10.07.2015 Views

MyCERT 3rd Quarter 2011 Summary Report - CyberSAFE Malaysia

MyCERT 3rd Quarter 2011 Summary Report - CyberSAFE Malaysia

MyCERT 3rd Quarter 2011 Summary Report - CyberSAFE Malaysia

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

“wire-once” settings pool bare-metalCPUs and network resources, allowingfor on demand assignments, defininglogical configurations and networkconnections instantly.Converged InfrastructuresMaturity ModelAs IT infrastructures are sprawled,the migrations of data centresthrough implementation of convergedtechnologies are essential. It is not anovernight transformation and must bedone in phases. A profound analyticalstudy on the current infrastructures andneeds are crucial. A common practicein monitoring the transformation is byapplying the Capability Maturity Model(CMM). It comprises of five maturitylevels, where the evolutionary areaof stability is well-defined towardsachieving a mature transformationprocess. The five maturity levels providethe top-level structure of CMM.Figure 1 shows the definition of eachlevel under CMM. This would helpan organisation to determine thephases of each level while undergoingtransformation.Level 1 – Initial (unstable)at this level, the processes are disorganised,even chaotic. It is likely to depend onindividual efforts for success. It is consideredto be non-repeatable because processeswould not be sufficiently defined anddocumented to allow them to be replicated.Level 2 – Repeatablethe basic project management techniquesare established, and successes could berepeated, because the requisite processeswould have been established, defined, anddocumented.Level 3 – Definedan organisation has developed or adapted astandard software process through greaterattention to documentation, standardisation,and integration of the whole infrastructure.Level 4 – Managedan organisation is able to monitor andcontrol processes through data collectionand analysis for sustainment of their systemand infrastructure.Level 5 – Optimisingprocesses are constantly being improvedthrough monitoring feedback from currentprocesses and introducing innovativeprocesses to better serve the organisation’sparticular needs.21The intention in setting down the keypractices is not to require or espouse a specificmodel of converged infrastructure migrationlife-cycle, a specific organisational structure,a specific separation of responsibilities, or aspecific management and technical approachto development. The intention, rather, isto provide a description of the essentialelements of an effective migration process.Security FeaturesFigure 1: Capability Maturity ModelThe security solution offered by convergedtechnologies varies from various technologyproviders. The fundamental ideas of howe-Security | Cyber Security <strong>Malaysia</strong> | Vol: 28-(Q3/<strong>2011</strong>)© CyberSecurity <strong>Malaysia</strong> <strong>2011</strong> - All Rights Reserved

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!