OCM-X
OWL has its own project construction consulting methodology based on various project
know-hows experienced in government, public, corporate, and financial institutions.
As a methodology applied to general project construction, there are slight differences for each construction customer.
OWL Consulting Methodology Guide
-
Envisioning/Education
- · Establishment of project environment (development environment, project team member composition, etc.)
- · Application program developer training
- - DB encryption overview and construction plan
- - Crypto package distribution
- - WAS environment setting (API, Plug-in) selection
-
Analyzing/Design
- · Identification of customer’s needs/Issue (review of proposal request)
- · Selection of encryption target
- - Target server (DB/WAS), DB Table, DB Column, impact analysis (Index/Constraint etc)
- · Encryption method (API/Plug-in) selection - Encryption algorithm, etc.
- - Establishment Milestone selection
(Considering the actual downtime time, the final migration schedule is derived.)
- - Pre-encryption if necessary
(encryption from 2 weeks before the last date when migrating hundreds of millions of data)
- · Actual running server environment measurement (separate measurement software required)
- -Future comparison data AS-IS vs TO-BE
-
Pilot/Test
- · Establishment of pilot (test server) environment
- · Extracting a sample of the target encryption column
- · Select target application program (web page jsp, asp, etc.) and transfer sample data
- · Check the TEST(jsp,asp,etc) Page
- · Source Modification Guide
- · Analysis of the scope of query modification of the target encryption column in the application program
(application program developer)
- · Analyze the impact of the application program's linkage program (interface)
- · Fix range schedule
* Only when the pilot is correctly confirmed, the actual implementation/deployment will proceed.
-
Setting/Implementation
- · Package setting on real server (regardless of real service)
- · Deriving possible scenarios within the downtime time of the last Data Migration (Encryption) day
- - Data purification and tuning parallelism in the DB server up to this point if necessary
- * Final Data Migration (Encryption), test and monitoring after completion
-
Stablizing/Monitoring
- · Check for normal operation in a real server environment for 1 to 1 week (application program operator)
- · Checking and fixing bugs on the web page that may occur in the actual application program (developer)
- · heck for possible bugs in DB (DBA)
- · Create project deliverables and performance measurement (AS-IS vs TO-BE)
-
Closure
- · Security Manager training - Console training
- · Project inspection (submission of output) and project termination