<Project Name> Solution Architecture Preliminary System Design



Similar documents
Jitterbit Technical Overview : Microsoft Dynamics AX

Jitterbit Technical Overview : Salesforce

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Cloudbuz at Glance. How to take control of your File Transfers!

Integrating F5 Application Delivery Solutions with VMware View 4.5

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

LinuxWorld Conference & Expo Server Farms and XML Web Services

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

CONDIS. IT Service Management and CMDB

Designing a Cloud Storage System

MS Design, Optimize and Maintain Database for Microsoft SQL Server 2008

JReport Server Deployment Scenarios

Jitterbit Technical Overview : Microsoft Dynamics CRM

Outline SOA. Properties of SOA. Service 2/19/2016. Definitions. Comparison of component technologies. Definitions Component technologies

3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19

Altus UC Security Overview

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

How To Secure Your Data Center From Hackers

Cisco and VMware Virtualization Planning and Design Service

Citrix XenServer Backups with Xen & Now by SEP

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Load Testing and Monitoring Web Applications in a Windows Environment

Technical Proposition. Security

IT Architecture Review. ISACA Conference Fall 2003

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Implementing a Microsoft SQL Server 2005 Database

Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions

Cisco Application Networking for IBM WebSphere

Ignify ecommerce. Item Requirements Notes

Course 5431: Getting Started with Microsoft Office PowerPoint Course 5420: Editing and Proofreading Documents in Microsoft Office Word 2007

PROPALMS TSE 6.0 March 2008

Stock Trader System. Architecture Description

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM

GRAVITYZONE HERE. Deployment Guide VLE Environment

Ecomm Enterprise High Availability Solution. Ecomm Enterprise High Availability Solution (EEHAS) Page 1 of 7

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Chapter 1 - Web Server Management and Cluster Topology

Oracle WebLogic Server 11g: Administration Essentials

Alfresco Enterprise on Azure: Reference Architecture. September 2014

F5 and Oracle Database Solution Guide. Solutions to optimize the network for database operations, replication, scalability, and security

SOA REFERENCE ARCHITECTURE: WEB TIER

Oracle Identity Analytics Architecture. An Oracle White Paper July 2010

Sentinet for BizTalk Server SENTINET

Citrix XenDesktop Backups with Xen & Now by SEP

How To Create A Network Access Control (Nac) Solution

Last Updated: July STATISTICA Enterprise Server Security

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

Fax Server Cluster Configuration

SOA REFERENCE ARCHITECTURE: SERVICE TIER

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL

Virtual machine interface. Operating system. Physical machine interface

CLOUD ARCHITECTURE DIAGRAMS AND DEFINITIONS

Citrix XenServer Backups with SEP sesam

Whitepaper: Back Up SAP HANA and SUSE Linux Enterprise Server with SEP sesam. Copyright 2014 SEP

Chapter 4. Architecture. Table of Contents. J2EE Technology Application Servers. Application Models

Building a SaaS Application. ReddyRaja Annareddy CTO and Founder

SolarWinds Log & Event Manager

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

AquaLogic Service Bus

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

Customer Service Description Next Generation Network Firewall

Things You Need to Know About Cloud Backup

ORACLE DATABASE 10G ENTERPRISE EDITION

PARTNER INTEGRATION GUIDE. Edition 1.0

Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus

Oracle Net Services for Oracle10g. An Oracle White Paper May 2005

TIBCO StreamBase High Availability Deploy Mission-Critical TIBCO StreamBase Applications in a Fault Tolerant Configuration

High Availability for Citrix XenApp

CASE STUDY: Oracle TimesTen In-Memory Database and Shared Disk HA Implementation at Instance level. -ORACLE TIMESTEN 11gR1

Best Practices for PCI DSS V3.0 Network Security Compliance

Designing a Windows Server 2008 Applications Infrastructure

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Vendor Audit Questionnaire

SSM6437 DESIGNING A WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE

Control and management of privileged users

REQUEST FOR INFORMATION (RFI) Health Interface Engine Solution

Simplifying Processes Interoperability with a Service Oriented Architecture

Client Requirement. Why SharePoint

CloudCERT (Testbed framework to exercise critical infrastructure protection)

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

WebArrow: System Overview and Architecture Namzak Labs White Paper,

Sophisticated Common Data Environment (CDE) with BIMaaS Platform

Storage Guardian Remote Backup Restore and Archive Services

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang

Information Security Services

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

ITDUMPS QUESTION & ANSWER. Accurate study guides, High passing rate! IT dumps provides update free of charge in one year!

