Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 12 additions & 0 deletions use-cases/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,6 +44,10 @@ Current examples were developed for simple use-case scenarios.
If not Terraform nor Cloudformation suits, take a look at the `manual-*` prefixed use-cases.



For [all-feature installation](https://docs.sysdig.com/en/docs/sysdig-secure/sysdig-secure-for-cloud/#features), check


| | `/examples/single-*` | `/examples/organizational-*` |
| --| -- | -- |
| Deployment Type | all Sysdig resources will be deployed within the selected account | Most Sysdig resources will be deployed within the selected account (just one), but some features, require resources to be deployed on all of the member-accounts (for Compliance and Image Scanning) . <br />One role is needed on the management account for cloudtrail-s3 event access |
Expand All @@ -53,3 +57,11 @@ If not Terraform nor Cloudformation suits, take a look at the `manual-*` prefixe
| More Info | [single-ecs](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-ecs), [single-apprunner](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-apprunner), [single-k8s](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/single-account-k8s) | [organizational](https://github.com/sysdiglabs/terraform-aws-secure-for-cloud/tree/master/examples/organizational) |

With both examples `single` and `org`, you can customize the desired features to de deployed with the `deploy_*` input vars to avoid deploying more than wanted.

<br/>

If you just want [CIS Unified Compliance Benchmarks](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/)
you can make use of

- [Single-Account Compliance Role Setup](./compliance-role-single-account.md)
- [Organizational Compliance Role setup](./compliance-role-organizational.md)
Original file line number Diff line number Diff line change
@@ -1,19 +1,10 @@
# SingleAccount-CIS Benchmarks
# Organizational - CIS Unified Compliance

## Use-Case explanation

Simple single-account setu in order to get CIS Benchmark
Organizational setup, in order to get [CIS Unified Compliance Benchmarks](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/)

**Client Setup**

- [X] single-account setup
- [ ] pre-existing resources

**Sysdig Secure For Cloud Features**

- [X] A part of Compliance, only CIS Benchmarks

## Suggested setup
## Setup

```terraform
terraform {
Expand All @@ -35,6 +26,8 @@ provider "aws" {

module "sysdig-sfc" {
source = "sysdiglabs/secure-for-cloud/aws//module/services/cloud-bench"
name = "TEST-NAME-cloudbench" # optional
name = "sysdig-compliance-role" # optional

is_organizational=true
}
```
31 changes: 31 additions & 0 deletions use-cases/compliance-role-single-account.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
# Single Account - CIS Unified Compliance

## Use-Case explanation

AWS single-account setup, in order to get [CIS Unified Compliance Benchmarks](https://docs.sysdig.com/en/docs/sysdig-secure/posture/compliance/compliance-unified-/)

## Setup

```terraform
terraform {
required_providers {
sysdig = {
source = "sysdiglabs/sysdig"
}
}
}

provider "sysdig" {
sysdig_secure_url = "<SYSDIG_SECURE_URL>"
sysdig_secure_api_token = "<SYSDIG_SECURE_API_TOKEN>"
}

provider "aws" {
region = "<AWS_REGION>"
}

module "sysdig-sfc" {
source = "sysdiglabs/secure-for-cloud/aws//module/services/cloud-bench"
name = "sysdig-compliance-role" # optional
}
```