Closed FranECross closed 1 month ago
I've added some information and will need Chris to review and edit as well. Targeting Sprint 14.
@FranECross I have made some additions but other than that looks good to me! Let me know if I have missed anything.
@chriskim2311 Thanks! I'll review today and ping you with any questions.
@FranECross reminder to review and clsoe when you get a chance
Closing as complete; appropriate collab ticket submitted
Status
[2024-09-26] [Fran] I added as much info as I could and this now needs Chris to review/edit as needed. I'll then take the info below and submit the appropriate Readiness Review ticket.
Description
As part of the Staging review for the Discharge Upgrade Wizard, I need to submit a Privacy, Security & Readiness Review ticket. I've captured below the ticket contents/questions, and will completed the information in collaboration with the FE engineer working on DUW,
AC
Readiness Review Ticket info below
Note that this will be copied/pasted into the official ticket and submitted.
Guidance
va.gov-team-sensitive
and answer the questionnaire in its entirety.Stakeholders from the requesting team
Questions to be Answered
The following product or feature descriptions may be answered with a reference link to the team’s documentation. However, the provided links must be specific to the request.
Please describe what problem this product or feature solves.
Please describe a plan to monitor this code base after deployment, including the following scenarios (NOTE: If you don't (yet) have such a plan, or don't know how to get started with one, we can work on this with you!). N/A The Discharge Upgrade wizard is un-authed, where a user chooses radio buttons or a dropdown select for answers, and nothing is stored. It doesn’t have any external or API dependencies, so there is nothing to monitor.
The code base is compromised at source- or run-time.How does the code base get disabled in the product?How would you detect a compromise?What process and privilege does the code base execute under?If so, is that process isolated?If so, what additional credentials are available to that process?The code base is infiltrated or ex-filtrated.Links to dashboards that help identify and debug application issues[N/A] Provide your Release Plan with the "Planning" sections completed (in each section: Phase I, Phase II, Go Live)
[NO] Are there any new application endpoints, front- or back-end? If so, please give examples of how any of the endpoints could be abused by unauthorized parties, as well as a plan to mitigate such threats.
[NO] Is there any new logging data being captured? If so, what data is being captured, how, and where is it stored?
[NO] Is Personal Health Information/PHI, Personal Identifiable Information/PII, or any other Personal Information/PI being captured? If so, please answer the following questions:
[NO] Are there any new, modified, or existing Cookies being used?
Is this feature authenticated or unauthenticated?
[NO] Are there any other specific subjects that you want to highlight or focus additional attention on?
Artifacts
Please provide the following documentation as attachments.
Additional information
Please refer to Platform Collaboration Cycle or the Privacy and Security Review Touchpoint on Platform website for more information about the Collaboration Cycle.
cc @raywangoctova