https://github.com/sysdiglabs/terraform-google-secure
https://github.com/sysdiglabs/terraform-google-secure
Last synced: 2 months ago
JSON representation
- Host: GitHub
- URL: https://github.com/sysdiglabs/terraform-google-secure
- Owner: sysdiglabs
- License: apache-2.0
- Created: 2023-07-21T08:02:44.000Z (almost 2 years ago)
- Default Branch: master
- Last Pushed: 2024-10-24T20:18:06.000Z (7 months ago)
- Last Synced: 2024-10-25T01:07:46.493Z (7 months ago)
- Language: HCL
- Size: 429 KB
- Stars: 0
- Watchers: 9
- Forks: 4
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE.txt
- Codeowners: CODEOWNERS
- Authors: AUTHORS
Awesome Lists containing this project
README
# Sysdig Secure for Cloud in Google
Terraform module that deploys the Sysdig Secure for Cloud stack in GCP.
Provides unified threat-detection, compliance, forensics and analysis through these major components:
* **[CSPM](https://docs.sysdig.com/en/docs/sysdig-secure/posture/)**: It evaluates periodically your cloud configuration, using Cloud Custodian, against some benchmarks and returns the results and remediation you need to fix. Managed through `service-principal` module.
* **[CIEM](https://docs.sysdig.com/en/docs/sysdig-secure/posture/identity-and-access/)**: Permissions and Entitlements management. Managed through `service-principal` module.
* **[CDR (Cloud Detection and Response)]((https://docs.sysdig.com/en/docs/sysdig-secure/threats/activity/events-feed/))**: It sends periodically the Audit Logs collected from a GCP project/organization to Sysdig's systems, this by collecting them in a PubSub topic through a Sink and then sending them through a `PUSH` integration. Managed through `webhook-datasource` module.
For other Cloud providers check: [AWS](https://github.com/draios/terraform-aws-secure-for-cloud)