maskopy
DNXLabs/maskopy/aws
Maskopy solution is to Copy and Obfuscate Production Data to Target Environments in AWS. It uses AWS Serverless services, Step functions, Lambda and Fargate.
terraform-aws-maskopy   Overview: Maskopy solution is to Copy and Obfuscate Production Data to Target Environments in AWS. It uses AWS Serverless services, Step functions, Lambda and Fargate. Features: Simplified Copy and Obfuscation Maskopy copies and provides ability to run obfuscation on production data across AWS accounts. Any sensitive information in the production data is obfuscated in a transient instance. The final obfuscated snapshot is shared in the user-specified environments. Self-Service and End-To-End Automation Maskopy is a self-serviced solution that allows users to get production data without involving multiple teams. It is
| Name | Type | Description | Default |
|---|---|---|---|
| staging_vpc_id | string | VPC id for the staging account. | required |
| rds_staging_subnet_group_name | string | Staging RDS option group name to deploy the transient database. | required |
| obfuscation_scripts_bucket_name | string | Bucket to store the obfuscations scripts, they should be uploaded inside `/obfus | required |
| staging_subnet_ids | list(string) | Subnets inside the staging VPC to deploy the lambdas and ECS tasks. | required |
| staging_rds_default_kms_key_id | string | KMS key that maskopy will use for the transient RDS. | required |
| lambda_role_name | string | Lambda role name. | "LAMBDA_MASKOPY" |
| replicate_destination_bucket_name | string | Name of the bucket to send dumps data from source bucket. | "" |
| sqs_queue_name | string | SNS queue name to send messages when step functions complete running. | "maskopy_sqs_queue" |
| step_function_state_machine_name | string | Name for the step functions state machine. | "maskopy-state-machine" |
| custom_source_kms_key | string | Custom KMS key, used when variable `custom_source_kms_key_enabled` equals to tru | "" |
| create_obfuscation_scripts_bucket | bool | Create bucket to store obfuscation scripts. | true |
| lambdas_names | list(string) | [
"00-AuthorizeUser",
"01-UseExistin | |
| cost_center | string | All the temporary resources are tagged with the code. | "MaskopyCost" |
| ecs_docker_image | string | Docker image that ECS task will run with and will download the scripts from S3 o | "dnxsolutions/obfuscation" |
| replicate_obfuscation_bucket | bool | Replicate data inside the bucket to another acount. | true |
| replicate_obfuscation_bucket_prefix | string | Name of prefix to replicate inside the bucket to another acount. | "dumps" |
| application_name | string | The name for the maskopy application, this name should match part of the string | "MASKOPY" |
| enabled | bool | If true, will deploy the maskopy solution. | true |
| ecs_fargate_role_name | string | ECS role name. | "ECS_MASKOPY" |
| replicate_destination_account_id | string | Name of the bucket to send dumps data from source bucket. | "" |
| build_lambda_layer | bool | If true will build the lambda layer. Set to true only with local source module. | false |
| custom_source_kms_key_enabled | bool | Only used when encrypt RDS in source account with another KMS key. Remember to a | false |
Azure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,