Beruflich Dokumente
Kultur Dokumente
Introduction
The requirements are vital to the initiation, conduct, and completion of the needed work.
They are of great importance in achieving the objectives of customers and users.
There
Customer needs and expectations are analyzed and described in the following ways:
TCS Confidential
Service/s description:
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
.
Define category (BPO, ODC, ITO, etc.)______________________________________________________
Output from the process
What is expected to be delivered?
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
Roles and contacts information
Role
Name
Telephones
TCS Confidential
1- Project Information
When is considered the project to start? ___/___/______ (dd/mm/yyyy) or ____/________
(mm/yyyy)
Project time horizon. How long the project is supposed to be active? _______(months, years)
Project users.
How many people will be affected to the project in the peak?_______. How many in average?
_______
How many will be from the start? ______
Will the project allow/demand remote users? YES
Will the project demand mobile users?
YES
NO
NO
How many?_______________
How many?_______________
Project environment
1- Is any level of segregation a mandatory requirement ? YES
NO
Biometrics
Electronic/Proximity Card
Physical security
Independent Power supply
Domain Controller required
If NO to previous question:
A separated/isolated DC in needed?
Physical segregation of workspace
Access control requirements
Physical security
Independent Power supply
Domain Controller required
TCS Confidential
Connectivity
What kind of communication solution will the project demand?
VPN Site to Site
VPN Client to Site
IPLC
Internet access
What kind of usage will the defined link have?
Remote Computing (Citrix, etc)
Remote Desktop
VOIP
Videoconference
Access to a BD or an Application Server
Deploy of source code
Terminal emulation (iSeries, Maninframe, etc)
Would a contingency be required? YES
NO
NO
Are there known constraints regarding delay, jitter and latency in communications?
Define maximum acceptable value for delay: _________ ms
If specific monitoring requirements are defined, specify:
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
______
See Appendix 1 for VPN setting template.
Notes
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
TCS Confidential
__________________________________________________________________
__________________________________________________________________
TCS Confidential
Servers
Server 1
Main use:____________________________________________________________
OS:____________________________________ Version:____________________________
Applications
Name
Managed by
Special
Requirements
Date required
NO
Server 2
Main use:____________________________________________________________
OS:____________________________________ Version:____________________________
Applications
Name
Managed by
Special
Requirements
Date required
NO
Server 3
Main use:____________________________________________________________
OS:____________________________________ Version:____________________________
Applications
Name
Managed by
Special
Requirements
Date required
NO
Notes
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
TCS Confidential
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
TCS Confidential
Workstations:
Workstation Group 1How many will be needed? From start _________ maximum _________
Project of Profile name:____________________________________________________________
OS (default is Windows XP):_____________________ Version (default sp3):_____________
Applications
Name
Special Requirements
Date required
:________ Gb
:________ Gb
:________ (qtty)______ Speed (Ghz)
NO
If YES, please attaching the corresponding documents that shows this need:
Workstation Group2How many will be needed? From start _________ maximum _________
Project of Profile name:____________________________________________________________
OS (default is Windows XP):_____________________ Version (default sp3):_____________
Applications
Name
Special Requirements
Date required
:________ Gb
:________ Gb
:________ (qtty)______ Speed (Ghz)
NO
TCS Confidential
SI
NO
Database Management:
Oracle
SQL Svr
DB2
Informix
OLEDB
MySql
Other _____________________
Other ________________________
Notes
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
TCS Confidential
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
TCS Confidential
Appendix 1
1. General Networking data:
Public IP address of remote Firewall :
Remote internal Net (encryption domain):
Brand and Modelo od clients Firewall:
___________________
___________________
___________________
_________
_________
_________
_________
Shared Secret Key: (authentication key), should have been defined at start up.
3. Encryption data (Phase 2):
Encryption Algorithm (DES, 3DES, AES-256, etc):
Data Integrity (MD5, SHA1):
Compression Method (DEFLATE, disable):
Perfect Forward Secrecy (Group1, Group2, Group3, disable):
____________
____________
____________
____________
Notes
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
TCS Confidential
Appendix 2
Please specify which elements (BD, Folder, System State) should be backed up:
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
Note: In case of DB and if the server is not managed by IS, the project should schedule the
close and open procedure of the BD.
The default backup policy is:
Daily Full (Monday to Thursday) with 1 week of retention
Weekly Full (on Friday) with 1 month of retention
Monthly Full (Last Friday) with 1 year of retention
If you need a different policy please specify:
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
If its managed by Project, should IS run a specify script or service at startup? YES
If yes please specified this startup procedure:
NO
___________________________________________________________________________________________
___________________________________________________________________________________________
Please take note that:
- if the SO is other than Windows Server, or a online backup for a DB (a backup
without shutdown it) is needed the Veritas agent must be purchased by the project.
- if its managed by project, the project is responsible for Disaster Recovery Plan of
the server, and should be possible just with the backup required.
- if case that a physical server is need, the RRF of it, should be release by project.
Notes
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
TCS Confidential