copyright | lastupdated | keywords | subcollection | ||
---|---|---|---|---|---|
|
2024-07-22 |
secure-infrastructure-vpc |
{{site.data.keyword.attribute-definition-list}}
{: #plan}
Before you begin the deployment of a landing zone deployable architecture, make sure that you understand and meet the prerequisites. {: shortdesc}
{: #vpc-cloud-prereqs}
Complete the following steps before you deploy the VPC landing zone deployable architecture.
-
Confirm or set up an {{site.data.keyword.cloud_notm}} account:
Make sure that you have an {{site.data.keyword.cloud_notm}} Pay-As-You-Go or Subscription account:
- If you don't have an {{site.data.keyword.cloud_notm}} account, create one.
- If you have a Trial or Lite account, upgrade your account.
-
Configure your {{site.data.keyword.cloud_notm}} account:
- Log in to {{site.data.keyword.cloud_notm}} with the {{site.data.keyword.ibmid}} you used to set up the account. This {{site.data.keyword.ibmid}} user is the account owner and has full IAM access.
- Complete the company profile and contact information for the account. This profile is required to stay in compliance with {{site.data.keyword.cloud_notm}} Financial Services profile.
- Enable the Financial Services Validated option for your account.
- Enable virtual routing and forwarding (VRF) and service endpoints by creating a support case. Follow the instructions in enabling VRF and service endpoints.
{: #vpc-iam-prereqs}
- Set up account access ({{site.data.keyword.iamshort}} (IAM)):
-
Create an {{site.data.keyword.cloud_notm}} API key. The user who owns this key must have the Administrator role.
Service ID API keys are not supported for the Red Hat OpenShift Container Platform on VPC landing zone deployable architecture. {: tip}
-
For compliance with {{site.data.keyword.framework-fs_notm}}: Require users in your account to use multifactor authentication (MFA).
-
User access to {{site.data.keyword.cloud_notm}} resources is controlled by using the access policies that are assigned to access groups. For {{site.data.keyword.cloud_notm}} Financial Services validation, do not assign direct IAM access to any {{site.data.keyword.cloud_notm}} resources.
Select All Identity and Access enabled services when you assign access to the group.
-
{: #vpc-access-roles}
IAM access roles are required to install this deployable architecture and create all the required elements.
You need the following permissions for this deployable architecture:
- Create services from {{site.data.keyword.cloud_notm}} catalog.
- Create and modify {{site.data.keyword.vpc_short}} services, virtual server instances, networks, network prefixes, storage volumes, SSH keys, and security groups of this VPC.
- Create and modify {{site.data.keyword.cloud_notm}} direct links and {{site.data.keyword.tg_full_notm}}.
- Access existing {{site.data.keyword.cos_short}} services.
For information about configuring permissions, contact your {{site.data.keyword.cloud_notm}} account administrator.
{: #access-projects}
You can use {{site.data.keyword.cloud_notm}} projects as a deployment option. Projects are designed with infrastructure as code and compliance in mind to help ensure that your projects are managed, secure, and always compliant. For more information, see Learn about IaC deployments with projects.
You need the following access to create a project and create project tooling resources within the account. Make sure you have the following access:
- The Editor role on the Projects service.
- The Editor and Manager role on the {{site.data.keyword.bpshort}} service
- The Viewer role on the resource group for the project
For more information, see Assigning users access to projects.
{: #vpc-ssh-key}
Make sure that you have an SSH key that you can use for authentication. This key is used to log in to all virtual server instances that you create. For more information about creating SSH keys, see SSH keys.
{: #vpc-crypto-prereqs}
For key management services, you can use {{site.data.keyword.cloud_notm}} {{site.data.keyword.hscrypto}} instead of {{site.data.keyword.cos_full_notm}}. {{site.data.keyword.hscrypto}} is a dedicated key management service and hardware security module based on {{site.data.keyword.cloud_notm}} that enables keep your own key (KYOK) features.
By using {{site.data.keyword.hscrypto}}, your deployable architecture satisfies the requirements for the following controls:
- SC-13(0) - Cryptographic Protection
- SC-28(0) - Protection of Information at Rest
- SC-28(1) - Cryptographic Protection
For more information, see the security information in the VPC reference architecture for IBM Cloud for Financial Services.
It is not possible to update an existing deployable architecture from {{site.data.keyword.keymanagementserviceshort}} to {{site.data.keyword.hscrypto}}. You must create and deploy another deployable architecture. {:restriction: .restriction}
{: #vpc-hpcs-setup}
Before you deploy this deployable architecture, you need an instance of the Hyper Protect Crypto Services service.
-
You can provision {{site.data.keyword.hscrypto}} in one of two ways:
-
By using the {{site.data.keyword.cloud_notm}} {{site.data.keyword.hscrypto}}{: external} Terraform module.
-
By creating and initializing an instance directly.
- (Optional) Create a resource group for your instance.
- On the {{site.data.keyword.hscrypto}} details page, select a plan.
- Complete the required details and click Create.
-
-
Initialize {{site.data.keyword.hscrypto}}:
- If you used the {{site.data.keyword.cloud_notm}} {{site.data.keyword.hscrypto}} module, follow the steps in the module readme file{: external}.
- If you created the instance directly, follow the steps in Getting started with {{site.data.keyword.cloud_notm}} {{site.data.keyword.hscrypto}}.
For proof-of-technology environments, use the
auto-init
flag. For more information, see Initializing service instances using recovery crypto units. -
When you configure your deployable architecture, specify the resource group in the
hs_crypto_resource_group
input variable and the instance name in thehs_crypto_instance_name
variable. If you don't provide values for those variables, the default {{site.data.keyword.keymanagementserviceshort}} encryption is used.