diff --git a/README.md b/README.md index eb219d9..cc29ac3 100644 --- a/README.md +++ b/README.md @@ -21,6 +21,7 @@ e.g. `terraform state rm 'google_project_iam_binding.for_lacework_service_accoun roles/browser roles/iam.securityReviewer roles/cloudasset.viewer +roles/policyanalyzer.activityAnalysisViewer ``` The following custom role is required depending on the integration level. @@ -50,6 +51,7 @@ cloudresourcemanager.googleapis.com storage-component.googleapis.com cloudasset.googleapis.com essentialcontacts.googleapis.com +policyanalyzer.googleapis.com ``` ## Requirements @@ -109,7 +111,7 @@ essentialcontacts.googleapis.com | [organization\_id](#input\_organization\_id) | The organization ID, required if org\_integration is set to true | `string` | `""` | no | | [prefix](#input\_prefix) | The prefix that will be use at the beginning of every generated resource | `string` | `"lw-cfg"` | no | | [project\_id](#input\_project\_id) | A project ID different from the default defined inside the provider | `string` | `""` | no | -| [required\_config\_apis](#input\_required\_config\_apis) | n/a | `map(any)` |
{
"bigquery": "bigquery.googleapis.com",
"cloudasset_inventory": "cloudasset.googleapis.com",
"compute": "compute.googleapis.com",
"containers": "container.googleapis.com",
"dns": "dns.googleapis.com",
"essentialcontacts": "essentialcontacts.googleapis.com",
"iam": "iam.googleapis.com",
"kms": "cloudkms.googleapis.com",
"logging": "logging.googleapis.com",
"pubsub": "pubsub.googleapis.com",
"resourcemanager": "cloudresourcemanager.googleapis.com",
"serviceusage": "serviceusage.googleapis.com",
"sqladmin": "sqladmin.googleapis.com",
"storage_component": "storage-component.googleapis.com"
}
| no | +| [required\_config\_apis](#input\_required\_config\_apis) | n/a | `map(any)` |
{
"bigquery": "bigquery.googleapis.com",
"cloudasset_inventory": "cloudasset.googleapis.com",
"compute": "compute.googleapis.com",
"containers": "container.googleapis.com",
"dns": "dns.googleapis.com",
"essentialcontacts": "essentialcontacts.googleapis.com",
"iam": "iam.googleapis.com",
"kms": "cloudkms.googleapis.com",
"logging": "logging.googleapis.com",
"policyanalyzer": "policyanalyzer.googleapis.com",
"pubsub": "pubsub.googleapis.com",
"resourcemanager": "cloudresourcemanager.googleapis.com",
"serviceusage": "serviceusage.googleapis.com",
"sqladmin": "sqladmin.googleapis.com",
"storage_component": "storage-component.googleapis.com"
}
| no | | [service\_account\_name](#input\_service\_account\_name) | The Service Account name (required when use\_existing\_service\_account is set to true). This can also be used to specify the new service account name when use\_existing\_service\_account is set to false | `string` | `""` | no | | [service\_account\_private\_key](#input\_service\_account\_private\_key) | The private key in JSON format, base64 encoded (required when use\_existing\_service\_account is set to true) | `string` | `""` | no | | [skip\_iam\_grants](#input\_skip\_iam\_grants) | Skip generation of custom role, and IAM grants to the Service Account, for customers who use IAM policy-as-code external to the Lacework module. WARNING - integration will fail if grants are not in place prior to execution. 'use\_existing\_service\_account' must also be set to `true` | `bool` | `false` | no | diff --git a/main.tf b/main.tf index 986fcd1..4f4daa5 100644 --- a/main.tf +++ b/main.tf @@ -23,13 +23,15 @@ locals { default_project_roles = local.skip_iam_grants ? [] : [ "roles/browser", "roles/iam.securityReviewer", - "roles/cloudasset.viewer" + "roles/cloudasset.viewer", + "roles/policyanalyzer.activityAnalysisViewer" ] default_organization_roles = local.skip_iam_grants ? [] : [ "roles/browser", "roles/iam.securityReviewer", - "roles/cloudasset.viewer" + "roles/cloudasset.viewer", + "roles/policyanalyzer.activityAnalysisViewer" ] // if org_integration is false, project_roles = local.default_project_roles @@ -54,6 +56,7 @@ locals { "roles/browser", "roles/iam.securityReviewer", "roles/cloudasset.viewer", + "roles/policyanalyzer.activityAnalysisViewer", google_organization_iam_custom_role.lacework_custom_organization_role.0.name ] ) : ( diff --git a/variables.tf b/variables.tf index 219f2d2..5350b70 100644 --- a/variables.tf +++ b/variables.tf @@ -60,6 +60,7 @@ variable "required_config_apis" { storage_component = "storage-component.googleapis.com" cloudasset_inventory = "cloudasset.googleapis.com" essentialcontacts = "essentialcontacts.googleapis.com" + policyanalyzer = "policyanalyzer.googleapis.com" } }