Sei sulla pagina 1di 14

TCS UGDC

Project Requirement Definition


[Check-list for Project Requirements Gathering]
[DRAFT - Version 1.0]

Project Requirement - Version 1.0

Introduction
The requirements are vital to the initiation, conduct, and completion of the needed work.
They are of great importance in achieving the objectives of customers and users.
There

are several levels of requirements gathering:


Business requirements;
User requirements;
Product requirements;
Environmental requirements;
Unknowable requirements.

Customer needs and expectations are analyzed and described in the following ways:

High-level (or system-level) requirements,


Functional requirements (what the system must do),
Performance requirements (e.g., how fast?),
Security requirements,
Availability Requirements,
Connectivity/Interface requirements (relationships between system elements),
Scalability requirements (how easy and in which steps growth can be managed),
Knowledge and qualifications requirements (what people must know to handle the
required item or aspect),
Nonfunctional requirements,
The ilities/specialty engineering requirements,
Derived requirements and design constraints.

TCS Confidential

Project Requirement - Version 1.0

Service/s description:
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
.
Define category (BPO, ODC, ITO, etc.)______________________________________________________
Output from the process
What is expected to be delivered?
_____________________________________________________________________________________________
_____________________________________________________________________________________________
_____________________________________________________________________________________________
Roles and contacts information
Role

Name

Telephones

Email

TCS Confidential

Project Requirement - Version 1.0

1- Project Information
When is considered the project to start? ___/___/______ (dd/mm/yyyy) or ____/________
(mm/yyyy)
Project time horizon. How long the project is supposed to be active? _______(months, years)
Project users.
How many people will be affected to the project in the peak?_______. How many in average?
_______
How many will be from the start? ______
Will the project allow/demand remote users? YES
Will the project demand mobile users?

YES

NO
NO

How many?_______________
How many?_______________

Project environment
1- Is any level of segregation a mandatory requirement ? YES

NO

If YES to previous question:


A separated/isolated DC in needed?
Physical segregation of workspace
Access control requirements

Biometrics

Electronic/Proximity Card

Physical security
Independent Power supply
Domain Controller required
If NO to previous question:
A separated/isolated DC in needed?
Physical segregation of workspace
Access control requirements
Physical security
Independent Power supply
Domain Controller required

TCS Confidential

Project Requirement - Version 1.0

Connectivity
What kind of communication solution will the project demand?
VPN Site to Site
VPN Client to Site
IPLC
Internet access
What kind of usage will the defined link have?
Remote Computing (Citrix, etc)
Remote Desktop
VOIP
Videoconference
Access to a BD or an Application Server
Deploy of source code
Terminal emulation (iSeries, Maninframe, etc)
Would a contingency be required? YES

NO

Maximum concurrent users


__________
__________
__________
__________
__________
__________
__________

What would be minimum usage on contingency_____

Should the contingency be identical to main link? YES

NO

Are there known constraints regarding delay, jitter and latency in communications?
Define maximum acceptable value for delay: _________ ms
If specific monitoring requirements are defined, specify:

_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
______
See Appendix 1 for VPN setting template.

Notes
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
TCS Confidential

Project Requirement - Version 1.0

__________________________________________________________________
__________________________________________________________________

TCS Confidential

Project Requirement - Version 1.0

Servers
Server 1
Main use:____________________________________________________________
OS:____________________________________ Version:____________________________
Applications
Name

Managed by

Special
Requirements

Date required

Disc space needed


:________ Gb
Memory requirements for server
:________ Gb
Processor capacity
:________ (qtty)______ Speed (Ghz)
Need to be visible from outside? YES

NO

If Yes, please specify which services must be published_ _________________________________


Define person to assign administration rights and define scope of IS over the asset.
______________________________________________________________________________
If back-up policy is defined use form in appendix 2 to set requirements.

Server 2
Main use:____________________________________________________________
OS:____________________________________ Version:____________________________
Applications
Name

Managed by

Special
Requirements

Date required

Disc space needed


:________ Gb
Memory requirements for server
:________ Gb
Processor capacity
:________ (qtty)______ Speed (Ghz)
Need to be visible from outside? YES

NO

If Yes, please specify which services must be published_ _________________________________


Define person/s to assign administration rights to and define scope of IS over the asset.
If back-up policy is defined use form in appendix 2 to set requirements.
TCS Confidential

Project Requirement - Version 1.0

Server 3
Main use:____________________________________________________________
OS:____________________________________ Version:____________________________
Applications
Name

Managed by

Special
Requirements

Date required

Disc space needed


:________ Gb
Memory requirements for server
:________ Gb
Processor capacity
:________ (qtty)______ Speed (Ghz)
Need to be visible from outside? YES

NO

If Yes, please specify which services must be published_ _________________________________


Define person to assign administration rights and define scope of IS over the asset.
__________________________________________________________________________________________
If back-up policy is defined use form in appendix 2 to set requirements.

