Account ECR image scanning** is not support since it's [not a best practice](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_best-practices_mgmt-acct.html#best-practices_mgmt-use) to have an ECR in the management account. However, we have a workaround to [solve this problem](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud#q-aws-scanning-images-pushed-to-management-account-ecr-are-not-scanned) in case you need to scan images pushed to the management account ECR. |
47 |
| -* **Deployment cost** This example will create resources that cost money.<br/>Run `terraform destroy` when you don't need them anymore |
48 |
| -* For **free subscription** users, beware that organizational examples may not deploy properly due to the [1 cloud-account limitation](https://docs.sysdig.com/en/docs/administration/administration-settings/subscription/#cloud-billing-free-tier). Open an Issue so we can help you here! |
49 |
| - |
50 |
| - |
51 |
| -<br/> |
| 16 | +If you're unsure about how to use this module, please contact your Sysdig representative. Our experts will guide you through the process and assist you in setting up your account securely and correctly. |
52 | 17 |
|
53 | 18 | ## Required Permissions
|
54 | 19 |
|
@@ -333,22 +298,6 @@ $ curl -v https://<SYSDIG_SECURE_ENDPOINT>/api/cloud/v2/accounts/<AWS_ACCOUNT_ID
|
333 | 298 | --header 'Authorization: Bearer <SYSDIG_SECURE_API_TOKEN>'
|
334 | 299 | ```
|
335 | 300 |
|
336 |
| -### Q-Benchmark: Getting Error: Not enough privileges to complete the action, Access is denied |
337 |
| - |
338 |
| -``` |
339 |
| -Error: Not enough privileges to complete the action, Access is denied |
340 |
| -│ |
341 |
| -│ with module.secure -for-cloud_organizational.module.cloud_bench_org[0].sysdig_secure_benchmark_task.benchmark_task, |
342 |
| -│ on.terraform / modules / secure -for-cloud_organizational / modules / services / cloud - bench / main.tf line 55, in resource "sysdig_secure_benchmark_task" "benchmark_task": |
343 |
| -
|
344 |
| -│ Error: error waiting for CloudFormation StackSet(sysdig - secure - cloudbench) update: unexpected state 'FAILED', wanted target 'SUCCEEDED'.last error: Operation(terraform - 20221130212414336200000001) Results: 6 errors occurred: |
345 |
| -│ * Account(***) Region(us - east - 1) Status(SUCCEEDED) Status Reason: No updates are to be performed. |
346 |
| -│ * Account(***) Region(us - east - 1) Status(FAILED) Status Reason: Account *** should have |
347 |
| -'stacksets-exec-70e2f8a88d368a5d3df60f4eb8c247dc' role with trust relationship to Role 'aws-service-role/stacksets.cloudformation.amazonaws.com/AWSServiceRoleForCloudFormationStackSetsOrgAdmin |
348 |
| -``` |
349 |
| - |
350 |
| -A: For **Organizational** Setup for cloudbench (deployed through management account / delegated administrator vía stackset) make sure it's being deployed in the management account. [enable organizational trusted access to stackset](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-enable-trusted-access.html) as part of the [prerequisites for stackset operations](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-prereqs.html) |
351 |
| - |
352 | 301 | ### Q-RuntimeThreat Detection: Getting error 403 `"could not load rule set from Sysdig Secure: ruleprovider#newPartialRuleSet | error loading default-rules: error from Sysdig Secure API: 403`
|
353 | 302 |
|
354 | 303 | A: The Sysdig User that deployed the components is a standard user within the Sysdig Platform. Only administrator users are given permissions to read falco rule sets. Once this permission is changed, you should no longer get this error and CSPM Cloud events should start populating.
|
|
0 commit comments