-
Notifications
You must be signed in to change notification settings - Fork 6
/
SCOM.html
executable file
·126 lines (96 loc) · 10.6 KB
/
SCOM.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>SCOM</title>
</head>
<body>
<h1>1. Scope. </h1>
<p>This section shall be divided into the following paragraphs.</p>
<h2>1.1 Identification.</h2>
<p>This paragraph shall contain a full identification of the system and software to which this document applies, including, as applicable, identification number(s), title(s), abbreviation(s), version number(s), and release number(s).</p>
<h2>1.2 System overview.</h2>
<p>This paragraph shall briefly state the purpose of the system and the software to which this document applies. It shall describe the general nature of the system and software; summarize the history of system development, operation, and maintenance; identify the project sponsor, acquirer, user, developer, and support agencies; identify current and planned operating sites; and list other relevant documents.</p>
<h2>1.3 Document overview. </h2>
<p>This paragraph shall summarize the purpose and contents of this manual and shall describe any security or privacy considerations associated with its use.</p>
<h1>2. Referenced documents.</h1>
<p>This section shall list the number, title, revision, and date of all documents referenced in this manual. This section shall also identify the source for all documents not available through normal Government stocking activities.</p>
<h1>3. Software summary.</h1>
<p>This section shall be divided into the following paragraphs.</p>
<h2>3.1 Software application. </h2>
<p>This paragraph shall provide a brief description of the intended uses of the software. Capabilities, operating improvements, and benefits expected from its use shall be described.</p>
<h2>3.2 Software inventory.</h2>
<p>This paragraph shall identify all software files, including databases and data files, that must be installed for the software to operate. The identification shall include security and privacy considerations for each file and identification of the software necessary to continue or resume operation in case of an emergency.</p>
<h2>3.3 Software environment.</h2>
<p>This paragraph shall identify the hardware, software, manual operations, and other resources needed to install and operate the software. Included, as applicable, shall be identification of:
<ol type="a">
<li>Computer equipment that must be present, including amount of memory needed, amount of auxiliary storage needed, and peripheral equipment such as terminals, printers, and other input/output devices</li><br/>
<li>Communications equipment that must be present</li><br/>
<li>Other software that must be present, such as networking software, operating systems, databases, data files, utilities, permanent files that are referenced, created, or updated by the software; and databases/data files necessary to resume operation in the event of emergencies</li><br/>
<li>Forms, procedures, or other manual operations that must be present</li><br/>
<li>Other facilities, equipment, or resources that must be present</li>
</ol>
</p>
<h2>3.4 Software organization and overview of operation.</h2>
<p>This paragraph shall provide a brief description of the organization and operation of the software from the operator's point of view. The description shall include, as applicable:
<ol type="a">
<li>Logical components of the software, from the operator's point of view, and an overview of the purpose/operation of each component</li><br/>
<li>Types of inputs/access that can be made to the software and the software's response to each type</li><br/>
<li>The reports and other outputs that are produced by the software, including security and privacy considerations for each</li><br/>
<li>Typical run times and factors that affect it</li><br/>
<li>Organization of software operation into runs. This description shall use a chart, if applicable, showing how the different operations are interrelated. If sets of runs are grouped by time periods or cycles, each set of integrated operations required on a daily, weekly, etc., basis shall be presented. If runs may be grouped logically by organizational level, the groups of runs that can be performed by each organizational level such as headquarters processing, field activity processing, etc., shall be presented.</li><br/>
<li>Any system restrictions, waivers of operational standards, information oriented toward specific support areas (for example, library, small computer and teleprocessing support, interfaces with other systems), or other special aspects of processing</li><br/>
<li>General description of the communications functions and processes of the software, including, as applicable, a diagram of the communications network used in the system</li>
</ol>
</p>
<h2>3.5 Contingencies and alternate states and modes of operation.</h2>
<p> This paragraph shall explain the differences in software operation at times of emergency and in various states and modes of operation, if applicable.</p>
<h2>3.6 Security and privacy.</h2>
<p>This paragraph shall contain an overview of the security and privacy considerations associated with the software. A warning shall be included regarding making unauthorized copies of software or documents, if applicable.</p>
