Skip to content
This repository was archived by the owner on Mar 15, 2025. It is now read-only.

Added IoMT Scenario and IaC Pattern#1

Closed
marvinbuss wants to merge 48 commits intomainfrom
healthcare_api
Closed

Added IoMT Scenario and IaC Pattern#1
marvinbuss wants to merge 48 commits intomainfrom
healthcare_api

Conversation

@marvinbuss
Copy link
Contributor

@marvinbuss marvinbuss commented Sep 10, 2021

In this branch I am working on the IoMT scenario and templates to have a sample that can be used for such scenarios.

Added:

  • IoMT scenario (WIP)
  • Bicep templates + Built ARM templates
  • Policy to collect Diagnostic Logs for FHIR API
  • Sample parameter file
  • Sample Deploy to Azure Button
  • Added Service Bus Namespace and Queue for Synch between Azure FHIR and D365 Dataverse

@marvinbuss marvinbuss added the enhancement New feature or request label Sep 10, 2021
@marvinbuss marvinbuss self-assigned this Sep 10, 2021
@marvinbuss
Copy link
Contributor Author

marvinbuss commented Sep 10, 2021

@esbran Let's discuss whether the health bot also needs to be deployed here or whether we should treat this separately. I haven't seen any integration between the two, which is why the health bot could be treated separately. Depending on this and the next steps, I will either:

  1. Update ARM/Bicep
  2. Create the portal exp.

@marvinbuss
Copy link
Contributor Author

@esbran The Portal UI was added and can be used once the repo is public.

Copy link
Contributor Author

@marvinbuss marvinbuss left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!

@marvinbuss
Copy link
Contributor Author

Added IoT Hub as option and added option to select between IoT Hub and EventHub.

Also added validation for mapping input, which I think is really important to simplify user experience.
image

@marvinbuss
Copy link
Contributor Author

marvinbuss commented Sep 20, 2021

I validated the new deployment templates:
image
I can share more details with you, if required.

@marvinbuss marvinbuss requested a review from a team October 4, 2021 09:25

Classical IoT as well as IoMT scenarios share similar architectures. The most significant differences can be identified on the application and data-driven use-case level. Also, there is a higher emphasis on the security aspect in the IoMT space and the compliance with legal regulations and standards. In the next paragraphs, we will look at the various layers of an IoMT architecture.

## IoMT Architecture
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is great. I was also wondering (although knowing it's early stage) if we can lead with critical design areas for IoMT, and flush out some design considerations/recommendations across those? That should help to position the reference architecture and the rationale behind the composition and integration we are recommending. Thoughts?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can I work on this as part of a second iteration?
Would that work?

"description": "Specifies the resource ID of the subnet to which all services will connect."
}
},
"privateDnsZoneIdEventhubNamespace": {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Assuming the ones who are deploying this will not have RBAC to the resourceId, could we call that out in the documentation that this 1) takes a dependency on platform networking, and 2) the recommended ways to achieve it?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We have this in the Portal UI:
image

Is this not sufficient?

@marvinbuss marvinbuss requested a review from krnese October 22, 2021 08:46
@marvinbuss
Copy link
Contributor Author

I will close this soon due to some issues in history. Let's continue here: #46

@marvinbuss marvinbuss closed this Oct 24, 2021
@marvinbuss marvinbuss deleted the healthcare_api branch October 24, 2021 11:05
krnese added a commit that referenced this pull request Feb 11, 2023
krnese added a commit that referenced this pull request Mar 3, 2023
* wave #1

* adding AKS

* added defender options

* adding mySql and other minor updates

* update

* backup completeness

* update + event grid

* adding Azure Data Explorer

* minor update

* adding rbac

* formatting

* adding ARM template for compliant services

* v2 refresh

* optimizing dependency

* adding policies

* dns update

* Update hubspoke-connectivity.json

* Update industryArmV2.json

* Update hubspoke-connectivity.json

* Update fsiPortalV2.json

* Update industryArmV2.json

* adding EH for data export

* Compliant network policySet

* prevent ssh and rdp from internet to network

* erDiag

* updated data export with description

* adding sub for ingress and egress

* adding assignments

* name lenght

* updated KV and adding cosmosDb

* more data stuff

* removing 'db'

* compliant events

* aks + nw

* Update Cognitive Services Policies (#370)

Co-authored-by: Kristian Nese <kristian.nese@microsoft.com>

* nw part 1

* network orchestration

* sql policySet

* adding sql, service bus, and postgre sql

* adding sql assignment + storage def and assignment

* updating condition

* lenght

* correcting params

* Network Policies (#374)

* Network Policies

* Removing duplicate assignments

---------

Co-authored-by: Kristian Nese <kristian.nese@microsoft.com>

* adding synapse

* update assignment name

* param mapping

* compliant corp lz

* update condition

* fixing url

* converge on private DNS across verticals

* compliant corp lz and modification to each vertical

* updated compliant services

* adding AVD

* Centralized logging initiative

* added diag to storage account

* naming convention for storage

* default identity sub behavior

* Add Azure Storage Policies (#375)

* Add Azure Storage Policies

* Fix minor bug

* Update type

* Add policy for CORS rules

* Add policy for CMK for encryption scopes

* Remove policy for encryption scope

* Update display name

* Add list of allowed values for policy definition

* Update policy for encryption

* Add policy assignments

* Removed policy for cross tenant PEs

* Add missing parameters

* Update mg name

* update sequencing

---------

Co-authored-by: Marvin Buss <34542414+marvinbuss@users.noreply.github.com>
Co-authored-by: Uday Pandya <14359777+uday31in@users.noreply.github.com>
krnese added a commit that referenced this pull request Mar 6, 2023
krnese added a commit that referenced this pull request Mar 7, 2023
* update platform resource config

* updated default value for policydef

* updated resourceNames for policy

* adding udr and nsg to private dns

* Allowed resourceTypes wave #1

* allowed corp resources + peering with udr and nsg

* updated resource types and NW sequencing for ERGW
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

enhancement New feature or request

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants