Application Hosting Framework (doc)

advertisement
DIVISION OF INFORMATION TECHNOLOGY
ENTERPRISE ARCHITECTURE
Application Hosting Framework
Version 1.0 – May 2014
Page | 1
v1.0
DIVISION OF INFORMATION TECHNOLOGY
ENTERPRISE ARCHITECTURE
Contents
Introduction ........................................................................................................................................ 3
Support Model Options matrix ........................................................................................................... 4
Internal ............................................................................................................................................ 4
Mixed (Internally hosted with direct vendor application support) ................................................ 4
External ........................................................................................................................................... 4
Business Dimensions ........................................................................................................................... 5
Core versus Non-Core business ...................................................................................................... 5
Enterprise versus Departmental ..................................................................................................... 5
Authentication and Authorisation .................................................................................................. 5
Privacy ............................................................................................................................................. 5
Security ........................................................................................................................................... 5
Cost and impact .............................................................................................................................. 5
Reuse ............................................................................................................................................... 6
Support Standards .......................................................................................................................... 6
Costing Considerations ................................................................................................................... 6
Guiding Principles ............................................................................................................................... 7
Access Control Standards.................................................................................................................... 7
Operational Aspects .......................................................................................................................... 10
Infrastructure ................................................................................................................................ 10
Integration .................................................................................................................................... 14
Application .................................................................................................................................... 15
Records Management (Compliance)............................................................................................. 16
Data ............................................................................................................................................... 16
Exit Strategy .................................................................................................................................. 17
Document Control............................................................................................................................. 17
Page | 2
v1.0
DIVISION OF INFORMATION TECHNOLOGY
ENTERPRISE ARCHITECTURE
Introduction
The purpose of this document is to provide a decision making framework that what should be considered in
determining the method of hosting a solution. It also describes the approved standard options for the support
models for each solution.
It consists of:
 Support Model options
 A list of business dimensions that can be used to assist in making the most appropriate decision
 Costing considerations
 A set of Guiding Principles
 A set of Standards that define the Access Controls that need to be implemented depending on the decision
reached and
 A list of various items relating to operational aspects such as Infrastructure, Data, Integration, Application,
and Records management aspects that need to be considered in the decision process as well as forming a
SLA checklist to underpin the hosting option decided on.
This document recognises that every situation is different and the relative weighting of considerations outlined in
this framework will determine the final decision.
Page | 3
v1.0
DIVISION OF INFORMATION TECHNOLOGY
ENTERPRISE ARCHITECTURE
Support Model Options matrix
This matrix lists the options available for hosting services and applications and reflects who has Primary
responsibility for ensuring correct functionality of the different aspects of the system. Note that the vendor may be
the originator of the application or may be an external support provider.
Operational Layers
Hardware
Operating
System
Application
(1) Internal
DIT
DIT
DIT
(2) Mixed
DIT
DIT
Vendor
(3) External
Vendor
Vendor
Vendor
Internal
CSU provides the hardware and the entire supporting infrastructure. DIT staff has responsibility for all operational
aspects of the system. Application support may leverage advice from the vendor but is executed by DIT staff. The
vendor does not require direct access to the infrastructure.
Mixed (Internally hosted with direct vendor application support)
CSU provides the hardware and the entire supporting infrastructure. DIT staff has responsibility for infrastructure
services but the vendor provides direct support for the application. The vendor connects to the server infrastructure
to manage and maintain the application and works with DIT staff to resolve issues relating to the Hardware and
Operating System.
External
The vendor is responsible for all operational aspects of the application and supporting infrastructure. The server
infrastructure may be located at either the vendor site or a CSU data centre. If the infrastructure is located within a
CSU data centre DIT staff may be occasionally required to assist in operational tasks that require physical proximity
such as cycling power, swapping hardware components etc. They may also be required to assist in analysing
connection problems resulting from the hardware’s location on CSU’s network. The responsibility for problem
diagnosis and all other system functionality remains with the vendor and they should make appropriate provisions to
deal with hardware and system support by their own staff or directly with hardware providers.
