General Overview

How we can contain and describe this deployment to a restricted environment

Security posture assumptions

  • POCs are built in a development account in AWS.
  • OCP is not approved for production environments.
  • Special considerations are required for CoreOS ami
  • Client adheres to role based access for all their environments.

AWS Role perms

Quantum Safe Posture Management is supported on either Red Hat Openshift or on AWS EKS.

Engineering infrastructure requirements

Per engineering doc:

  • OpenShift Container Platform
  • IBM Cloud Pak Foundational Services
  • cluster-admin privileges are required

Below sizing are the base requirements for a extra small starter deployment.

Flavor Count vCPU RAM Local Storage Role
c5.2xlarge 3 24 (8 cores x Count) 48G (16G x Count) 100Gb EBS * Control Plane
m6i.4xlarge 4 64 (16 cores x Count) 256G (64G x Count) 250Gb EBS, 200Gb EBS (additional) Compute
r6i.8xlarge 1 32 256G 250Gb EBS, 10Tb EBS (additional) DB2
Totals 8 128 560G 11903Gb
Control Plane

If deploying to EKS on AWS, you don’t need to be concerned with the control plane sizing. Only compute.

Storage considerations:

client primarily uses EBS and EFS.

  • Network attached (SAN) SSD at 3000 MB/sec IO (required)
  • Adding ODF into the mix would require adding more larger storage nodes

Components

These are some components of this solution that are available from IBM Passport Advantage:

Bill of Materials

  • IBM Quantum Safe Remediator (QSR)
    • Adaptive Proxy
    • Performance Test Harness
  • IBM Quantum Safe Explorer (QSR)
  • QSPM
  • IBM Quantum Safe Advisor (QSA)

Constraints

  • QSR
    • Requires docker or podman
    • Using the Adaptive Proxy it can act as a dynamic TLS termination point and re-encrypts connections with quantum-safe encryption
  • QSE
    • Runs as a local service on a user’s desktop.
    • Rapid deployment.
    • Supports MacOS and Windows services.
    • Has a CLI to locally interact with the local service.
    • VSCode plugin to automatically scan and identify vulnerable pre-quantum algorithms in a user’s code
  • QSA
    • TBD
  • QSPM
    • Current specs require OCP cluster or EKS