Information Security Network Connectivity Process - USPS.com
Information Security Network Connectivity Process - USPS.com
Information Security Network Connectivity Process - USPS.com
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Network</strong> <strong>Connectivity</strong> <strong>Process</strong> 3-9<br />
3-6 Approval<br />
3-7 Implementation<br />
3-8 Escalation Procedures<br />
3-9 Monitoring<br />
If the request is approved, the NCRB chairperson, or his or her designee<br />
notifies the executive sponsor of the decision, and the NCRB-approved<br />
connectivity request package is forwarded to the implementation<br />
organizations for review and scheduling the implementation.<br />
The implementation engineers review the implementation requirements of<br />
the request and schedule the implementation.<br />
The chairperson, NCRB, or his/her designee is available to provide technical<br />
guidance throughout the network connectivity process. The request is<br />
implemented based on the approved request and is <strong>com</strong>pleted by the<br />
appropriate implementation group. A confirmation e-mail of the<br />
establishment of connectivity is sent to all the contacts listed on the request.<br />
The requester should test the connectivity when notified that the<br />
implementation has been <strong>com</strong>pleted. If there are any problems, the<br />
implementation group should be contacted to resolve any problems.<br />
If a request is not approved, the executive sponsor can escalate it to the<br />
NCRB CCB.<br />
All extranet connections are monitored to ensure the connection is not a<br />
threat to the Postal Service network infrastructure. See Handbook AS-805,<br />
Chapter 14, Compliance and Monitoring.<br />
September 2009 17