diff --git a/use-cases/README.md b/use-cases/README.md index 138894d8..03734b87 100644 --- a/use-cases/README.md +++ b/use-cases/README.md @@ -44,6 +44,10 @@ Current examples were developed for simple use-case scenarios. If not Terraform nor Cloudformation suits, take a look at the `manual-*` prefixed use-cases. + +For [all-feature installation](https://docs.sysdig.com/en/docs/sysdig-secure/sysdig-secure-for-cloud/#features), check + + | | `/examples/single-*` | `/examples/organizational-*` | | --| -- | -- | | Deployment Type | all Sysdig resources will be deployed within the selected account | Most Sysdig resources will be deployed within the selected account (just one), but some features, require resources to be deployed on all of the member-accounts (for Compliance and Image Scanning) .
One role is needed on the management account for cloudtrail-s3 event access | @@ -53,3 +57,11 @@ If not Terraform nor Cloudformation suits, take a look at the `manual-*` prefixe | More Info | [single-ecs](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-ecs), [single-apprunner](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-apprunner), [single-k8s](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-k8s) | [organizational](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/organizational) | With both examples `single` and `org`, you can customize the desired features to de deployed with the `deploy_*` input vars to avoid deploying more than wanted. + +
+ +If you just want [CIS Unified Compliance Benchmarks](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/) +you can make use of + +- [Single-Account Compliance Role Setup](./compliance-role-single-account.md) +- [Organizational Compliance Role setup](./compliance-role-organizational.md) \ No newline at end of file diff --git a/use-cases/single-benchmark.md b/use-cases/compliance-role-organizational.md similarity index 57% rename from use-cases/single-benchmark.md rename to use-cases/compliance-role-organizational.md index e7821dee..d58efcb7 100644 --- a/use-cases/single-benchmark.md +++ b/use-cases/compliance-role-organizational.md @@ -1,19 +1,10 @@ -# SingleAccount-CIS Benchmarks +# Organizational - CIS Unified Compliance ## Use-Case explanation -Simple single-account setu in order to get CIS Benchmark +Organizational setup, in order to get [CIS Unified Compliance Benchmarks](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/) -**Client Setup** - -- [X] single-account setup -- [ ] pre-existing resources - -**Sysdig Secure For Cloud Features** - -- [X] A part of Compliance, only CIS Benchmarks - -## Suggested setup +## Setup ```terraform terraform { @@ -35,6 +26,8 @@ provider "aws" { module "sysdig-sfc" { source = "sysdiglabs/secure-for-cloud/aws//module/services/cloud-bench" - name = "TEST-NAME-cloudbench" # optional + name = "sysdig-compliance-role" # optional + + is_organizational=true } ``` diff --git a/use-cases/compliance-role-single-account.md b/use-cases/compliance-role-single-account.md new file mode 100644 index 00000000..4c0cb512 --- /dev/null +++ b/use-cases/compliance-role-single-account.md @@ -0,0 +1,31 @@ +# Single Account - CIS Unified Compliance + +## Use-Case explanation + +AWS single-account setup, in order to get [CIS Unified Compliance Benchmarks](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/) + +## Setup + +```terraform +terraform { + required_providers { + sysdig = { + source = "sysdiglabs/sysdig" + } + } +} + +provider "sysdig" { + sysdig_secure_url = "" + sysdig_secure_api_token = "" +} + +provider "aws" { + region = "" +} + +module "sysdig-sfc" { + source = "sysdiglabs/secure-for-cloud/aws//module/services/cloud-bench" + name = "sysdig-compliance-role" # optional +} +```