You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
||`CIS 3.1`: Ensure 'Secure Transfer Required' set to 'Enabled' | Y ||
43
43
||`CIS 3.2`: Ensure 'Enable Infrastructure Encryption' set to 'Enabled' | Y ||
44
44
||`CIS 3.3`: Enable key rotation reminders for each storage account | N | Storage keys are not used for authentication |
@@ -55,16 +55,16 @@ This layer deploys the core components required for other layers, including a nu
55
55
||`CIS 8.5`: Ensure the key vault is recoverable | Y | Purge protection enabled for prod environments |
56
56
||`CIS 8.6`: Ensure RBAC enabled for Azure Key Vault | Y ||
57
57
||`CIS 8.7`: Ensure Private Endpoints are used for Azure Key Vault | Y | Public internet access disabled, PE into VNET |
58
-
||`CIS 10.1`: Ensure that resource locks are set for critical resources | TODO |https://github.com/UCLH-Foundry/FlowEHR/issues/124|
59
-
| Microsoft Defender for Cloud |`CIS 2.1`| N | TODO: Enable MS Defender for Cloud for the Prod subscription: https://github.com/UCLH-Foundry/FlowEHR/issues/174 . This is an 'org' level feature, and should be applied and managed at a subscription / management group level, by Subscription Owners. |
58
+
||`CIS 10.1`: Ensure that resource locks are set for critical resources | TODO |https://github.com/SAFEHR-data/FlowEHR/issues/124|
59
+
| Microsoft Defender for Cloud |`CIS 2.1`| N | TODO: Enable MS Defender for Cloud for the Prod subscription: https://github.com/SAFEHR-data/FlowEHR/issues/174 . This is an 'org' level feature, and should be applied and managed at a subscription / management group level, by Subscription Owners. |
60
60
||`CIS 2.1.2`: Ensure Microsoft Defender for App Services is set to 'On' | n/a | Set at org level |
61
61
||`CIS 2.1.4`: Ensure Microsoft Defender for Azure SQL Databases is set to 'On' | n/a | Set at org level |
62
62
||`CIS 2.1.5`: Ensure Microsoft Defender for Azure SQL Servers is set to 'On' | n/a | Set at org level |
63
63
||`CIS 2.1.7`: Ensure Microsoft Defender for Storage is set to 'On' | n/a | Set at org level |
64
64
||`CIS 2.1.8`: Ensure Microsoft Defender for Containers is set to 'On' | n/a | Set at org level |
65
65
||`CIS 2.1.9`: Ensure Microsoft Defender for Azure Cosmos DB is set to 'On' | n/a | Set at org level |
66
66
||`CIS 2.1.10`: Ensure Microsoft Defender for Key Vault is set to 'On' | n/a | Set at org level |
67
-
| Azure Log Analytics: <br/>`log-<suffix>`|`CIS 5`| TODO |https://github.com/UCLH-Foundry/FlowEHR/issues/187|
67
+
| Azure Log Analytics: <br/>`log-<suffix>`|`CIS 5`| TODO |https://github.com/SAFEHR-data/FlowEHR/issues/187|
||`CIS 5.1.4`: Ensure Diagnostic log storage container is encrypted with Customer Managed Key | N | System managed keys chosen to reduce management burden |
@@ -78,19 +78,19 @@ This layer deploys components required to ingest data, transform data, and save
||`CIS 4.1.1`: Ensure auditing is set to 'on' | Y |https://github.com/UCLH-Foundry/FlowEHR/issues/172|
81
+
||`CIS 4.1.1`: Ensure auditing is set to 'on' | Y |https://github.com/SAFEHR-data/FlowEHR/issues/172|
82
82
||`CIS 4.1.2`: Ensure no SQL databases allow ingress from 0.0.0.0/0 (any IP) | Y | All public access disabled |
83
83
||`CIS 4.1.3`: Ensure SQL uses Transparent Data Encryption with customer managed key | N | Decision was made to use Service Managed Key to decrease management overhead |
84
84
||`CIS 4.1.4`: Ensure AAD admin is configured | Y | Owner is an auto-created Service Principal account, with credentials saved in key vault |
85
85
||`CIS 4.1.5`: Ensure 'Data encryption' is set to 'on' | Y | Service Managed Key |
86
-
||`CIS 4.1.6`: Ensure that 'Auditing Retention' is set to 'Greater than 90 days' | Y |https://github.com/UCLH-Foundry/FlowEHR/issues/172|
87
-
||`CIS 4.2.1`: Ensure Microsoft Defender for SQL is set to 'on' | TODO |https://github.com/UCLH-Foundry/FlowEHR/issues/174|
86
+
||`CIS 4.1.6`: Ensure that 'Auditing Retention' is set to 'Greater than 90 days' | Y |https://github.com/SAFEHR-data/FlowEHR/issues/172|
87
+
||`CIS 4.2.1`: Ensure Microsoft Defender for SQL is set to 'on' | TODO |https://github.com/SAFEHR-data/FlowEHR/issues/174|
88
88
||`CIS 4.2.2 -> CIS 4.2.5`: Ensure Vulnerability Assessment is enabled by setting a storage account | Y ||
89
-
||`CIS 10.1`: Ensure that resource locks are set for critical resources | TODO |https://github.com/UCLH-Foundry/FlowEHR/issues/124|
89
+
||`CIS 10.1`: Ensure that resource locks are set for critical resources | TODO |https://github.com/SAFEHR-data/FlowEHR/issues/124|
||`CIS 8.3`: Ensure expiration is set for all secrets in RBAC vaults | N | No automated secret rotation in place as of yet. Will be taken care of as a manual background task. |
