|
|
4 years ago | |
|---|---|---|
| .. | ||
| 000-mdradmin-bootstrap | 5 years ago | |
| 001-tfstate | 5 years ago | |
| 004-iam-okta | 5 years ago | |
| 006-account-standards | 5 years ago | |
| 006-account-standards-regional | 5 years ago | |
| 008-xdr-binaries | 4 years ago | |
| 010-public-dns | 5 years ago | |
| 010-shared-ami-key | 4 years ago | |
| 015-security-vpc | 4 years ago | |
| 019-qualys-service-account | 5 years ago | |
| 072-salt-master-inventory-role | 5 years ago | |
| README.md | 5 years ago | |
| account.hcl | 4 years ago | |
I'm not sure if this is a helpful readme or not tbh
A handful of these need the static access keys for the MDRAdmin account, mostly because at that point of setting up a new AWS account we don't have the okta integration in place.
| Subdirectory | auth | Purpose |
|---|---|---|
| 000-mdradmin-bootstrap | MDRAdmin + aws-mfa | Configures MDRAdmin Account to have IAM rights to create terraform state |
| 001-tfstate | MDRAdmin + aws-mfa | Creates TF state s3 bucket, dynamodb tables |
| 005-iam | okta + saml2aws | Fundamental IAM setup - does OKTA linkage, sets up user roles and policies |
| common | okta + saml2aws | Variable / provider definitions used across multiple chunks |