Technology Standards

VersionDateAuthorComments
1.0D. Souza / L. CrespoDocument Creation
1.1S. ZuloagaAdded Cybersecurity Considerations Section
1.206/08/25L. CrespoAdded CMS to Informational Sites
1.311/08/25L. CrespoModified CI/CD supported platforms
1.421/08/25Marco Roberto GonçalvesAdded Infrastructure Section

Introduction

This document establishes the approved technology standards for Patria, covering various technology implementation categories. These standards ensure we maintain consistency, security, and quality across all our systems. The document continuously evolves, adapting to new needs and technological advancements. Undefined technical scenarios will be standardized as needed.

Technical Drivers

These fundamental principles guide our technical decisions and architecture evolution:

  • SECURITY BY DESIGN: Applications must be designed with Information Security, SSO, and SOC process requirements in mind from their conception.
  • ARCHITECTURAL INTEGRITY PRESERVATION: The technical architecture of systems must be maintained according to their original standards, avoiding maintenance activities that generate unnecessary disruptions and risks. Structural changes will be evaluated when necessary, due to obsolescence, security risks, or changes in non-functional requirements.
  • BUSINESS LOGIC SEPARATION: Integration, presentation, or database layers should not contain business logic. This logic must reside in backend structures with specific responsibilities.
  • INTEGRATED AUTOMATION: Automation and the elimination of manual processes should be maximized for all new developments. CI/CD is mandatory for package generation, automated testing for integrity validation, environment transitions, deployment, notification, and monitoring.

Technology Standards by Use Case

This section outlines the approved technologies organized by their primary use cases. By categorizing standards according to their application context, we provide clear guidance for technology selection while ensuring consistency across similar implementation scenarios.

Application and Service Development

Application and service development standards define the approved technologies for building both internal and customer-facing digital solutions. These standards ensure consistency, interoperability, and maintainability across our development ecosystem while supporting our security and quality objectives.

Transactional Applications

Transactional applications handle critical business operations that require data processing, state management, and secure user interactions. The following standards ensure these applications are built on robust, scalable, and secure foundations.

ComponentStandard TechnologyVersionAlternativeVersion
FrontendReactLatest StableAngular (TypeScript)Latest Stable
BackendPython3.13.x+Node.jsLatest Stable
APIsRESTful with FastAPILatestGraphQLLatest Stable
AuthenticationEntra ID (Microsoft AD)-OAuth 2.0/OpenID Connect-

Informational Applications (web sites)

Informational applications focus on data presentation, reporting, and content delivery without complex transactional requirements. These standards provide guidance for building efficient and user-friendly information systems while maintaining appropriate security measures.

ComponentStandard TechnologyVersionAlternativeVersion
FrontendReactLatest StableAngular (TypeScript)Latest Stable
BackendPython3.13.x+Node.jsLatest Stable
APIsRESTfulLatest--
CMSStrapiCMSLatest StableDrupal (Only for legacy systems)Latest Stable

Custom Development

Custom development environments establish standardized tools and platforms for code creation, version control, and deployment pipelines. These standards ensure developer productivity, code quality, and consistent delivery processes.

Development EnvironmentPrimaryAlternative
IDEVS Code-
Repository ManagementGithubAzure DevOps
CI/CDGithub ActionsAzure DevOps Pipelines

Automation

Automation standards address the technologies used to streamline processes, reduce manual effort, and increase operational efficiency. By standardizing our automation approaches, we ensure consistent implementation, maintainability, and integration with existing systems.

Simple Automation

Simple automation focuses on streamlining basic processes through scripting and low-code solutions. These standards guide the development of efficient automation for routine tasks without the complexity of full RPA implementations.

Use CaseStandard TechnologyAlternative
Scripts and Automated ProcessesPython 3.13.x+N8N / Power Automate Cloud Flows

Robotic Process Automation (RPA)

RPA solutions emulate human interactions with digital systems to automate complex, repetitive tasks. These standards ensure our RPA implementations are consistent, maintainable, and properly integrated with our security framework.

Use CaseStandard TechnologyAlternative
User Interface AutomationUiPathPower Automate Desktop

Workflow Automation

Workflow automation manages the orchestration of business processes across systems and human interactions. These standards provide guidance for implementing structured workflows with proper governance, tracking, and approval mechanisms.

Use CaseStandard TechnologyAlternative
Processes and ApprovalsServiceNowFluig (TBC) / Power Automate

Business Analysis Tools

Business analysis tools empower departments to derive insights from data and improve decision-making processes. These standards balance the need for analytical flexibility with appropriate governance and security controls. Business areas have autonomy to develop departmental data solutions, experimentation, and exploration. Corporate systems must be managed by the IT team.

ComponentStandard TechnologyVersionAlternativeVersion
Analysis LanguagePython3.13.x+RLatest LTS
Development EnvironmentVS Code + Jupyter NotebooksLatest--

Cybersecurity in Technology Architecture

Cybersecurity is a foundational element integrated across all aspects of our technology architecture. This section outlines the security standards, controls, and practices that must be implemented to protect our systems, data, and users while enabling business operations.

Application Development Security

Application security standards establish the requirements for building secure applications from the ground up. By implementing these standards consistently, we protect against common vulnerabilities while ensuring proper authentication, authorization, and data protection.

Security Fundamentals

These fundamental security controls address the most critical application vulnerabilities. They must be integrated into all application development processes to establish a strong security foundation and prevent common attack vectors.

CategoryKey ControlsReference Standard
Injection ProtectionParameterized queries · Input validation · ORM usageOWASP ASVS
Sensitive Data ProtectionAES-256 encryption at rest and in transit · TLS 1.2+ · Updated cryptographic librariesNIST CSF
Input/Output ValidationInput/output escaping · CSP implementation · Strict validationOWASP Top Ten

Access Control and Authentication

Access control and authentication standards ensure that only authorized users can access our systems and data. These controls establish the framework for proper identity verification, permission management, and session security.

MechanismImplementationReference Standard
Role-Based Access ControlComprehensive RBAC · Periodic permission reviews · Least privilege principleISO 27001
Multi-Factor AuthenticationMandatory MFA · Strong password policies · Adaptive authentication mechanismsOWASP ASVS

API Security

API security standards protect the interfaces that connect our systems internally and with external partners. These standards ensure that our APIs maintain data confidentiality, integrity, and availability while preventing unauthorized access and abuse.

Secure API Design

Secure API design principles establish the architectural foundation for protected service interfaces. These standards ensure APIs are designed with security as a primary consideration, from communication protocols to authentication mechanisms.

ComponentImplemented StandardSecurity Consideration
ArchitectureRESTful / GraphQLDesign by contract
CommunicationHTTPS/TLS 1.3 (minimum)Complete channel encryption
AuthenticationOAuth 2.0 / OpenID ConnectSecure JWT token management
Access ControlGranular by endpoints and methodsConsistent permission enforcement

Additional Security Controls

These complementary security controls enhance API protection beyond basic design principles. They address specific threat vectors such as injection attacks, cross-origin vulnerabilities, and denial-of-service attempts.

ControlImplementationPurpose
Input ValidationComprehensive across all endpointsPrevent injections and attacks
CORS PoliciesStrict restrictionPrevent unauthorized access
Rate LimitingBy user/IP/endpointPrevent abuse and DoS
DocumentationOpenAPI (Swagger)Facilitate secure usage

Threat Monitoring and Response

Threat monitoring and response capabilities enable the detection, analysis, and mitigation of security incidents. These standards ensure we maintain visibility into our environment and can respond effectively to potential threats.

Event Management and Monitoring

Effective event management and monitoring provide the visibility needed to detect security incidents. These standards establish the requirements for comprehensive logging, event correlation, and anomaly detection across our technology landscape.

CapabilityImplementationPurpose
Centralized LoggingSIEM SystemEvent correlation
Continuous MonitoringAnomaly detection rulesThreat identification
Incident ResponseAutomated proceduresRapid mitigation

Continuous Security Validation

Continuous security validation ensures our defenses remain effective against evolving threats. These standards establish the framework for ongoing security testing, vulnerability management, and architecture reviews.

MechanismFrequencyScope
Vulnerability AnalysisContinuous in pipelineCode and dependencies
Penetration TestingQuarterlyApplications and APIs
Security ReviewsWith each architectural changeDesign and configuration

Infrastructure

Infrastructure standards define the approved technologies and practices for building, deploying, and managing the foundational IT environment that supports all applications and services. These standards ensure robustness, scalability, security, and operational efficiency across our physical and cloud footprints.

Platform Services

Platform Services cover the core computing, networking, and storage components that form the backbone of our digital operations. These standards provide guidelines for selecting and implementing the fundamental building blocks of our IT infrastructure, ensuring high availability and performance.

Compute & Orchestration

Compute and orchestration standards address the platforms used for virtual machines, container management, server operating systems, and serverless functions, ensuring a consistent and scalable environment for application deployment.

ComponentStandard TechnologyAlternative
Virtualization Platforms for On PremisesVMwareHyper-V
Container OrchestrationKubernetesN/A
Server Operating SystemsWindows ServerLinux (Red Hat or Ubuntu Server)
Serverless ComputingGCP Cloud FunctionsAzure Functions / AWS Lambda

Network Services

Network services standards cover the design, implementation, and management of network infrastructure, including equipment, load balancing, DNS, connectivity, and monitoring, ensuring secure and efficient data flow.

ComponentStandard TechnologyAlternative
Network EquipmentCiscoN/A
DNS ManagementInternal DNS, Public DNSN/A
ConnectivityVPNs (IPSec), Direct Connect / ExpressRouteN/A
Network MonitoringPRTGN/A

Storage Services

Storage services standards define the approved types and platforms for data storage, including block, file, and object storage, along with guidelines for data backup and restoration to ensure data integrity and availability.

ComponentStandard TechnologyAlternative
Storage TypesStorage (GCP)N/A
Storage PlatformsPure Storage, Google StorageCloud Native (Azure Storage, AWS S3)
Data Backup and RestoreVeeam / CommvaultSnapshots

Data Management

Data Management standards focus on the approved technologies for managing various types of databases and data warehousing solutions. These guidelines ensure efficient, scalable, and secure data persistence and analytics capabilities.

Database management standards define the approved relational and NoSQL databases, as well as data warehousing solutions, ensuring optimal performance, scalability, and data integrity for all applications.

ComponentStandard TechnologyAlternative
Relational DatabasesSQL ServerMySQL / Google DB
NoSQL DatabasesMongoDBCassandra / DynamoDB / Cosmos DB
Data WarehousingGoogle BigQueryAzure Synapse Analytics / Amazon Redshift

Cloud Strategy

Cloud Strategy standards outline our approach to cloud computing, including provider strategies, and the adoption of Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) models. These guidelines also cover cloud governance for cost and resource management.

Cloud Computing Fundamentals

Cloud computing fundamentals establish the foundational principles and standards for leveraging cloud services, ensuring a consistent approach to multi-cloud, hybrid cloud, and native cloud deployments, along with effective governance.

ComponentStandard TechnologyAlternative
Cloud Provider StrategyGCPAWS / Azure
IaaS StandardsVirtual Machines, Virtual Networks, Managed DisksN/A
PaaS StandardsManaged Databases, App Services, Functions, Message QueuesN/A
Cloud GovernanceFinOps principles, Cloud Cost Management toolsN/A

IT Operations & Management

IT Operations & Management standards define the tools and processes for monitoring, automation, identity management, CI/CD, and disaster recovery. These standards aim to achieve operational excellence, efficiency, and business continuity.

Operational Excellence

Operational excellence standards ensure robust monitoring, extensive automation, streamlined identity and access management, integrated CI/CD pipelines, and comprehensive disaster recovery plans, critical for maintaining high availability and efficient operations.

