You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: use-cases/org-k8s-threat-compliance.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -167,7 +167,7 @@ Check that deployment logs throw no errors and can go to [confirm services are w
167
167
168
168
### Compliance - Customer's Side
169
169
170
-
We'll need, **for each project**
170
+
We'll need, **for each project** (`GCP_PROJECT_ID`)
171
171
172
172
- A **Service Account** (SA) with `IAM Workload Identity Federation` on Sysdigs AWS Cloud infrastructure, to be able to assess your infrastructure Compliance
173
173
- currently, federation is only available through AWS, but we will enable other clouds in the near-future
@@ -198,7 +198,7 @@ We'll need, **for each project**
198
198
4. In the previously created 'sysdigcloudbench' SA, we need to create a **Service Account Pool Binding**
199
199
- Set Pool Binding the role `roles/iam.workloadIdentityUser`
200
200
- For the members value, we will add the following
0 commit comments