Skip to content

Commit 4c87346

Browse files
authored
feat: Update CBR config to support SCC Workload Protection and App Configuration aggregator (#374)
* incorporated cbr changes * updated variable names and description
1 parent c421b03 commit 4c87346

File tree

3 files changed

+46
-2
lines changed

3 files changed

+46
-2
lines changed

README.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ You need the following permissions to run this module.
8989
| Name | Source | Version |
9090
|------|--------|---------|
9191
| <a name="module_account_settings"></a> [account\_settings](#module\_account\_settings) | terraform-ibm-modules/iam-account-settings/ibm | 2.12.0 |
92-
| <a name="module_cbr_fscloud"></a> [cbr\_fscloud](#module\_cbr\_fscloud) | terraform-ibm-modules/cbr/ibm//modules/fscloud | 1.32.6 |
92+
| <a name="module_cbr_fscloud"></a> [cbr\_fscloud](#module\_cbr\_fscloud) | terraform-ibm-modules/cbr/ibm//modules/fscloud | 1.33.5 |
9393
| <a name="module_existing_resource_group"></a> [existing\_resource\_group](#module\_existing\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.3.0 |
9494
| <a name="module_resource_group"></a> [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.3.0 |
9595
| <a name="module_trusted_profile_projects"></a> [trusted\_profile\_projects](#module\_trusted\_profile\_projects) | terraform-ibm-modules/trusted-profile/ibm | 2.3.1 |
@@ -106,6 +106,7 @@ No resources.
106106
| <a name="input_active_session_timeout"></a> [active\_session\_timeout](#input\_active\_session\_timeout) | Specify how long, in seconds, a user is allowed to work continuously in the account. This variable is ignored when `skip_iam_account_settings` is set to `true`. | `number` | `86400` | no |
107107
| <a name="input_allowed_ip_addresses"></a> [allowed\_ip\_addresses](#input\_allowed\_ip\_addresses) | List of the IP addresses and subnets that can create IAM tokens for the account. This variable is ignored when `skip_iam_account_settings` is set to `true`. | `list(any)` | `[]` | no |
108108
| <a name="input_api_creation"></a> [api\_creation](#input\_api\_creation) | When this variable is set to `RESTRICTED`, only users who are assigned the User API key creator role on the IAM Identity Service can create API keys, including the account owner. When set to `NOT_SET`, the previous value for this variable is cleared. Allowed values are `RESTRICTED`, `NOT_RESTRICTED`, or `NOT_SET`. This variable is ignored when `skip_iam_account_settings` is set to `true`. | `string` | `"RESTRICTED"` | no |
109+
| <a name="input_appconfig_aggregator_service_access"></a> [appconfig\_aggregator\_service\_access](#input\_appconfig\_aggregator\_service\_access) | Set rule for App Configuration to a list of services supported by the configuration aggregator. The default is true. The full list of services can be found [here](https://cloud.ibm.com/docs/app-configuration?topic=app-configuration-ac-configuration-aggregator#ac-list-of-services-configaggregator). However, CBR rules will only be created for the CBR-supported services. Service references in the CBR zone are not supported for databases. | `map(bool)` | <pre>{<br/> "IAM": true,<br/> "apprapp": true,<br/> "atracker": true,<br/> "cloud-object-storage": true,<br/> "codeengine": true,<br/> "container-registry": true,<br/> "dns-svcs": true,<br/> "event-notifications": true,<br/> "globalcatalog-collection": true,<br/> "hs-crypto": true,<br/> "is": true,<br/> "kms": true,<br/> "logs": true,<br/> "messagehub": true,<br/> "schematics": true,<br/> "secrets-manager": true,<br/> "sysdig-monitor": true,<br/> "sysdig-secure": true,<br/> "transit": true<br/>}</pre> | no |
109110
| <a name="input_audit_resource_group_name"></a> [audit\_resource\_group\_name](#input\_audit\_resource\_group\_name) | The name of the audit resource group to create. | `string` | `"audit-rg"` | no |
110111
| <a name="input_cbr_allow_at_to_cos"></a> [cbr\_allow\_at\_to\_cos](#input\_cbr\_allow\_at\_to\_cos) | Set to `true` to allow Activity Tracker Event Routing access to Object Storage. Default is `true` if `provision_cbr` is set to `true`. | `bool` | `true` | no |
111112
| <a name="input_cbr_allow_block_storage_to_kms"></a> [cbr\_allow\_block\_storage\_to\_kms](#input\_cbr\_allow\_block\_storage\_to\_kms) | Set to `true` to allow Block Storage for VPC access to the key management service. Default is `true` if `provision_cbr` is set to `true`. | `bool` | `true` | no |
@@ -116,6 +117,8 @@ No resources.
116117
| <a name="input_cbr_allow_is_to_cos"></a> [cbr\_allow\_is\_to\_cos](#input\_cbr\_allow\_is\_to\_cos) | Set to `true` to allow Virtual Private Cloud Infrastructure Services access to Object Storage. Default is `true` if `provision_cbr` is set to `true`. | `bool` | `true` | no |
117118
| <a name="input_cbr_allow_roks_to_kms"></a> [cbr\_allow\_roks\_to\_kms](#input\_cbr\_allow\_roks\_to\_kms) | Set to `true` to allow Red Hat OpenShift access to the key management service. Default is `true` if `provision_cbr` is set to `true`. | `bool` | `true` | no |
118119
| <a name="input_cbr_allow_scc_to_cos"></a> [cbr\_allow\_scc\_to\_cos](#input\_cbr\_allow\_scc\_to\_cos) | Set to `true` to allow Security and Compliance Center access to Object Storage. Default is `true` if `provision_cbr` is `true`. | `bool` | `true` | no |
120+
| <a name="input_cbr_allow_scc_wp_to_appconfig"></a> [cbr\_allow\_scc\_wp\_to\_appconfig](#input\_cbr\_allow\_scc\_wp\_to\_appconfig) | Set to `true` to allow Security and Compliance Center access to App Configuration. Default is `true` if `provision_cbr` is `true`. | `bool` | `true` | no |
121+
| <a name="input_cbr_allow_scc_wp_to_cloud_monitoring"></a> [cbr\_allow\_scc\_wp\_to\_cloud\_monitoring](#input\_cbr\_allow\_scc\_wp\_to\_cloud\_monitoring) | Set to `true` to allow Security and Compliance Center access to Cloud Monitoring. Default is `true` if `provision_cbr` is `true`. | `bool` | `true` | no |
119122
| <a name="input_cbr_allow_vpcs_to_container_registry"></a> [cbr\_allow\_vpcs\_to\_container\_registry](#input\_cbr\_allow\_vpcs\_to\_container\_registry) | Set to `true` to allow Virtual Private Clouds access to the Container Registry. Default is `true` if `provision_cbr` is set to `true`. | `bool` | `true` | no |
120123
| <a name="input_cbr_allow_vpcs_to_cos"></a> [cbr\_allow\_vpcs\_to\_cos](#input\_cbr\_allow\_vpcs\_to\_cos) | Set to `true` to allows Virtual Private Clouds access to Object Storage. Default is `true` if `provision_cbr` is set to `true`. | `bool` | `true` | no |
121124
| <a name="input_cbr_allow_vpcs_to_iam_access_management"></a> [cbr\_allow\_vpcs\_to\_iam\_access\_management](#input\_cbr\_allow\_vpcs\_to\_iam\_access\_management) | Set to `true` to allow Virtual Private Clouds access to IAM access management. Default is `true` if `provision_cbr` is set to `true`. | `bool` | `true` | no |

