ref-scca-enclave-starter

所属分类:云计算
开发工具:JavaScript
文件大小:370KB
下载次数:0
上传日期:2023-06-12 14:03:45
上 传 者sh-1993
说明:  部署支持在...上运行的web应用程序的SCCA兼容中心辐射式飞地的参考实现...
(A reference implementation of an SCCA-compliant Mission Enclave landing zone that supports running Azure PaaS services using Azure NoOps.)

文件列表:
.devcontainer (0, 2023-10-18)
.devcontainer\DOCKERFILE (4597, 2023-10-18)
.devcontainer\devcontainer.json (1277, 2023-10-18)
.vscode (0, 2023-10-18)
.vscode\extensions.json (627, 2023-10-18)
.vscode\settings.json (501, 2023-10-18)
docs (0, 2023-10-18)
docs\07-Remote-State-Storage.md (5175, 2023-10-18)
docs\08-cleanup.md (1510, 2023-10-18)
docs\09-e2e-deployment-guide-githubaction.md (7242, 2023-10-18)
docs\10-manual-deployment-guide-terraform.md (34628, 2023-10-18)
docs\images (0, 2023-10-18)
docs\images\normalized-architecture.png (315565, 2023-10-18)
infrastructure (0, 2023-10-18)
infrastructure\terraform (0, 2023-10-18)
infrastructure\terraform\02-modules.management.groups.tf (1297, 2023-10-18)
infrastructure\terraform\03-modules.management.budgets.tf (1082, 2023-10-18)
infrastructure\terraform\04-modules.management.landing.zone.tf (17404, 2023-10-18)
infrastructure\terraform\05-modules.management.roles.tf (436, 2023-10-18)
infrastructure\terraform\06-modules.management.devsecops.tf (7195, 2023-10-18)
infrastructure\terraform\07-modules.management.sentinel.tf (2871, 2023-10-18)
infrastructure\terraform\08-modules.management.service.health.tf (2171, 2023-10-18)
infrastructure\terraform\09-modules.management.telemetry.tf (774, 2023-10-18)
infrastructure\terraform\data.tf (195, 2023-10-18)
infrastructure\terraform\deployment (0, 2023-10-18)
infrastructure\terraform\deployment\scripts (0, 2023-10-18)
... ...

