EAC RCIIS: ICT Infrastructure & Hosting Documentation
Handover checklist
Initializing search
EAC RCIIS: ICT Infrastructure & Hosting Documentation
Menu
Menu
Home
1. Planning
1. Planning
1.1 Choose Your Deployment Model
1.2 Security Requirements
2. Prepare the Environment
2. Prepare the Environment
2.1 Accounts & Access
2.1 Accounts & Access
Set Up Access
Credential Management
2.2 Install & Configure Tooling
2.2 Install & Configure Tooling
Install Tooling
Prepare Provisioning Config
3. Build the Infrastructure
3. Build the Infrastructure
3.1 Configure Networking
3.1 Configure Networking
Set Up Network Fabric
Configure Firewall Rules
Set Up Load Balancing
3.2 Configure Storage
3.3 Encryption & HSM Provisioning
3.4 Provision Compute
4. Install Talos Linux
4. Install Talos Linux
4.1 Generate Machine Configuration
4.2 Boot & Install
4.3 Bootstrap the Cluster
4.4 Verify Cluster Health
5. Install Platform Services
5. Install Platform Services
5.0 Overview
5.1 Core Infrastructure
5.1 Core Infrastructure
5.1.1 Networking
5.1.2 Certificates
5.1.3 GitOps & Delivery
5.1.4 Storage
5.2 Security
5.2 Security
5.2.1 Overview
5.2.2 Policy Engine
5.2.3 Vulnerability Scanning
5.2.4 Runtime Threat Detection
5.2.5 Troubleshooting
5.3 Services & Operations
5.3 Services & Operations
5.3.1 Observability
5.3.2 Data Services
5.3.3 Backup & Scheduling
5.3.4 Identity & Access Management
5.3.5 Key Management & HSM Integration
6. Configure Cloudflare
6. Configure Cloudflare
6.1 Set Up DNS Zones
6.2 Configure Geo Load Balancing
7. Replication
7. Replication
7.0 Overview
7.1 S3 Replication
7.2 Kafka Replication
7.3 PostgreSQL Replication
7.4 SQL Server Replication
8. Validate the Environment
8. Validate the Environment
8.1 Security Audit
9. Day-2 Operations
9. Day-2 Operations
9.1 Talos Linux Upgrades
9.2 Certificate Rotation
9.3 Maintenance Windows
9.4 Backup & Recovery Procedures
9.5 Incident Response
9.6 Security Operations
Appendix
Appendix
Glossary
SRE & Observability Concepts
Kubernetes Security Concepts
Handover checklist