BLUEPRINT LIBRARY

Create paved roads

Blueprints for creating cloud resources with best practices embedded

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

This blueprint creates an Azure Network Security Group (NSG) with best practices in mind, encouraging the definition of specific security rules to control network traffic and enhance security. It uses secure defaults while allowing customization to suit different requirements. The blueprint also promotes the use of tags for better resource identification and management, organizing variables into intuitive groups to assist users—including those who may not be cloud infrastructure experts—in configuring essential and advanced settings easily.

This blueprint creates a Google Cloud Service Account adhering to best practices by requiring a valid account_id that meets naming conventions and encouraging the use of meaningful display_name and description for better resource management. It allows association with a specific project and offers advanced options like disabling the service account when necessary.

This blueprint creates a Google Compute Engine instance with best practices in mind, such as not assigning a public IP address by default to enhance security. It uses a default machine type of e2-medium and a Debian 10 image for the boot disk, promoting cost-effectiveness and stability. The blueprint encourages the use of labels for better resource management and organizes variables into logical groups to assist users—including those who may not be cloud infrastructure experts—in configuring essential settings easily.

This blueprint creates an Azure Storage Account with best practices in mind, such as enforcing HTTPS traffic only and setting the minimum TLS version to TLS 1.2 for enhanced security. It defaults to the StorageV2 account kind and LRS replication for optimal performance and cost-effectiveness. The blueprint allows for the configuration of network rules to restrict access, promoting secure data management. It also encourages the use of tags for better resource identification and management, and organizes variables into logical groups to assist users who may not be cloud infrastructure experts.

This blueprint creates an Azure Virtual Machine with best practices such as disabling password authentication by default to enhance security and encouraging the use of SSH keys for authentication. It uses managed disks and defaults to the latest Ubuntu LTS image. Variables are organized into intuitive groups to assist users who may not be cloud infrastructure experts. The blueprint also promotes the use of tags for better resource identification and management.

This blueprint creates an Azure Managed Disk with best practices in mind, such as defaulting the storage account type to "Standard_LRS" for cost-effectiveness and setting the create option to "Empty" for a new disk. It encourages the use of tags for better resource identification and management. Advanced configurations like specifying the OS type and source URI are available for more experienced users, and variables are organized into logical groups to assist users—including those who may not be cloud infrastructure experts—in configuring essential and advanced settings easily.

This blueprint creates an AWS Auto Scaling Group with best practices in mind, such as configuring minimum and maximum instance counts for efficient scaling, using private subnets for enhanced security, setting health checks and termination policies with sensible defaults, and encouraging the use of tags for resource identification and management. The blueprint is organized into groups to assist users—including those who may not be cloud infrastructure experts—in configuring essential and advanced settings easily.

This blueprint creates an AWS IAM Policy by requiring users to provide a valid JSON policy document, adhering to best practices in security and compliance. It encourages the use of tags for resource identification and management, organizing variables into groups to assist users—including those who may not be cloud infrastructure experts—in configuring essential settings easily.

This blueprint creates an AWS Internet Gateway and attaches it to a specified VPC. It adheres to best practices by encouraging the use of tagging for better resource management and identification. The blueprint is organized to assist users, including those who may not be cloud infrastructure experts, in configuring essential settings easily.

This blueprint creates an Azure Network Interface with best practices in mind, such as associating it with a subnet and optionally a Network Security Group to enhance security. It includes options to enable accelerated networking for improved performance and uses default settings that promote secure configurations. The blueprint encourages the use of tags for better resource management and organizes variables into intuitive groups to assist users—including those who may not be cloud infrastructure experts—in configuring essential and advanced settings easily.

This blueprint creates an AWS SNS Topic with best practices in mind, such as encouraging the use of KMS encryption to secure messages at rest. It allows users to specify custom policies for fine-grained access control and delivery settings. Tags are included to promote better resource identification and management. The blueprint organizes variables into intuitive groups to assist users—including those not well-versed in cloud infrastructure—in configuring essential and advanced settings easily.

This blueprint creates an AWS VPC with best practices in mind, such as enabling DNS support and hostnames by default to facilitate resource naming and resolution within the VPC. It sets a default CIDR block of "10.0.0.0/16" but allows customization to suit different network requirements. The blueprint encourages the use of tagging for better resource management and organizes variables into groups to assist users who may not be cloud infrastructure experts.

This blueprint creates an AWS Route Table associated with a specified VPC. It allows users to define multiple routes using section tags, adhering to best practices by encouraging the use of tagging for resource identification and management. The blueprint is organized into groups to assist users, including those who may not be cloud infrastructure experts, in configuring essential settings and routes easily.

This blueprint creates an AWS KMS key with best practices in mind, such as enabling key rotation by default to enhance security. It allows users to provide a custom key policy if needed and encourages the use of tags for resource identification and management. The blueprint organizes variables into groups to assist users—including those who may not be cloud infrastructure experts—in configuring essential and advanced settings easily.

This Blueprint sets up a Google Compute Address with customizable options, emphasizing best practices by defaulting to an external address in the "us-central1" region using the "PREMIUM" network tier. Variables are organized into "Basic Settings" for essential configurations and "Advanced Settings" for additional customization, aiding software engineers in deploying cloud resources securely and efficiently without deep expertise in cloud infrastructure.l offering flexibility for advanced users.

Your CSPM can't fix cloud infrastructure

Learn how Resourcely can improve your cloud posture in days, not quarters