92
92
| Azure Databricks | Databricks is not referenced in the CIS benchmark || Below are some relevant security settings |
93
-
|| Network Isolation | Partial | - Databricks nodes are network isolated <br/>- Databricks control plane is internet accessible. This can and should be switched off when internal routing is in place: https://github.com/UCLH-Foundry/FlowEHR/issues/201|
93
+
|| Network Isolation | Partial | - Databricks nodes are network isolated <br/>- Databricks control plane is internet accessible. This can and should be switched off when internal routing is in place: https://github.com/SAFEHR-data/FlowEHR/issues/201|
94
94
|| Secret management | Y | Secrets are stored in Databricks private secret scopes. Due to API limitation, it was not possible to use Key Vault backed vaults |
95
95
| Azure Key Vault for Apps: <br/>`kv-<suffix>-serve`|`CIS 8`|[keyvault.tf](./infrastructure/serve/keyvault.tf)||
96
96
||`CIS 8.5`: Ensure the key vault is recoverable | Y | Purge protection enabled for prod environments |
@@ -119,7 +119,7 @@ This layer deploys components required to ingest data, transform data, and save
119
119
||`CIS 9.2`: Ensure all HTTP traffic is redirected to HTTPS | Y ||
120
120
||`CIS 9.3`: Ensure web apps are using latest version of TLS | Y ||
121
121
||`CIS 9.4`: Ensure web apps have 'Incoming Client Certificates' set to 'On' | N | Choice made not to use client cert auth due to a number of overheads |
122
-
||`CIS 6.4`: Ensure HTTPS access from the internet is evaluated and restricted | TODO |https://github.com/UCLH-Foundry/FlowEHR/issues/109|
122
+
||`CIS 6.4`: Ensure HTTPS access from the internet is evaluated and restricted | TODO |https://github.com/SAFEHR-data/FlowEHR/issues/109|
123
123
||`CIS 9.5`: Ensure that 'Registed with AAD' is 'On' | Y | MSI used for container registry |
124
124
||`CIS 9.10`: Ensure that FTP is disabled | Y ||
125
125
||`CIS 9.11`: Ensure Key Vaults are used to store secrets | Y ||
@@ -129,7 +129,7 @@ This layer deploys components required to ingest data, transform data, and save
129
129
||`CIS 4.5.3`: Ensure AAD Client Auth & RBAC are used where possible | Y ||
130
130
| App Insights: <br/>`ai-<suffix>`||||
131
131
||`CIS 5.3.1`: Ensure App Insights are configured | Y ||
132
-
| Background Storage Account for AML Registry |`CIS 3`||[aml.tf](./infrastructure/serve/aml.tf). [Issue to track here](https://github.com/UCLH-Foundry/FlowEHR/issues/285)|
132
+
| Background Storage Account for AML Registry |`CIS 3`||[aml.tf](./infrastructure/serve/aml.tf). [Issue to track here](https://github.com/SAFEHR-data/FlowEHR/issues/285)|
133
133
||`CIS 3.1`: Ensure 'Secure Transfer Required' set to 'Enabled' | Y ||
134
134
||`CIS 3.2`: Ensure 'Enable Infrastructure Encryption' set to 'Enabled' | Y ||
135
135
||`CIS 3.3`: Enable key rotation reminders for each storage account | N | Storage keys are not used for authentication |
Copy file name to clipboardExpand all lines: README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -137,7 +137,7 @@ This step will create an AAD Application and Service Principal in the specified
137
137
138
138
For CI deployments, due to certain resources being deployed within a Virtual Network with public access disabled, we need to use private build agents (also called self-hosted GitHub runners) to run our CI pipelines. We also need somewhere to store the associated container images and Terraform state within a vnet.
139
139
140
-
You can use [the Azure Bootstrap template](https://github.com/UCLH-Foundry/Azure-Bootstrap) to deploy all these resources, or alternatively, you can reference pre-existing resources in the following steps.
140
+
You can use [the Azure Bootstrap template](https://github.com/SAFEHR-data/Azure-Bootstrap) to deploy all these resources, or alternatively, you can reference pre-existing resources in the following steps.
141
141
142
142
5. Create a deployer identity (AAD App Registration/Service Principal) with required AAD permissions:
143
143
@@ -181,7 +181,7 @@ This step will create an AAD Application and Service Principal in the specified
181
181
182
182
### Next steps
183
183
184
-
- [Deploy a data transformation pipeline](https://github.com/UCLH-Foundry/FlowEHR-Data-Pot/blob/main/README.md)
184
+
- [Deploy a data transformation pipeline](https://github.com/SAFEHR-data/FlowEHR-Data-Pot/blob/main/README.md)
185
185
- [Configure and deploy a FlowEHR app](./apps/README.md)
At the end of the URL after `installations/`, you'll see a number. Record this down - it is your `GitHub App Installation Id`. (Believe it or not this is the easiest way to find it!)
0 commit comments