diff --git a/docs/cnspec/README.mdx b/docs/cnspec/README.mdx index e1558ae5..a83d2516 100644 --- a/docs/cnspec/README.mdx +++ b/docs/cnspec/README.mdx @@ -122,11 +122,11 @@ To learn how to sign up for a free Mondoo account and register cnspec, read [Log ## Learn more -- To get started with AWS, read [Assess AWS Security](/cnspec/cnspec-aws/). +- To get started with AWS, read [Assess AWS Security](/cnspec/cloud/aws). -- To get started with Google Cloud, read [Assess Google Cloud Security](/cnspec/cnspec-gcp/). +- To get started with Google Cloud, read [Assess Google Cloud Security](/cnspec/cloud/gcp/). -- To get started with Kubernetes, read [Assess Kubernetes Security](/cnspec/cnspec-k8s/). +- To get started with Kubernetes, read [Assess Kubernetes Security](/cnspec/cloud/k8s/). - To explore cnspec commands, read the [CLI Reference](/cnspec/cli/cnspec). diff --git a/docs/cnspec/cli/cnspec_scan.md b/docs/cnspec/cli/cnspec_scan.md index bd58c7fd..fd7d6cb9 100644 --- a/docs/cnspec/cli/cnspec_scan.md +++ b/docs/cnspec/cli/cnspec_scan.md @@ -39,7 +39,7 @@ cnspec scan ssh ec2-user@52.51.185.215:2222 cnspec scan aws --region us-east-1 ``` -To learn more, read [Assess AWS Security with cnspec](/cnspec/cnspec-aws/). +To learn more, read [Assess AWS Security with cnspec](/cnspec/cloud/aws). #### Scan Azure @@ -47,7 +47,7 @@ To learn more, read [Assess AWS Security with cnspec](/cnspec/cnspec-aws/). cnspec scan azure --subscription SUBSCRIPTION_ID --group GROUP_NAME ``` -To learn more, read [Assess Azure Security with cnspec](/cnspec/cnspec-azure/). +To learn more, read [Assess Azure Security with cnspec](/cnspec/cloud/azure/). #### Scan Google Cloud (GCP) @@ -55,7 +55,7 @@ To learn more, read [Assess Azure Security with cnspec](/cnspec/cnspec-azure/). cnspec scan gcp project PROJECT_ID ``` -To learn more, read [Assess Google Cloud Security with cnspec](/cnspec/cnspec-gcp/). +To learn more, read [Assess Google Cloud Security with cnspec](/cnspec/cloud/gcp/). #### Scan Kubernetes @@ -67,7 +67,7 @@ cnspec scan k8s cnspec scan k8s MANIFEST_FILE ``` -To learn more, read [Assess Kubernetes Security with cnspec](/cnspec/cnspec-k8s/). +To learn more, read [Assess Kubernetes Security with cnspec](/cnspec/cloud/k8s/). #### Scan Oracle Cloud Infrastructure (OCI) @@ -75,7 +75,7 @@ To learn more, read [Assess Kubernetes Security with cnspec](/cnspec/cnspec-k8s/ cnspec scan oci ``` -To learn more, read [Assess Oracle Cloud Infrastructure (OCI) Security with cnspec](/cnspec/cnspec-oci/). +To learn more, read [Assess Oracle Cloud Infrastructure (OCI) Security with cnspec](/cnspec/cloud/oci/). ### Examples: SaaS diff --git a/docs/cnspec/cli/cnspec_shell.md b/docs/cnspec/cli/cnspec_shell.md index 3dd733ec..4d66163c 100644 --- a/docs/cnspec/cli/cnspec_shell.md +++ b/docs/cnspec/cli/cnspec_shell.md @@ -23,7 +23,7 @@ cnspec shell [flags] cnspec shell aws ``` -To learn more, read [Assess AWS Security with cnspec](/cnspec/cnspec-aws/). +To learn more, read [Assess AWS Security with cnspec](/cnspec/cloud/aws). #### Query Azure @@ -31,7 +31,7 @@ To learn more, read [Assess AWS Security with cnspec](/cnspec/cnspec-aws/). cnspec shell azure --subscription SUBSCRIPTION_ID --group GROUP_NAME ``` -To learn more, read [Assess Azure Security with cnspec](/cnspec/cnspec-azure/). +To learn more, read [Assess Azure Security with cnspec](/cnspec/cloud/azure/). #### Query Google Cloud (GCP) @@ -39,7 +39,7 @@ To learn more, read [Assess Azure Security with cnspec](/cnspec/cnspec-azure/). cnspec shell gcp project PROJECT_ID ``` -To learn more, read [Assess Google Cloud Security with cnspec](/cnspec/cnspec-gcp/). +To learn more, read [Assess Google Cloud Security with cnspec](/cnspec/cloud/gcp/). #### Query Kubernetes @@ -47,7 +47,7 @@ To learn more, read [Assess Google Cloud