Page | 4
v1.0
DIVISION OF INFORMATION TECHNOLOGY
ENTERPRISE ARCHITECTURE
Business Dimensions
Analysis of the following business dimensions may help in the decision making process about what hosting option is
selected.
Core versus Non-Core business
Applications and services that support core business functions rather than ancillary services may be more suitable
for internal hosting. This depends on a variety of factors including legislative requirements, Privacy issues, Levels of
availability and so on.
Enterprise versus Departmental
Enterprise wide systems that are utilised by large numbers of staff and or students often require superior levels of
infrastructure support as well as high levels of integration and commonly have tight dependencies on other
applications. Departmental applications that serve the needs of smaller groups often can be provided with simpler
support levels.
Authentication and Authorisation
Applications commonly require the authentication or identification of users. CSU provide a single sign on system
using SAML2 (implemented by Shibboleth). CSU are investigating support for Microsoft Federated Active Directory.
Applications requiring authentication by students are expected to support CSU single sign on – therefore
authenticated student systems should be internally hosted unless they support SAML2.
Where applications are used only by staff we prefer use of Single Sign On but this requirement may be waived,
especially where there are a small number of users.
Authorisation is the association of roles and privileges with particular authenticated users. Internally hosted systems
may leverage information from CSU Roles, IGMS and LDAP to support groups for authorisation. Access to these
centrally managed groups is likely to be more difficult for externally hosted applications.
Privacy
Recent legislative and policy requirements require us to vigorously protect our users privacy. Whether hosting
internally or externally we must review privacy and security requirements. For external hosting this must include
negotiating contractual safeguards that adequately address our obligations in this area. Externally hosted
applications should be compliant with the CSU Cloud Information Security and Privacy Policy (Pending Publication)
Security
For the integrity of the application, the protection of the users and the reputation of the University applications must
ensure security. A number of aspects are described in the operational section of this document. Externally hosted
applications should be compliant with the CSU Cloud Information Security and Privacy Policy (Pending Publication)
Cost and impact
Differences in cost between internal and external hosting should be balanced against the potential impact of service
loss. It may be cheaper to host externally but appropriate levels of service may not be available from the vendor or
conversely an externally hosted applications may have greater service level guarantees but the costs may be
prohibitive.
Page | 5
v1.0
DIVISION OF INFORMATION TECHNOLOGY
ENTERPRISE ARCHITECTURE
Reuse
If one business unit has a business need than often other units may have the same or similar needs. Hosting
externally may limit the scope of other applications integrating with the service or other business units making use
of functionality within the application. Hosting externally may make integration more complex and therefore more
costly.
Support Standards
DIT has a set of application and infrastructure standards that define and attempt to constrain the variety of
hardware, operating systems, database environments and supporting software stack products that they have to
support and maintain skill sets for. If the application falls outside the standards than it should ideally be hosted
externally. Moreover DIT hosting will provide a best effort level of support where problems occur – external
providers cannot be expected to exceed the standards in their support contracts. Therefore careful consideration
should be given to Service Level Agreements, especially where hosting externally.
Costing Considerations
When analysing hosting costs, a comparison of internal versus external should include the aspects listed in the table
below. While many of these costs may be hidden in general hosting fees (for external providers) and centrally
provided shared infrastructure (for internally hosted systems), costs need to be clarified to assess the true impact.
Because of the dynamic nature of computerised systems and technologies costs should be considered over the
entire lifetime of the solution. Ongoing costs need to be measured not just the establishment cost. It is important to
consider the means by which ongoing costs will be defrayed.
Aspect
Description
Infrastructure Components
Server Hardware
Storage
Backup media
Archive media
Network hardware
Cabling
Power requirements
Environmentally Controlled Data centre
Licensing
Operating System
Database
Storage
Backup Client
Software
Maintenance
Hardware Contracts
Software Contracts
Vendor Support desk calls
Network
Network Traffic
Incoming Off-Net traffic
Support Resources
Analysis & Design
Implementation
Upgrades
Program development
Infrastructure support
After Hours Maintenance
Support Staff Training
Page | 6
v1.0
DIVISION OF INFORMATION TECHNOLOGY
ENTERPRISE ARCHITECTURE
Notes:
1) Business continuity infrastructure needs to be considered where required
2) Incoming network traffic uploaded to CSU hosted servers as well as data from externally hosted (outside AARNET)
systems accessed from within our network is charged to CSU. An externally hosted application primarily accessed by
staff located on the CSU network will have network data costs. Conversely a CSU hosted system to which external
users upload data will also have data costs.
