Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cloud development policy #298

Open
wants to merge 30 commits into
base: main
Choose a base branch
from
Open

Cloud development policy #298

wants to merge 30 commits into from

Conversation

penwith
Copy link

@penwith penwith commented Nov 21, 2024

Not intended as a 'complete' policy - missing areas may already be planned, but all suggestions welcome

penwith and others added 30 commits December 19, 2023 09:14
…on to reflect that elasticsearch and APM are standard for logging and observability (#287)
* training section of cloud development policy

* cloud pilots license
* added order of preference for wiremock plus fixed capitalisation (#281)

* Create Test-Approach-TSR-Reviews.md (#285)

* Correcting the rings on the tech radar referenced by the tech governance policy (#283)

* Correcting the rings on the tech radar referenced by the tech governance policy, and some rewording for clarification.
* Include a link to the tech radar application on the tech governance page.

---------

Co-authored-by: nevillejrbrown <[email protected]>
Co-authored-by: Martin Rock-Evans <[email protected]>
* wip

* WIP

* IaC base

* push latest DDC changes

* add SC link

* adds Tagging policy

---------

Co-authored-by: bolt-io <[email protected]>
Co-authored-by: Callum Young <[email protected]>
Co-authored-by: skins-uk <[email protected]>
Co-authored-by: James Thomas <[email protected]>
* Initial pass of the Deployment policy

* Fix linting

* Add dependency check

* Update CloudDevelopmentPolicy.md

* Update CloudDevelopmentPolicy.md
Introduced a new "Centralized Secrets Management" section under "Secrets Management" with detailed guidelines on:
- Access Control: Use Azure RBAC and Key Vault Access Policies.
- Network Security: Enable Private or Service Endpoints.
- Secret Rotation and Expiration: Automate renewal and alerting.
- Audit and Monitoring: Enable and monitor access logs.
- Secure Application Integration: Use Managed Identities, remove hardcoded secrets.
- Compliance: Align with UK government standards.
- Exceptions: Require documented approval and risk assessment.

Co-authored-by: Jim <[email protected]>
Copy link

@srjames-ukho srjames-ukho left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Some comments, I'll have to come back to this later, I am getting word blindness

@srjames-ukho
Copy link

Thanks Jim. I will try to do another look through before the attending the Cloud Guild.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants