BLUEPRINT LIBRARY

Create paved roads

Blueprints for creating cloud resources with best practices embedded

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

This blueprint creates an AWS IAM Policy by requiring users to provide a valid JSON policy document, adhering to best practices in security and compliance. It encourages the use of tags for resource identification and management, organizing variables into groups to assist users—including those who may not be cloud infrastructure experts—in configuring essential settings easily.

This blueprint creates an AWS RDS Cluster following best practices such as enabling encryption at rest for data security, setting deletion protection by default to prevent accidental deletion, and configuring sensible defaults for backup retention and preferred backup windows. It encourages the use of tags for resource identification and management. The blueprint is organized into intuitive groups to assist users—including those not well-versed in cloud infrastructure—in configuring essential and advanced settings easily.

This blueprint creates an Azure Public IP with best practices in mind, such as defaulting to a 'Static' allocation method and using the 'Standard' SKU for enhanced security and features. It encourages the use of tags for better resource management and identification. Advanced settings like idle timeout can be customized if needed. The blueprint organizes variables into intuitive groups to assist users—including those who may not be cloud infrastructure experts—in configuring essential and advanced settings easily.

This blueprint creates an AWS KMS key with best practices in mind, such as enabling key rotation by default to enhance security. It allows users to provide a custom key policy if needed and encourages the use of tags for resource identification and management. The blueprint organizes variables into groups to assist users—including those who may not be cloud infrastructure experts—in configuring essential and advanced settings easily.

This blueprint creates an AWS VPC with best practices in mind, such as enabling DNS support and hostnames by default to facilitate resource naming and resolution within the VPC. It sets a default CIDR block of "10.0.0.0/16" but allows customization to suit different network requirements. The blueprint encourages the use of tagging for better resource management and organizes variables into groups to assist users who may not be cloud infrastructure experts.

This blueprint creates an Azure SQL Database with best practices in mind, such as defaulting to the 'Basic' edition and service objective for cost-effectiveness, setting a standard collation, and encouraging the use of tags for better resource identification and management. It allows customization of advanced settings like collation and maximum size, organizing variables into logical groups to assist users—including those who may not be cloud infrastructure experts—in configuring essential and advanced settings easily.

This blueprint creates an AWS Lambda function following best practices, such as setting a default runtime environment (Python 3.8) and handler, enabling secure configuration by requiring an IAM role, and encouraging the use of tags for resource identification and management. It allows customization of memory size and timeout for performance tuning and supports the inclusion of environment variables to provide flexibility for various use cases.

This blueprint creates an Azure Network Security Group (NSG) with best practices in mind, encouraging the definition of specific security rules to control network traffic and enhance security. It uses secure defaults while allowing customization to suit different requirements. The blueprint also promotes the use of tags for better resource identification and management, organizing variables into intuitive groups to assist users—including those who may not be cloud infrastructure experts—in configuring essential and advanced settings easily.

This blueprint creates an AWS Security Group adhering to best practices by denying all inbound traffic unless specified, thereby enhancing security. It allows all outbound traffic by default, following AWS's standard behavior, but gives users the flexibility to define specific egress rules if needed. The blueprint encourages the use of descriptive tagging for better resource management and organizes variables into groups to simplify configuration for users who may not be cloud infrastructure experts.

This blueprint creates a Google Compute Subnetwork with best practices by defaulting to enable private Google access and flow logs, enhancing security and observability. It allows for the configuration of secondary IP ranges and encourages the use of labels for better resource management. The variables are organized into logical groups to assist users, including those who may not be cloud infrastructure experts, in configuring essential settings easily.

This blueprint creates an AWS Subnet with best practices in mind, such as disabling public IP assignment by default to enhance security. It allows customization of CIDR blocks and availability zones to suit different network requirements. The blueprint encourages the use of tagging for better resource management and organizes variables into groups to assist users who may not be cloud infrastructure experts.

This blueprint creates a Google Cloud VPC network following best practices by defaulting to custom mode (auto_create_subnetworks set to false), allowing for manual subnet creation and better control over network configuration. It includes advanced options like routing mode and MTU with sensible defaults, providing flexibility for advanced users. The blueprint is organized to help users, including those who may not be cloud infrastructure experts, configure essential settings easily.

This blueprint creates an Azure Managed Disk with best practices in mind, such as defaulting the storage account type to "Standard_LRS" for cost-effectiveness and setting the create option to "Empty" for a new disk. It encourages the use of tags for better resource identification and management. Advanced configurations like specifying the OS type and source URI are available for more experienced users, and variables are organized into logical groups to assist users—including those who may not be cloud infrastructure experts—in configuring essential and advanced settings easily.

This blueprint creates an AWS Route Table associated with a specified VPC. It allows users to define multiple routes using section tags, adhering to best practices by encouraging the use of tagging for resource identification and management. The blueprint is organized into groups to assist users, including those who may not be cloud infrastructure experts, in configuring essential settings and routes easily.

This blueprint creates an AWS CloudWatch Log Group with best practices in mind, such as setting a default retention period of 14 days to prevent unlimited storage costs and optionally enabling encryption using a KMS key for enhanced security. It encourages the use of tags for better resource identification and management. The blueprint is organized to assist users, including those who may not be cloud infrastructure experts, in configuring essential settings easily.

Your CSPM can't fix cloud infrastructure

Learn how Resourcely can improve your cloud posture in days, not quarters