Likvid Bank Cloud Foundation
Foundation
  • Azure
  • AWS
  • IONOS
  • STACKIT
  • SAP BTP
  • GCP
Concepts
meshStack
Compliance
Foundation
  • Azure
  • AWS
  • IONOS
  • STACKIT
  • SAP BTP
  • GCP
Concepts
meshStack
Compliance
  • Azure
    • Azure Organization Hierarchy
    • Landing Zones

      • Sandbox Landing Zone
      • Cloud-Native Landing Zone
      • Corp and Online Landing Zones
      • Container Platform Landing Zone
      • Lift & Shift Landing Zone
    • Building Blocks

      • Subscription Budget Alert
      • Connectivity
      • /platforms/azure/buildingblocks/github-repo/backplane.html
      • Starter Kit Building Block
    • Platform Administration

      • Cloud Foundation Deployment
      • Logging
      • Networking
        • Hub and spoke vnet-peering
        • Subnets
        • Firewall deployment is not enabled.
        • Network Security Group Management
        • Compliance Statements
      • Privileged Access Management
      • meshStack Integration
      • 🏗️ Building Blocks Automation Infrastructure

Networking

Connection to the hub is the pre-requisite for getting access to the on-prem network.

The hub itself has the following address space 10.0.0.0/16.

Upon request, we will peer a VNet in your subscription with the hub.

All Firewall related logs are in the Log Anlytics Workspace

  • /subscriptions/e4a6af88-cd23-4785-acd6-d7221f755be7/resourceGroups/law-rg-likvid-foundation/providers/Microsoft.OperationalInsights/workspaces/log-analytics-workspace

Hub and spoke vnet-peering

nameaddress_spacedescription
glaskugel10.1.0.0/24Project Palantíri, stackholder Saruman
glaskugel10.2.1.0/24Project Palantíri dev, stackholder Saruman

Subnets

nameprefixes
Management10.0.192.0/18
GatewaySubnet10.0.64.0/18

Firewall deployment is not enabled.

Network Security Group Management

NameDirectionAccessProtocolSource Port RangeDestination Port RangeSource Address PrefixDestination Address Prefix
allow-sshInboundAllowTcp*22VirtualNetworkVirtualNetwork
allow-rdpInboundAllowTcp*3389VirtualNetworkVirtualNetwork

Access to the central Network Hub is granted on a need-to-know basis to Auditors and Cloud Foundation Team members. The following Entra ID groups control access and are used to implement Privileged Access Management.

groupdescription
cloudfoundation-network-adminsPrivileged Cloud Foundation group. Members have access to Azure network resources Logs.

Compliance Statements

no compliance statements provided

Prev
Logging
Next
Privileged Access Management