Where the traffic charges are incurred as a result of external hosting or utilisation of an externally provided service
and not the result of user instigated actions the charges should be paid for Organisational Unit responsible for the
external application or service.
Guiding Principles
Solutions outside the Application and Infrastructure support standards – “External”
1. Where appropriate service levels apply, integration and data issues are manageable and cost difference is
not a substantial factor – “External”.
2. If “External” model is not applicable Off the Shelf Applications using “Mixed” model should be used.
3. If “External” or “Mixed” are not appropriate – “Internal”
4. Regardless of the hosting option all operational aspects should have good understanding through an SLA
(“External”), OLA (“Internal”) or Both (“Mixed”)
5. Operational Aspect considerations should be reflected in RFP, RFT, and RFI documents
Access Control Standards
For direct access to server infrastructure to support a CSU application or service, the following controls apply. The
following section lists categories of people that require access and the technologies that provide the various
methods of access to the solution as well as a matrix that defines the level appropriate.
Access Control Matrix
Administrative Access
DIT
Vendor
Non-DIT Staff
Consultant
Unix
(1) SSH2 or (6) OOB or (5)
VmWare
(1) SSH2 and
(2) VPN
(1) SSH2
X
Windows
(3) RDP or (5) VmWare or (7) KVM
(4) Term
(3) RDP
X
Application Support Access
Unix
(1) SSH2
(1) SSH2 and
(2) VPN
X
(1) SSH2 and (2) VPN
Windows
(3) Term
(4) Term
X
(4) Term
Administrative Access
Highly privileged access such as” root” on unix or “Administrative User” on windows. Allows full control over all
operating system functionality
Page | 7
v1.0
DIVISION OF INFORMATION TECHNOLOGY
ENTERPRISE ARCHITECTURE
Application Support Access
Direct access to the Operating System through an account (personal or generic) that has restricted privileges. This
access should be restricted to only the privileges necessary to support the relevant application.
DIT
DIT staff who may be accessing the system from inside the CSU network or externally
Vendor
Support Staff of the application vendor that are providing direct support. They usually access the infrastructure from
outside the CSU network
Non-DIT- Staff
CSU employees that are not DIT staff who are allocated infrastructure for personal use. Examples may include
Academic Platforms and the Innovations environment.
Consultant
Non-CSU staff engaged on a consultancy basis to support applications, develop code, or provide any service that
requires access to the operating system.
Access Technologies
1. SSH2 (Secured Shell)
a. Used on mainly on Unix/Linux systems
b. Encrypted end to end communication
c. Text (CLI) based access
2. Virtual Private Network (VPN)
a. Encrypted End-to-End network connection
b. Needs enabled CSU account in Radius
3. RDP (Remote Desktop Protocol)
a. Full desktop access to server with privileges of account used to log in
b. Encrypted end to end communication
c. Local drive Mapping
4. Terminal Services Gateway
a. Uses RDP protocol
b. Policy Based control of connections
c. Controls Drive Mapping Options
d. Controls User account access to servers
5. VmWare Console
a. Control of Virtual Environment
b. Stop, Start and monitor Virtual Machines and underlying hardware
c. Direct console access
6. Out of Band Management (E.g. Advanced Lights Out Management (ALOM) console)
a. Sun Server Infrastructure
b. Stop and Start Operating System and control hardware (Power Cycle) remotely
c. Direct Console Access
Page | 8
v1.0
DIVISION OF INFORMATION TECHNOLOGY
ENTERPRISE ARCHITECTURE
d. Interfaces in Secure Subnet
7. Remote KVM access
a. Remote Console access to windows servers
Notes:
 Duration of access is limited to the association that the person has with the University. I.e. staff lose access
when their employment is finalised and Vendors and consultants lose access when the relevant contract
expires.