<h2>3.7 Assistance and problem reporting.</h2>
<p>This paragraph shall identify points of contact and procedures to be followed to obtain assistance and report problems encountered in operating the software.</p>
<h1>4. Installation and setup.</h1>
<p>This paragraph shall describe any procedures that the operator must perform to install the software on the equipment, to configure the software, to delete or overwrite former files or data, and to enter parameters for software operation. Safety precautions, marked by WARNING or CAUTION, shall be included where applicable.</p>
<h1>5. Description of runs.</h1>
<p>This section shall be divided into the following paragraphs to provide a description of the runs to be performed. Safety precautions, marked by WARNING or CAUTION, shall be included where applicable.</p>
<h2>5.1 Run inventory.</h2>
<p>This paragraph shall provide a list of the runs to be performed, identifying the software and the jobs that make up each run. It shall include a brief summary of the purpose of each run and shall relate the list to the run descriptions included in the remainder of this section.</p>
<h2>5.2 Phasing.</h2>
<p>This paragraph shall describe acceptable phasing of the software into a logical series of operations. A run may be phased to permit manual or semiautomatic checking of intermediate results, to provide the user with intermediate results for other purposes, or to permit a logical break if higher priority jobs are submitted. An example of the minimum division for most systems would be edit, file update, and report preparation.</p>
<h2>5.3 Diagnostic procedures.</h2>
<p>This paragraph shall provide the setup and execution procedures for any software diagnostics. Included shall be procedures for validation and trouble shooting. All parameters (both input and output), codes, and range values for diagnostic software shall be explained.</p>
<h2>5.4 Error messages.</h2>
<p>This paragraph shall list all error messages output by the software, along with the meaning and corresponding correction procedure for each message.</p>
<h2>5.5 Description of each run.</h2>
<p>This paragraph shall be divided into the following subpara-graphs.</p>
<h3>5.5.x Run description for (run name or identifier).</h3>
<p>This paragraph shall identify a run and shall be divided into the following subparagraphs to describe the run. </p>
<h4>5.5.x.1 Control inputs.</h4>
<p>This paragraph shall provide a listing of the run stream of job control statements needed to initiate the run.</p>
<h4>5.5.x.2 Run management information.</h4>
<p>This paragraph shall provide the information needed to manage the run including, as applicable:
<ol type="a">
<li>Peripheral and resource requirements</li><br/>
<li>Security and privacy considerations</li><br/>
<li>Method of initiation, such as on request, after another run, or at a predetermined time</li><br/>
<li>Estimated run time</li><br/>
<li>Required turnaround time</li><br/>
<li>Messages and responses</li><br/>
<li>Procedures for taking check points</li><br/>
<li>Waivers from operational standards</li>
</ol>
</p>
<h4>5.5.x.3 Input-output files. </h4>
<p>This paragraph shall provide information about the files and databases that serve as input to or that are created or updated by the run. Included for each shall be information such as name, security and privacy, recording medium, retention schedule, and disposition.</p>
<h4>5.5.x.4 Output reports.</h4>
<p>This paragraph shall provide information about the reports that are produced during the run. In-cluded for each report shall be the following information, as applicable: report identifier, product control number, report control symbol, title, security and privacy, media (e.g., hard copy, magnetic tape), volume of report, number of copies, and distribution of copies.</p>
<h4>5.5.x.5 Reproduced output reports.</h4>
<p>This paragraph shall provide information about computer-generated reports that are subse-quently reproduced by other means. Included for each report shall be information such as report identification, security and privacy, reproduction technique, paper size, binding method, number of copies, and distribution of copies.</p>
<h4>5.5.x.6 Procedures for restart/recovery and continuity of operations.</h4>
<p>This paragraph shall provide procedures to be followed by operator personnel concerning re-start/recovery in the event of a system failure and for continuity of operations in the event of emergencies.</p>
<h1>6. Notes.</h1>
<p>This section shall contain any general information that aids in understanding this document (e.g., background information, glossary, rationale). This section shall include an alphabetical listing of all acronyms, abbreviations, and their meanings as used in this document and a list of terms and definitions needed to understand this document.</p>
<h1>A. Appendixes. </h1>
<p>Appendixes may be used to provide information published separately for convenience in document maintenance (e.g., charts, classified data). As applicable, each appendix shall be referenced in the main body of the document where the data would normally have been provided. Appendixes may be bound as separate documents for ease in handling. Appendixes shall be lettered alphabetically (A, B, etc.).</p>
</body>
</html>