ComponentStandard TechnologyAlternative
Monitoring and ObservabilityGrafana + PrometheusTBD
Automation and OrchestrationTerraformTBD
Identity and Access ManagementAzure Active Directory (Entra ID)GCP IAM
CI/CD Platforms for InfraAzure DevOpsGitHub
Disaster Recovery (DR) and Business Continuity (BC)DRaaS Solutions / Cloud Native DR (GCP)Defined RTO/RPO strategies, Regular DR Testing

Infrastructure Protection

Infrastructure Protection standards outline the necessary security controls for network, endpoint, and vulnerability management, as well as privileged access. These standards are crucial for safeguarding the underlying infrastructure from various cyber threats.

Infrastructure Security Controls

Infrastructure security controls establish the defensive measures for network security (firewalls, segmentation), endpoint protection (servers), vulnerability management, and privileged access management, providing a hardened foundation for IT operations.

ComponentStandard TechnologyAlternative
Network SecurityPalo Alto, Network Segmentation, WAFNext-Gen Firewalls
Endpoint Security (Servers)TrelixMicrosoft Defender
Vulnerability ManagementQualysGCP SCC
Privileged Access Management (PAM)TBD (Azure PIM)TBD

Naming Convention

Consistent and standardized naming conventions are fundamental for maintaining a well-organized, manageable, and secure infrastructure. Proper naming facilitates automation, simplifies troubleshooting, enhances readability for operations teams, and supports compliance efforts across on-premises and cloud environments.

Standard Naming Elements

Resource names are constructed by combining several key elements (only for cloud resources, separated by delimiters (e.g., hyphens -). The order and inclusion of these elements may vary slightly depending on the resource type or platform.

ElementDescriptionExample Values
CompanyShort identifier for the company or business unit.PAT
Environment (Env)Indicates the lifecycle stage of the resource.‘PROD’(Production) ‘UAT’(Staging) ‘DEV’(Development) ‘POC’(Proof of Concept) ‘SANDBOX’ (Sandbox)
Region/Location (Loc)Physical or logical geographical location of the resource.SAO (São Paulo) MVD (Montevideo) BUE (Buenos Aires) BOG (Bogotá) MDE (Medellín) NYC (New York) GTW (George Town) EDI (Edinburgh) LON (London) DR (Disaster Recovery) gcp (Google Cloud Platform)
Resource Type (Type)Abbreviation for the type of resource.SRV (Server) WKS (Workstation) NOT (Laptop) MTR (Meeting Room) FW (Firewall) SW (Switch) AP (Access Point) vm (Virtual Machine) vnet (Virtual Network) sg (Security Group) stg (Storage Account) rg (Resource Group) ce (Computer Engine)
Description/Purpose (Desc)Optional short description if needed for specific clarity (use sparingly).On Premises AD: Active Directory DB: Database AP: Application Server AC: Access Control ST: Storage BK: Backup EX: Exchange FS: File Server PS: Print Server MN: Management CA: Certification Authority XA: Citrix XenAPP Cloud dc: Domain Controller fs: File Server ap : Application Server db : Database fw : Firewall bh : Bastion Host rd : Remote Desktop Service rs : Reporting Service
Instance/Index (Idx)Numerical or alphabetical suffix for multiple instances of the same resource within a workload.01, 02, etc

General Naming Structure

While variations may exist, a common structure would be:

Uppercase for on-premises resources and following the standard below:

[Company][Loc][Type][Desc][Idx] PATSAOSRVDB01

Lowercase for cloud resources and following the standard below:

[Company][Loc][Type][Desc][Idx] patgcpcedb04

Exceptions and Deviations

Note

Exceptions: Any deviations from these naming conventions must be documented and approved by the Architecture Review Board. Exceptions should be rare and justified by specific technical constraints or compliance requirements.


References

This document adheres to several established standards and frameworks to ensure robust technology architecture. Key references include:

  • OWASP Application Security Verification Standard (ASVS)
  • NIST Cybersecurity Framework
  • ISO 27001/27002 Security Standards
  • Python Code Style: PEP 8
  • OWASP API Security Project
  • NIST SP 800-53 Security Controls
  • RFC 6749 (OAuth 2.0)
  • OpenAPI Specification
  • REST API Design Rulebook