Skip to content

Commit 6011675

Browse files
authored
Rename references to old github organisation (#336)
1 parent acc9440 commit 6011675

File tree

9 files changed

+22
-22
lines changed

9 files changed

+22
-22
lines changed

.devcontainer/devcontainer.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@
2626
"ghcr.io/devcontainers/features/azure-cli:1.0.8": {
2727
"version": "2.47.0",
2828
"extensions": "ml"
29-
// extensions do not currently install, investigating in separate issue: https://github.com/UCLH-Foundry/FlowEHR/issues/286
29+
// extensions do not currently install, investigating in separate issue: https://github.com/SAFEHR-data/FlowEHR/issues/286
3030
},
3131
"ghcr.io/devcontainers/features/node:1": {},
3232
"ghcr.io/devcontainers/features/github-cli:1": {

CIS-Adherence.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -36,9 +36,9 @@ This layer deploys the core components required for other layers, including a nu
3636
| Azure Resource | CIS Reference | Adherence | Notes |
3737
|--|--|--|--|
3838
| Core Virtual Network: <br/>`vnet-<suffix>` | `CIS 6` | [network.tf](./infrastructure/core/network.tf) | Allows other resources to remain non-internet-accessible |
39-
| | `CIS 5.1.6`: Ensure NSG Flow Logs are captured and sent to Log Analytics | Y | https://github.com/UCLH-Foundry/FlowEHR/issues/187 |
40-
| | `CIS 6.6`: Ensure 'Network Watcher' is enabled for all networks | Y | https://github.com/UCLH-Foundry/FlowEHR/issues/187 |
41-
| Azure Storage Account for FlowEHR management: <br/>`strg<suffix>` | `CIS 3` | [main.tf](./infrastructure/core/main.tf) | Issues summarised https://github.com/UCLH-Foundry/FlowEHR/issues/176 |
39+
| | `CIS 5.1.6`: Ensure NSG Flow Logs are captured and sent to Log Analytics | Y | https://github.com/SAFEHR-data/FlowEHR/issues/187 |
40+
| | `CIS 6.6`: Ensure 'Network Watcher' is enabled for all networks | Y | https://github.com/SAFEHR-data/FlowEHR/issues/187 |
41+
| Azure Storage Account for FlowEHR management: <br/>`strg<suffix>` | `CIS 3` | [main.tf](./infrastructure/core/main.tf) | Issues summarised https://github.com/SAFEHR-data/FlowEHR/issues/176 |
4242
| | `CIS 3.1`: Ensure 'Secure Transfer Required' set to 'Enabled' | Y | |
4343
| | `CIS 3.2`: Ensure 'Enable Infrastructure Encryption' set to 'Enabled' | Y | |
4444
| | `CIS 3.3`: Enable key rotation reminders for each storage account | N | Storage keys are not used for authentication |
@@ -55,16 +55,16 @@ This layer deploys the core components required for other layers, including a nu
5555
| | `CIS 8.5`: Ensure the key vault is recoverable | Y | Purge protection enabled for prod environments |
5656
| | `CIS 8.6`: Ensure RBAC enabled for Azure Key Vault | Y | |
5757
| | `CIS 8.7`: Ensure Private Endpoints are used for Azure Key Vault | Y | Public internet access disabled, PE into VNET |
58-
| | `CIS 10.1`: Ensure that resource locks are set for critical resources | TODO | https://github.com/UCLH-Foundry/FlowEHR/issues/124 |
59-
| Microsoft Defender for Cloud | `CIS 2.1` | N | TODO: Enable MS Defender for Cloud for the Prod subscription: https://github.com/UCLH-Foundry/FlowEHR/issues/174 . This is an 'org' level feature, and should be applied and managed at a subscription / management group level, by Subscription Owners. |
58+
| | `CIS 10.1`: Ensure that resource locks are set for critical resources | TODO | https://github.com/SAFEHR-data/FlowEHR/issues/124 |
59+
