Business domain

The following is the domain checklist:

  • Has the choice for subsystems been argued?
  • Are well-trained substitutes on standby within the production organization?
  • Are well-trained substitutes on standby within the user organization?
  • Is there insurance against the risk of damage caused by faults or disruptions in the information services?
  • Are the backups of vital data stored in a special, extra security location, preferably outside the computer center?
  • Have provisions been made so that, in the instance of serious disturbances or disasters, information services may continue as seamlessly as possible?
  • Has a similar production environment been reserved, for instance in a different computer center, including accompanying procedures for alternative use?
  • Have manual procedures been prepared in order to substitute (parts of) the automated information services?
  • Has it been determined whether additional education is required to operate the new or changed information system?
  • Does an adequate procedure exist in the instance of a disturbance?
  • Is the hardware, and so on, insured?
  • Is a plan for disasters available?
  • Is the access to the organization grounds and buildings controlled?
  • Have measures been taken to prevent, signal, or take care of technical disturbances and disasters?
  • Are the backups of vital data stored in a special, extra security location, preferably outside the computer center?
  • Is access to the computer center restricted to the people who belong there?
  • Do you have a description of the instrumentation included in the application that allows for the health and performance of the application to be monitored?
  • What is the frequency of software changes that must be distributed?
  • What tools are used for software distribution?
  • Are multiple software and/or data versions allowed in production?
  • What is the user data backup frequency and expected restore time?
  • How are user accounts created and managed?
  • What is the system license management strategy?
  • What general system administration tools are required?
  • What specific application administration tools are required?
  • What specific service administration tools are required?
  • How are service calls received and dispatched?
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset