PMSL-ISMS-SP-005-Standard Operating Procedure For IT
PMSL-ISMS-SP-005-Standard Operating Procedure For IT
3.0 13th Jan 2014 13th Jan 2014 --- -- Rakesh Kumar Rajesh Yadvendu
4.0 10th Jan 2015 12th Jan 2015 --- -- Rakesh Kumar Rajesh Yadvendu
4.1 9th Jan 2016 9th Jan 2016 Rakesh Kumar Rajesh Yadvendu
5.0 18th Feb 2016 19th Feb 2016 --- -- Rakesh Kumar Sanjay Duda
5.0 8th March 9th March 2017 --- -- Rakesh Kumar Sanjay Duda
2017
5.1 6th May 2017 6th May 2017 --- -- Rakesh Kumar Sanjay Duda
Document Maintenance
Document Custodian
Document Distribution
1-Purpose:
It is the responsibility of all operating units to ensure that these policies are clearly communicated,
understood and followed to the users. These procedures also apply to software,contractors, and
vendors/suppliers providing services to Organization that bring them into contact with Company’s
Information Technology infrastructure.
2-Scope: These procedures apply to all users, whether on Company property, connected from remote
via any networked connection, or using Company equipment.
3-Procedure
Daily Operations:
In case the system is not being fixed anyhow, the system will be changed ASAP.
In case of server and internet issue, the fastest recovery or alternatives are to be identified and implemented
at the time.
Any service or software requirement (daily used software) without which a fraction of work is pending.
The software installation will be subjected to availability and actual need of the software and will be
distributed as per the process owner’s consent.
The Organization deals with extremely confidential information so the access or free traversing through
all the information may be restricted for all the users.
2.1 Active Directory: For centralized user account management, IT department has setup the Active
directory scheme on Linux platform.
The users are grouped and group level access is enabled along with individual access (fig. 2.1a and
2.1b).
Login credentials (active directory) for the new joiners will be created on the written request
(hard copy as well soft copy) of process owner or HR department.
Login credentials (active directory, email id) for the employees leaving the organization will be
removed when we received the clearance report from for the HR department, and then will be
disposed based on the notification provided by Process owner or HR department. The employee
will have to sign a clearance form (Ref- PMSL-ISMS-FO-006-Clearance report form) at the
time of full and final settlement with in the organization.
Information is shared on file server and flow is controlled by access level permissions.
A formal user access provisioning process shall be implemented to assign or revoke access
right for all user types to systems and services.
The allocation of privileged access right shall be restricted and controlled and rights shall be
reviewed at quarter intervals or when ever required by the management.
The operational access to any information will be granted with the approval of the process
owners only. It is understood that before requesting the access for a user, the process owner
knows the possible breaches of the access.The information is shared in two following ways
based on the process owner’s recommendation:
a. Full access.
b. Read Only
3- Firewall:-
PMSL placed a CISCO firewall (model no ASA 5516 and IP is 210.212.88.1 for main and
model no ASA 5516 and IP is 124.124.45.10 for backup ) between the router and switch,all the
traffic will be routed through the firewall.
A formal user access provisioning process shall be implemented to assign or revoke access
right in the server.
We have kept all the data in NAS and logs are saved in syslog server (It is centralize server).
4- Internet access:
The internet access is limited for the user 40 MB per day and for the business purposes only.
The internet access for the users are controlled by the Proxy deployed within the organization
and will be governed through the industry specific information security norms.
Any special access other than standard access; will be granted with the approval of department
head only.
For general internet use, personal web based mail, but any kind of heavy download, song or video
transfer, any kind of discourteous material is strictly prohibited and appropriate action will be
recommended if somebody found indulged in such activity.
5. Backup
Data of the user & server is very critical; to prevent data loss IT department has configured NAS
for automatic scheduled data backup. All user’s data is scheduled on daily basis. For data backup &
Servers backup (Mail, database, Proxy, NMS) are configured on daily basis at 12:00 PM to 2:00
PM and for Active directory backup is schedule on daily basis at 1:00P.M on SVN Client.
1. The minimum server space to be maintained in VIDEO server is 25% (Threshold Value).
2. Whenever Server Space reaches nearby to Threshold value we transfer Old Contents (approx
one week older) to NAS.
3. After Content has been transferred successfully the same will delete from the Server.
4. Access to the backup location and storage safe must be restricted to authorized personnel only.
These individuals must be vetted and approved to have access to the sensitive information backup
systems and media storage cabinets / Fire Protection Systems for preserving the media content.
5. They have taken the content backup in NAS to LTO. For detail description refer to LTO work
flow structure.
MAM LTO
Archive Process.pdf
6. Playout team check the status through VNAS UI on regular basis.In Case of transfer failure, Id
mark as aborted in VNAS UI. User can re-initiate the process manually.
7. Engineer check the TAP status on regular basis.whenever tape is full IT team change the Tape
accordingly.
1. Faulty hardware initially replaced with new hardware so that process could not be effected.
2. Hardware detail should be maintained in desired document i.e Faulty Hardware Maintenance sheet.
Refer to form no- PMSL-ISMS-FO-062
Fault harddisk
report.xls
6. Faulty Hardware maintenance sheet should be reviewed by Head of Department once in quarter.
7. When the number of faulty or non repairable hardware is increased then it is mandatory to crushed
the hardware with crusher and sale in scrap.
IT Procurement:
The requirement:
The requirement related to any specific IT resource (software, hardware etc) will be raised by the
concerned departments with justification of the requirement.
On approval of department head or management, IT will go ahead and will study the alternates, costing
of the resource and will produce a report to management.
Once the purchase is approved, the Technology department will be coming with quotations, negotiations
and comparisons among the vendors and the lowest bidder will be identified. The lowest bidder will be
assigned an official purchase order after approval.
Any software or hardware needed for running daily operation will be falling under this category. For
the MS Windows licenses, MS office and other software being used in operations for performing the
daily duties of employees; technology department will ensure the licensing and compliance's. For these
mandatory licenses, the technology department will be keeping a watch on no. of licenses purchased
and the no. of licenses being used. The enforced transitions may not require any analysis and subjected
to be purchased with immediate effect.
The procurement process for these requirements will be same as other requirements.
The technology department will be maintaining the logs of all kind of IT assets.
10.0 Enforcement:
All users shall read and abide by this Standard Operating Procedure of IT department .
Any employee found in violation to this SOP shall be subjected to disciplinary action as mentioned
under PMSL-ISMS-PO-020-Employee Discipline Policy.