 Vendor and consultant access should be on an ad-hoc basis by arrangement and should be enabled as
required to carry out the necessary work not left open for extended periods.
 Dial-back modem arrangement is in place for storage vendors to perform pre-emptive fault monitoring and
maintenance tasks. This type of access should be contained to the hardware involved.
 Where possible access from a predefined IP range should be enforced to ensure that client machines that are
potential security risks are not being used. (E.g. On consultants home computers or Airport Internet terminals
etc.)
 Supporting vendors and consultants need accounts within the CSU Authentication System. These accounts
need to be created by the business owner and any costs incurred by that account charged to their cost centre
code.
 These controls should be used in conjunction with the “Policy for Remote Access Connection to CSU Network”
(Pending Publication)
Page | 9
v1.0
DIVISION OF INFORMATION TECHNOLOGY
ENTERPRISE ARCHITECTURE
Operational Aspects
Infrastructure
Operating System Patching
The operating system needs to be patched to resolve functional bugs and security vulnerabilities. Patches are
provided by Operating System Vendors and can be applied via several different methodologies.
These include
 Single Patches
 Generic Patch Clusters (Eg Solaris Recommended Patch Clusters)
 Tailored Patch Clusters (Eg. xVM Ops centre)
 Automated Patch Deployment (WSUS, Windows Update)
Backups / Restores
Taking copies of data to Tape media at regular intervals to protect against disk failure, corruption or accidental
deletion as well as restoring the data back to disk on request.
There are different backup methods utilised depending on the importance of the data and the different type.
Unstructured data located on File-systems often utilises incremental backups where only changed files are copied to
tape where this makes little sense for an oracle database for example as all files change regularly and the database is
not in a consistent state unless specific intervention is made prior to the commencement of backups.
Backups are supported by underlying storage technologies such as replication, cloning, and Snapshots
Network Integration
Servers are located in different logical isolated network segments depending on security requirements. Physical
wiring to ports on network devices as well as network card and router configuration determines this. Speed settings
and other network traffic parameters need to be set on the server and the router to ensure correct functionality
Page | 10
v1.0
DIVISION OF INFORMATION TECHNOLOGY
ENTERPRISE ARCHITECTURE
Security
Servers, associated storage, and network traffic are all security touch-points that need to be considered to ensure
applications and data are protected from accidental or malicious activity.
Security Categories include:
 Network
o Firewalls (ACL’s)
o Packet Inspection
o Sub-netting
o Intrusion Detection
o Transfer Encryption
 Server Based Security methods
o Host Firewalls
o Port Activation
o Database Security
o File- System permissions
 Client based security
o Anti-Virus
o Malware protection
o Usage of Public Access Computers
o Data storage on mobile devices
 Physical Security
o Data Centre Security
o Cable Security
 Confidentiality Agreements – should cover not just what use is made of data but how it is accessed.
Monitoring
Network, Server, Storage and Application layers need to be proactively monitored to ensure short term optimal
performance.
Monitoring types include:
 Availability – Uptime of the application and associated supporting infrastructure
 Performance - Adequate application response times
 Resource - CPU, Memory, Storage, network etc are not exceeding predefined limits
Page | 11
v1.0
DIVISION OF INFORMATION TECHNOLOGY
ENTERPRISE ARCHITECTURE
Capacity management
Network, Server, Storage and Application layers need long term resource monitoring and statistical analysis to
ensure infrastructure resources are sufficient to maintain optimal application performance.
This includes:
 Trend analysis
 Demand forecasting
 Resource forecasting
 Modelling
Licensing
Applications and all components of the supporting infrastructure and software stack need to meet the licensing
requirements of the relevant software and hardware vendors. Licensing compliance is an ongoing process.
Authentication
Access to applications as well as the supporting infrastructure needs to be limited to authorised people.
Authentication is the process of ensuring the person requesting access is who they claim to be. Externally hosted
solutions potentially introduce the need for sharing authentication data in a secure method.
Authorisation
Once authenticated a user must be limited to the set of functions they are allowed to perform. This can be based on
group membership of individual permissions.