main.tf

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -188,7 +188,7 @@ module "trusted_profile_projects" {
188188
module "cbr_fscloud" {
189189
count = var.provision_cbr ? 1 : 0
190190
source = "terraform-ibm-modules/cbr/ibm//modules/fscloud"
191-
version = "1.32.6"
191+
version = "1.33.5"
192192
prefix = var.cbr_prefix
193193
zone_vpc_crn_list = []
194194
allow_cos_to_kms = var.cbr_allow_cos_to_kms
@@ -204,6 +204,9 @@ module "cbr_fscloud" {
204204
allow_scc_to_cos = var.cbr_allow_scc_to_cos
205205
allow_vpcs_to_iam_groups = var.cbr_allow_vpcs_to_iam_groups
206206
allow_vpcs_to_iam_access_management = var.cbr_allow_vpcs_to_iam_access_management
207+
allow_scc_wp_to_appconfig = var.cbr_allow_scc_wp_to_appconfig
208+
allow_scc_wp_to_cloud_monitoring = var.cbr_allow_scc_wp_to_cloud_monitoring
209+
appconfig_aggregator_service_access = var.appconfig_aggregator_service_access
207210
kms_service_targeted_by_prewired_rules = var.cbr_kms_service_targeted_by_prewired_rules
208211
target_service_details = var.cbr_target_service_details
209212
}

variables.tf

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -384,3 +384,41 @@ variable "cbr_target_service_details" {
384384
description = "Details of the target service for which a rule is created. The key is the service name."
385385
default = {}
386386
}
387+
388+
variable "cbr_allow_scc_wp_to_appconfig" {
389+
description = "Set to `true` to allow Security and Compliance Center access to App Configuration. Default is `true` if `provision_cbr` is `true`."
390+
type = bool
391+
default = true
392+
}
393+
394+
variable "cbr_allow_scc_wp_to_cloud_monitoring" {
395+
description = "Set to `true` to allow Security and Compliance Center access to Cloud Monitoring. Default is `true` if `provision_cbr` is `true`."
396+
type = bool
397+
default = true
398+
}
399+
400+
variable "appconfig_aggregator_service_access" {
401+
description = "Set rule for App Configuration to a list of services supported by the configuration aggregator. The default is true. The full list of services can be found [here](https://cloud.ibm.com/docs/app-configuration?topic=app-configuration-ac-configuration-aggregator#ac-list-of-services-configaggregator). However, CBR rules will only be created for the CBR-supported services. Service references in the CBR zone are not supported for databases."
402+
type = map(bool)
403+
default = {
404+
cloud-object-storage = true
405+
is = true
406+
secrets-manager = true
407+
IAM = true
408+
kms = true
409+
container-registry = true
410+
codeengine = true
411+
dns-svcs = true
412+
messagehub = true
413+
transit = true
414+
schematics = true
415+
sysdig-monitor = true
416+
sysdig-secure = true
417+
hs-crypto = true
418+
apprapp = true
419+
globalcatalog-collection = true
420+
event-notifications = true
421+
atracker = true
422+
logs = true
423+
}
424+
}

0 commit comments

Comments
 (0)