Mission Landing Zone for Edge Technologies
Перейти к файлу
Shawn Gibbs 1a77f73c92
Shawngib/uploadf5scripts (#119)
* fixed windows stig PS1 in zip and add custom script to f5 for config

* modified linux custom script and derive fqdn from kv, also added back stig = true parameter

* added depends on to f5 kv policy so remote will wait

* changedf5 config_stig to stig and config seperate

* add stig option to F5

* added note to use publish script if not deploying to ASH

* modified to allow deployments in hyper scale in similar fashion as ASH

* added outputting blob URL as last line of running script

* added filter storage name to first 24 and force lowercase, people can still break it so best effort

* added check for length before running substring"

* corrected blob url output by removing trailing /

* Updated documentation

* Apply json changes

* Update Software Bill of Materials (SBOM)

Co-authored-by: Byron Boudreaux <16844071+Phydeauxman@users.noreply.github.com>
Co-authored-by: shawngib <shawngib@users.noreply.github.com>
Co-authored-by: GitHub <>
2022-03-07 08:47:23 -05:00
.devops Nightly Build and SBOM plugin (#98) 2022-02-17 17:59:32 -05:00
.github adding syndication and stig tooling via container (#59) 2022-01-26 12:05:38 -05:00
.vscode -Added workflows 2021-11-18 17:43:19 -05:00
_manifest Shawngib/uploadf5scripts (#119) 2022-03-07 08:47:23 -05:00
docs Shawngib/uploadf5scripts (#119) 2022-03-07 08:47:23 -05:00
images scope (#94) 2022-02-08 07:34:00 -05:00
src Shawngib/uploadf5scripts (#119) 2022-03-07 08:47:23 -05:00
.gitattributes Consolidate and Update Documentation (#93) 2022-02-07 11:41:59 -05:00
.gitignore Consolidate and Update Documentation (#93) 2022-02-07 11:41:59 -05:00
CODE_OF_CONDUCT.md CODE_OF_CONDUCT.md committed 2021-11-18 09:34:09 -08:00
CONTRIBUTING.MD Consolidate and Update Documentation (#93) 2022-02-07 11:41:59 -05:00
Dockerfile Consolidate and Update Documentation (#93) 2022-02-07 11:41:59 -05:00
LICENSE LICENSE committed 2021-11-18 09:34:09 -08:00
README.md Shawngib/uploadf5scripts (#119) 2022-03-07 08:47:23 -05:00
SECURITY.md Some minor changes (#41) 2022-01-25 15:32:40 -05:00
SUPPORT.md Updated documentation (#37) 2021-12-10 15:27:06 -05:00

README.md

Mission LZ - Edge

Mission Landing Zone Edge is a highly opinionated template which IT oversight organizations can used to deploy compliant enclaves on Azure Stack Hub stamps. It addresses a narrowly scoped, specific need for an SCCA compliant hub and spoke infrastructure.

Mission LZ Edge is:

  • Designed for US Gov mission customers
  • Implements SCCA requirements following Microsoft's SACA implementation guidance
  • Deployable on Azure Stack Hubs configured to connected or disconnected at all classification levels
  • A narrow scope for a specific common need
  • A simple solution with low configuration
  • Written in Bicep

Mission Landing Zone Edge is the right solution when:

  • A simple, secure, and repeatable hub and spoke infrastructure is needed
  • Various teams need separate, secure cloud environments administered by a central IT team
  • There is a need to implement SCCA
  • Hosting any workload requiring a secure environment, for example: data warehousing, AI/ML, or IaaS hosted workloads

Design goals include:

  • A simple, minimal set of code that is easy to configure
  • Good defaults that allow experimentation and testing in a single subscription
  • Deployment via command line

Our intent is to enable IT Admins to use this software to:

  • Test and evaluate the landing zone using a single Azure subscription
  • Deploy multiple customer workloads in production

** If you are interested in Mission Landing Zone for your Hyperscale solutions, check out the Mission Landing Zone repo **

Scope

Mission LZ Edge has the following scope:

  • Hub and spoke networking intended to comply with SCCA controls
  • Predefined spokes for identity, operations, shared services, and workloads
  • Ability to create multiple, isolated workloads
  • Remote access
  • Compatibility with SCCA compliance (and other compliance frameworks)
  • Security using standard Azure tools with sensible defaults
Mission LZ Edge Scope

Here's a summary of what Mission Landing Zone Edge deploys of as of February 2022:

Mission LZ as of December 2021

Networking

Networking is set up in a hub and spoke design, separated by tiers: T0 (Identity and Authorization), T1 (Infrastructure Operations), T2 (DevSecOps and Shared Services), and multiple T3s (Workloads). Access control can be configured to allow separation of duties between all tiers.

Mission LZ Networking

Subscriptions

Most customers will deploy each tier to a separate Azure subscription, but multiple subscriptions are not required. A single subscription deployment is good for a testing and evaluation, or possibly a small IT Admin team.

Firewall

All network traffic is directed through the firewall residing in the Network Hub resource group. The firewall is configured as the default route for all the T0 (Identity and Authorization) through T3 (workload/team environments) resource groups.

The default firewall configured for MLZ edge is a single F5 BIG-IP VE. Review the Configuring F5 README for detailed instructions on how to configure the F5.

Getting Started

  1. Prior to deploying the Mission Landing Zone Edge on a new install of Azure Stack Hub (ASH), the ASH marketplace must be populated with the necessary items to support the deployment. Review the Deployment Container README to set up Azure stack Hub with required artifacts.

  2. Review the Deployment Guide for Mission LZ Edge.

Product Roadmap

See the Projects page for the release timeline and feature areas.

Here's a summary of what Mission Landing Zone Edge deploys of as of February 2022:

Mission LZ as of December 2021 ## Nightly Build Status

Azure Government

Build Status

Contributing

This project welcomes contributions and suggestions. See our Contributing Guide for details.

Trademarks

This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow Microsoft's Trademark & Brand Guidelines. Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party's policies.