INCIDENT RESPONSE CHECKLIST

IBM Security Access Manager, Version 8.0 Distributed Session Cache Architectural Overview and Migration Guide

Transcription:

<Project Name> Solution Architecture Preliminary System Design Gate 2 Date: <dd/mmm/yyyy> Version: <nn.nn> <Company Name> <Company Logo>

Gate 2 Change Log Any moderate or significant changes to the solution design must be resubmitted to TSG for review and approval prior to making any actual implementation change(s). In most cases, the review and approval of any changes would be performed internally within TSG. Notes: 1. Use of a word processing automated change tracking feature is required when resubmitting this document in order to simplify the review and approval process. Once a version of the document has been approved, then that version of the document should be saved for archival purposes. Prior to submitting a new version of the document, all prior tracked changes should be accepted. This process for resubmission can then be repeated as many times as necessary until the final approval has been issued. 2. Failure to resubmit changes for review and approval could result in a recommendation by TSG that the project approval status be reconsidered. If there are any questions as to whether or not a change is substantive enough to warrant review and approval, please send an email on eau.mita@gov.mt for clarification. 3. Maintain a summary of changes in the table below. Change Log Summary Description (For instructional purposes examples have been provided) Version Date Solution Architecture Document Template Version: 1.1 Page 2 of 8

2. Gate 2: Preliminary Solution Design The Preliminary Solution Design Section has been designed to capture only the most essential information required to obtain Preliminary Design approval. While the items listed are not intended to be an exhaustive list of the possible technologies that may be utilized in the implementation of an application, it does reflect some of the more common choices as well as important items that should be considered during the design phase. 2.1 Preliminary Solution Checklist Disclaimer: Any technologies listed below have been provided solely for convenience, the information provided is not intended to be exhaustive nor does it indicate product endorsement by TSG. Preliminary Solution Checklist Responses Select all that apply Development Approach Commercial Off The Shelf (COTS ) Software License Framework Web Based Architectural Approach Processing Type Development Platform Architectural Framework(s) Architectural Pattern(s) Free Libre Open Source Software (FLOSS) Commercial Open Source Custom / Bespoke Note: Customizations to COTS or FLOSS solutions must be limited to 10% and be fully supported in future releases or versions NOTE: Specify License Framework. Such as GPLv3, EUPL, LGPL, BSD, etc. Yes No Virtualizable: Yes No NOTE: For non web based solutions indicate if the desktop application can be abstracted via virtualization. SOA 3/N Tier Other (specify): OLTP OLAP Other (specify): J2EE.NET Other (specify): Version STRUTS JATO JSF Other (specify): MVC Factory Controller Data Access Object Other (specify): Solution Architecture Document Template Version: 1.1 Page 3 of 8

Preliminary Solution Checklist Application Communication Technologies (Within the Solution Domain) Responses Select all that apply Service Interface: Web Services (HTTP, XML, SOAP, WSDL, UDDI) Public Facing Internal Facing Messaging / Message Queuing Solution Integration Technologies (Both for service provisioning and service consumption) Platform Specific:.NET Remoting EJB/RMI IIOP Other (specify): XML Web Services Messaging EDI CORBA IIOP Adaptors Secure FTP Proprietary API via Other (specify): Security Technologies Note: Kindly fill in the Service Contract/ Adapter Definition template (Refer to Appendix A), to include any additional information with respect to the service/s being offered through the solution. Secure Authentication: Secure transport : Secure Storage: Other Scenario where data is persisted on in transit (specify): Provide the security technologies which have been used in the mentioned contexts. The government adopted specifications related to Encryption and signing algorithms can be found on http://ictpolicies.gov.mt/ Solution Architecture Document Template Version: 1.1 Page 4 of 8

