24.01.2015 Views

Technical requirements - Information Technology Services

Technical requirements - Information Technology Services

Technical requirements - Information Technology Services

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

scheduled as needed)<br />

6<br />

d<br />

6<br />

e<br />

SHAWN TO WORDSMITH<br />

Privileged Access (Application,<br />

Database, and System<br />

Administrators)<br />

1. Will adhere to service provider<br />

guidelines<br />

2. Will use secure access<br />

methods (SSH, VPN, or other<br />

approved method)<br />

3. Will include account and<br />

access information within<br />

quarterly report to data<br />

stewards (see 2e, above)<br />

LISA TO WORDSMITH remaining of<br />

6 with Eric Keisler<br />

Where Hosted Who supports the<br />

hosting What hosting functions are<br />

included<br />

Use Case: If System will be housed<br />

in the ITS Data Center or another<br />

ITS­supported facility, consider the<br />

following ­<br />

○ ITS Administrators will<br />

manage the systems<br />

(application, database,<br />

hardware and<br />

operating system)<br />

○ Includes monitoring of<br />

system health, and<br />

alert when<br />

performance targets<br />

degrade<br />

■ Confirm if<br />

non­ITS<br />

service<br />

provider will<br />

receive alerts

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!