Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Broaden project scope to include Co-Lo #345

Open
noelmcloughlin opened this issue Jun 3, 2023 · 2 comments
Open

Broaden project scope to include Co-Lo #345

noelmcloughlin opened this issue Jun 3, 2023 · 2 comments

Comments

@noelmcloughlin
Copy link

noelmcloughlin commented Jun 3, 2023

Support Question

I see project scope is Infra-as-Code (IaC) and Compliance-as-Code (CaC) in Public Cloud .. i.e.

"Compliant Financial Infrastructure accelerates the development, deployment and adoption of services provided for AWS, Azure and Google in a way that meets existing regulatory and internal security controls. "

Investment Banks also use Bare Metal for low-latency and realtime workloads (Market edge/Co-Lo Equinix Data Centers) as Public Cloud is currently unsuitable. Maybe broadening scope of project could be considered. From technical perspective IaC examples include Ansible/Salt/Chef and CaC may include InSpec/Goss/Mondoo (p.s. I favor Ansible/InSpec but will look at Probr).

@eddie-knight
Copy link
Contributor

Hey @noelmcloughlin! Right now we have been primarily using Terraform and Ansible for IaC, and our CaC/validation toolkit is in very early stages (we have recently decided to move away from Probr due to a lack of active development on that project).

We have primarily determined our scope for CFI based on the availability of contribution, which has so far been focused on public cloud resources. Considering that, I'm happy to open up discussion around what it would look like to accept contributions on elements that are not within the currently documented scope. Do you have anything specific in mind?

@noelmcloughlin
Copy link
Author

noelmcloughlin commented Jun 26, 2023

Hey @eddie-knight
Sorry for delay (vacation, etc). I'm an individual member of FINOS and thinking about contributions. Browsing issues, I see some of my DevSecOps engineering interests mentioned: Azure, OCP, Containers, Runtime Validation, OSCAL. Good engineering interests me greatly.

Current documented scope is correct in terms of what is industry priority and community focus. However, I do believe that good CFI engineering practices and enterprise architecture are equally applicable to both public and private cloud. We could note private cloud/data center contributors, as documentation exercise is perhaps my core suggesting.

Good work by the way, CFI is interesting evolving project adding value.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants