Setting up IaC Remediation for Cloud Security Management
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。
Use the following instructions to enable Infrastructure as Code (IaC) remediation for Cloud Security Management (CSM). IaC remediation is available for CSM Misconfigurations and CSM Identity Risks.
Set up the GitHub integration
Follow the instructions for creating a GitHub app for your organization.
To use IaC remediation, you must give the Github App Read & Write
permissions for Contents
and Pull Requests
. These permissions can be applied to all or select repositories.
After you set up the GitHub integration, enable IaC remediation for the repositories in your GitHub account.
- On the CSM Setup page, expand the Source Code Integrations section.
- Click Configure for the GitHub account you want to configure.
- To enable IaC:
- For all repositories, switch on the IAC toggle under Enable Infrastructure as Code (IaC).
- For a single repository, switch on the IAC toggle for that repository.
Further reading