deepfence/ThreatMapper

Run Cloud Scanner on Kubernetes or with the Console

Closed this issue · 1 comments

Cloud Provider IAM Role Single Account Org Account Docker Compose
AWS need to attach required IAM roles to EC2 instance
GCP NA
Azure NA
  • ✅ - supported
  • ❌ - not supported

Requirement

  • Cloud scanner on AWS EKS uses IRSA for auth (Completed in #2289)
  • GCP supports similar IAM roles with workload identity which can be used similar to AWS IRSA
    (https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity#kubernetes-sa-to-iam)
  • Check if Azure supports IAM roles similar to AWS IAM or GCP workload identity
  • Running Cloud scanner outside IAM role requires access credentials for aws / service account credentials json for gcp / project app password for azure
  • Should single instance of cloud scanner support multiple cloud providers? is it supported in current implementation?
  • Separate out IAM roles creation scripts to use as standalone modules

Should single instance of cloud scanner support multiple cloud providers? is it supported in current implementation?

Not supported at the moment, but we should be able to add support if required