|
%!s(int64=3) %!d(string=hai) anos | |
---|---|---|
.. | ||
000-mdradmin-bootstrap | %!s(int64=3) %!d(string=hai) anos | |
001-tfstate | %!s(int64=3) %!d(string=hai) anos | |
004-iam-okta | %!s(int64=3) %!d(string=hai) anos | |
006-account-standards | %!s(int64=3) %!d(string=hai) anos | |
006-account-standards-regional | %!s(int64=3) %!d(string=hai) anos | |
008-xdr-binaries | %!s(int64=3) %!d(string=hai) anos | |
010-shared-ami-key | %!s(int64=3) %!d(string=hai) anos | |
015-security-vpc | %!s(int64=3) %!d(string=hai) anos | |
019-qualys-service-account | %!s(int64=3) %!d(string=hai) anos | |
021-qualys-connector-role | %!s(int64=3) %!d(string=hai) anos | |
050-lcp-ami-sharing | %!s(int64=3) %!d(string=hai) anos | |
072-salt-master-inventory-role | %!s(int64=3) %!d(string=hai) anos | |
075-codebuild-ecr-base | %!s(int64=3) %!d(string=hai) anos | |
080-codebuild-ecr-sample | %!s(int64=3) %!d(string=hai) anos | |
081-codebuild-rpm-collectd | %!s(int64=3) %!d(string=hai) anos | |
085-codebuild-ecr-customer-portal | %!s(int64=3) %!d(string=hai) anos | |
090-codebuild-rpm-tmux | %!s(int64=3) %!d(string=hai) anos | |
095-codebuild-rpm-aws-efs-utils | %!s(int64=3) %!d(string=hai) anos | |
100-codebuild-rpm-syslog-ng | %!s(int64=3) %!d(string=hai) anos | |
105-codebuild-ecr-mcas-container | %!s(int64=3) %!d(string=hai) anos | |
110-xdr-binaries-write-role | %!s(int64=3) %!d(string=hai) anos | |
300-s3-xdr-trumpet | %!s(int64=3) %!d(string=hai) anos | |
350-codebuild-ecr-content-generator-build-image | %!s(int64=3) %!d(string=hai) anos | |
disabled | %!s(int64=3) %!d(string=hai) anos | |
us-gov-west-1 | %!s(int64=3) %!d(string=hai) anos | |
README.md | %!s(int64=5) %!d(string=hai) anos | |
account.hcl | %!s(int64=3) %!d(string=hai) anos |
I'm not sure if this is a helpful readme or not tbh
A handful of these need the static access keys for the MDRAdmin account, mostly because at that point of setting up a new AWS account we don't have the okta integration in place.
Subdirectory | auth | Purpose |
---|---|---|
000-mdradmin-bootstrap | MDRAdmin + aws-mfa | Configures MDRAdmin Account to have IAM rights to create terraform state |
001-tfstate | MDRAdmin + aws-mfa | Creates TF state s3 bucket, dynamodb tables |
005-iam | okta + saml2aws | Fundamental IAM setup - does OKTA linkage, sets up user roles and policies |