Notes
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
TCS Confidential

Project Requirement - Version 1.0

__________________________________________________________________
__________________________________________________________________
__________________________________________________________________

TCS Confidential

Project Requirement - Version 1.0

Workstations:
Workstation Group 1How many will be needed? From start _________ maximum _________
Project of Profile name:____________________________________________________________
OS (default is Windows XP):_____________________ Version (default sp3):_____________
Applications
Name

Special Requirements

Disc space needed if its above 80 GB


Memory requirements if its above 1GB
Processor capacity (default is DualCore)

Date required

:________ Gb
:________ Gb
:________ (qtty)______ Speed (Ghz)

Is local Administration rights need if for this profile? YES

NO

If YES, please attaching the corresponding documents that shows this need:
Workstation Group2How many will be needed? From start _________ maximum _________
Project of Profile name:____________________________________________________________
OS (default is Windows XP):_____________________ Version (default sp3):_____________
Applications
Name

Special Requirements

Disc space needed if its above 80 GB


Memory requirements if its above 1GB
Processor capacity (default is DualCore)

Date required

:________ Gb
:________ Gb
:________ (qtty)______ Speed (Ghz)

Is local Administration rights need if for this profile? YES

NO

If YES, please attach corresponding documents that shows this need:


__________________________________________________________________________________________
__________________________________________________________________________________________

TCS Confidential

Project Requirement - Version 1.0

Special Services (work in progress)


Mail Local Server:

SI

Software _________________ Version _______________________

NO

Remote server Address :_____________________________

Database Management:
Oracle

SQL Svr

DB2

Database access: ODBC

Informix
OLEDB

MySql

Other _____________________

Other ________________________

Instant Messaging solution : _________________________ Purpose


________________________________
Collaboration tool __________________________________
Document repository ________________________________

Other Desktop software


Code Repository
________________________________________________________________
Office application specify ________________________________________________________________
Data Encryption
________________________________________________________________
Development environment
________________________________________________________________
Data editing
________________________________________________________________
Collaboration
________________________________________________________________

Notes
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
TCS Confidential

Project Requirement - Version 1.0

__________________________________________________________________
__________________________________________________________________
__________________________________________________________________

TCS Confidential

Project Requirement - Version 1.0

Appendix 1
1. General Networking data:
Public IP address of remote Firewall :
Remote internal Net (encryption domain):
Brand and Modelo od clients Firewall:

___________________
___________________
___________________

2. Encryption Data(Phase 1):


Encryption Algorithm (DES, 3DES, AES-256, etc):
Data Integrity (MD5, SHA1):
Diffie-Helman IKE Groups (Group1, Group2, Group3):
Misc (Agresive Mode, disable):

_________
_________
_________
_________

Shared Secret Key: (authentication key), should have been defined at start up.
3. Encryption data (Phase 2):
Encryption Algorithm (DES, 3DES, AES-256, etc):
Data Integrity (MD5, SHA1):
Compression Method (DEFLATE, disable):
Perfect Forward Secrecy (Group1, Group2, Group3, disable):

____________
____________
____________
____________

Values in bold are default values used in TCS-UGDC.


4. Service details
We need to define which services has to be allowed to pass through (inbound, outbound, both ways). If
aplicable, a detail of users name and password has to be provided, and to which specific services.
5. TCSs internal network
IP:Port where local host will be located (if applicable): 172.50.52.0xxx.xxx.xxx.xxx/yy23.

Notes
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
TCS Confidential

Project Requirement - Version 1.0

Appendix 2
Please specify which elements (BD, Folder, System State) should be backed up:
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
Note: In case of DB and if the server is not managed by IS, the project should schedule the
close and open procedure of the BD.
The default backup policy is:
Daily Full (Monday to Thursday) with 1 week of retention
Weekly Full (on Friday) with 1 month of retention
Monthly Full (Last Friday) with 1 year of retention
If you need a different policy please specify:
__________________________________________________________________________________________
__________________________________________________________________________________________
__________________________________________________________________________________________
If its managed by Project, should IS run a specify script or service at startup? YES
If yes please specified this startup procedure:

NO

___________________________________________________________________________________________
___________________________________________________________________________________________
Please take note that:
- if the SO is other than Windows Server, or a online backup for a DB (a backup
without shutdown it) is needed the Veritas agent must be purchased by the project.
- if its managed by project, the project is responsible for Disaster Recovery Plan of
the server, and should be possible just with the backup required.
- if case that a physical server is need, the RRF of it, should be release by project.

Notes
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
TCS Confidential

Potrebbero piacerti anche