Showing posts with label Management. Show all posts
Showing posts with label Management. Show all posts

Thursday, January 11, 2024

分享九个厚黑心理学的技巧,

 很多心理学的技巧,看起来非常的简单,却非常的实用,今天主要给大家分享九个厚黑心理学的技巧,高手都在用。

Tuesday, March 26, 2013

Data Center Access / Visitor Procedures


Procedure Background 
       In order to reduce physical exposures to data center equipment, production operations and backed up application data files, access controls are required. This is a preventive measure to safeguard the continuous operation of Company Hubs. Data center access audits are performed quarterly and door checks are performed weekly.


Input(s)  
· The Data Center Facilities Team Lead is responsible to ensure that all IT personnel adhere to the policy of applying for data center access.
· See contact list for appropriate contacts.
· Any member of the workforce may STOP any WORK in progress due to unsafe work methods, conditions causing the area to be unsafe, emergency, or for any other Data Center operational necessity.  All unsafe work methods will be reported to the Data Center Operations Team Lead who will investigate the situation and take corrective action.

Data Center Access/ Visitor Procedure 

Physical Security
· Physical access to all computer rooms must be tightly controlled.  Doors must be locked at all times with only authorized personnel having access.
   - All employees, contractors, and visitors on company premises must wear identification tags at all times. 
   - All visitors and vendors MUST be approved by the Data Center Facilities authorized approvers, visitor access added to their smart card (visitor card), and must be escorted while in the data center.
   - Authorized personnel must not allow unknown or unauthorized individuals into restricted areas.  Unauthorized or unknown personnel not accompanied by authorized personnel, particularly in computer areas, must be challenged (in a tactful manner).  Personnel without a valid reason for being in the computer room must be escorted out of the computer room immediately and Security must be contacted.
   -  Smart card long term access can provide up to 6 months access before it needs to be renewed – via the local site data center access processes.
   -  Visitor or temporary access can provide up to 14 days of access before it needs to be renewed.  The Data Center Facilities Team Lead is not responsible for providing building access
 - only data center access.  Make sure the visitor has been added to the Visitor Management System or equivalent access system prior to their arrival.  For after hours requests that have not been pre-approved, contact the primary and secondary Data Center Facilities Contacts.  They will contact Security and let them know if the request is approved or denied.
   - Security in the Data Centers is the responsibility of the Data Center Facilities Team Lead.  The Data Center Facilities Team Lead will manage security by:
     §  Daily reviews and processing of IT Facilities Data Center Access
     §  Weekly IT Controls - Door Checks
     §  Quarterly audit of all individuals with Data Center Access
     §  Yearly Documentation and Review

Network Questionnaire for Network Administrators (IT Audit)

Example network questionnaire for Network Administrators:

General

1. Please provide an organization chart(s) for all personnel who will be involved with this audit.
2. Please provide a list of contacts.  This list should include the person's name, telephone number, e-mail address, room number, and job description (Ex. UNIX System administrator).
3. Please provide network drawings identifying all firewalls, 
routers, switches, wireless products and other network infrastructure components.
4. Please provide a list of network infrastructure components (firewalls, routers, switches, wireless products, etc).  The list should include the network infrastructure component's name, IP address, manufacture, model number, location, asset owner and IT contact / administrator.
5. Please provide a list of all Internet and third-party connections within your environment.






