You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I see project scope is Infra-as-Code (IaC) and Compliance-as-Code (CaC) in Public Cloud .. i.e.
"Compliant Financial Infrastructure accelerates the development, deployment and adoption of services provided for AWS, Azure and Google in a way that meets existing regulatory and internal security controls. "
Investment Banks also use Bare Metal for low-latency and realtime workloads (Market edge/Co-Lo Equinix Data Centers) as Public Cloud is currently unsuitable. Maybe broadening scope of project could be considered. From technical perspective IaC examples include Ansible/Salt/Chef and CaC may include InSpec/Goss/Mondoo (p.s. I favor Ansible/InSpec but will look at Probr).
The text was updated successfully, but these errors were encountered:
Hey @noelmcloughlin! Right now we have been primarily using Terraform and Ansible for IaC, and our CaC/validation toolkit is in very early stages (we have recently decided to move away from Probr due to a lack of active development on that project).
We have primarily determined our scope for CFI based on the availability of contribution, which has so far been focused on public cloud resources. Considering that, I'm happy to open up discussion around what it would look like to accept contributions on elements that are not within the currently documented scope. Do you have anything specific in mind?
Hey @eddie-knight
Sorry for delay (vacation, etc). I'm an individual member of FINOS and thinking about contributions. Browsing issues, I see some of my DevSecOps engineering interests mentioned: Azure, OCP, Containers, Runtime Validation, OSCAL. Good engineering interests me greatly.
Current documented scope is correct in terms of what is industry priority and community focus. However, I do believe that good CFI engineering practices and enterprise architecture are equally applicable to both public and private cloud. We could note private cloud/data center contributors, as documentation exercise is perhaps my core suggesting.
Good work by the way, CFI is interesting evolving project adding value.
Support Question
I see project scope is Infra-as-Code (IaC) and Compliance-as-Code (CaC) in Public Cloud .. i.e.
"Compliant Financial Infrastructure accelerates the development, deployment and adoption of services provided for AWS, Azure and Google in a way that meets existing regulatory and internal security controls. "
Investment Banks also use Bare Metal for low-latency and realtime workloads (Market edge/Co-Lo Equinix Data Centers) as Public Cloud is currently unsuitable. Maybe broadening scope of project could be considered. From technical perspective IaC examples include Ansible/Salt/Chef and CaC may include InSpec/Goss/Mondoo (p.s. I favor Ansible/InSpec but will look at Probr).
The text was updated successfully, but these errors were encountered: