Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This article describes how to implement an Azure Red Hat OpenShift landing zone architecture for the financial services industry (FSI). This guidance outlines how to use any supported Azure Red Hat OpenShift 4.x version in a hybrid cloud environment to create secure, resilient, and compliant solutions that meet FSI regulatory requirements and security standards.
Before you build a production environment by using Azure Red Hat OpenShift, read the Azure Red Hat OpenShift landing zone guidance in the Cloud Adoption Framework for Azure. Consider reviewing the latest Azure Red Hat OpenShift service updates and version compatibility matrix for production planning.
Architecture
Download a Visio file of this architecture.
Dataflow
This scenario uses an application that runs on an Azure Red Hat OpenShift cluster. The application connects to on-premises resources and a hub virtual network on Azure that Azure Firewall protects.
The following dataflow corresponds to the previous diagram:
The developer writes code within the company's network and pushes the code to GitHub Enterprise. You can use any code repository for your scenario.
The customer's deployment pipeline containerizes the code, which deploys it in an on-premises container registry.
The image can then be deployed into an on-premises OpenShift cluster and to the Azure Red Hat OpenShift cluster on Azure. The image also gets deployed to Azure Red Hat OpenShift through Azure ExpressRoute, which routes the traffic through the Azure hub virtual network to the private Azure Red Hat OpenShift cluster in the spoke virtual network. These two networks are peered.
Outgoing traffic that comes from the Azure Red Hat OpenShift cluster is first routed through the peered hub virtual network and then through an Azure Firewall instance.
To access the application, customers can go to a web address that routes traffic through Azure Front Door.
Azure Front Door uses Azure Private Link to connect to the private Azure Red Hat OpenShift cluster.
Components
Azure Red Hat OpenShift is a Kubernetes service that provides managed, highly available OpenShift 4.x clusters on demand with 99.95% service-level agreement (SLA) availability. In this architecture, these clusters serve as the primary compute platform. Microsoft and Red Hat jointly monitor and operate the clusters, which provides enterprise-grade support with automated updates, patching, and life cycle management. Azure Red Hat OpenShift supports OpenShift 4.12 and later with regular version updates and extended support options.
Microsoft Entra ID is a cloud-based identity and access management service that controls access to resources across various environments. In this architecture, Microsoft Entra ID integrates with Azure role-based access control (Azure RBAC) and OpenShift RBAC. This integration provides customers with secure, granular access to external resources.
ExpressRoute is a networking service that can integrate with a connectivity provider to extend on-premises networks into the Microsoft cloud over a private connection. In this architecture, ExpressRoute provides private, high-bandwidth connectivity between on-premises resources and Azure.
Azure Key Vault is a cloud-native key management solution that stores and manages secrets, keys, and certificates with FIPS 140-3 Level 3 validated Hardware Security Module (HSMs). It complies with standards such as Payment Card Industry Data Security Standard (PCI DSS) and Payment Card Industry Three-Domain Secure (PCI 3DS). For FSI scenarios, this architecture recommends that you use Key Vault Premium tier instead of the Standard SKU to provide enhanced security compliance, including customer-managed keys, bring-your-own-key (BYOK) capabilities, and dedicated HSM backing for applications that run on the private Azure Red Hat OpenShift cluster. Key Vault Premium enables FIPS 140-3 Level 3 compliance required by many financial regulations. Integration with Azure Red Hat OpenShift includes native support for Key Vault CSI driver and Microsoft Entra Workload ID. For more information about the different Azure key-management solutions, see Choose the right Azure key management solution.
Azure Bastion is a managed platform as a service (PaaS) solution that enables connections to virtual machines (VMs) through a private IP address. In this architecture, Azure Bastion connects to an Azure VM within the private network because this scenario implements a private cluster.
Azure Firewall is a cloud-native and intelligent network firewall security service that provides threat protection for cloud workloads that run in Azure. In this architecture, Azure Firewall monitors and filters network traffic that goes in and out of the Azure Red Hat OpenShift environment.
Alternatives
You can use Azure Red Hat OpenShift to access the OpenShift ecosystem and cloud-native toolchain. When you run OpenShift on-premises, most of the included platform services apply to Azure Red Hat OpenShift. You can use these platform services as alternatives to some of the Azure services mentioned in this article.
Non-Microsoft alternatives are available. For example, you can host your container registry on-premises or use OpenShift GitOps instead of GitHub Actions. You can also use non-Microsoft monitoring solutions that work with Azure Red Hat OpenShift environments. This article focuses on Azure alternatives that customers often use to build their solutions on Azure Red Hat OpenShift.
Scenario details
FSI and other regulated industry Azure Red Hat OpenShift customers often have stringent requirements for their environments. This architecture outlines criteria and guidelines that financial institutions can use to design solutions that meet their unique requirements when they use Azure Red Hat OpenShift in a hybrid cloud environment.
This scenario focuses on security measures. For example, you can enable private connectivity from on-premises environments, implement controls on private link usage, establish private registries, ensure network segregation, and deploy encryption for data at rest and data in transit. Identity and access management and Azure RBAC both ensure secure user administration within Azure Red Hat OpenShift clusters.
To add resilience, you can distribute resources across availability zones for fault tolerance. Compliance obligations involve non-Microsoft risk assessments, regulatory adherence, and disaster recovery (DR) protocols. To improve observability, you can add logging, monitoring, and backup mechanisms to uphold operational efficiency and regulatory compliance. The guidelines in this article provide a framework that you can use to deploy and manage Azure Red Hat OpenShift solutions that are tailored to the needs of the FSI.
Potential use cases
This scenario is most relevant to customers in regulated industries, such as finance and healthcare. This scenario also applies to customers who have elevated security requirements, such as solutions that have strict data governance requirements.
Considerations
These considerations implement the pillars of the Azure Well-Architected Framework, which is a set of guiding tenets that you can use to improve the quality of a workload. For more information, see Well-Architected Framework.
Reliability
Reliability helps ensure that your application can meet the commitments that you make to your customers. For more information, see Design review checklist for Reliability.
Resilience is essential for Azure Red Hat OpenShift to maintain the uninterrupted operation of mission-critical applications. Implement the following reliability best practices:
Availability zones: Distribute control plane and worker nodes across all available availability zones within an Azure region. This setup ensures that the control plane cluster maintains quorum and mitigates potential failures across entire availability zones. Implement this distribution as a standard practice.
Multi-region deployments: Deploy Azure Red Hat OpenShift clusters in multiple regions to protect against region-wide failures. Use Azure Front Door Premium for global load balancing and traffic routing to these clusters, with health probes and automatic failover capabilities for improved resilience. Choose Azure services that support geo-redundancy and match each secondary location to the location where you deploy the OpenShift cluster.
DR: Implement rigorous DR standards to safeguard customer data and ensure continuous business operations. To meet these standards effectively, follow the DR considerations.
Backup: To protect sensitive customer data and meet stringent compliance requirements, implement a robust backup and restore strategy for Azure Red Hat OpenShift.
Start by configuring Azure Red Hat OpenShift clusters to attach to Azure storage by default, and ensure that they automatically reattach after a restore operation. For application-level backups that use Velero, see Create an Azure Red Hat OpenShift cluster application backup.
For backup and DR workflows, including scheduled backups, remote object store replication, and data mover support, review Backup and restore for Azure Red Hat OpenShift by using OpenShift API for Data Protection. Use this approach for production environments that require strict recovery time objectives (RTOs), recovery point objectives (RPOs), and adherence to compliance standards.
Security
Security provides assurances against deliberate attacks and the misuse of your valuable data and systems. For more information, see Design review checklist for Security.
Security is paramount in the financial industry. To protect sensitive data and ensure regulatory compliance, you need stringent security measures.
Networking
Private connectivity from an on-premises environment: Financial industry use cases require exclusive private network connectivity without public internet access.
Implement Private Link endpoints for secure connectivity, and use ExpressRoute for private connectivity from on-premises datacenters. Azure Red Hat OpenShift supports private clusters that include private ingress controllers and API endpoints.
For enhanced security, consider using a hub-spoke network topology. For more information, see Create an Azure Red Hat OpenShift private cluster.
Use the Azure Red Hat OpenShift landing zone accelerator template to expedite the creation of a new cluster that follows recommended practices from Microsoft.
Push-only private link: Financial companies often restrict Azure workload traffic from connecting back to their datacenters. Configure Private Link gateways for inbound-only access from private datacenters to Azure.
Ensure that system dependencies in private datacenters push data to Azure.
Use Private Link and Azure Firewall to apply firewall policy exceptions on an individual basis according to least-privilege principles.
Private registry with vulnerability scanning: Use the Azure Container Registry Premium tier with integrated security scanning to identify vulnerabilities in images hosted in your registry. Enable this feature at the subscription level by using Microsoft Defender for Containers.
Implement image signing by using Notation and Cosign for supply chain security.
Distribute container images through private endpoints, and configure Azure Red Hat OpenShift to use private registries exclusively.
Enable quarantine policies for vulnerable images. For more information, see Use Container Registry in private Azure Red Hat OpenShift clusters.
Use Private Link to enable private network access to Container Registry.
Network segmentation: Segment default subnets for security and network isolation.
Use Azure networking to create distinct subnets for the Azure Red Hat OpenShift control plane, worker plane, and data plane, Azure Front Door, Azure Firewall, Azure Bastion, and Azure Application Gateway.
Create NetworkPolicy objects to restrict traffic between pods in a project.
Data
Encryption of data at rest: Use default storage policies and configurations to ensure encryption of data at rest.
Enable etcd encryption behind the control plane, and encrypt storage on each worker node.
Configure the Key Vault provider for Secrets Store CSI driver (CSI) to mount secrets in Key Vault to your pods.
To manage keys through the customer or Azure, use etcd and storage data encryption, which is a feature of Azure Red Hat OpenShift. For more information, see Security for Azure Red Hat OpenShift.
Encryption of data in transit: Encrypt interconnections between services in a default Azure Red Hat OpenShift cluster.
Enable Transport Layer Security (TLS) for traffic between services.
Use network policies, service mesh, and Key Vault for certificate storage. For more information, see Update Azure Red Hat OpenShift cluster certificates.
Use Red Hat OpenShift Service Mesh to enforce traffic management, service identity, security, and policy and to gain telemetry. For more information, see Introduction to Red Hat OpenShift Service Mesh.
Key management service: Use Key Vault as the primary service to securely store and manage secrets, keys, and certificates.
For workloads that require HSM-backed keys, use Key Vault Premium, which meets FIPS 140-3 Level 3 standards.
Enable Microsoft Defender for Key Vault for advanced threat detection. Configure diagnostic logging for auditing. Implement automated key rotation and secret life cycle management by using built-in policies or event-driven automation.
For advanced or multicloud scenarios, consider software development companies such as HashiCorp Vault or CyberArk Conjur. BYOK models are fully supported across Azure services.
Authentication and authorization
Identity and access management: Use Microsoft Entra ID for centralized identity management of Azure Red Hat OpenShift clusters. For more information, see Configure Azure Red Hat OpenShift to use Microsoft Entra ID group claims.
Use Microsoft Entra to authenticate users against your Azure Red Hat OpenShift cluster.
Use Microsoft Entra Privileged Identity Management (PIM) to manage, control, and monitor access to the cluster with just-in-time (JIT) privilege and multifactor authentication (MFA).
Create a separate service principal with scoped Azure RBAC roles for your Azure Red Hat OpenShift landing zone. For more information, see Prerequisites checklist to deploy an Azure Red Hat OpenShift cluster.
RBAC: Implement Azure RBAC in Azure Red Hat OpenShift to provide granular authorization of user actions and access levels.
Use cluster RBAC in FSI scenarios to implement least-privilege access to the platform. For more information, see Use RBAC to define and apply permissions.
Use role bindings between OpenShift and Microsoft Entra ID for distinct groups like Site Reliability Engineering, SecOps, DevOps, and developers. For more information, see Configure Azure Red Hat OpenShift to use Microsoft Entra ID.
Compliance
Non-Microsoft risk assessments: To follow financial compliance regulations, adhere to least-privilege access, limit duration for escalated privileges, and audit site reliability engineer (SRE) resource access. For the SRE shared responsibility model and access-escalation procedures, see Overview of responsibilities for Azure Red Hat OpenShift and SRE access to Azure Red Hat OpenShift.
Regulatory compliance: Use Azure Policy to address various regulatory requirements related to compliance in FSI scenarios.
Use Azure Policy to apply tags to resources to an Azure Red Hat OpenShift cluster's managed resource group. For more information, see Azure Policy and Azure Policy built-in initiative definitions.
Operational Excellence
Operational Excellence covers the operations processes that deploy an application and keep it running in production. For more information, see Design review checklist for Operational Excellence.
FSI companies can use robust observability tools and practices to proactively detect and address problems and optimize resource usage. Follow these operational-excellence recommendations:
Implement effective logging and monitoring: Use Azure Monitor and Microsoft Sentinel to track actions and ensure system integrity within your Azure Red Hat OpenShift environment.
Supplement observability and monitoring practices by using non-Microsoft tools such as Dynatrace, Datadog, and Splunk.
Ensure that managed service for Prometheus or Azure Managed Grafana is available for Azure Red Hat OpenShift.
Use the Cluster Logging Forwarder to send logs to Azure Monitor and Log Analytics. This functionality allows you to query and view your Azure Red Hat OpenShift workloads in Azure Monitor.
Use Azure Arc-enabled Kubernetes: Integrate Azure Arc-enabled Kubernetes with your Azure Red Hat OpenShift environment for enhanced logging and monitoring capabilities.
Use the provided tools to optimize resource usage and maintain compliance with industry regulations.
Enable comprehensive monitoring and observability. For more information, see Azure Arc-enabled Kubernetes and Enable monitoring for Azure Arc-enabled clusters.
Deploy Red Hat Advanced Cluster Management (ACM) and OpenShift Data Foundation (ODF) for Azure Red Hat OpenShift DR: For business continuity and disaster recovery (BCDR) scenarios, consider running a hub cluster with ACM and the ODF Multicluster Orchestrator to coordinate primary and secondary clusters across peered virtual networks. For more information, see Deploy ACM and ODF for Azure Red Hat OpenShift DR.
Contributors
Microsoft maintains this article. The following contributors wrote this article.
Principal authors:
- Ayobami Ayodeji | Senior Program Manager
- Diego Casati | Azure Global Black Belt
To see nonpublic LinkedIn profiles, sign in to LinkedIn.
Next steps
Production deployment resources:
- Azure Red Hat OpenShift landing zone accelerator: Comprehensive reference implementation with Terraform and Bicep templates and critical design area recommendations
- Azure Red Hat OpenShift workshop: Hands-on lab exercises for learning Azure Red Hat OpenShift deployment and management
- Red Hat OpenShift on Azure documentation: Complete technical documentation and tutorials
Architecture and best practices:
- Azure Architecture Center - Container architectures: Reference architectures and design patterns
- Azure Red Hat OpenShift support policies: Version support and life cycle information
Security and compliance:
- Azure security baseline for Azure Red Hat OpenShift: Security baseline guidance from the Microsoft cloud security benchmark version 1.0 to Azure Red Hat OpenShift