Skip to content

Commit d03cbcd

Browse files
authored
fix: diagram updates (#297)
1 parent a8715ac commit d03cbcd

File tree

12 files changed

+798
-95
lines changed

12 files changed

+798
-95
lines changed

.secrets.baseline

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"files": "go.sum|^.secrets.baseline$",
44
"lines": null
55
},
6-
"generated_at": "2023-03-21T18:27:02Z",
6+
"generated_at": "2023-03-23T08:47:18Z",
77
"plugins_used": [
88
{
99
"name": "AWSKeyDetector"
@@ -82,7 +82,7 @@
8282
"hashed_secret": "83b1c425484475e97934007eccb2277e9bdbd203",
8383
"is_secret": false,
8484
"is_verified": false,
85-
"line_number": 296,
85+
"line_number": 689,
8686
"type": "Secret Keyword",
8787
"verified_result": null
8888
}

examples/no-compute-example/README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,7 @@
11
# No compute example
22

3+
![vpc](../../reference-architectures/vpc.drawio.svg)
4+
35
This example shows how you can use the landing zone module to create a networking infrastructure layer without any compute resources (no VSI, nor OpenShift cluster).
46

57
The example deploys all the network components and associated compliance services that are defined in the [mixed](https://github.com/terraform-ibm-modules/terraform-ibm-landing-zone/tree/main/patterns/mixed) pattern, but does not deploy any compute resource (no VSI or any OpenShift cluster).
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
{"ibmcloud_api_key": $VALIDATION_APIKEY, "region": "us-south", "resource_tags": $TAGS, "prefix": $PREFIX}

examples/quickstart/README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,7 @@
11
# Quick start example
22

3+
![vsi-quickstart](../../reference-architectures/vsi-quickstart.drawio.svg)
4+
35
This example deploys the following infrastructure:
46

57
- An edge VPC with 1 VSI in one of the three subnets and a VPC load balancer in the edge VPC, exposing the VSI publicly.

ibm_catalog.json

Lines changed: 603 additions & 74 deletions
Large diffs are not rendered by default.

patterns/roks/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
This template allows a user to create a landing zone
44

5-
![roks](../../.docs/images/roks.png)
5+
![roks](../../reference-architectures/roks.drawio.svg)
66

77
## Module Variables
88

patterns/vsi/README.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,7 @@
22

33
This template allows a user to create a landing zone
44

5-
6-
![vsi](../../.docs/images/vsi.png)
5+
![vsi](../../reference-architectures/vsi-vsi.drawio.svg)
76

