Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Group

Content

High-level permissions

Main

Primary resources needed to run (blue star) but no resources that contain data

The responsible party (can be Unique or the client, see Responsibilities) mostly works within this resource group if ever.

Sensitive

All customer data which mainly consists of prompts and files, all the embedding of uploaded files, encryption keys

Unique should have the least possible privilege (and only JIT) of to this group. Actually, no human should have too much access to this, see Automation.

Audit

Centralised, tamper-safe audit logs of (blue star)

Unique and their workloads can only one-way emit into this resource group, there is no way to read. Modifications to this resource group should preferably only be made by the client or via Automation.

Vnet

Networking setup, whereof some limited internet access is needed to pull the content of Release Content https://unique-ch.atlassian.net/wiki/spaces/PUB/pages/436536544

Naturally most clients prefer to administer this part of the infrastructure themselves as it has a colossal security impact, if Unique should take care of it, the Automation approach is recommended above all manual actions

Terraform

Store terraform states

Few individuals with a specific role or the Automation should have access to this group as here the state of the whole infrastructure gets saved.

...

Gliffy
baseUrlhttps://unique-ch.atlassian.net/wiki
namerole-high-level
pageid298254348
timestamp1710338306500

...

Owner

Author

Dominik Meyer

See Parent