You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+13-7Lines changed: 13 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,34 +20,40 @@ A list of the tooling that comes with the Kali distro and the extras that we hav
20
20
### Pre-requisite:
21
21
Within the AWS account you wish to deploy to.
22
22
23
+
- Ensure you have installed and configured aws-vault. More info: https://github.com/99designs/aws-vault
24
+
23
25
- Go to AWS Marketplace search for Kali and open a subscription.
24
26
25
-
-Assume the role of the aws account you wish to deploy to at your cli.
27
+
-Ensure you are using terraform `0.12.3`
26
28
27
-
*Note that this has already been done for the `security-vuln-testing`aws account*
29
+
- Assume the role of the aws account you wish to deploy to at your cli. If this is your first time, you will need to create an access key on the `gds-users` account to be able to assume role programatically. See aws doc: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_access-keys.html#Using_CreateAccessKey
28
30
29
-
### Deploy with the below commands
31
+
*Note that this has already been done for the `security-vuln-testing` aws account. If you are using another aws account, ensure you change line 6 on https://github.com/alphagov/penetration-testing-instance/blob/readme-update/terraform/main.tf to replace the s3 bucket name. Create the bucket manually before running the terraform template.*
0 commit comments