Zones
Sysdig provides two zones by default:
- Entire Infrastructure: This applies to connected data sources. Create a new zone to update findings that are reported on the Compliance page.
- Entire Git: If you have configured Infrastructure as Code (IaC) scanning with Git integrations to your development pipeline in Git, then the Entire Git zone is automatically applied to those source repositories. You can also create more targeted zones for selected Git sources.
You can create more Zones to suit your organization’s needs.
Create and Configure a Zone
A completed Zone includes:
- Zone name and description
- Zone scope (the area of business to be included)
To create a Zone:
Log in to Sysdig Secure, and navigate to Inventory > Zones.
Click New Zone.
In the Main Info part of the Zone definition:
Enter a Zone Name
(Optional) Enter Zone Description.
In the Scopes part of the Zone definition you can create scopes.
- To create a new scope, click Add Scope and select from the available platforms and specify which attributes to include.
Click Save to save the Zone. The Zone will appear in the list of Zones.
Use of the Region scope may result in more data being shown to users in the Posture > Identity Management pages than defined in the Zone.
Available Scope Rule Attributes
Supported scope rule attributes vary according to platform:
AWS
- Organization
- Account
- Region
- Labels
Azure
- Organization
- Subscription
- Region
- Labels
GCP
- Organization
- Project
- Region
- Labels
Host
- Host Name (for Docker, Linux hosts)
- Cluster
- Agent Tags
Kubernetes
- Distribution (AKS, GKE, EKS, Vanilla Kubernetes)
- Cluster name
- Namespace
- Labels
- Agent Tags
Git
- Git integration
- Git source(s)
Image
- Registry
- Repository
Use Operators and Values
After the attribute, you can use operators and values.
Sysdig supports two operators:
in
:- Matches exact values. Use this to scope specific cluster names.
- For example, defining a scope,
Cluster
+in
+prd
, will only match the clusterprd
, if it exists. - You can match multiple values. For example, use the scope,
Cluster
+in
+prd
+demo
, to include the clustersprd
anddemo
.
contains
:- Matches a value inside a string. Use this to scope cluster names containing a given value.
- For example, defining a scope,
Cluster
+contains
+prd
, will include clusters such asmyApp-prd
,prd1
, andprd-sysdig
.
After the operator, select a value. Each value field has a limitation of 2048 characters per row. For longer values, consider adding scopes. This improves readability and maintenance of your scopes.
Auto-complete values will be based on resources that were scanned and listed in the Inventory.
Team Zones (CA)
Team Zones is in Controlled Availability. Contact Sysdig Support to request access. This is an experimental feature, and will not work for Vulnerability Management (VM) and Threat Detection.
Team Zones allow you to limit the scope of certain teams, restricting what a team can see to what is strictly necessary. This boosts security, following the principle of minimal privilege.
Zones are designed to replace Team Scopes. Unlike Team Scopes, Zones only have to be defined once, and can then be applied at will. Zones work for agentless cloud resources, as well as agent resources.
Enable Team Zones
Once Sysdig Support has granted you access to this feature, Admin users can enable Team Zones:
Log in to Sysdig Secure as an Admin.
Select Settings > User Profile.
Under Sysdig Labs, enable Zones based team scoping and Zones scoping for all features.
Click Save.
Zones based team scoping is now enabled.
Apply a Team Zone
To apply zones to teams:
Log in to Sysdig Secure.
Select Settings > Teams
Select an existing team, or select Add team to create a new team.
The Team configuration page appears.
- Under Zones, select All Zones, or select one or more zones under Selected Zones.
If you do not select a zone, the scope will default to the configuration entered under Team Scopes.
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.