Security with cnspec](/cnspec/cnspec-gc cnspec shell k8s ``` -To learn more, read [Assess Kubernetes Security with cnspec](/cnspec/cnspec-k8s/). +To learn more, read [Assess Kubernetes Security with cnspec](/cnspec/cloud/k8s/). #### Query Oracle Cloud Infrastructure (OCI) @@ -55,7 +55,7 @@ To learn more, read [Assess Kubernetes Security with cnspec](/cnspec/cnspec-k8s/ cnspec shell oci ``` -To learn more, read [Assess Oracle Cloud Infrastructure (OCI) Security with cnspec](/cnspec/cnspec-oci/). +To learn more, read [Assess Oracle Cloud Infrastructure (OCI) Security with cnspec](/cnspec/cloud/oci/). ### Examples: SaaS diff --git a/docs/cnspec/cnspec-aws/README.mdx b/docs/cnspec/cloud/aws/README.mdx similarity index 96% rename from docs/cnspec/cnspec-aws/README.mdx rename to docs/cnspec/cloud/aws/README.mdx index cd920cac..5b05c780 100644 --- a/docs/cnspec/cnspec-aws/README.mdx +++ b/docs/cnspec/cloud/aws/README.mdx @@ -1,6 +1,5 @@ --- title: Assess AWS Security with cnspec -id: cnspec-aws-intro sidebar_label: Get Started displayed_sidebar: cnspec sidebar_position: 1 @@ -41,6 +40,6 @@ cnspec returns `[ok]` to indicate that the test passed, and includes the actual ## Next step -You've successfully used cnspec to run your first check against your AWS account. Now you're ready to [assess your AWS environment.](/cnspec/cnspec-aws/cnspec-aws-account) +You've successfully used cnspec to run your first check against your AWS account. Now you're ready to [assess your AWS environment.](/cnspec/cloud/aws/account) --- diff --git a/docs/cnspec/cnspec-aws/cnspec-aws-account.mdx b/docs/cnspec/cloud/aws/account.mdx similarity index 97% rename from docs/cnspec/cnspec-aws/cnspec-aws-account.mdx rename to docs/cnspec/cloud/aws/account.mdx index 83472d9c..3c01f247 100644 --- a/docs/cnspec/cnspec-aws/cnspec-aws-account.mdx +++ b/docs/cnspec/cloud/aws/account.mdx @@ -1,6 +1,5 @@ --- title: Assess an AWS Account -id: cnspec-aws-account sidebar_label: Assess an AWS Account displayed_sidebar: cnspec sidebar_position: 20 @@ -8,7 +7,7 @@ description: Assess the security and compliance of an AWS account configuration image: /img/featured_img/mondoo-aws.jpg --- -Once you've ensured that [cnspec can access your AWS environment](/cnspec/cnspec-aws/), you can begin testing. The method you choose depends on your goals: +Once you've ensured that [cnspec can access your AWS environment](/cnspec/cloud/aws), you can begin testing. The method you choose depends on your goals: - For widescale assessment of your AWS infrastructure, scan using policy bundles. These collections of tests work together to present a broad picture of your AWS security posture. - To run ad hoc checks against your AWS environment, use cnspec's interactive shell. It has auto-complete to guide you, which is especially helpful when you're new to cnspec and learning MQL. @@ -189,6 +188,6 @@ To exit the cnspec shell, either press `Ctrl + D` or type `exit`. ## Next step -Now that you've scanned your AWS environment and run tests using the cnquery shell, you're ready to dive deeper and [test your EC2 instances](/cnspec/cnspec-aws/cnspec-aws-ec2/). +Now that you've scanned your AWS environment and run tests using the cnquery shell, you're ready to dive deeper and [test your EC2 instances](/cnspec/cloud/aws/ec2/). --- diff --git a/docs/cnspec/cnspec-aws/cnspec-aws-cloudshell.md b/docs/cnspec/cloud/aws/cloudshell.md similarity index 99% rename from docs/cnspec/cnspec-aws/cnspec-aws-cloudshell.md rename to docs/cnspec/cloud/aws/cloudshell.md index a1100653..15b31202 100644 --- a/docs/cnspec/cnspec-aws/cnspec-aws-cloudshell.md +++ b/docs/cnspec/cloud/aws/cloudshell.md @@ -2,7 +2,6 @@ title: Assess AWS Security from AWS CloudShell description: Learn how to install and configure cnspec in AWS CloudShell to