2.2 Development Quality Description The Development Quality Description section has been designed to capture how quality aspects such as portability, maintainability, extensibility, supportability and re-usability shall be reflected in the software part of the proposed solution. Portability The ability for a solution to be migrated/ installed on a different environment other then the original one, without the need of any code changes. Maintainability Ease of extending the solution functionality, fixing of errors etc. Extensibility The ability for the solution to be extended with ease and with minor modifications (future proof solution). Supportability The ability for the solution to be more efficient in terms of product maintainability thus reducing operational costs (installation, configuration and monitoring) maintaining business continuity. Re-usability The ability to use modified or unmodified solution components (subroutines etc.) in other solutions. Solution Architecture Document Template Version: 1.1 Page 5 of 8

2.3 Preliminary Solution Design Description Provide a diagram (or diagrams) with corresponding narrative that depicts an accurate and detailed description of the preliminary design for the entire application. The design must document how each of the requirements specified in the conceptual design will be logically accomplished. The preliminary design must align with the Principles, Practices, and Standards that are published in the http://ictpolicies.gov.mt and https://www.mita.gov.mt/edev portals respectively. At this point, properties such as scalability, availability, and security posture should be reflected. External network connection speeds (for both the citizen and employee) should be documented. The supporting application should perform at acceptable levels when utilizing lowest common access speeds. Specify any known hardware and software details (brand, model, version, etc) for clients, servers, and other network infrastructure; programming languages selected, and deployment location (i.e. server location where code is deployed). Interfaces must be identified. Line of Business Application Logical Design Zone 0/1 Internet Citizen (5000 Transactions Per day SSL Transaction Zone Firewall Load Balancer Transaction Zone (Hardened DMZ) Web Server Zone 2 Firewall Zone 2 (Internal Network) Employee Desktop (N=300) Zone 3 Firewall Zone 3 (Hardened Internal Network) Appl. Server (Cluster) DB Server (Mirror) Remote Access Employees (N=50) Field Employees (N=100) WAN Identity Access Management System Zone 3 Firewall EDI Dedicated Circuit External Business Partner Service Broker External Agency Application Common Payment Service (CC and ACH) Credit Card Authorization SAMPLE Solution Architecture Document Template Version: 1.1 Page 6 of 8

2.4 Solution Architecture Quality Description The Service Quality Description section has been designed to capture how quality aspects such as Performance/Throughput, Security, Integrity, Reliability, Availability, Scalability, Manageability, Serviceability and Recoverability shall be reflected in the proposed solution. Fill in the applicable section hence reflecting how the solution shall be delivered. Performance/Throughput Response times: how fast the solution handles individual requests in terms of user experience. Throughput: how many requests the solution can handle. Concurrency: how many users or threads work simultaneously where applicable Security Authentication: The substantiation of the identity of a person or entity related to the solution in some way. Authorization: The definition and enforcement of permitted capabilities for a person or entity whose identity has been established. Audit: The ability to provide forensic data attesting that the solution was used in accordance with stated security policies. Assurance: The ability to test and prove that the solution has the security attributes required to uphold the stated security policies. Asset Protection: The protection of information assets from loss or unintended disclosure, and resources from unauthorized and unintended use. Administration: The ability to add and change security policies, add or change how policies are implemented in the solution, and add or change the persons or entities related to the solution. Integrity The capability for an application to bring data or a function from one application program together with that of another application program. Reliability The ability for a solution to be aware of the hardware and software components to determine where and why failure is high and consequently is able to apply actions in order to reduce failure. Availability The ability of the solution to function without service interruption or depletion despite abnormal or malicious events. Scalability A property of a solution or process, which indicates its ability to either handle growing amounts of work (in terms of work load Solution Architecture Document Template Version: 1.1 Page 7 of 8

capacity computational power etc.) in a graceful manner or the ability and ease of enhancing the solution to handle new requirements. Manageability The building blocks of manageability can be viewed as Deployable: Solution deployment (moving or replication of information or binaries) aspects. Diagnosable: Ability for Solution to provide auditing functionality to enable easy tracing and diagnosis of errors/ issues. Disaster-recoverable: The ability for the solution to recover from run-time crashes; considerations should also include data recovery aspects. Serviceability The ease and extent of changes that can be affected without interrupting the application and the environment, consequently affecting availability. Recoverability The ability towards a fast, easy, and reliable recovery of business data from virtually any disruption or event. Solution Architecture Document Template Version: 1.1 Page 8 of 8