You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/data-sources/cloud_aws_account.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,6 +73,7 @@ Read-Only:
73
73
74
74
-`account_id` (String) The AWS Account ID
75
75
-`account_type` (String) The AWS account type. Value is 'commercial' for Commercial cloud accounts. For GovCloud environments, value can be either 'commercial' or 'gov' depending on the account type
76
+
-`agentless_scanning_role_name` (String) The name of the IAM role to be used by CrowdStrike Agentless Scanning (DSPM/Vulnerability scanning). If both are configured, the DSPM role takes precedence.
76
77
-`asset_inventory_enabled` (Boolean) Whether asset inventory is enabled
77
78
-`cloudtrail_bucket_name` (String) The name of the CloudTrail S3 bucket used for real-time visibility
78
79
-`cloudtrail_region` (String) The AWS region of the CloudTrail bucket
@@ -91,3 +92,6 @@ Read-Only:
91
92
-`realtime_visibility_enabled` (Boolean) Whether real-time visibility is enabled
92
93
-`sensor_management_enabled` (Boolean) Whether 1-click sensor deployment is enabled
93
94
-`target_ous` (List of String) The list of AWS Organizational Units (OUs) targeted for this account
95
+
-`vulnerability_scanning_enabled` (Boolean) Whether Vulnerability Scanning is enabled
96
+
-`vulnerability_scanning_role_arn` (String) The ARN of the IAM role to be used by CrowdStrike Vulnerability Scanning
97
+
-`vulnerability_scanning_role_name` (String) The name of the IAM role to be used by CrowdStrike Vulnerability Scanning
-`resource_name_suffix` (String) The suffix to be added to all resource names
79
83
-`sensor_management` (Attributes) (see [below for nested schema](#nestedatt--sensor_management))
80
84
-`target_ous` (List of String) The list of target Organizational Units
85
+
-`vulnerability_scanning` (Attributes) (see [below for nested schema](#nestedatt--vulnerability_scanning))
81
86
82
87
### Read-Only
83
88
89
+
-`agentless_scanning_role_name` (String) The name of the IAM role to be used by CrowdStrike Agentless Scanning (DSPM/Vulnerability scanning). If both are configured, the DSPM role takes precedence.
84
90
-`cloudtrail_bucket_name` (String) The name of the CloudTrail S3 bucket used for real-time visibility
85
91
-`dspm_role_arn` (String) The ARN of the IAM role to be used by CrowdStrike Data Security Posture Management
86
92
-`dspm_role_name` (String) The name of the IAM role to be used by CrowdStrike Data Security Posture Management
-`iam_role_name` (String) The name of the AWS IAM role used to access this AWS account
92
98
-`intermediate_role_arn` (String) The ARN of the intermediate role used to assume the AWS IAM role
93
99
-`is_organization_management_account` (Boolean) Indicates whether this is the management account (formerly known as the root account) of an AWS Organization
100
+
-`vulnerability_scanning_role_arn` (String) The ARN of the IAM role to be used by CrowdStrike Vulnerability Scanning
101
+
-`vulnerability_scanning_role_name` (String) The name of the IAM role to be used by CrowdStrike Vulnerability Scanning
// skipIfRegoNotEnabled skips the test if the ENABLE_REGO_TESTS environment variable is not set.
17
+
// This is used for tests that use custom Rego logic, which requires the custom policy feature
18
+
// flag to be enabled in the CrowdStrike environment.
19
+
//
20
+
// To enable these tests, set: export ENABLE_REGO_TESTS=1
21
+
funcskipIfRegoNotEnabled(t*testing.T) {
22
+
ifos.Getenv("ENABLE_REGO_TESTS") =="" {
23
+
t.Skip("Skipping test: ENABLE_REGO_TESTS environment variable not set. These tests require the custom policy feature flag to be enabled for your CID.")
0 commit comments