NetOps Checklist

  • View
    6.459

  • Download
    2

Embed Size (px)

DESCRIPTION

 

Transcript

  • 1. 3 DISA NetOps4Readiness Review Process56 And78DISA NetOps9Program/System/Application/Service 10 Readiness Checklist 11 13 14 15 16 17 18 Version 2.1 19 31 Aug 2007 20 21 22 Unclassified UNTIL FILLED IN23Circle one of the following:24 25FOR OFFICIAL USE ONLY (mark each page) 26CONFIDENTIAL (mark each page and each finding) 27SECRET (mark each page and each finding)

2. 1UNCLASSIFIED2NetOps Readiness Review Process and P/S/A/S Readiness Checklist, V2.1331 Aug 2007 Defense Information Systems Agency4 28Document Change Record 29 Version ID Date Description Version 131 May 2006Initial Release Version 204 Apr 2007Updated NRRB Process, updated Recommended P/S/A/ S Documentation, updated Requirements and Question Formatting. Updated CFE reviews (Fig 4), CP-SIB and SEPA information. Merge of Process and Checklist documents into one. Version 2.131 August 2007 Updated with administrative comments received as feedback from formal staffing of Version 2 to DISA Directorates. Substantive comments will be addressed in the next major release. 3056 i7UNCLASSIFIED 3. 8UNCLASSIFIED 9NetOps Readiness Review Process and P/S/A/S Readiness Checklist, V2.11031 Aug 2007 Defense Information Systems Agency 11 31Table of Contents 32 331 Introduction.......................................................................................................................1 34 1.1 Background................................................................................................................1 35 1.2 Purpose of the NetOps Readiness Review Process ...................................................1 36 1.3 Scope of the Document..............................................................................................3 372 Definition of NetOps.........................................................................................................4 38 2.1 NetOps Essential Tasks and Desired Effects.............................................................4 39 2.2 NetOps in the DISA Framework................................................................................5 403 DISAs Role in NetOps....................................................................................................6 41 3.1 DISAs NetOps Vision..............................................................................................6 42 3.2 DISAs Implementation of the GIG NetOps Vision..................................................6 434 Management for NetOps...................................................................................................8 44 4.1 DISA NetOps Goals...................................................................................................8 45 4.2 Best Practices to Ensure NetOps................................................................................8 465 NetOps Readiness Reviews............................................................................................10 47 5.1 NetOps Readiness Review Process..........................................................................10 48 5.1.1 NetOps P/S/A/S Readiness Checklist...............................................................11 49 5.1.2 CONOPS Template...........................................................................................13 50 5.2 DISA Roles in Achieving NetOps Readiness..........................................................14 51 5.2.1 The Chief Financial Executive Role.................................................................16 52 5.2.2 The Component Acquisition Executive Role...................................................16 53 5.2.3 The Corporate Board Role................................................................................18 54 5.2.4 The GIG Engineering and the Program Executive Offices Role......................18 55 5.2.5 The GIG Combat Support Directorate Role.....................................................19 56 5.2.6 The GIG Operations Directorate Role..............................................................20 57 5.2.7 Configuration Management Control Process....................................................20 58 5.2.8 Supporting the GIG IA Portfolio (GIAP).........................................................21 596 Appendix A. NetOps Program/System/Application/Service Readiness Checklist.........24 607 GIG ENTERPRISE MANAGEMENT (GEM)..............................................................28 61 7.1 Assignment of Project Officer.................................................................................28 62 7.2 CONOPS with NetOps Section...............................................................................28 63 7.3 Designation of DNC for Management and Control.................................................29 64 7.4 System Status Reporting Requirements and Procedures.........................................29 65 7.5 Situational Awareness (SA)/Critical System Status Reporting ..............................30 66 7.6 DISA NetOps Center (DNC) Specific Requirements..............................................30 67 7.7 Compliance with DISA OSS...................................................................................31 68 7.8 Filtering of Status Data............................................................................................31 69 7.9 Alternate DNC if the Internal Management System is Not Redundant...................32 70 7.10 Automated Drill Down and Query Capability.......................................................32 71 7.11 Integration to DISA Help Desk Center..................................................................33 72 7.12 Trouble Management System (TMS)....................................................................34 73 7.13 Configuration Management Tracking....................................................................34 74 7.14 Proposed Maintenance Schedule for System Devices/Components......................35 75 7.15 Specialized Training Requirements.......................................................................35 12 13 ii 14UNCLASSIFIED 4. 15 UNCLASSIFIED 16NetOps Readiness Review Process and P/S/A/S Readiness Checklist, V2.1 1731 Aug 2007Defense Information Systems Agency1876 7.16 Formal Agreements with Outside (Non-DISA) Organizations.............................3677 7.17 Maintenance of System Diagrams.........................................................................3778 7.18 Approval Process for Changes to the System Architecture...................................3879 7.19 Identification and Registration of System Interfaces.............................................3980 7.20 Key Performance Metrics and Objectives for Service Level Agreement (SLA)81 Monitoring.....................................................................................................................3982 7.21 System Performance Capability ............................................................................4083 7.22 Product Support Plan (PSP)...................................................................................4284 7.23 Employment and Integration of Core Enterprise Services....................................4285 7.24 Does the System Support IPv6.............................................................................43868 GIG NETWORK DEFENSE (GND) .............................................................................4487 8.1 DoD Net-Centric IA Strategy..................................................................................4488 8.3 IA Design Tenets.....................................................................................................4589 8.4 Assignment of Mission Assurance Category (MAC)/Sensitivity Levels................4690 8.5 Integrity and Availability Controls Required for the Assigned MAC Level...........4691 8.6 Confidentiality Controls Required for the Assigned Sensitivity Level...................4692 8.7 Identification of P/S/A/S Need-to-Know Requirements and Access Control93 Procedures......................................................................................................................4794 8.9 Capture and UDOP Display of Security Events .....................................................4895 8.10 Automated Capability for Detecting and Reporting P/S/A/S Security Events and96 Anomalous Behavior.....................................................................................................4897 8.11 IAVM Methodology .............................................................................................499810 GIG CONTENT MANAGEMENT (GCM).................................................................5099 10.1 Metadata.................................................................................................................50 100 10.2 Federated Search Aggregators...............................................................................51 101 10.3 Service Discovery Registry....................................................................................52 102 10.4 Roles-Based Access...............................................................................................53 103 10.5 Smart Push/Pull of Data.........................................................................................54 104 10.6 Publication Mechanism for Smart Push/Pull of Data............................................55 105 10.7 Caching, Content Management, or Other Smart Delivery Mechanisms............56 106 10.8 Receipt and Delivery Notifications........................................................................57 107 10.9 Definition of User Population/COI........................................................................57 108 10.10 Contingency Operations.......................................................................................58 109 10.11 Monitoring and Analysis......................................................................................59 11011 APPENDIX B.