| Microsoft Defender for Cloud | `CIS 2.1` | N | TODO: Enable MS Defender for Cloud for the Prod subscription: https://github.com/SAFEHR-data/FlowEHR/issues/174 . This is an 'org' level feature, and should be applied and managed at a subscription / management group level, by Subscription Owners. |
6060
| | `CIS 2.1.2`: Ensure Microsoft Defender for App Services is set to 'On' | n/a | Set at org level |
6161
| | `CIS 2.1.4`: Ensure Microsoft Defender for Azure SQL Databases is set to 'On' | n/a | Set at org level |
6262
| | `CIS 2.1.5`: Ensure Microsoft Defender for Azure SQL Servers is set to 'On' | n/a | Set at org level |
6363
| | `CIS 2.1.7`: Ensure Microsoft Defender for Storage is set to 'On' | n/a | Set at org level |
6464
| | `CIS 2.1.8`: Ensure Microsoft Defender for Containers is set to 'On' | n/a | Set at org level |
6565
| | `CIS 2.1.9`: Ensure Microsoft Defender for Azure Cosmos DB is set to 'On' | n/a | Set at org level |
6666
| | `CIS 2.1.10`: Ensure Microsoft Defender for Key Vault is set to 'On' | n/a | Set at org level |
67-
| Azure Log Analytics: <br/>`log-<suffix>` | `CIS 5` | TODO | https://github.com/UCLH-Foundry/FlowEHR/issues/187 |
67+
| Azure Log Analytics: <br/>`log-<suffix>` | `CIS 5` | TODO | https://github.com/SAFEHR-data/FlowEHR/issues/187 |
6868
| | `CIS 5.1.1`: Ensure Diagnostic setting exists (per resource) | TODO | |
6969
| | `CIS 5.1.2`: Ensure Diagnostic setting captures appropriate categories | TODO | |
7070
| | `CIS 5.1.4`: Ensure Diagnostic log storage container is encrypted with Customer Managed Key | N | System managed keys chosen to reduce management burden |
@@ -78,19 +78,19 @@ This layer deploys components required to ingest data, transform data, and save
7878
| Azure Resource | CIS Reference | Adherence | Notes |
7979
|--|--|--|--|
8080
| Azure SQL Server:<br/> `sql-server-features-suffix` | [feature-data-store.tf](./infrastructure/core/feature-data-store.tf) | |
81-
| | `CIS 4.1.1`: Ensure auditing is set to 'on' | Y | https://github.com/UCLH-Foundry/FlowEHR/issues/172 |
81+
| | `CIS 4.1.1`: Ensure auditing is set to 'on' | Y | https://github.com/SAFEHR-data/FlowEHR/issues/172 |
8282
| | `CIS 4.1.2`: Ensure no SQL databases allow ingress from 0.0.0.0/0 (any IP) | Y | All public access disabled |
8383
| | `CIS 4.1.3`: Ensure SQL uses Transparent Data Encryption with customer managed key | N | Decision was made to use Service Managed Key to decrease management overhead |
8484
| | `CIS 4.1.4`: Ensure AAD admin is configured | Y | Owner is an auto-created Service Principal account, with credentials saved in key vault |
8585
| | `CIS 4.1.5`: Ensure 'Data encryption' is set to 'on' | Y | Service Managed Key |
86-
| | `CIS 4.1.6`: Ensure that 'Auditing Retention' is set to 'Greater than 90 days' | Y | https://github.com/UCLH-Foundry/FlowEHR/issues/172 |
87-
| | `CIS 4.2.1`: Ensure Microsoft Defender for SQL is set to 'on' | TODO | https://github.com/UCLH-Foundry/FlowEHR/issues/174 |
86+
| | `CIS 4.1.6`: Ensure that 'Auditing Retention' is set to 'Greater than 90 days' | Y | https://github.com/SAFEHR-data/FlowEHR/issues/172 |
87+
| | `CIS 4.2.1`: Ensure Microsoft Defender for SQL is set to 'on' | TODO | https://github.com/SAFEHR-data/FlowEHR/issues/174 |
8888
| | `CIS 4.2.2 -> CIS 4.2.5`: Ensure Vulnerability Assessment is enabled by setting a storage account | Y | |
89-
| | `CIS 10.1`: Ensure that resource locks are set for critical resources | TODO | https://github.com/UCLH-Foundry/FlowEHR/issues/124 |
