This Azure Blueprint solution automatically deploys a multi-tier web application architecture with pre-configured security controls to help customers achieve compliance with FedRAMP requirements. The solution consists of Azure Resource Manager (ARM) templates and PowerShell scripts that guide resource deployment and configuration. Accompanying Azure Blueprint compliance documentation is provided, indicating security control inheritance from Azure and where deployed resources and configurations align with NIST SP 800-53 security controls, thereby enabling organizations to fast-track compliance obligations. Note: This solution deploys to Azure Government.
-
Clone this repository to your local workstation.
-
Run the pre-deployment PowerShell script: azure-blueprint/predeploy/Orchestration_InitialSetup.ps1. Read more about pre-deployment.
-
Click the button below, sign into the Azure portal, enter the required ARM template parameters, and click Purchase. Read more about deployment.
Architecture Deployment instructions Frequently asked questions Troubleshooting
This solution deploys a notional architecture for a web application with a database backend. The architecture includes a web tier, data tier, Active Directory infrastructure, application gateway and load balancer. Virtual machines deployed to the web and data tiers are configured in an availability set and SQL Servers are configured in an AlwaysOn availability group for high availability. Virtual machines are domain-joined, and Active Directory group policies are used to enforce security and compliance configurations at the operating system level. A management jumpbox (bastion host) provides a secure connection for administrators to access deployed resources.
The architecture includes the following Azure services:
- Virtual Machines
- (1) Management/bastion (Windows Server 2016 Datacenter)
- (2) Active Directory domain controller (Windows Server 2016 Datacenter)
- (2) SQL Server cluster node (Windows Server 2012 R2 on SQL2014SP2)
- (1) SQL Server witness (Windows Server 2016 Datacenter)
- (2) Web/IIS (Windows Server 2016 Datacenter)
- AvailabilitySets
- (1) Active Directory domain controllers
- (1) SQL cluster nodes and witness
- (1) Web/IIS
- Virtual Network
- (1) /16 virtual networks
- (5) /24 subnets
- DNS settings are set to both domain controllers
- Load Balancer
- (1) SQL load balancer
- Application Gateway
- (1) WAF Application Gateway -- Enabled -- Firewall Mode: Prevention -- Rule set: OWASP 3.0 -- Listener: Port 443
- Storage
- (7) Geo-redundant storage accounts
- Backup
- (1) Recovery Services vault
- Key Vault
- (1) Key Vault -- (3) Access policies (user, AADServicePrincipal, BackupFairFax) -- (7) Secrets (aadClientID, aadClientSecret, adminPassword, azurePassword, azureUserName, keyEncryptionKeyURL, sqlServerServiceAccountPassword)
- Azure Active Directory
- Azure Resource Manager
- Log Analytics
- Automation
- (1) Automation account
- Scheduler
- Operations Management Suite
- (1) OMS workspace
This Azure Blueprint solution is comprised of JSON configuration files and PowerShell scripts that are handled by Azure Resource Manager's API service to deploy resources within Azure. For more information about ARM template deployment see the following documentation:
Azure Resource Manager templates ARM template functions ARM templates and nesting resources
During pre-deployment, you will confirm that your Azure subscription and local workstation are prepared to deploy the solution. The final pre-deployment step will run a PowerShell script that verifies setup requirements, gathers parameters and credentials, and creates resources in Azure to prepare for deployment.
This Azure Blueprint solution is designed to deploy to Azure Government. The solution does not currently support Azure commercial regions. For customers with a multi-tenant environment, the account used to deploy must be a member of the Azure Active Directory associated with the subscription where this solution will be deployed.
PowerShell is used to initiate some pre-deployment tasks. PowerShell version 5.0 or greater must be installed on your local workstation. In PowerShell, you can use the following command to check the version:
$PSVersionTable.psversion
In order to run the pre-deployment script, you will need to have the current Azure PowerShell AzureRM modules installed (see Installing AzureRM modules).
This solution deploys an Application Gateway and requires an SSL certificate. To generate a self-signed SSL certificate using PowerShell, run this script. Note: self-signed certificates are not recommended for use in production environments.
The pre-deployment PowerShell script will verify that the necessary Azure PowerShell modules are installed. Azure PowerShell modules provide cmdlets for managing Azure resources. After all setup requirements are verified, the script will ask you to sign into Azure and then prompt for parameters and credentials to use when the solution is deployed. The script will prompt for the following parameters in order:
- Azure username: Your Azure username (ex. [email protected])
- Azure password: Password for the Azure account above
- Admin username: Administrator username you want to use for the administrator accounts on deployed virtual machines
- adminPassword: Administrator password you want to use for the administrator accounts on deployed virtual machines (must complexity requirements, see below)
- sqlServerServiceAccountPassword: SQL service account password you want to use (must complexity requirements, see below)
- subscriptionId: To find your Azure Government subscription ID, navigate to https://portal.azure.us and sign in. Expand the service menu, and begin typing "subscription" in the filter box. Click on Subscriptions to open the subscriptions blade. Note the subscription ID, which has the format xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx.
