Closed jasonBirchall closed 5 months ago
Identified the whole process end-to-end https://drive.google.com/file/d/1odJ1Az5lt45EjNgKwnR673aWta6sp2rv/view?usp=drive_link
@imkatiewatson & @AntonyBishop - any chance you can cast your eyes over the document attached and see if it makes sense?
Catching up with members of the team today.
We will use demos today to flesh out the BT and JISC process.
After a discussion with a team member, it was decided that we would include the change process in the document and subsequent questions.
Template created https://docs.google.com/document/d/1XReZmnASl8kaXvYjxZiaFb4XgYlmtBUP8tCQyR1nkV8/edit?usp=sharing
Slack message created and now waiting for a response.
Interviews were conducted, and a report was generated. Report: https://docs.google.com/document/d/1d_dCBi5T6R1_RdLDk4Av-mZVwwhWpY-z_RTXtSa-fN0/edit Chat: https://mojdt.slack.com/archives/CPVD6398C/p1715074826833529
Requirements captured and will be assessed in due course.
User Need
As an Operations Engineering Team
I want to conduct interviews and gather information from our security stakeholders
so that we can understand their requirements, concerns, and expectations regarding the security of our organisation's DNS estate.
Value
This initiative aims to proactively identify and align with our organisation's security needs to ensure our DNS management practices are robust, secure, and compliant with industry standards. By understanding the perspectives of security stakeholders, we can enhance our DNS infrastructure's resilience against attacks, ensure continuity of service, and uphold our commitment to safeguarding organisational and customer data.
Functional Requirements:
Non-Functional Requirements:
Acceptance Criteria:
Notes: