diff --git a/README.md b/README.md
index 4604d57c99343b1a070cb55b5adf82b8812e090b..50186f86d99d5107be190a6993c63cdd6301450b 100644
--- a/README.md
+++ b/README.md
@@ -211,6 +211,24 @@ $ terraform validate
 $ cat secure_agent.tfvars
 image_name="265723766240.dkr.ecr.us-east-1.amazonaws.com/enterprise-integrations/iics_secure_agent:git-8f6f0d24"
 
+# sample `secure_agent.tfvars` for production set up.
+$ cat prod.secure_agent.tvfars
+image_name="265723766240.dkr.ecr.us-east-1.amazonaws.com/enterprise-integrations/iics_secure_agent:git-8f6f0d24"
+aws_region="us-east-2"
+vpc_tags={"Name":"prod-tier","tier":"prod"}
+private_subnets_filter={"Name":"prod-private-*"}
+security_group={"Name":"internal","tier":"prod"}
+container_name="iics-secure-agent-prod"
+container_hostname="prod.ei.secureagent.doit.wisc.edu"
+ecs_iam_role="iics-secure-agent-iam-role-prod"
+ecs_execution_role="iics-secure-agent-ecs-execution-role-prod"
+ecs_cluster_tags={"Name":"iics-agent-cluster","tier":"prod"}
+ecs_task_tags={"Name":"iics-secure-agent","tier":"prod"}
+efs_tags={"Name":"iics-secure-agent","tier":"prod"}
+secure_agent_sg_tags={"Name":"secure-agent-efs-sg","tier":"prod"}
+iam_instance_profile="secure-agent-ecs-instance-profile-prod"
+iics_secret_access_policy="iics-secret-access-policy-prod"
+
 $ terraform plan -out agent.tfplan -var-file=<path>/<to>/secure_agent.tfvars
 $ terraform apply "agent.tfplan"
 ```