- resourceGroupName: Resource group name you want to use for this deployment; must be a string of 1-90 alphanumeric characters (0-9, a-z, A-Z), periods, underscores, hyphens, and parenthesis and cannot end in a period (e.g.,
blueprint-rg
). - keyVaultName: Key Vault name you want to use for this deployment; must be a string 3-24 alphanumeric characters (0-9, a-z, A-Z) and hyphens and must be unique across Azure Government.
Passwords must be at least 14 characters and contain one each of: lower case character, upper case character, number, special character.
- Clone this GitHub repository to your local workstation
git clone https://github.com/AppliedIS/azure-blueprint.git
- Start PowerShell as an administrator
- Run Orchestration_InitialSetup.ps1
- Enter the parameters above when prompted
Note the resource group name and Key Vault name; these will be required during the deployment phase. The script will also generate an GUID for use during the deployment phase.
During this phase, an Azure Resource Manager (ARM) template will deploy Azure resources to your subscription and perform configuration activities.
After clicking the Deploy to Azure Gov button, the Azure portal will open and prompt for the following settings:
Basics
- Subscription: Choose the same subscription used during the pre-deployment phase
- Resource group: Select 'Use existing' and choose the resource group created during pre-deployment
- Location: Select 'USGovVirginia'
Settings
- Admin Username: Administrator username you want to use for administrative accounts for deployed resources (can be the same username as entered during pre-deployment phase)
- Key Vault Name: Name of the Key Vault created during pre-deployment
- Key Vault Resource Group Name: Name of the resource group created during pre-deployment
- Cert Data: 64bit-encoded certificate for SSL
- Cert Password: Password used to create certificate
- Scheduler Job GUID: GUID for the runbook job to be started (use GUID output by pre-deployment script or run New-Guid in PowerShell)
- OMS Workspace Name: Name you want to use for the Log Analytic workspace; must be a string 4-63 alphanumeric characters (0-9, a-z, A-Z) and hyphens and must be unique across Azure Government.
- OMS Automation Account Name: Name you want to use for the automation account used with OMS; must be a string 6-50 alphanumeric characters (0-9, a-z, A-Z) and hyphens and must be unique across Azure Government.
-
Click the button below.
-
Enter the settings above.
-
Review the terms and conditions and click I agree to the terms and conditions stated above.
-
Click Purchase.
This solution uses multiple nested templates to deploy and configure the resources shown in the architecture diagram. The full deployment will take approximately [120] minutes. You can monitor the deployment from Azure Portal.
See TIMELINE.md for a resource dependency outline.
- Set Retention time - Set the data retention time in the OMS resource blade from 31 to 365 days to meet FedRAMP compliance
You can access your machines through the MGT VM that is created from the deployment. From this VM, you can remote into and access any of the VMs in the network.
Deploying this solution will create resources within your Azure subscription. You will be responsible for the costs associated with these resources, so it is important that you review the applicable pricing and legal terms associated with all resources and offerings deployed as part of this solution. For cost estimates, you can use the Azure Pricing Calculator.
If you have a basic knowledge of how Azure Resource Manager (ARM) templates work, you can customize the deployment by editing azuredeploy.json or any of the templates located in the nested templates folder. Some items you might want to edit include but are not limited to:
- Network Security Group rules (nestedtemplates/virtualNetworkNSG.json)
- OMS alert rules and configuration (nestedtemplates/provisioningAutoAccOMSWorkspace)
- Application Gateway routing rules (nestedtemplates/provisioningApplicationGateway.json)
For more information about template deployment read the following links:
If you do not want to specifically alter the template contents, you can edit the parameters section at the top level of the JSON object within azuredeploy.json.
If your deployment should fail, to avoid incurring costs and orphan resources it is advisable to delete the resource group associated with this solution in its entirety, fix the issue, and redeploy the solution. See the section below for instructions to delete all resources deployed by the solution.
Please feel free to open and submit a GitHub issue pertaining to the error you are experiencing.
To help with deleting protected resources, use postdeploy/deleteProtectedItems.ps1 -- this will specifically help you with removing the delete lock on the resources inside your vault.
- OMS Monitoring Extension fails intermittently on different machines (See issue #95).
- SQL Always On configuration is currently broken for SQL2016-WS2012R2 (See issue #73).
- Deployment only works successfully with a new key vault (it does not work with an existing key vault). This will force the user to run the pre-deployment script to create a new resource group and key vault before each deployment.