Likvid Bank Cloud Foundation
Foundation
  • Azure
  • AWS
  • IONOS
  • STACKIT
  • SAP BTP
  • GCP
Concepts
meshStack
Compliance
Foundation
  • Azure
  • AWS
  • IONOS
  • STACKIT
  • SAP BTP
  • GCP
Concepts
meshStack
Compliance
  • Azure
    • Azure Organization Hierarchy
    • Landing Zones

      • Sandbox Landing Zone
      • Cloud-Native Landing Zone
      • Corp and Online Landing Zones
        • Active Policies Corp
        • Active Policies Online
        • Compliance Statements
      • Container Platform Landing Zone
      • Lift & Shift Landing Zone
    • Building Blocks

      • Subscription Budget Alert
      • Connectivity
      • /platforms/azure/buildingblocks/github-repo/backplane.html
      • Starter Kit Building Block
    • Platform Administration

      • Cloud Foundation Deployment
      • Logging
      • Networking
      • Privileged Access Management
      • meshStack Integration
      • 🏗️ Building Blocks Automation Infrastructure

Corp and Online Landing Zones

Online: This is the dedicated Management Group for Online landing zones, meaning workloads that may require direct internet inbound/outbound connectivity or also for workloads that may not require a VNet.

Corp: This is the dedicated Management Group for Corp landing zones, meaning workloads that requires connectivity/hybrid connectivity with the corporate network thru the hub in the connectivity subscription.

Landing zones for application teams are placed under either

  • online - landing zones with internet access
  • corp - landing zones with on-prem network access

Active Policies Corp

PolicyEffectDescriptionRationale
Audit Private Link Private DNS Zone resourcesAuditAudits the deployment of Private Link Private DNS Zone resources in the Corp landing zone.This policy helps to ensure that Private Link Private DNS Zone resources are deployed correctly and securely. By auditing the deployment of these resources, we can identify any potential issues or vulnerabilities and take corrective action to mitigate them.
Configure Azure PaaS services to use private DNS zonesDeployThis policy initiative is a group of policies that ensures private endpoints to Azure PaaS services are integrated with Azure Private DNS zonesThis policy helps to ensure that Azure PaaS services are integrated with Azure Private DNS zones, which provides a reliable, secure DNS service to manage and resolve domain names in a virtual network without the need to add a custom DNS solution.
Deny the deployment of vWAN/ER/VPN gateway resourcesDenyDenies deployment of vWAN/ER/VPN gateway resources in the Corp landing zone.By denying these resources, we can ensure that all traffic to and from the resource is routed through the private network, which is more secure.
Public network access should be disabled for PaaS servicesDenyThis policy initiative is a group of policies that prevents creation of Azure PaaS services with exposed public endpointsBy disabling public network access, we can ensure that all traffic to and from the resource is routed through the private network, which is more secure.
Deny network interfaces having a public IP associatedDenyThis policy denies network interfaces from having a public IP associated to it under the assigned scope.By denying public IP addresses, we can ensure that all traffic to and from the resource is routed through the private network, which is more secure.

Active Policies Online

Service and Location Restrictions

PolicyEffectDescriptionRationale

Compliance Statements

  • Service and Location Restrictions: Restricts deployment of vWAN/ER/VPN gateway resources in the Corp landing zone Restricts creation of Azure PaaS services with exposed public endpoints Restricts network interfaces from having a public IP associated to it under the assigned scope
  • Centralized audit logs: Audits the deployment of Private Link Private DNS Zone resources in the Corp landing zone.
Prev
Cloud-Native Landing Zone
Next
Container Platform Landing Zone