89+
| | `CIS 10.1`: Ensure that resource locks are set for critical resources | TODO | https://github.com/SAFEHR-data/FlowEHR/issues/124 |
9090
| Azure Key Vault Secrets | | [secrets.tf](./infrastructure/transform/secrets.tf) |
9191
| | `CIS 8.3`: Ensure expiration is set for all secrets in RBAC vaults | N | No automated secret rotation in place as of yet. Will be taken care of as a manual background task. |
9292
| Azure Databricks | Databricks is not referenced in the CIS benchmark | | Below are some relevant security settings |
93-
| | Network Isolation | Partial | - Databricks nodes are network isolated <br/>- Databricks control plane is internet accessible. This can and should be switched off when internal routing is in place: https://github.com/UCLH-Foundry/FlowEHR/issues/201 |
93+
| | Network Isolation | Partial | - Databricks nodes are network isolated <br/>- Databricks control plane is internet accessible. This can and should be switched off when internal routing is in place: https://github.com/SAFEHR-data/FlowEHR/issues/201 |
9494
| | Secret management | Y | Secrets are stored in Databricks private secret scopes. Due to API limitation, it was not possible to use Key Vault backed vaults |
9595
| Azure Key Vault for Apps: <br/>`kv-<suffix>-serve` | `CIS 8` | [keyvault.tf](./infrastructure/serve/keyvault.tf) | |
9696
| | `CIS 8.5`: Ensure the key vault is recoverable | Y | Purge protection enabled for prod environments |
@@ -119,7 +119,7 @@ This layer deploys components required to ingest data, transform data, and save
119119
| | `CIS 9.2`: Ensure all HTTP traffic is redirected to HTTPS | Y | |
120120
| | `CIS 9.3`: Ensure web apps are using latest version of TLS | Y | |
121121
| | `CIS 9.4`: Ensure web apps have 'Incoming Client Certificates' set to 'On' | N | Choice made not to use client cert auth due to a number of overheads |
122-
| | `CIS 6.4`: Ensure HTTPS access from the internet is evaluated and restricted | TODO | https://github.com/UCLH-Foundry/FlowEHR/issues/109 |
122+
| | `CIS 6.4`: Ensure HTTPS access from the internet is evaluated and restricted | TODO | https://github.com/SAFEHR-data/FlowEHR/issues/109 |
123123
| | `CIS 9.5`: Ensure that 'Registed with AAD' is 'On' | Y | MSI used for container registry |
124124
| | `CIS 9.10`: Ensure that FTP is disabled | Y | |
125125
| | `CIS 9.11`: Ensure Key Vaults are used to store secrets | Y | |
@@ -129,7 +129,7 @@ This layer deploys components required to ingest data, transform data, and save
129129
| | `CIS 4.5.3`: Ensure AAD Client Auth & RBAC are used where possible | Y | |
130130
| App Insights: <br/>`ai-<suffix>` | | | |
131131
| | `CIS 5.3.1`: Ensure App Insights are configured | Y | |
132-
| Background Storage Account for AML Registry | `CIS 3` | | [aml.tf](./infrastructure/serve/aml.tf). [Issue to track here](https://github.com/UCLH-Foundry/FlowEHR/issues/285) |
132+
| Background Storage Account for AML Registry | `CIS 3` | | [aml.tf](./infrastructure/serve/aml.tf). [Issue to track here](https://github.com/SAFEHR-data/FlowEHR/issues/285) |
133133
| | `CIS 3.1`: Ensure 'Secure Transfer Required' set to 'Enabled' | Y | |
134134
| | `CIS 3.2`: Ensure 'Enable Infrastructure Encryption' set to 'Enabled' | Y | |
135135
| | `CIS 3.3`: Enable key rotation reminders for each storage account | N | Storage keys are not used for authentication |

