Question: There is a major development project going on with over 100 developers. It is being performed on a cluster of 80 Linux and Solaris servers

There is a major development project going on with over 100 developers. It is being performed on a cluster of 80 Linux and Solaris servers and workstations and a distributed file system over a large LAN. There are 10 servers doing builds and several used for file systems. The primary application development and testing tool in use is the Micro Focus Application Lifecycle Management (ALM) product. This network also supports a web server, email server and provides the working home directories for all desktop systems. Finally, some of the Linux and Solaris servers support Oracle databases. There is also a Windows domain that is used by non-IT personnel (HR, Finance, etc.). This domain has a few servers running Microsoft SQL Server. The Risk Manager is responsible for reviewing and maintaining the Global Security Policy (GSP) and ensuring that all controls are being performed. In addition, any exceptions should have a Risk Acceptance Form (RAF) associated with it, along with the required approvals. Perform a risk management assessment and a risk mitigation plan for this computing and software tools infrastructure. Identify risks, estimate risk probability and impact, identify the potential for risk mitigation, and identify potential risk responses. Areas of concern: Admin access to the Windows and Unix systems Password configurations may not be set properly for any of the operating environments Unauthorized code changes Backup tapes are suspect. They should be tested quarterly. An alternate power source may not be reliable if the main power fails. These should be tested monthly. Improper database access Context: The project is under delivery pressure and people are already working 10-12 hours a day. The development and production environments may not be as separated as they should be, especially within ALM. There has been quite a bit of turnover. There are now two very junior systems administrators. One of them possesses decent knowledge of Windows, while the other claims to be a Unix expert. They both know just enough about databases to be dangerous. Deliverables. Perform a risk assessment on this system and suggest a mitigation plan. Estimate the probability of each event occurring and the impact. (ANSWER THIS) Executive summary. Provide an assessment of the computing environment and areas of concern. Document the most serious risks. Describe the areas of most concern based on the information above and the probable events that might occur. Do a risk audit and discuss the potential problems. You should add a summary assessment on the current state of the project vs. the ideal state and make recommendations. (ANSWER THIS) At least 5 major risks across all environments

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!