System Logging
Operating System events such as successful and failed access requests, system errors, issued commands etc are
logged in a variety of system log files.
Uses of these files include
 Detailed Access Auditing- may be requested internally or subpoenaed
 Statistical Analysis
Physical Access
Physical Access to infrastructure and the media that contains data needs to be rigorously controlled
 Data Centre Access
 Media handling and Disposal
Page | 12
v1.0
DIVISION OF INFORMATION TECHNOLOGY
ENTERPRISE ARCHITECTURE
Business Continuity
Business continuity is a wide range of strategies and technologies that allow the business functions of an enterprise
to continue in the event of failure. The extent of the anticipated failure may vary from localised infrastructure failure
to a catastrophic event that requires full geographically remote Disaster Recovery infrastructure. The level of
Business Continuity should be relevant to the business value of the solution
Aspects of Business Continuity include
 Redundancy
 Clustering
 Data Replication
 Failover / Failback
 Alternate business methods (eg Paper Based)

Business continuity requirements are largely driven by the definition of two significant aspects.
 Recovery Time Objectives (RTO)
o What is the guaranteed timeframe for restoration of a working system in the event of catastrophic
failure?
 Recovery Point Objectives (RPO)
o What is the guaranteed minimum period of data loss in the event of catastrophic failure?
Problem Analysis
All solutions encounter problems from time to time. Problem analysis involves identifying faults and failures within
often very complex systems. The “Root Cause” of a problem may cross several infrastructure layers between
Application, Operating System, Storage and Network or could be related to Application Code or application
dependencies. Who is responsible for identifying and resolving system problems should be well defined.
Application Environments
Applications often require different environments with varying degrees of support levels. The following Matrix
defines the supported application environment types.
Application Environments
Environment
Description
Production
Clients conduct business
Quality Assurance
Functional testing of in-house enhancements
Development
In-house enhancements developed and tested
Training
Client application training
Implementation (Build & Test)
New versions implemented and tested prior to migration to
production
Page | 13
v1.0
DIVISION OF INFORMATION TECHNOLOGY
ENTERPRISE ARCHITECTURE
Integration
Authentication and Authorisation
Authentication and Authorisation is currently provided by a set of technologies that are consumers of data located in
the CSU central authentication system (www_access & associated tables). In the future this will evolve into a more
sophisticated Identity Management (IDM) System. Applications where possible should leverage the existing and
future systems to utilise existing usernames and passwords as well as authorisation to services and privileges
associated with their role. If the solution is hosted externally to CSU this may be more difficult and may require
transfers of sensitive data between the application and the CSU IDM system that have the potential to dilute security
or require additional software such as Shiboleth to conduct that exchange in a more secure way.
Data integration
Most applications are either providers or consumers of data in an end-to-end business process. If an application is
hosted externally than the ways in which data is exchanged between applications involved needs to be rigorously
controlled.
 Secure transfer methods need to be implemented to protect privacy and integrity of the data
 Transformation of data between applications needs to be well defined and reflect the appropriate business
rules.
 Dependencies on other CSU applications as well as the timeliness of the data sharing need to be well
defined.
 The differing way the data is represented or interpreted (transformation) between applications needs to be
clearly defined and articulated to ensure business rules are being satisfied and no data is being
misinterpreted.
Program Integration
Some applications provide Application Programming Interfaces (API) with their products. This allows customer
organisations to extract and contribute data in meaningful ways using well defined methods. It can allow nonstructured reporting with a third party tool for example. It also allows the development of supporting functionality
and other dependent applications without having to alter the data structures or modify the baseline code of the
application. Any API’s should be considered when assessing how the application fits into business processes.
Multi-Mastering
Applications that provide an entry point for data that is held in another repository has the potential to reduce data
integrity. If there is a two way data flow between applications there has to be strict business rules to resolve any
data conflicts resulting from concurrent changes.
