|
%!s(int64=3) %!d(string=hai) anos | |
---|---|---|
.. | ||
000-mdradmin-bootstrap | %!s(int64=4) %!d(string=hai) anos | |
001-tfstate | %!s(int64=4) %!d(string=hai) anos | |
004-iam-okta | %!s(int64=3) %!d(string=hai) anos | |
006-account-standards | %!s(int64=3) %!d(string=hai) anos | |
006-account-standards-regional | %!s(int64=3) %!d(string=hai) anos | |
008-xdr-binaries | %!s(int64=3) %!d(string=hai) anos | |
010-public-dns | %!s(int64=3) %!d(string=hai) anos | |
010-shared-ami-key | %!s(int64=3) %!d(string=hai) anos | |
011-defpoint_com-legacy-dns | %!s(int64=3) %!d(string=hai) anos | |
015-security-vpc | %!s(int64=3) %!d(string=hai) anos | |
019-qualys-service-account | %!s(int64=3) %!d(string=hai) anos | |
050-lcp-ami-sharing | %!s(int64=3) %!d(string=hai) anos | |
072-salt-master-inventory-role | %!s(int64=3) %!d(string=hai) anos | |
110-xdr-binaries-write-role | %!s(int64=3) %!d(string=hai) anos | |
300-s3-xdr-trumpet | %!s(int64=3) %!d(string=hai) anos | |
us-east-2 | %!s(int64=3) %!d(string=hai) anos | |
us-west-1 | %!s(int64=3) %!d(string=hai) anos | |
us-west-2 | %!s(int64=3) %!d(string=hai) anos | |
README.md | %!s(int64=5) %!d(string=hai) anos | |
account.hcl | %!s(int64=4) %!d(string=hai) anos |
I'm not sure if this is a helpful readme or not tbh
A handful of these need the static access keys for the MDRAdmin account, mostly because at that point of setting up a new AWS account we don't have the okta integration in place.
Subdirectory | auth | Purpose |
---|---|---|
000-mdradmin-bootstrap | MDRAdmin + aws-mfa | Configures MDRAdmin Account to have IAM rights to create terraform state |
001-tfstate | MDRAdmin + aws-mfa | Creates TF state s3 bucket, dynamodb tables |
005-iam | okta + saml2aws | Fundamental IAM setup - does OKTA linkage, sets up user roles and policies |
common | okta + saml2aws | Variable / provider definitions used across multiple chunks |