Consulting

OCM-X

OWL has its own project construction consulting methodology based on various project
know-hows experienced in government, public, corporate, and financial institutions.

As a methodology applied to general project construction, there are slight differences for each construction customer.

OCM-X Guide OWL Consulting Methodology Guide

When building, we consult with customers and apply our own consulting methodology provided by OWL. When building, we consult with customers and apply our own consulting methodology provided by OWL.
  1. 1 Envisioning/Education
    • · Establishment of project environment (development environment, project team member composition, etc.)
    • · Application program developer training
      • - DB encryption overview and construction plan
      • - Crypto package distribution
      • - WAS environment setting (API, Plug-in) selection
  2. 2 Analyzing/Design
    • · Identification of customer’s needs/Issue (review of proposal request)
    • · Selection of encryption target
      • - Target server (DB/WAS), DB Table, DB Column, impact analysis (Index/Constraint etc)
    • · Encryption method (API/Plug-in) selection - Encryption algorithm, etc.
      • - Establishment Milestone selection
        (Considering the actual downtime time, the final migration schedule is derived.)
      • - Pre-encryption if necessary
        (encryption from 2 weeks before the last date when migrating hundreds of millions of data)
    • · Actual running server environment measurement (separate measurement software required)
      • -Future comparison data AS-IS vs TO-BE
  3. 3 Pilot/Test
    • · Establishment of pilot (test server) environment
    • · Extracting a sample of the target encryption column
    • · Select target application program (web page jsp, asp, etc.) and transfer sample data
    • · Check the TEST(jsp,asp,etc) Page
    • · Source Modification Guide
    • · Analysis of the scope of query modification of the target encryption column in the application program
      (application program developer)
    • · Analyze the impact of the application program's linkage program (interface)
    • · Fix range schedule
      * Only when the pilot is correctly confirmed, the actual implementation/deployment will proceed.
  4. 4 Setting/Implementation
    • · Package setting on real server (regardless of real service)
    • · Deriving possible scenarios within the downtime time of the last Data Migration (Encryption) day
      • - Data purification and tuning parallelism in the DB server up to this point if necessary
    • * Final Data Migration (Encryption), test and monitoring after completion
  5. 5 Stablizing/Monitoring
    • · Check for normal operation in a real server environment for 1 to 1 week (application program operator)
    • · Checking and fixing bugs on the web page that may occur in the actual application program (developer)
    • · heck for possible bugs in DB (DBA)
    • · Create project deliverables and performance measurement (AS-IS vs TO-BE)
  6. 6 Closure
    • · Security Manager training - Console training
    • · Project inspection (submission of output) and project termination