Skip to content

Commit b1e528e

Browse files
author
iru
authored
Update org-k8s-threat-compliance.md
1 parent f8255ce commit b1e528e

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

use-cases/org-k8s-threat-compliance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ Check that deployment logs throw no errors and can go to [confirm services are w
167167
168168
### Compliance - Customer's Side
169169
170-
We'll need, **for each project**
170+
We'll need, **for each project** (`GCP_PROJECT_ID`)
171171
172172
- A **Service Account** (SA) with `IAM Workload Identity Federation` on Sysdigs AWS Cloud infrastructure, to be able to assess your infrastructure Compliance
173173
- currently, federation is only available through AWS, but we will enable other clouds in the near-future
@@ -198,7 +198,7 @@ We'll need, **for each project**
198198
4. In the previously created 'sysdigcloudbench' SA, we need to create a **Service Account Pool Binding**
199199
- Set Pool Binding the role `roles/iam.workloadIdentityUser`
200200
- For the members value, we will add the following
201-
> principalSet://iam.googleapis.com/projects/<SYSDIG_PROJECT_ID>/locations/global/workloadIdentityPools/<IDENTITY_POOL_ID>/attribute.aws_role/arn:aws:sts::<SYSDIG_AWS_ACCOUNT_ID>:assumed-role/<SYSDIG_AWS_ROLE_NAME>/<SYSDIG_AWS_EXTERNAL_ID>
201+
> principalSet://iam.googleapis.com/projects/<GCP_PROJECT_ID>/locations/global/workloadIdentityPools/<IDENTITY_POOL_ID>/attribute.aws_role/arn:aws:sts::<SYSDIG_AWS_ACCOUNT_ID>:assumed-role/<SYSDIG_AWS_ROLE_NAME>/<SYSDIG_AWS_EXTERNAL_ID>
202202
203203
5. You can check the communication between Sysdig and your infrastructure by querying this API endpoint for each of the projects you have registered:
204204
```shell

0 commit comments

Comments
 (0)