|
1 | 1 | # Pre-wired CBR configuration for FS Cloud
|
2 | 2 |
|
3 | 3 | This module creates default coarse-grained CBR rules in a given account following a "secure by default" approach - that is: deny all flows by default, except known documented communication in the [Financial Services Cloud Reference Architecture](https://cloud.ibm.com/docs/framework-financial-services?topic=framework-financial-services-vpc-architecture-about):
|
4 |
| -- Cloud Object Storage (COS) -> Key Management Service (KMS) |
5 |
| -- Block Storage -> Key Management Service (KMS) |
6 |
| -- IBM Cloud Kubernetes Service (IKS) -> Key Management Service (KMS) |
7 |
| -- All IBM Cloud Databases (ICD) services -> Key Management Service (KMS) |
| 4 | +- Cloud Object Storage (COS) -> Hyper Protect Crypto Services (HPCS) |
| 5 | +- Block Storage -> Hyper Protect Crypto Services (HPCS) |
| 6 | +- IBM Cloud Kubernetes Service (IKS) -> Hyper Protect Crypto Services (HPCS) |
| 7 | +- All IBM Cloud Databases (ICD) services -> Hyper Protect Crypto Services (HPCS) |
8 | 8 | - Activity Tracker route -> Cloud Object Storage (COS)
|
9 | 9 | - Virtual Private Clouds (VPCs) where clusters are deployed -> Cloud Object Storage (COS)
|
10 | 10 | - IBM Cloud VPC Infrastructure Services (IS) -> Cloud Object Storage (COS)
|
11 | 11 | - Virtual Private Cloud workload (eg: Kubernetes worker nodes) -> IBM Cloud Container Registry
|
12 | 12 | - IBM Cloud Databases (ICD) -> Hyper Protect Crypto Services (HPCS)
|
13 |
| -- IBM Cloud Kubernetes Service (IKS) -> IS (VPC Infrastructure Services) |
| 13 | +- IBM Cloud Kubernetes Service (IKS) -> VPC Infrastructure Services (IS) |
| 14 | +- Event Streams (Messagehub) -> Hyper Protect Crypto Services (HPCS) |
14 | 15 |
|
15 | 16 |
|
16 | 17 | **Note on KMS**: the module supports setting up rules for Key Protect, and Hyper Protect Crypto Services. By default the modules set rules for Hyper Protect Crypto Services, but this can be modified to use Key Protect, Hyper Protect, or both Key Protect and Hyper Protect Crypto Services using the input variable `kms_service_targeted_by_prewired_rules`.
|
@@ -92,7 +93,8 @@ module "cbr_fscloud" {
|
92 | 93 | | <a name="input_allow_at_to_cos"></a> [allow\_at\_to\_cos](#input\_allow\_at\_to\_cos) | Set rule for Activity Tracker to COS, default is true | `bool` | `true` | no |
|
93 | 94 | | <a name="input_allow_block_storage_to_kms"></a> [allow\_block\_storage\_to\_kms](#input\_allow\_block\_storage\_to\_kms) | Set rule for block storage to KMS, default is true | `bool` | `true` | no |
|
94 | 95 | | <a name="input_allow_cos_to_kms"></a> [allow\_cos\_to\_kms](#input\_allow\_cos\_to\_kms) | Set rule for COS to KMS, default is true | `bool` | `true` | no |
|
95 |
| -| <a name="input_allow_icd_to_kms"></a> [allow\_icd\_to\_kms](#input\_allow\_icd\_to\_kms) | Set rule for ICD to KMS, deafult is true | `bool` | `true` | no | |
| 96 | +| <a name="input_allow_event_streams_to_kms"></a> [allow\_event\_streams\_to\_kms](#input\_allow\_event\_streams\_to\_kms) | Set rule for Event Streams (Messagehub) to KMS, default is true | `bool` | `true` | no | |
| 97 | +| <a name="input_allow_icd_to_kms"></a> [allow\_icd\_to\_kms](#input\_allow\_icd\_to\_kms) | Set rule for ICD to KMS, default is true | `bool` | `true` | no | |
96 | 98 | | <a name="input_allow_iks_to_is"></a> [allow\_iks\_to\_is](#input\_allow\_iks\_to\_is) | Set rule for IKS to IS (VPC Infrastructure Services), default is true | `bool` | `true` | no |
|
97 | 99 | | <a name="input_allow_is_to_cos"></a> [allow\_is\_to\_cos](#input\_allow\_is\_to\_cos) | Set rule for IS (VPC Infrastructure Services) to COS, default is true | `bool` | `true` | no |
|
98 | 100 | | <a name="input_allow_roks_to_kms"></a> [allow\_roks\_to\_kms](#input\_allow\_roks\_to\_kms) | Set rule for ROKS to KMS, default is true | `bool` | `true` | no |
|
|
0 commit comments