Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Updating the prerequisites section for the security patterns #165

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
11 changes: 2 additions & 9 deletions docs/patterns/security/eks-config-rules.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,18 +6,11 @@ The objective of this pattern is to demonstrate how to enable AWS Config configu

## Prerequisites

1. Clone the repository.
2. Follow the usage [instructions](../../../README.md#usage) to install the dependencies.
3. `argo-admin-password` secret must be defined in Secrets Manager in the same region as the EKS cluster.
1. Follow the usage [instructions](https://github.com/aws-samples/cdk-eks-blueprints-patterns/blob/main/README.md#usage) to install the dependencies and perform the repository setup.
2. `argo-admin-password` secret must be defined in Secrets Manager in the same region as the EKS cluster.

## Deploy

To update npm, run the following command:

```bash
npm install -g npm@latest
```

To bootstrap the CDK toolkit and list all stacks in the app, run the following commands:

```bash
Expand Down
13 changes: 3 additions & 10 deletions docs/patterns/security/encryption-at-rest.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# EKS Encryption-at-Rest pattern
# Data at Rest Encryption

## Objective

Expand All @@ -19,18 +19,11 @@ The sample repository contains the following workloads:

## Prerequisites

1. Clone the repository.
2. Follow the usage [instructions](../../../README.md#usage) to install the dependencies.
3. `argo-admin-password` secret must be defined in Secrets Manager in the same region as the EKS cluster.
1. Follow the usage [instructions](https://github.com/aws-samples/cdk-eks-blueprints-patterns/blob/main/README.md#usage) to install the dependencies and perform the repository setup.
2. `argo-admin-password` secret must be defined in Secrets Manager in the same region as the EKS cluster.

## Deploy

To update npm, run the following command:

```bash
npm install -g npm@latest
```

To bootstrap the CDK toolkit and list all stacks in the app, run the following commands:

```bash
Expand Down
11 changes: 2 additions & 9 deletions docs/patterns/security/guardduty.md
Original file line number Diff line number Diff line change
Expand Up @@ -31,18 +31,11 @@ The sample repository contains the following workloads:

## Prerequisites

1. Clone the repository
2. Follow the usage [instructions](../../../README.md#usage) to install the dependencies
3. `argo-admin-password` secret must be defined in Secrets Manager in the same region as the EKS cluster.
1. Follow the usage [instructions](https://github.com/aws-samples/cdk-eks-blueprints-patterns/blob/main/README.md#usage) to install the dependencies and perform the repository setup.
2. `argo-admin-password` secret must be defined in Secrets Manager in the same region as the EKS cluster.

## Deploy

To update npm, run the following command:

```bash
npm install -g npm@latest
```

To bootstrap the CDK toolkit and list all stacks in the app, run the following commands:

```bash
Expand Down
11 changes: 2 additions & 9 deletions docs/patterns/security/image-scanning.md
Original file line number Diff line number Diff line change
Expand Up @@ -37,18 +37,11 @@ The sample repository contains the following workloads:

## Prerequisites

1. Clone the repository
2. Follow the usage [instructions](../../../README.md#usage) to install the dependencies
3. `argo-admin-password` secret must be defined in Secrets Manager in the same region as the EKS cluster.
1. Follow the usage [instructions](https://github.com/aws-samples/cdk-eks-blueprints-patterns/blob/main/README.md#usage) to install the dependencies and perform the repository setup.
2. `argo-admin-password` secret must be defined in Secrets Manager in the same region as the EKS cluster.

## Deploy

To update npm, run the following command:

```bash
npm install -g npm@latest
```

To bootstrap the CDK toolkit and list all stacks in the app, run the following commands:

```bash
Expand Down
13 changes: 3 additions & 10 deletions docs/patterns/security/securityhub.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,21 +8,14 @@ The pattern will enable AWS Security Hub in the `CDK_DEFAULT_ACCOUNT` and `CDK_D

## Prerequisites

1. Clone the repository
2. Follow the usage [instructions](../../../README.md#usage) to install the dependencies
3. `argo-admin-password` secret must be defined in Secrets Manager in the same region as the EKS cluster.
4. Complete the steps to [enable AWS Config and deploy the Security Best Practices for Amazon EKS AWS Config managed rules](eks-config-rules.md).
1. Follow the usage [instructions](https://github.com/aws-samples/cdk-eks-blueprints-patterns/blob/main/README.md#usage) to install the dependencies and perform the repository setup.
2. `argo-admin-password` secret must be defined in Secrets Manager in the same region as the EKS cluster.
3. Complete the steps to [enable AWS Config and deploy the Security Best Practices for Amazon EKS AWS Config managed rules](eks-config-rules.md).

**Optional (but recommended):** If you have not done so already, follow the steps to deploy the [Amazon GuardDuty stack and blueprint](guardduty.md). Since Amazon GuardDuty automatically sends its findings to AWS Security Hub, the sample EKS finding will appear in AWS Security Hub about five minutes after it has been enabled in the same region.

## Deploy

To update npm, run the following command:

```bash
npm install -g npm@latest
```

To bootstrap the CDK toolkit and list all stacks in the app, run the following commands:

```bash
Expand Down
Loading