ISIM HealthCheck

  1. Analysis and Recommendations. To provide the Health Check outlined in the previous section, the following requirements highlight key actions and discovery points of the Health Check Service, for the Prod environment:
  2. Inspect Server Usage for CPU Load (a), Memory Use (b), Disk Use (c), Disk I/O (d), and Network I/O (e)
  3. Inspect Common SSL Certificates for Storage (a), Validity (b), and Expiration (c)
  4. Inspect Security Directory Server for Operational Load (a), Current Version and Fix Pack Level (b), Error Discovery (c), Log Collection (d), Replication (e).
  5. Inspect Security Directory Integrator Server for Operational Load (a), Current Version and Fix Pack Level (b), Error Discovery (c), Log Collection (d), Assembly Line configurations (e), and Administration and Management Console configuration (f).
  6. Inspect Security Identity Manager for Operational Load (a), Current Version and Fix Pack Level (b), Error Discovery (c), Log Collection (d), Audit and Activities Reports (e), Service Type and Service Versions (f), Service Configuration (g), Workflow activities (h), Policy configuration (i), Role use (k), and custom ACIs (j).
  7. Inspect DB2 for Operational Load (a), Current Version and Fix Pack Level (b), Error Discovery (c), Maintenance Reports (d), Audit Reports (e), Schema Statistics (f), and Replication (g).
  8. Inspect custom application integration points for Error Discovery (c), and Log Collection (d).
  9. Inspect Common Log Management Configuration.
  10. Inspect or Confirm current Load Balancer configuration, and Inspect Round Robin and Active/Passive configurations related to the Identity Management Solution.
  11. Inspect or Confirm Network Routing and Firewall rules related to the Identity Management Solution.
  12. Provide Same-Day Report of any Critical Issues, and Conduct Onsite Review of Highest Priority Corrections or Recommendations.
  13. Review Dev and UAC environments from the best practices perspective
  14. Create summary report of Recommended and Required Corrective Actions.
◦ Solution health concerns will be classified by severity, and prioritized against your corporate goals and pain points, as well as against IBM Security Advisories and current audit requirements. Where appropriate, Blue Bay Technologies will make recommendations for the higher priority concerns.
◦ High priority health concerns that will be included are necessary fix packs to address evolving security requirements, and comparing security capabilities of newer product versions versus currently installed versions.