Skip to content

Releases: Azure/CanadaPubSecALZ

v0.6.0

04 Jan 12:09
8b237e9
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v0.5.0...v0.6.0

v0.5.1

17 Dec 14:27
Compare
Choose a tag to compare

What's Changed

  • Update Bicep Linter rules & fix automation syntax (#124)

Full Changelog: v0.5.0...v0.5.1

v0.5.0

30 Nov 15:59
3db3d5f
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v0.4.0...v0.5.0

v0.4.0

01 Nov 10:46
ba12223
Compare
Choose a tag to compare

This release includes:

cc: @Vallentyne, @hudua, @SenthuranSivananthan, @skeeler, @obrien-j, @nataliakon, @mnigh

v0.3.0

30 Sep 22:24
4127275
Compare
Choose a tag to compare

This release is based on Azure Landing Zones for Canadian Public Sector version: v0.3.0 (September 2021 Release)

The purpose of the reference implementation is to guide Canadian Public Sector customers on building Landing Zones in their Azure environment. The reference implementation is based on Cloud Adoption Framework for Azure and provides an opinionated implementation that enables ITSG-33 regulatory compliance by using NIST SP 800-53 Rev. 4 and Canada Federal PBMM Regulatory Compliance Policy Sets.

Architecture supported up to Treasury Board of Canada Secretariat (TBS) Cloud Profile 3 - Cloud Only Applications. This profile is applicable to Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) with characteristics :

  • Cloud-based services hosting sensitive (up to Protected B) information
  • No direct system to system network interconnections required with GC data centers

Current release supports:

  • Supports Azure Policy Sets (customers are encouraged to review the compliance results and adjust their environment based on their requirements):
    • Azure Security Benchmark
    • Canada Federal Protected B (PBMM)
    • CIS Microsoft Foundation v1.3.0
    • HITRUST/HIPAA
    • NIST 800-53 R4 & NIST 800-53 R5
  • DDOS Standard Protection
  • Shared Azure Bastion in Hub
  • Shared Private DNS Zones in Hub
  • Bring-your-own DNS for Spoke subscriptions
  • Service Health alerts
  • Hub & Spoke networking with cloud-only access using Network Virtual Appliances (NVAs)
  • Hub & Spoke networking with cloud-only access using Azure Firewall (with and without forced tunneling)
  • 3 Archetypes:
    • Generic Subscription
    • Machine Learning
    • Healthcare
  • Azure DevOps Pipelines for:
    • Management Groups
    • Log Analytics
    • Azure Policies
    • Roles
    • Hub Networking - Fortinet Firewalls (only pay-as-you-go images)
    • Hub Networking - Azure Firewall & Azure Firewall Policy
    • Subscriptions (Archetypes)

cc: @adamlash, @Vallentyne, @hudua, @MG-Microsoft, @SenthuranSivananthan, @skeeler