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ This step will create an AAD Application and Service Principal in the specified
137137

138138
For CI deployments, due to certain resources being deployed within a Virtual Network with public access disabled, we need to use private build agents (also called self-hosted GitHub runners) to run our CI pipelines. We also need somewhere to store the associated container images and Terraform state within a vnet.
139139

140-
You can use [the Azure Bootstrap template](https://github.com/UCLH-Foundry/Azure-Bootstrap) to deploy all these resources, or alternatively, you can reference pre-existing resources in the following steps.
140+
You can use [the Azure Bootstrap template](https://github.com/SAFEHR-data/Azure-Bootstrap) to deploy all these resources, or alternatively, you can reference pre-existing resources in the following steps.
141141

142142
5. Create a deployer identity (AAD App Registration/Service Principal) with required AAD permissions:
143143

@@ -181,7 +181,7 @@ This step will create an AAD Application and Service Principal in the specified
181181

182182
### Next steps
183183

184-
- [Deploy a data transformation pipeline](https://github.com/UCLH-Foundry/FlowEHR-Data-Pot/blob/main/README.md)
184+
- [Deploy a data transformation pipeline](https://github.com/SAFEHR-data/FlowEHR-Data-Pot/blob/main/README.md)
185185
- [Configure and deploy a FlowEHR app](./apps/README.md)
186186

187187

apps/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Once created, you need to the install the app to the organization. [Follow these
4545
After installation, stay on the same page and check the URL. It should look like this:
4646

4747
```
48-
https://github.com/organizations/UCLH-Foundry/settings/installations/123456789
48+
https://github.com/organizations/SAFEHR-data/settings/installations/123456789
4949
```
5050

5151
At the end of the URL after `installations/`, you'll see a number. Record this down - it is your `GitHub App Installation Id`. (Believe it or not this is the easiest way to find it!)

apps/apps.infra-test.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,6 @@ flowehr_cicd_test:
33
add_testing_slot: false
44
managed_repo:
55
private: false
6-
template: UCLH-Foundry/Dash-Seedling
6+
template: SAFEHR-data/Dash-Seedling
77
auth:
88
easy_auth: true

apps/apps.sample.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ dash_seedling: # unique ID for the app
2626
octokitten: an_aad_user@mycompany.com
2727
managed_repo: # details for repo to create/manage
2828
private: false # repo visibility
29-
template: UCLH-Foundry/Dash-Seedling # template to use in format GH_ORG/TEMPLATE_NAME
29+
template: SAFEHR-data/Dash-Seedling # template to use in format GH_ORG/TEMPLATE_NAME
3030
branch: # details of the branch created with a name: <environment>
3131
num_of_approvals: 1
3232
env: # any env vars to pass to the app container

config.infra-test.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ private_dns_zones_rg: rg-bootstrap-uclh-ci-dev
77
transform:
88
spark_version: 3.4
99
repositories:
10-
- url: https://github.com/UCLH-Foundry/FlowEHR-Data-Pot
10+
- url: https://github.com/SAFEHR-data/FlowEHR-Data-Pot
1111
datalake:
1212
zones:
1313
- Bronze

infrastructure/transform/feature-data-store.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ resource "azurerm_mssql_server_transparent_data_encryption" "sql_server_features
8282
}
8383

8484
# Azure SQL database, basic + small for dev
85-
# TODO: Rightsize for prod -> https://github.com/UCLH-Foundry/FlowEHR/issues/63
85+
# TODO: Rightsize for prod -> https://github.com/SAFEHR-data/FlowEHR/issues/63
8686
resource "azurerm_mssql_database" "feature_database" {
8787
name = "sql-db-features"
8888
server_id = azurerm_mssql_server.sql_server_features.id

shared.hcl

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ inputs = merge(
6868
}
6969
})
7070

71-
# Databricks cluster deployment failures are transient. https://github.com/UCLH-Foundry/FlowEHR/issues/141
71+
# Databricks cluster deployment failures are transient. https://github.com/SAFEHR-data/FlowEHR/issues/141
7272
retryable_errors = [
7373
"cannot create cluster", # databricks
7474
"Waiting for deletion of application" # AD application

0 commit comments

Comments
 (0)