run security scans against your AWS account. displayed_sidebar: cnspec -id: cnspec-aws-cloudshell sidebar_label: Assess AWS from CloudShell sidebar_position: 50 image: /img/featured_img/mondoo-aws.jpg diff --git a/docs/cnspec/cnspec-aws/cnspec-aws-ec2.mdx b/docs/cnspec/cloud/aws/ec2.mdx similarity index 89% rename from docs/cnspec/cnspec-aws/cnspec-aws-ec2.mdx rename to docs/cnspec/cloud/aws/ec2.mdx index 7dbce920..c13bebb3 100644 --- a/docs/cnspec/cnspec-aws/cnspec-aws-ec2.mdx +++ b/docs/cnspec/cloud/aws/ec2.mdx @@ -1,6 +1,5 @@ --- title: Assess an AWS EC2 Instance -id: cnspec-aws-ec2 sidebar_label: Assess an AWS EC2 Instance displayed_sidebar: cnspec sidebar_position: 30 @@ -8,9 +7,9 @@ description: Assess the security and compliance of an AWS EC2 instance image: /img/featured_img/mondoo-aws.jpg --- -Now that you have an introduction to [assessing your AWS security](/cnspec/cnspec-aws/cnspec-aws-account/) with cnspec, let's dive deeper and test EC2 instances. +Now that you have an introduction to [assessing your AWS security](/cnspec/cloud/aws/account/) with cnspec, let's dive deeper and test EC2 instances. -We'll continue working in the cnspec shell, which makes running individual queries easy. If it's not already open, enter `cnspec shell aws` in your terminal. To learn about accessing your AWS account with cnspec, read [Assess AWS Security](/cnspec/cnspec-aws/). +We'll continue working in the cnspec shell, which makes running individual queries easy. If it's not already open, enter `cnspec shell aws` in your terminal. To learn about accessing your AWS account with cnspec, read [Assess AWS Security](/cnspec/cloud/aws). ## EC2 resources @@ -67,6 +66,6 @@ aws.ec2.snapshots.all(createVolumePermission.none(_['Group'] == "all" )) ## Next step -To discover more of cnspec's AWS capabilities, [test your EKS clusters](/cnspec/cnspec-aws/cnspec-aws-eks/). +To discover more of cnspec's AWS capabilities, [test your EKS clusters](/cnspec/cloud/aws/eks/). --- diff --git a/docs/cnspec/cnspec-aws/cnspec-aws-eks.mdx b/docs/cnspec/cloud/aws/eks.mdx similarity index 88% rename from docs/cnspec/cnspec-aws/cnspec-aws-eks.mdx rename to docs/cnspec/cloud/aws/eks.mdx index 5f71bdde..c725fa31 100644 --- a/docs/cnspec/cnspec-aws/cnspec-aws-eks.mdx +++ b/docs/cnspec/cloud/aws/eks.mdx @@ -1,6 +1,5 @@ --- title: Assess an AWS EKS Cluster -id: cnspec-aws-eks sidebar_label: Assess an AWS EKS Cluster displayed_sidebar: cnspec sidebar_position: 40 @@ -8,9 +7,9 @@ description: Assess the security and compliance of an AWS EKS cluster image: /img/featured_img/mondoo-aws.jpg --- -Now that you have an introduction to [assessing your AWS account](/cnspec/cnspec-aws/cnspec-aws-account/) with cnspec and have tried an [EC2 test](/cnspec/cnspec-aws/cnspec-aws-ec2), let's dive deeper and test EKS clusters. +Now that you have an introduction to [assessing your AWS account](/cnspec/cloud/aws/account/) with cnspec and have tried an [EC2 test](/cnspec/cloud/aws/ec2), let's dive deeper and test EKS clusters. -We'll continue working in the cnspec shell, which makes running individual queries easy. If it's not already open, enter `cnspec shell aws` in your terminal. To learn about accessing your AWS account with cnspec, read [Assess AWS Security](/cnspec/cnspec-aws/). +We'll continue working in the cnspec shell, which makes running individual queries easy. If it's not already open, enter `cnspec shell aws` in your terminal. To learn about accessing your AWS account with cnspec, read [Assess AWS Security](/cnspec/cloud/aws/). ## EKS resources diff --git a/docs/cnspec/cnspec-aws/cnspec-aws-packer.mdx b/docs/cnspec/cloud/aws/packer.mdx similarity index 99% rename from docs/cnspec/cnspec-aws/cnspec-aws-packer.mdx rename to docs/cnspec/cloud/aws/packer.mdx index 072e5094..d6c40aee 