Routers 
1. Who owns and manages your routers? 
2. Please add to the network component listing the router's operating system version number.
3. For routers providing connectivity to third-party locations, please provide documentation for all tunnels or ACLs configured in each router. 
4. If third-party connections exist, please provide or describe your procedures for reviewing the access-control lists or tunnels with customers.  Also, indicate the frequency of these reviews.
5. Please provide or describe your policies and procedures for router access authentication.  In other words, what is the process for determining who can access or change the router configuration?
6. Please provide a list of people who know the built-in passwords. Please provide or describe your procedures to change the router's administrator password when someone who knows the passwords leaves the group.
7. Is each router covered by a maintenance agreement?  If yes, please describe who is providing the maintenance and the outage response times (either on-site arrival time or replacing broken hardware).
8. Does the maintenance agreement cover software upgrades?  If yes, how is the new software obtained?
9. How do you learn of new releases, service packs or hot-fixes?
10. What are your policies and procedures for installing / upgrading new software releases?  Are these new releases tested before they are put into production? What are your change control procedures for installing new releases, service packs or hot-fixes?
11. Is spare router equipment available?  Please describe.
12. Is a network management station or some other device monitoring the routers?  If yes, please describe.
    13. Are system and configuration router manuals available?  If yes, where are they located?  
14. Are router events logs being reviewed?  If yes, by whom and what is the frequency of review?   Please describe the process.
15. Are backup copies of the router configuration files stored outside of the router? If yes, where are these files stored - please provide the system name, folder or directory and location?  Also, please provide a contact for this storage system. 
16. Are the routers connected to an UPS system? 





Switches 

1. Who owns and manages your switches?
2. Please add to the network component listing the operating system version number.
3. Please provide or describe your policies and procedures for switch access authentication.  In other words, what is the process for determining who can access or change the switch configuration?
4. Please provide a list of people who know the built-in passwords. Please provide or describe your procedures to change the switch's administrator password when someone who knows the password leaves the group.
5. Is each switch covered by a maintenance agreement?  If yes, please describe who is providing the maintenance and the outage response times (either on-site arrival time or replacing broken hardware).
6. Does the maintenance agreement cover software upgrades?  If yes, how is the new software obtained?
7. How do you learn of new releases, service packs or hot-fixes?
8. What are your policies and procedures for installing / upgrading new software releases?  Are these new releases tested before they are put into production?  What are your change control procedures for installing new releases, service packs or hot-fixes?
9. Is spare switch equipment available?  Please describe.
10. Is a network management station or some other device monitoring the switches? If yes, please describe.
     11. Are system and configuration switch manuals available?  If yes, where are they located? 
12. Are backup copies of the switch configuration files stored outside of the switch? If yes, where are these files stored - please provide the system name, folder or directory and location?  Also, please provide a contact for this system. 

Note: A full audit of the network system will identify where improvements can be made that will have a positive effect on the business:)

Problem Management and Communication Process


Problem Management and Communication Process
       Outage Communication Timeline for example Sev 1
Communications activities begin after notification from Help Desk, from users or from Key Production Environment Manager. After initial consultation with responding infrastructure manager or appropriate support team assigned to problem resolution, the Communications Coordinator should complete the following:


After 15 minutes:
       - Verbally drafts content of bulletin announcement and get message placed on the Help Desk number for the ACD Front End Prompt. 


After 1 hour:
       - Send mail, stating awareness of the problem and available impact, resolution and contact information to AP IT Management, IT Managers and support team. 
      - If direct communication with a large group of end users is necessary, coordination will need to occur with Company Communications. 
      - Work with telco to update information on SEV1 bulletin board with updated symptoms, and estimated time of resolution. 


Every hour thereafter:
      - Work with the telco to update and disseminate revised message, stating awareness of the problem and available impact, resolution and contact information to AP IT Management, IT Managers and support team. 
     - Work with telco to update information on SEV1 bulletin board with updated symptoms, and estimated time of resolution.
     - Escalated the problem to the subject matter expert to look in to the matter
     - Should be updated every hour until resolution. if “There is no estimated resolution time” or “The estimated resolution time is about 2 hours”


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Attention to All User



Please be informed that there is a problem with network connectivity. Support personnel are currently working on this issue.


Impact:
       Access to services like Email and Instant Messaging were affected and has been back to normal.
       SAP and Intranet access may still have some problems. 



For any clarification please contact the Help Desk on 6XXX-1XXX or +6X (X) 8XXX-XXXX. Thank you.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Update:

Network team working on Core connectivity problem as it is suspected that the Core Link is dropping packets. 
There will be an activity on the Core equipment to resolve the issue at around 21:00 - 23:00 pm US Time.



Impact:
       Currently eMail delivery from Internet/External is delayed. SAP and Intranet access may be slow.
       Internet/Intranet access maybe disconnected during the 21:00 pm activity. 

YouTube Channel