87
## Module Variables
98

reference-architectures/vpc.drawio.svg

Lines changed: 4 additions & 0 deletions
Loading

scc/v1/SLZ ROKS Custom v0.2.0.csv

Lines changed: 91 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,91 @@
1+
"profilename","SLZ ROKS Custom v0.2.0"
2+
"profilemnemonic",
3+
"profiledescription",""
4+
"##METAINFO ENDS##"
5+
"ExternalControlId","Description","Parent","ControlId","Tags"
6+
"AC","Access Control","","",""
7+
"AC-2","Account Management","AC","",""
8+
"AC-2(4)","Account Management | Automated Audit Actions","AC-2","3000118","IBM,COS"
9+
"AC-2(7)","Account Management | Role Based Schemes","AC-2","",""
10+
"AC-2(7)(b)","Monitors privileged role assignments","AC-2(7)","3000118","IBM,COS"
11+
"AC-2(a)","The organization: Identifies and selects the following types of information system accounts to support organizational missions or business functions: [Assignment: organization-defined information system account types]","AC-2","3000059","IBM,IAM"
12+
"AC-2(g)","The organization: Monitors the use of information system accounts","AC-2","3000118","IBM,COS"
13+
"AC-6","Least Privilege","AC","",""
14+
"AC-6(9)","Least Privilege | Auditing Use of Privileged Functions","AC-6","3000118","IBM,COS"
15+
"AC-7","Unsuccessful Logon Attempts","AC","",""
16+
"AC-7(a)","The information system: Enforce a limit of [Assignment: organization-defined number] consecutive invalid logon attempts by a user during a [Assignment: organization-defined time period]","AC-7","3000716,3000053","IBM,IAM,APPID"
17+
"AC-11","Session Lock","AC","",""
18+
"AC-11(1)","Session Lock | Pattern-Hiding Displays","AC-11","3000055","IBM,IAM"
19+
"AC-11(a)","The information system: Prevents further access to the system by initiating a session lock after [Assignment: organization-defined time period] of inactivity or upon receiving a request from a user","AC-11","3000049","IBM,IAM"
20+
"AC-11(b)","The information system: Retains the session lock until the user reestablishes access using established identification and authentication procedures.","AC-11","3000056","IBM,IAM"
21+
"AC-14","Permitted Actions Without Identification or Authentication","AC","",""
22+
"AC-14(a)","The organization: Identifies [Assignment: organization-defined user actions] that can be performed on the information system without identification or authentication consistent ...","AC-14","3000052,3000712,3000022","IBM,IAM,APPID"
23+
"AC-16","Security Attributes","AC","",""
24+
"AC-16(a)"," The organization: Provides the means to associate [Assignment: organization-defined types of security attributes] having [Assignment: organization-defined security attribute values] with information in storage, in process, and or in transmission","AC-16","3000057","IBM,IAM"
25+
"AC-17","Remote Access","AC","",""
26+
"AC-17(9)","Remote Access | Disconnect / Disable Access","AC-17","3000058","IBM,IAM"
27+
"AU","Audit and Accountability(AU)","","",""
28+
"AU-2","Audit Events","AU","",""
29+
"AU-2(a)","The organization: Determines that the information system is capable of auditing the following events: [Assignment: organization-defined auditable events]","AU-2","3000118,3000710","IBM,COS,APPID"
30+
"AU-2(d)","The organization: Determines that the following events are to be audited within The information system: [Assignment: organization-defined audited event...","AU-2","3000118,3000710","IBM,COS,APPID"
31+
"AU-3","Content of Audit Records","AU","3000118","IBM,COS"
32+
"AU-4","Audit Storage Capacity","AU","3000282,3000283","IBM,COS"
33+
"AU-8","Time stamps","AU","",""
34+
"AU-8(1)","Time Stamps | Synchronization with Authoritative Time Source","AU-8","",""
35+
"AU-8(1)(a)","The information system: Compares the internal information system clocks [Assignment: organization-defined frequency] with [Assignment: organization-defined authoritative time source]","AU-8(1)","3000118","IBM,COS"
36+
"AU-8(1)(b)","The information system: Synchronizes the internal system clocks to the authoritative time source when the time difference is greater than [Assignment: organization-defined time period]","AU-8(1)","3000118","IBM,COS"
37+
"AU-8(a)","The information system: Use internal system clocks to generate time stamps for audit records","AU-8","3000118","IBM,COS"
38+
"AU-8(b)","The information system: Records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT) and meets [Assignment: organization-defined granularity of time measurement]","AU-8","3000118","IBM,COS"
39+
"AU-12","Audit generation","AU","",""
40+
"AU-12(a)","The information system: Provide audit record generation capability for the event types the system is capable of auditing as defined in AU-2a on [Assignment: organization-defined system components]","AU-12","3000118","IBM,COS"
41+
"AU-12(b)","The information system: Allow [Assignment: organization-defined personnel or roles] to select the event types that are to be logged by specific components of the system","AU-12","3000118","IBM,COS"
42+
"AU-12(c)","The information system: Generates audit records for the events defined in AU-2 d. with the content defined in AU-3.","AU-12","3000118","IBM,COS"
43+
"CA","Security Assessment and Authorization(CA)","","",""
44+
"CA-2","Security Assessment","CA","",""
45+
"CA-2(2)","Control Assessments | Specialized Assessments","CA-2","3000611,3000601","IBM,TOOLCHAIN,VULNERABILITY_ADVISOR"
46+
"CA-7","Continuous Monitoring","CA","",""
47+
"CA-7(d)","The organization develops a continuous monitoring strategy and implements a continuous monitoring program that includes: d. Ongoing security status ...","CA-7","3000611,3000118,3000601","IBM,TOOLCHAIN,COS,VULNERABILITY_ADVISOR"
48+
"CM","Configuration Management(CM)","","",""
49+
"CM-2","Baseline Configuration","CM","3000478","CIS,IBM"
50+
"CM-8","Information System Component Inventory","CM","",""
51+
"CM-8(3)","System Component Inventory | Automated Unauthorized Component Detection","CM-8","",""
52+
"CM-8(3)(a)","The organization: Employs automated mechanisms [Assignment: organization-defined frequency] to detect the presence of unauthorized hardware, software, and firmware components within the information system","CM-8(3)","3000611,3000907,3000601,3000462,3000901","ROKS,IBM,TOOLCHAIN,CLUSTER,NETWORKING,VULNERABILITY_ADVISOR"
53+
"IA","Identification and Authentication(IA)","","",""
54+
"IA-2","Identification and Authentication (Organizational Users)","IA","",""
55+
"IA-2-0","The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).","IA-2","3000061,3000060,3000903","IBM,IAM,CLUSTER"
56+
"IA-4","Identifier Management","IA","",""
57+
"IA-4(b)","The organization manages information system identifiers by: Selecting an identifier that identifies an individual, group, role, or device.","IA-4","3000062,3000464,3000465,3000463,3000063","IBM,IAM,NETWORKING"
58+
"IA-4(c)","The organization manages information system identifiers by: Assigning the identifier to the intended individual, group, role, or device.","IA-4","3000062,3000464,3000465,3000463,3000063","IBM,IAM,NETWORKING"
59+
"IA-4(d)","The organization manages information system identifiers by: Preventing reuse of identifiers for [Assignment: organization-defined time period].","IA-4","3000064","IBM,IAM"
60+
"IA-5","Authenticator Management","IA","",""
61+
"IA-5(1)","Authenticator Management | Password-Based Authentication","IA-5","",""
62+
"IA-5(1)(a)","The information system, for password-based authentication: Enforces minimum password complexity of [Assignment: organization-defined requirements for case sensitivity, number of characters, mix of upper-case letters, lower-case letters, numbers...","IA-5(1)","3000006,3000714,3000002,3000003,3000713,3000007,3000004,3000001,3000008","IBM,IAM,APPID"
63+
"IA-5(1)(d)","The information system, for password-based authentication: Enforces password minimum and maximum lifetime restrictions of [Assignment: organization- defined numbers for lifetime minimum, lifetime maximum].","IA-5(1)","3000071,3000719","IBM,IAM,APPID"
64+
"IA-5(1)(e)","The information system, for password-based authentication: Prohibits password reuse for [Assignment: organization-defined number] generations.","IA-5(1)","3000715,3000005","IBM,IAM,APPID"
65+
"IA-5(b)","The organization manages information system authenticators by: Establishing initial authenticator content for authenticators defined by the organization","IA-5","3000075","IBM,IAM"
66+
"IA-5(f)","The organization manages information system authenticators by: Establishing minimum and maximum lifetime restrictions and reuse conditions for authenticators.","IA-5","3000718,3000067,3000068","IBM,IAM,APPID"
67+
"IA-6","Authenticator Feedback","IA","3000074","IBM,IAM"
68+
"RA","Risk Assessment","","",""
69+
"RA-5","Vulnerability Scanning","RA","",""
70+
"RA-5(1)","Vulnerability Monitoring and Scanning | Update Tool Capability","RA-5","3000611,3000601","IBM,TOOLCHAIN,VULNERABILITY_ADVISOR"
71+
"RA-5(2)","Vulnerability Scanning | Update by Frequency / Prior to New Scan / When Identified","RA-5","3000611,3000601","IBM,TOOLCHAIN,VULNERABILITY_ADVISOR"
72+
"RA-5(a)","The organization: Scans for vulnerabilities in the information system and hosted applications [Assignment: organization-defined frequency and/or randomly in accordance with organization-defined process] ...","RA-5","3000611,3000601","IBM,TOOLCHAIN,VULNERABILITY_ADVISOR"
73+
"SA","System and Services Acquisition(SA)","","",""
74+
"SA-10","Developer Configuration Management","SA","",""
75+
"SA-10(1)","Developer Configuration Management | Software / Firmware Integrity Verification","SA-10","3000611,3000601","IBM,TOOLCHAIN,VULNERABILITY_ADVISOR"
76+
"SC","System and Communication Protection(SC)","","",""
77+
"SC-2","Application Partitioning","SC","3000471,3000472","IBM,NETWORKING"
78+
"SC-3","Security Function Isolation","SC","3000471,3000472","IBM,NETWORKING"
79+
"SC-7-0","Boundary Protection","SC-7","3000478","CIS,IBM"
80+
"SC-7","Boundary Protection","SC","",""
81+
"SC-10","Network Disconnect","SC","3000050,3000724","IBM,IAM,APPID"
82+
"SI","System and Information Integrity(SI)","","",""
83+
"SI-2","Flaw Remediation","SI","",""
84+
"SI-2(2)","Flaw Remediation | Automated Flaw Remediation Status","SI-2","3000611,3000907,3000601,3000901","ROKS,IBM,TOOLCHAIN,CLUSTER,VULNERABILITY_ADVISOR"
85+
"SI-3","Malicious Code Protection","SI","",""
86+
"SI-3(a)","The organization: Employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code","SI-3","3000611,3000601","IBM,TOOLCHAIN,VULNERABILITY_ADVISOR"
87+
"SI-4","Information System Monitoring","SI","",""
88+
"SI-4(a)","The organization: Monitors the information system to detect:1. Attacks and indicators of potential attacks...; and 2. Unauthorized local, network, and remote connections.","SI-4","3000118,3000408","IBM,COS,NETWORKING"
89+
"SI-4(b)","The organization: Identifies unauthorized use of the information system through [Assignment: organization- defined techniques and methods].","SI-4","3000118,3000408","IBM,COS,NETWORKING"
90+
"SI-4(c)","The organization: Deploys monitoring devices: (i) strategically within the information system to collect organization-determined essential information; and (ii) at ad hoc locations ..","SI-4","3000118,3000408","IBM,COS,NETWORKING"
91+
"SI-12","Information Handling and Retention","SI","3000282,3000283","IBM,COS"

0 commit comments

Comments
 (0)