100644 --- a/docs/cnspec/cnspec-aws/cnspec-aws-packer.mdx +++ b/docs/cnspec/cloud/aws/packer.mdx @@ -1,6 +1,5 @@ --- title: Build Secure AMIs with cnspec and HashiCorp Packer -id: cnspec-aws-packer sidebar_label: Build Secure AMIs with Packer displayed_sidebar: cnspec sidebar_position: 60 diff --git a/docs/cnspec/cnspec-azure/README.mdx b/docs/cnspec/cloud/azure/README.mdx similarity index 99% rename from docs/cnspec/cnspec-azure/README.mdx rename to docs/cnspec/cloud/azure/README.mdx index 01809b2b..dc3c56c3 100644 --- a/docs/cnspec/cnspec-azure/README.mdx +++ b/docs/cnspec/cloud/azure/README.mdx @@ -1,6 +1,5 @@ --- title: Assess Azure Security with cnspec -id: cnspec-azure-intro sidebar_label: Azure displayed_sidebar: cnspec sidebar_position: 1 diff --git a/docs/cnspec/cnspec-gcp/README.mdx b/docs/cnspec/cloud/gcp/README.mdx similarity index 96% rename from docs/cnspec/cnspec-gcp/README.mdx rename to docs/cnspec/cloud/gcp/README.mdx index 43f0478a..56c2d3f4 100644 --- a/docs/cnspec/cnspec-gcp/README.mdx +++ b/docs/cnspec/cloud/gcp/README.mdx @@ -1,6 +1,5 @@ --- title: Assess Google Cloud Security with cnspec -id: cnspec-gcp-intro sidebar_label: Get Started displayed_sidebar: cnspec sidebar_position: 1 @@ -14,7 +13,7 @@ cnspec can test any aspect of your GCP configuration. For a list of GCP resource :::info -You can also use cnspec with HashiCorp Packer to [build secure VM images in Google Cloud](/cnspec/cnspec-gcp/cnspec-gcp-packer/). +You can also use cnspec with HashiCorp Packer to [build secure VM images in Google Cloud](/cnspec/cloud/gcp/packer/). ::: @@ -90,7 +89,7 @@ cnspec returns `[ok]` to indicate that the test passed, and includes the actual You've successfully used cnspec to run your first check on your GCP environment. Now you're ready to explore. -Once you've ensured that [cnspec can access your GCP environment](/cnspec/cnspec-gcp/), you can begin testing. The method you choose depends on your goals: +Once you've ensured that [cnspec can access your GCP environment](/cnspec/cloud/gcp/), you can begin testing. The method you choose depends on your goals: - For widescale assessment of your GCP infrastructure, scan using policy bundles. These collections of tests work together to present a broad picture of your GCP security posture. - To run ad hoc checks against your GCP environment, use cnspec's interactive shell. It has auto-complete to guide you, which is especially helpful when you're new to cnspec and learning MQL. @@ -273,6 +272,6 @@ To exit the cnspec shell, either press `Ctrl + D` or type `exit`. ## Next step -Learn how to use [snapshot scanning](/cnspec/cnspec-gcp/gcp-snapshot/) to assess GCP instances without affecting your production workload. +Learn how to use [snapshot scanning](/cnspec/cloud/gcp/snapshot/) to assess GCP instances without affecting your production workload. --- diff --git a/docs/cnspec/cnspec-gcp/cnspec-gcp-packer.mdx b/docs/cnspec/cloud/gcp/packer.mdx similarity index 99% rename from docs/cnspec/cnspec-gcp/cnspec-gcp-packer.mdx rename to docs/cnspec/cloud/gcp/packer.mdx index 848e90d0..f571e514 100644 --- a/docs/cnspec/cnspec-gcp/cnspec-gcp-packer.mdx +++ b/docs/cnspec/cloud/gcp/packer.mdx @@ -1,6 +1,5 @@ --- title: Build Secure VM Images in Google Cloud with cnspec and HashiCorp Packer -id: cnspec-gcp-packer sidebar_label: Build Secure VMs with Packer displayed_sidebar: cnspec sidebar_position: 3 diff --git a/docs/cnspec/cnspec-gcp/gcp-snapshot.mdx b/docs/cnspec/cloud/gcp/snapshot.mdx similarity index 97% rename from docs/cnspec/cnspec-gcp/gcp-snapshot.mdx rename to docs/cnspec/cloud/gcp/snapshot.mdx index 1224cc62..ed75ad31 100644 --- a/docs/cnspec/cnspec-gcp/gcp-snapshot.mdx +++ b/docs/cnspec/cloud/gcp/snapshot.mdx @@ -1,6 +1,5 @@ --- title: Scan GCP Instances Using Snapshots -id: gcp-snapshot sidebar_label: Scan Instance Snapshots displayed_sidebar: cnspec sidebar_position: 2 @@ -85,4 +84,4 @@ cnquery scan gcp snapshot suse12 --project-id rover-123 ## Next step -Learn how you can [Build Secure VM Images in Google Cloud with cnspec and HashiCorp Packer](/cnspec/cnspec-gcp/cnspec-gcp-packer/). +Learn how you can [Build Secure VM Images in Google Cloud with cnspec and HashiCorp Packer](/cnspec/cloud/gcp/packer/). diff --git a/docs/cnspec/cnspec-k8s/README.mdx b/docs/cnspec/cloud/k8s/README.mdx similarity index 96% rename from docs/cnspec/cnspec-k8s/README.mdx rename to docs/cnspec/cloud/k8s/README.mdx index 6cb63275..928a7ff3 100644 --- a/docs/cnspec/cnspec-k8s/README.mdx +++ b/docs/cnspec/cloud/k8s/README.mdx @@ -1,6 +1,5 @@ --- title: Assess Kubernetes Security with cnspec -id: cnspec-k8s-intro sidebar_label: Get Started displayed_sidebar: cnspec sidebar_position: 1 @@ -45,6 +44,6 @@ This asserts that none of your deployments are named `foo`. cnspec returns a rep ## Next step -You've successfully used cnspec to run your first check against your Kubernetes infrastructure. Now you're ready to [explore more Kubernetes information.](/cnspec/cnspec-k8s/cnspec-k8s-cluster) +You've successfully used cnspec to run your first check against your Kubernetes infrastructure. Now you're ready to [explore more Kubernetes information.](/cnspec/cloud/k8s/cluster) --- diff --git a/docs/cnspec/cnspec-k8s/cnspec-k8s-cluster.mdx b/docs/cnspec/cloud/k8s/cluster.mdx similarity index 99% rename from docs/cnspec/cnspec-k8s/cnspec-k8s-cluster.mdx rename to docs/cnspec/cloud/k8s/cluster.mdx index e56c525e..66b02c91 100644 --- a/docs/cnspec/cnspec-k8s/cnspec-k8s-cluster.mdx +++ b/docs/cnspec/cloud/k8s/cluster.mdx @@ -1,6 +1,5 @@ --- title: Assess a Kubernetes Cluster -id: cnspec-k8s-cluster sidebar_label: Assess a Kubernetes Cluster displayed_sidebar: cnspec sidebar_position: 20 @@ -8,7 +7,7 @@ description: Assess the security and compliance of a Kubernetes cluster image: /img/featured_img/mondoo-k8s.jpg --- -Once you've ensured that [cnspec can access your Kubernetes environment](/cnspec/cnspec-k8s/), you can begin testing. The method you choose depends on your goals: +Once you've ensured that [cnspec can access your Kubernetes environment](/cnspec/cloud/k8s/), you can begin testing. The method you choose depends on your goals: - For widescale assessment of your Kubernetes infrastructure, scan using policy bundles. These collections of tests work together to present a broad picture of your Kubernetes security posture. - To run ad hoc checks against your Kubernetes environment, use cnspec's interactive shell. It has auto-complete to guide you, which is especially helpful when you're new to cnspec and learning MQL. @@ -1049,6 +1048,6 @@ To exit the cnspec shell, either press `Ctrl + D` or type `exit`. ## Next step -Now that you've scanned your Kubernetes environment and run tests using the cnquery shell, you're ready to dive deeper and [test Kubernetes manifests](/cnspec/cnspec-k8s/cnspec-k8s-manifest/). +Now that you've scanned your Kubernetes environment and run tests using the cnquery shell, you're ready to dive deeper and [test Kubernetes manifests](/cnspec/cloud/k8s/manifest/). --- diff --git a/docs/cnspec/cnspec-k8s/cnspec-k8s-manifest.mdx b/docs/cnspec/cloud/k8s/manifest.mdx similarity index 97% rename from docs/cnspec/cnspec-k8s/cnspec-k8s-manifest.mdx rename to docs/cnspec/cloud/k8s/manifest.mdx index 3620e964..af855861 100644 --- a/docs/cnspec/cnspec-k8s/cnspec-k8s-manifest.mdx +++ b/docs/cnspec/cloud/k8s/manifest.mdx @@ -1,6 +1,5 @@ --- title: Assess a Kubernetes Manifest -id: cnspec-k8s-manifest sidebar_label: Assess a Kubernetes Manifest displayed_sidebar: cnspec sidebar_position: 30 @@ -10,7 +9,7 @@ image: /img/featured_img/mondoo-k8s.jpg Use cnspec to scan Kubernetes manifests for security and best practices. You can assess manifests using the same policies that you rely on for testing your live clusters. -To scan a Kubernetes manifest, you need a Kubernetes policy. If you haven't already [downloaded the Kubernetes Security by Mondoo policy](/cnspec/cnspec-k8s/cnspec-k8s-cluster/#assess-kubernetes-security-with-policy-based-scanning), do so now. +To scan a Kubernetes manifest, you need a Kubernetes policy. If you haven't already [downloaded the Kubernetes Security by Mondoo policy](/cnspec/cloud/k8s/cluster/#assess-kubernetes-security-with-policy-based-scanning), do so now. From the directory where you downloaded the policy, run: diff --git a/docs/cnspec/cnspec-oci/README.mdx b/docs/cnspec/cloud/oci/README.mdx similarity index 99% rename from docs/cnspec/cnspec-oci/README.mdx rename to docs/cnspec/cloud/oci/README.mdx index c0e40393..a804aa28 100644 --- a/docs/cnspec/cnspec-oci/README.mdx +++ b/docs/cnspec/cloud/oci/README.mdx @@ -1,6 +1,5 @@ --- title: Assess Oracle Cloud Infrastructure (OCI) Security with cnspec -id: cnspec-oci-intro sidebar_label: OCI displayed_sidebar: cnspec sidebar_position: 1 diff --git a/docs/cnspec/cnspec-aws/_cnspec-aws-codebuild.mdx b/docs/cnspec/cnspec-aws/_cnspec-aws-codebuild.mdx deleted file mode 100644 index 74638082..00000000 --- a/docs/cnspec/cnspec-aws/_cnspec-aws-codebuild.mdx +++ /dev/null @@ -1,13 +0,0 @@ ---- -title: write me codebuild -id: cnspec-aws-codebuild -sidebar_label: write me codebuild -displayed_sidebar: cnspec -sidebar_position: 5 -description: write me codebuild -image: /img/featured_img/mondoo-aws.jpg ---- - -Write me! - ---- diff --git a/docs/cnspec/cnspec-oper/_category_.json b/docs/cnspec/cnspec-oper/_category_.json new file mode 100644 index 00000000..fe8a48a0 --- /dev/null +++ b/docs/cnspec/cnspec-oper/_category_.json @@ -0,0 +1,4 @@ +{ + "label": "Operating Systems", + "position": 1 +} diff --git a/docs/cnspec/home.md b/docs/cnspec/home.md index b96a35c7..a1aec0c5 100644 --- a/docs/cnspec/home.md +++ b/docs/cnspec/home.md @@ -22,13 +22,13 @@ Download and install cnspec on your assets. ### Get Started with: -- [AWS](/cnspec/cnspec-aws/) +- [AWS](/cnspec/cloud/aws/) -- [Azure](/cnspec/cnspec-azure/) +- [Azure](/cnspec/cloud/azure/) -- [GCP](/cnspec/cnspec-gcp/) +- [GCP](/cnspec/cloud/gcp/) -- [Kubernetes](/cnspec/cnspec-k8s/) +- [Kubernetes](/cnspec/cloud/k8s/) - [Linux](/cnspec/cnspec-oper/cnspec-linux-intro) diff --git a/docs/cnspec/supplychain/packer.md b/docs/cnspec/supplychain/packer.md index 1560de6d..68ae61c4 100644 --- a/docs/cnspec/supplychain/packer.md +++ b/docs/cnspec/supplychain/packer.md @@ -72,9 +72,9 @@ If you prefer to build the plugin from sources, clone the GitHub repository loca ## Learn more -- AWS users can [build secure AMIs with Mondoo and Packer](/cnspec/cnspec-aws/cnspec-aws-packer/). +- AWS users can [build secure AMIs with Mondoo and Packer](/cnspec/cloud/aws/packer/). -- Google Cloud users can [build secure VMs with Mondoo and Packer](/cnspec/cnspec-gcp/cnspec-gcp-packer) +- Google Cloud users can [build secure VMs with Mondoo and Packer](/cnspec/cloud/gcp/packer) - To learn more about how the MQL query language works, read [Write Effective MQL](/mql/mql.write/). diff --git a/docs/platform/infra/cloud/aws/aws-overview.mdx b/docs/platform/infra/cloud/aws/aws-overview.mdx index c487a5ad..88fb951c 100644 --- a/docs/platform/infra/cloud/aws/aws-overview.mdx +++ b/docs/platform/infra/cloud/aws/aws-overview.mdx @@ -18,7 +18,7 @@ The [Mondoo AWS Integration](/platform/infra/cloud/aws/aws-integration-scan) pro ## Scan during build time -[Build Secure AMIs with cnspec and HashiCorp Packer](/cnspec/cnspec-aws/cnspec-aws-packer/): Scan Linux and Windows HashiCorp