Page | 14
v1.0
DIVISION OF INFORMATION TECHNOLOGY
ENTERPRISE ARCHITECTURE
Application
Auditing
Many applications log information in Operating System files or in database tables that are not readily accessible to
application users. These files and tables are often interrogated for auditing purposes to establish who accessed
what parts of the application when, where they accessed it from etc. Access to this data may be required for internal
business reasons, by the Universities auditing bodies, or may be subpoenaed in a legal matter. Who has
responsibility for extracting and providing this data needs to be defined
Statistical Analysis
Many applications log information in Operating System files or in database tables that are not readily accessible to
application users. These files and tables may need to be interrogated for statistical analysis purposes. Who has
responsibility for producing the relevant statistical reports needs to be defined
Application and Software Component Patching
Most applications and solutions are built on supporting software components (Software Stack) such as common
application servers, web servers and databases as well as operating system libraries. As well as operating system
patches there are often software stack patches released to address bugs and security vulnerabilities. An agreed
balance must be struck between disruptions to the service, optimal performance and integrity of the data
Installation and Upgrades
Of The Shelf applications introduce unique operational aspects that are not inherent in In-House developed
solutions. One of the major considerations is the original installation of the software and associated Operating
System integration as well as the ongoing implementation of application upgrades.
Responsibility and timing needs to be defined for:
 Who does software installs
 Who does upgrades
 The method of upgrade E.g. Vendor sends out disks or vendor logs on directly
 How often upgrades are performed
 What are the demarcation points? E.g. who prepares Operating System for application install etc.
Page | 15
v1.0
DIVISION OF INFORMATION TECHNOLOGY
ENTERPRISE ARCHITECTURE
Records Management (Compliance)
Retention Periods
There are legislative requirements to maintain certain data for differing periods of time. It is necessary to ensure to
solution and application vendor agreements have the capacity to meet those requirements during the lifespan of the
product as well as after it is decommissioned if required.
Archiving
Archiving usually involves extracting data from an application for the purposes of long term storage to meet the
defined retention periods of the affected data. Data may also be deleted from the application if the retention
requirements are met to improve system performance.
The following need to be considered:
 Media Type – E.g. paper, Magnetic Tape, Optical disk or movement to Records Management solution.
 Record Location – For environmental control, security, access etc
Data
Regulatory requirements
Any regulatory requirements that prescribe where data is to be maintained need to be considered when assessing
the hosting Solution.
Privacy
Privacy legislation relevant to any data stored in the solution or data transferred to and from it need to be
considered and compliance guarantees sought from the vendor and consultants. DIT Staff should be referred to
Confidentiality Agreement arrangements.
Sensitivity
The sensitivity of data should be assessed to ensure adequate levels of security are implemented for the solution.
Some Examples of sensitive data include:
 Profession - E.g. Policing students
 Medical Records - E.g. Dentistry Clinics
 Personal identity E.g. Tax file number, date of birth or other personal details that may be used for identity
theft or Social Engineering purposes
 Financial data E.g. Bank account Details or Credit card Details
 Authentication Data E.g. Usernames and Passwords
Ad Hoc reporting
Solutions hosted externally may have a reduced ability to do unstructured reporting or data mining with nonapplication provided interfaces.
Master Data
Consideration must be given to data held in the solution to determine if it is enterprise or master data that may be
used by another application. If data is held externally than it may be more difficult to conduct data exchange in a
timely or secure manner.
Latency (timeliness of shared data)
The timing of data exchanges may be extended if solution is external.
Page | 16
v1.0
DIVISION OF INFORMATION TECHNOLOGY
ENTERPRISE ARCHITECTURE
Exit Strategy
Any external hosting agreement will need to carefully consider an Exit Strategy in the event of termination of the
contract or insolvency of the company etc.
Contingency strategies need to be in place for:
 Recovery of data or to ensure that the external company no longer maintains CSU data
 Replacement Application
 New Integration interfaces
Document Control
Version
0.1
0.2
1.0
1.0
Page | 17
Author
Kieran Fromholtz
Kieran Fromholtz
Kieran Fromholtz
Kieran Fromholtz
Issue Date
23/04/2010
28/04/2010
29/05/2014
06/02/2015
Revisions
Initial draft.
Cost considerations added
Incorporate feedback/additions from Paul & Luke
Minor adjustments
v1.0
Download