IT Infrastructure take-over checklist (CompetenceCloud™ outsourcing services)

What is the take-over checklist required to activate a CompetenceCloud™ outsourcing service?

Leonardo Zanus
Leonardo Zanus
10000
| 2 1 3
Asked on 09/07/15 16.32
0
vote
11528 Visualizzazioni

The following list is a standard guideline and should be customized basing the Client Infrastructure, Market segment, Business size and Agreed Service Level. Please refer to the official CompetenceCloud™ manuals for approved Customer-specific checklist.

  1. Company
    1. Market segment (D-U-N-S classification if possilbe)
    2. Market position (most recent available report)
    3. Structure and participations (diagram)
    4. Core Business line (brief description)
      1. Business-specific regulations (list)
      2. Business-specific best-practices (list)
    5. Secondary Business lines (brief description)
      1. Importance (% on total business)
      2. Business-specific regulations (list)
      3. Business-specific best-practices (list)
  2. Location
    1. HQ
      1. History (brief description)
      2. Addresses
      3. Registered businesses
      4. Notes
    2. Regions (list)
      1. Countries (drill down)
        1. Site type
        2. Main site role
        3. Secondary site roles
        4. Size
          1. SQM
          2. Employees/Associates
        5. Applicable regulations (list)
  3. People
    1. Direct contacts list (local team, partners and people who have been met or interviewed directly)
      1. Full Name
      2. Job Role (official)
      3. Additional roles and responsibilities
      4. Reports to (Manager reference)
      5. Based on (location)
      6. Contacts
        1. e-mail addresses
        2. landline phone numbers
        3. mobile phone numbers
        4. (DR-related contacts only - Data Privacy compliance rule applies)
          1. home landline phone number
          2. personal mobile phone number
        5. fax numbers
        6. skype or other IM contact name
    2. Indirect contacts list (escalation contacts, remote team and managers, people not directly met or interviewed)
      1. Full Name
      2. Job Role (official)
      3. Reason for being in this list
      4. Reports to (Manager reference)
      5. Direct contacts who reports to
      6. Based on (location)
      7. Availability time-zone
  4. Network
    1. Network topology
      1. Network type
      2. High-Level diagram
      3. Sites/Locations
    2. Infrastructure
      1. Network devices inventory
        1. Hardware inventory
          1. Manufacturer
          2. Type
          3. Model
          4. P/N
          5. S/N
          6. Internal Inventory ID
          7. Installed modules
            1. Manufacturer
            2. Type
            3. Model
            4. P/N
            5. S/N
            6. Internal Inventory ID
        2. Cabling/Connections diagram
        3. Configuration inventory
        4. Access credentials (to be stored on secure platforms, eg: dedicated keepass db)
          1. Basic access
          2. Administrator
          3. SNMP comm.
    3. Network services
      1. Traffic shaping
      2. DHCP
      3. DNS
      4. Routing
      5. Directory Services
        1. Active Directory
          1. Diagram
          2. Schema export (first 3 levels, without cn items)
          3. Sites
          4. Controllers
          5. Services and schema extension
          6. Group policies
          7. Logon scripts
        2. Others
          1. Service description
          2. Documentation references
          3. Contacts
          4. Configuration
          5. Security configuration
      6. Firewalling
      7. Proxying
      8. Other
  5. Policies
    1. Data Retention policy (attach)
    2. IGM manual (attach / reference)
    3. Network Access policy (attach / reference)
    4. ISEC manual (attach / reference)
    5. Data Privacy policy (attach)
    6. Other (attach / reference)
  6. Operating Systems and related Hardware
    1. Server
      1. Server class
      2. Server type
      3. OS Vendor
      4. OS Version
      5. OS Build (incl. patch level)
      6. OS Edition
      7. License type and expiration date
      8. Hardware
        1. Manufacturer
        2. Type
        3. Model
        4. S/N
        5. Internal Inventory ID
        6. Installed components
          1. Connection type
          2. Manufacturer
          3. Type
          4. Model
          5. P/N
          6. S/N
          7. Internal Inventory ID
          8. Connected to (Network/Storage device/module /other)
    2. Workstation (list only)
      1. OS Vendor
      2. OS Version
      3. OS Edition
    3. Storage systems
      1. Manufacturer
      2. Type
      3. Model
      4. Edition
      5. Factory date
      6. SP Software Version
      7. SP Software Build
      8. Complete diagram
      9. Sub-devices
        1. Connection type
        2. Manufacturer
        3. Type
        4. Model
        5. P/N
        6. S/N
        7. Internal Inventory ID
        8. Connected to (Network/Storage device/module /other)
  7. Services and Applications
    1. Class (Infrastructure, Office, Manufacturing, R&D,...)
    2. Service Name
    3. Description
    4. Business Risk classification
    5. ISEC classification
    6. Regulations that apply (DP, SOx, HIPAA, ....)
    7. Application Manager (Contact MUST be recorded)
    8. Application Manager Deputy/Backup
    9. B&R Policy (attach or describe in full)
    10. Qualification documents (attach)
    11. Software components
      1. Vendor
      2. Name
      3. Description
      4. Version
      5. Build
      6. Technical name (eg: service/daemon name)
      7. Requirements
      8. Linked Operating System instances (runs on)
        1. Dependencies
        2. Installation procedures (attach)
        3. Qualification documents (attach)
        4. Maintenance/periodic check procedures (attach)
        5. Security configuration
        6. Application configuration
        7. Other
  8. Standard procedures
    1. Documented (list)
      1. Document reference
      2. Title
      3. Scope
      4. Approval date
      5. Version
      6. Owner
    2. Non-documented
      1. Process title
      2. Description
      3. Involved people/roles
      4. Target systems
      5. Flowchart
      6. Responsible
      7. Current status
      8. Attachment references
      9. Note
Leonardo Zanus
Leonardo Zanus
10000
| 2 1 3
Answered on 10/07/15 06.55
0
vote

La tua risposta

Please try to give a substantial answer. If you wanted to comment on the question or answer, just use the commenting tool. Please remember that you can always revise your answers - no need to answer the same question twice. Also, please don't forget to vote - it really helps to select the best questions and answers!

Ask a question

Resta aggiornato

Forum tecnico

This community is for professionals and enthusiasts of our products and services.

Read Guidelines

Question tools

1 follower(s)

Statistiche

Asked: 09/07/15 16.32
Seen: 11528 times
Ultimo aggiornamento: 10/07/15 06.58