Packer builds for vulnerabilities and security misconfigurations. Mondoo's plugin works with any of the supported Packer builders, including containers. +[Build Secure AMIs with cnspec and HashiCorp Packer](/cnspec/cloud/aws/packer/): Scan Linux and Windows HashiCorp Packer builds for vulnerabilities and security misconfigurations. Mondoo's plugin works with any of the supported Packer builders, including containers. ## Scan during run time diff --git a/docs/platform/infra/cloud/azure/overview.mdx b/docs/platform/infra/cloud/azure/overview.mdx index 56920c13..b507f400 100644 --- a/docs/platform/infra/cloud/azure/overview.mdx +++ b/docs/platform/infra/cloud/azure/overview.mdx @@ -26,7 +26,7 @@ With the API-driven Mondoo Azure Integration, you deploy the integration once an ## Scan during run time -- [Scan an Azure subscription from your workstation using cnspec](/cnspec/cnspec-azure/) +- [Scan an Azure subscription from your workstation using cnspec](/cnspec/cloud/azure/) - [Install cnspec via cloud-init](/platform/infra/opsys/automation/cloudinit.md) diff --git a/docs/platform/infra/cloud/gcp/overview.mdx b/docs/platform/infra/cloud/gcp/overview.mdx index 69651579..13722418 100644 --- a/docs/platform/infra/cloud/gcp/overview.mdx +++ b/docs/platform/infra/cloud/gcp/overview.mdx @@ -18,13 +18,13 @@ With the [Mondoo GCP Integration](/platform/infra/cloud/gcp/gcp-integration-scan ## Scan during build time -- [Build secure VM images in Google Cloud with cnspec and HashiCorp Packer](/cnspec/cnspec-gcp/cnspec-gcp-packer/) +- [Build secure VM images in Google Cloud with cnspec and HashiCorp Packer](/cnspec/cloud/gcp/packer/) - [Assess risk in the Google Cloud Container Registry](/cnspec/supplychain/registry/gcp_gcr.md) - [Build GCE custom images with HashiCorp Packer](/cnspec/supplychain/packer.md) ## Scan during run time -- [Scan a Google Cloud project with cnspec](/cnspec/cnspec-gcp/) +- [Scan a Google Cloud project with cnspec](/cnspec/cloud/gcp/) - [Terraform deployment](/cnspec/supplychain/terraform.md) - [Verify instances managed by Chef/AWS OpsWorks](/platform/infra/opsys/automation/chef.md) - [Verify instances managed by Ansible](/platform/infra/opsys/automation/ansible.md) diff --git a/docs/platform/infra/cloud/kubernetes/overview.md b/docs/platform/infra/cloud/kubernetes/overview.md index ecf0bffe..3edf5dae 100644 --- a/docs/platform/infra/cloud/kubernetes/overview.md +++ b/docs/platform/infra/cloud/kubernetes/overview.md @@ -16,9 +16,9 @@ Learn how to: - [Continuously Scan Kubernetes with the Mondoo Kubernetes Operator](/platform/infra/cloud/kubernetes/scan-kubernetes-with-operator) -- [Run ad hoc security Kubernetes scans from your workstation](/cnspec/cnspec-k8s/) +- [Run ad hoc security Kubernetes scans from your workstation](/cnspec/cloud/k8s/) -- [Scan Kubernetes manifests](/cnspec/cnspec-k8s/cnspec-k8s-manifest) +- [Scan Kubernetes manifests](/cnspec/cloud/k8s/manifest) - [Integrate Mondoo with CI/CD systems](/platform/infra/supply/cicd/overview) diff --git a/docs/platform/infra/cloud/kubernetes/scan-kubernetes-with-operator.md b/docs/platform/infra/cloud/kubernetes/scan-kubernetes-with-operator.md index 8be05342..5401bedf 100644 --- a/docs/platform/infra/cloud/kubernetes/scan-kubernetes-with-operator.md +++ b/docs/platform/infra/cloud/kubernetes/scan-kubernetes-with-operator.md @@ -13,7 +13,7 @@ The Mondoo Kubernetes Operator is Mondoo software that runs in your Kubernetes e - Scan new nodes as they come online -The operator includes a Kubernetes admission controller that performs a security scan on each deployment introduced into the cluster and reports the results. [Learn more.](/cnspec/cnspec-k8s/) +The operator includes a Kubernetes admission controller that performs a security scan on each deployment introduced