|
When
roles and responsibilities are being defined, you should have
a list of people who will be responsible for configuration
and customisation. This list will need to be reviewed, but will
form the basis of developing security profiles. The parts
of the system, and the level of access will need to be determined
by the Project Manager in conjunction with the Business Managers
involved.
A plan should also be put in place to cover the environments
that need to be set up. It may be as simple as one development
and one test environment, or it may be several environments
to develop and test different components, then an integration
environment, and a User Acceptance Testing (UAT) environment.
The plan should cover, security, backup and restore, database
configuration, data available and capacity.
Installation may require support from the Vendor to install
the software and configure it for access. The Vendor may need
to be given several days notice to provide the software and
support staff for the installation. A list of additional software
should also be prepared. This may included operation system,
development tools, security applications, performance monitoring,
drivers, anti virus applications, etc.
|