# Azure NoOps Mission Enclave Landing Zone starter # Azure NoOps Mission Enclave Landing Zone starter is a highly opinionated Infrastructure-as-Code (IaC) Landing Zone which IT oversight organizations can use to create a cloud management system to deploy Azure environments for their workloads and teams. Azure NoOps Mission Enclave Landing Zone starter addresses a narrowly scoped, specific need for a Secure Cloud Computing Architecture (SCCA) compliant hub and spoke infrastructure. Goals of Azure NoOps Mission Enclave Landing Zone starter: - Designed for US Government mission customers that have a small number of teams to operate cloud environments for their workloads - Implements SCCA controls following Microsoft's [SACA](https://aka.ms/saca) implementation guidance - Deployable in Azure commercial, Azure Government, Azure Government Secret, and Azure Government Top Secret clouds - Written as [Terraform](./infrastructure/terraform/) templates - Ability to consume workloads addons such as TAK Server, web apps, Azure SQL Database, and Azure Kubernetes Service (AKS) - Use E2E [Github Actions](https://docs.github.com/en/actions/learn-github-actions/understanding-github-actions) as part of pipelines to automate the deployment and removal of the entire infrastructure on multiple environments on the Azure platform. ## Architecture ## The following picture shows the high-level architecture created by the Terraform modules included in this Azure NoOps Mission Enclave Landing Zone starter: ![Architecture](./docs/images/normalized-architecture.png) ## Deploy with GitHub ## You can deploy Azure NoOps Mission Enclave Landing Zone using the GitHub Actions. The GitHub Actions will deploy the infrastructure to the Azure subscription you have configured in the GitHub Secrets. You must have [Owner RBAC permissions](https://docs.microsoft.com/en-us/azure/role-based-access-control/built-in-roles#owner) to the subscription(s) you deploy Azure NoOps Mission Enclave Landing Zone into. Pick the below scenario to get started on the Mission Enclave Landing Zone implementation. This implementation has a detailed README.md that will walk you through the deployment steps. Manual Deployment Details: | Deployment Methodology | Manual Deployment | |--------------|--------------| |Terraform|[Published](./docs/manual-deployment-guide-terraform.md) >NOTE: Using manual deployment to deploy the infrastructure using the Terraform CLI. This is a good option if you want to learn how to deploy the infrastructure using Terraform CLI. E2E GitHub Deployment Details: | Deployment Methodology | GitHub Actions | Azure DevOps | |--------------|--------------|--------------| |Terraform|[Published](./docs/11-e2e-githubaction.md)| Coming soon | ## Importance of Separation of Duties (Azure NoOps Shared Responsibility Model) ## In this is a reference implementation, the repo is self contained and contains all the Terraform modules and configuration files to deploy the infrastructure on Azure. This does not take into account of roles. Azure NoOps Shared Responsibility Model pushes the need to separate roles. In a production environment, you will need to separate the Terraform modules and configuration files into different repositories. For example, you can have the following repositories: - A repository for the Management Layer Terraform modules (includes management groups, management service such as budgets, landing zones, and shared services) - A repository for the Management Policy Terraform modules - A repository for the Workload Terraform modules (includes workload spoke and workload services such as web app, and Azure SQL Database) The following picture shows the separation of duties for the Terraform modules and configuration files: ![Separation of Duties](./docs/images/separation-of-duties.png) It is important to understand how you would set this up for a production environment. The separation of duties is important to ensure that the Terraform modules can be reused across multiple environments and allows the right role to control changes. ## Policy ## Policy is a important piece of an Mission Enclave and required for a ATO to your environment. It is too broad of a topic to add to this reference implementation. If you are interested in learning more about how to apply policy to use in an Mission Enclave, you can use the following resources: - [Azure NoOps Policy Starter](https://github.com/azurenoops/ref-scca-enclave-policy-starter) However, you can use the following resources to learn more about policy in general: - [Azure Policy](https://docs.microsoft.com/en-us/azure/governance/policy/overview) ## Limitations ## ## Got feedback ## Please leverage issues if you have any feedback or request on how we can improve on this repository. ## Data Collection ## The software may collect information about you and your use of the software and send it to Microsoft. Microsoft may use this information to provide services and improve our products and services. You may turn off the telemetry as described in the repository. There are also some features in the software that may enable you and Microsoft to collect data from users of your applications. If you use these features, you must comply with applicable law, including providing appropriate notices to users of your applications together with a copy of Microsoft's privacy statement. Our privacy statement is located at . You can learn more about data collection and use in the help documentation and our privacy statement. Your use of the software operates as your consent to these practices. ## Contributing ## This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit . When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA. This project has adopted the [Microsoft Open Source Code of Conduct](https://opensource.microsoft.com/codeofconduct/). For more information see the [Code of Conduct FAQ](https://opensource.microsoft.com/codeofconduct/faq/) or contact [opencode@microsoft.com](mailto:opencode@microsoft.com) with any additional questions or comments. ## Legal Notices ## Microsoft and any contributors grant you a license to the Microsoft documentation and other content in this repository under the [Creative Commons Attribution 4.0 International Public License](https://creativecommons.org/licenses/by/4.0/legalcode), see the [LICENSE](LICENSE) file, and grant you a license to any code in the repository under the [MIT License](https://opensource.org/licenses/MIT), see the [LICENSE-CODE](LICENSE-CODE) file. Microsoft, Windows, Microsoft Azure and/or other Microsoft products and services referenced in the documentation may be either trademarks or registered trademarks of Microsoft in the United States and/or other countries. The licenses for this project do not grant you rights to use any Microsoft names, logos, or trademarks. Microsoft's general trademark guidelines can be found at . Privacy information can be found at Microsoft and any contributors reserve all other rights, whether under their respective copyrights, patents, or trademarks, whether by implication, estoppel or otherwise. ## Trademarks ## This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow [Microsoft's Trademark & Brand Guidelines](https://www.microsoft.com/legal/intellectualproperty/trademarks/usage/general). Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party's policies.

近期下载者

相关文件


收藏者