into the cluster and reports the results. [Learn more.](/cnspec/cloud/k8s/) ### Add a Mondoo Kubernetes integration diff --git a/docs/platform/infra/supply/cicd/overview.md b/docs/platform/infra/supply/cicd/overview.md index d2fcf347..21661bd9 100644 --- a/docs/platform/infra/supply/cicd/overview.md +++ b/docs/platform/infra/supply/cicd/overview.md @@ -14,7 +14,7 @@ With Mondoo security scanning in CI/CD systems, you can: - Scan application container images (with [Docker](/cnspec/supplychain/docker/), for example) -- Scan [Kubernetes manifests](/cnspec/cnspec-k8s/cnspec-k8s-manifest/) +- Scan [Kubernetes manifests](/cnspec/cloud/k8s/manifest/) - Scan infrastructure as code configuration files (such as [Terraform configurations](/cnspec/supplychain/terraform/)) diff --git a/docusaurus.config.js b/docusaurus.config.js index fbf87274..aece27d7 100644 --- a/docusaurus.config.js +++ b/docusaurus.config.js @@ -5,6 +5,85 @@ const { themes } = require("prism-react-renderer"); const legacyRedirects = [ // NOTE: Path / is equivalent to https://mondoo.com/docs/ // + // march 2024 moved cnspec cloud content into one dir + { + from: "/cnspec/cnspec-aws/cnspec-aws-account", + to: "/cnspec/cloud/aws/account", + }, + { + from: "/cnspec/cnspec-aws/cnspec-aws-cloudshell", + to: "/cnspec/cloud/aws/cloudshell", + }, + { + from: "/cnspec/cnspec-aws/cnspec-aws-ec2", + to: "/cnspec/cloud/aws/ec2", + }, + { + from: "/cnspec/cnspec-aws/cnspec-aws-eks", + to: "/cnspec/cloud/aws/eks", + }, + { + from: "/cnspec/cnspec-aws/cnspec-aws-packer", + to: "/cnspec/cloud/aws/packer", + }, + { + from: "/cnspec/cnspec-aws/cnspec-aws-intro", + to: "/cnspec/cloud/aws", + }, + { + from: "/cnspec/cnspec-aws", + to: "/cnspec/cloud/aws", + }, + { + from: "/cnspec/cnspec-azure", + to: "/cnspec/cloud/azure", + }, + { + from: "/cnspec/cnspec-azure/cnspec-azure-intro", + to: "/cnspec/cloud/azure", + }, + { + from: "/cnspec/cnspec-gcp", + to: "/cnspec/cloud/gcp", + }, + { + from: "/cnspec/cnspec-gcp/cnspec-gcp-intro", + to: "/cnspec/cloud/gcp", + }, + { + from: "/cnspec/cnspec-gcp/cnspec-gcp-packer", + to: "/cnspec/cloud/gcp/packer", + }, + { + from: "/cnspec/cnspec-gcp/cnspec-gcp-snapshot", + to: "/cnspec/cloud/gcp/snapshot", + }, + { + from: "/cnspec/cnspec-k8s", + to: "/cnspec/cloud/k8s", + }, + { + from: "/cnspec/cnspec-k8s/cnspec-k8s-cluster", + to: "/cnspec/cloud/k8s/cluster", + }, + { + from: "/cnspec/cnspec-k8s/cnspec-k8s-intro", + to: "/cnspec/cloud/k8s", + }, + { + from: "/cnspec/cnspec-k8s/cnspec-k8s-manifest", + to: "/cnspec/cloud/k8s/manifest", + }, + { + from: "/cnspec/cnspec-oci", + to: "/cnspec/cloud/oci", + }, + { + from: "/cnspec/cnspec-oci/cnspec-oci-intro", + to: "/cnspec/cloud/oci", + }, + // + // and march 2024 move { from: "/getstarted/quickstart", to: "/platform/start/plat-start-acct", diff --git a/sidebars.js b/sidebars.js index e554ca59..b02f8a2e 100644 --- a/sidebars.js +++ b/sidebars.js @@ -263,47 +263,15 @@ module.exports = { items: [ { type: "category", - label: "AWS", - collapsed: true, - items: [ - { - type: "autogenerated", - dirName: "cnspec/cnspec-aws", // Generate sidebar slice - }, - ], - }, - { - type: "doc", - id: "cnspec/cnspec-azure/cnspec-azure-intro", - label: "Azure", - }, - { - type: "category", - label: "GCP", - collapsed: true, - items: [ - { - type: "autogenerated", - dirName: "cnspec/cnspec-gcp", // Generate sidebar slice - }, - ], - }, - { - type: "category", - label: "Kubernetes", + label: "Cloud", collapsed: true, items: [ { type: "autogenerated", - dirName: "cnspec/cnspec-k8s", // Generate sidebar slice + dirName: "cnspec/cloud", // Generate sidebar slice }, ], }, - { - type: "doc", - id: "cnspec/cnspec-oci/cnspec-oci-intro", - label: "Oracle Cloud Infrastructure (OCI)", - }, { type: "category", label: "Operating Systems",