Securing IP In Agile

2y ago
99 Views
4 Downloads
1.23 MB
22 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Julia Hutchens
Transcription

Securing IP using Advanced Agile PLMCapabilitiesSharad UdyawarIT AnalystCoherentSharad Udyawar

Problems to be Solved1.Many Items and Changes in Agile contain very sensitive IP – should besecured2.Some IP is subject to multiple legal restrictions (ITAR, EAR, etc.)3.IP must be controlled, yet allow “appropriate” collaboration4.Enable users (not IT) to manage their own IP security5.Business wants granular security but minimal data entry.6.Security model must be scalable across classes of objects7.Security model must be maintainable with minimum effortSharad UdyawarPage 2

Advanced Features Used1.Dynamic Lists2. USERGROUP variable3.Event Framework4.Groovy ScriptingSharad UdyawarPage 3

Dynamic Lists1.Contains a list of values that are updated at run time.2.Based on a criteriaSharad UdyawarPage 4

USERGROUP variable1. variables are system variables that can be used in building Privilege MaskCriteria2. USERGROUP maps to the name(s) of PLM user groups. So, if a field is tiedto the Admin list for User Groups, criteria can match a user to a user group;this criteria can then be used with Read and Discover privileges to grantobject access and control to a group of users.Sharad UdyawarPage 5

Event Framework1.Events act as trigger points for generating an automation action within thePLM application.2.Event is generated from a source within Agile PLM applications. The sourcecan be a business action triggered by a user, a UI action, or system initiatedsource such as a timer.Sharad UdyawarPage 6

Groovy Scripting1.Groovy is an object-oriented programming language that can be used as ascripting language for the Java Platform.2.Can be used in Script PX which can be called from Events3.Scripts can be used to Automate functions with simple business logic suchas data validation, notification, or defaulting field valuesSharad UdyawarPage 7

Solution Architecture1.Create Page 2 attributes for Security on Agile classes2.Create User Groups to represent Orgs, Legal Classification and Suppliers3.Tag each User group as Org/ Legal Classification/Supplier4.Create 3 Dynamic Lists for Orgs/Legal Classification/Supplier5.Attach dynamic lists to the corresponding security attributes on all classes6.Assign appropriate User Groups to users7.Use Event Framework with Groovy Script for Defaulting8.Use Event Framework with Groovy Script for Validation9.Control access with Criteria based on USERGROUPSharad UdyawarPage 8

High-Level Approach Specify ownership (Design Org) for every object (Part or Change) New object security defaults to the “Design Org” of the creator rather than“Public”. Every object carries security attributes that define its access To gain access, a user must belong to the proper User Group Access is at the Discovery level. If you do not have access, the object is notvisible.Sharad UdyawarPage 9

High Level Flow1. Upon creation of a new Item or Change, default security attributes to: Security Level “Org” Access Orgs the “Home Org” of the creator Supplier Access blank File Access Orgs blank2. Creator can modify these values at first.3. Once the Item is released or the Change is Submitted, only a Security Officer canmodify security.4. Multiple Orgs can be added if the Item or Change must be actively used by anotherOrg.5. One or more Suppliers can be added if they either make or buy the item, or need toreview or approve the Change.Sharad Udyawar

Security AttributesSecurity AttributeSecurity ClassDetermines What?Which kinds of groups get access (controls the other values)Public– every user has accessRestricted – only specified access orgs/suppliers allowedAccess OrgsWhich Org(s) get accessLegalWhich legal restrictions apply (EAR, ITAR, etc.)Supplier AccessWhich Suppliers get accessFile Access OrgsWhich Org(s) get access to attachmentsIf blank, then uses list from “Access Orgs” attributeSharad UdyawarPage 11

User Group – Access OrgSharad UdyawarPage 12

User Group – LegalSharad UdyawarPage 13

User Group – SupplierSharad UdyawarPage 14

Dynamic ListSharad UdyawarPage 15

User ProvisioningSharad UdyawarPage 16

Groovy Script - DefaultingSharad UdyawarPage 17

Groovy Script - ValidationSharad UdyawarPage 18

Discovery CriteriaSharad UdyawarPage 19

Attachment Security CriteriaSharad UdyawarPage 20

Problems Solved1.Many Items and Changes in Agile contain very sensitive IP – should besecuredAccess control now available at Org level – default is to secure by Org2.Some IP is subject to multiple legal restrictions (ITAR, EAR, etc.)Item/Change can be tagged as ITAR,EAR and immediately secured3.IP must be controlled, yet allow “appropriate” collaborationOther orgs can be easily added for access4.Enable users (not IT) to manage their own IP securityAccess security fully controllable by users without IT intervention5.Business wants granular security but minimal data entrySecurity defaults to creator’s org – this is all that is needed 98% of the timeSharad UdyawarPage 21

Problems Solved6.Security model must be scalable across classes of objectsSame Page 2 attributes and same Security Mechanism is used on Item, Documents,Change Orders, Change Requests, Manufacturer Orders and Deviations7.Security model must be maintainable with minimum effortWhen a new business org is set up all that is needed is to create a user group withthe org name and assign that user group to the usersWhen security needs to be extended to a new Agile class( even in a new module likeNCR in the PQM module), all we need to do is Enable the same Page 2 security attributes on that new class Enable the equivalent events for the new classSharad UdyawarPage 22

PLM application. 2. Event is generated from a source within Agile PLM applications. The source can be a business action triggered by a user, a UI action, or system initiat

Related Documents:

1. The need for an agile way of working 6 2. The need for an agile way of working 9 3. Agile Core Values - Agile Project Management Vs. 10 Agile Event Management 4. Agile principles 12 _Agile Principles of Agile Project Management 13 _Agile Principles of VOK DAMS Agile Event Management 14 5. Agile Methods 16 _Scrum in Short 16 _Kanban in Short 18

1.1 Purpose of the Agile Extension to the BABOK Guide1 1.2 What is Agile Business Analysis?2 1.3 Structure6 Chapter 2:The Agile Mindset 2.1 What is an Agile Mindset?7 2.2 The Agile Mindset, Methodologies, and Frameworks8 2.3 Applying the Agile Mindset9 2.4 Agile Extension and the Agile Ma

Agile Estimating and Planning by Mike Cohn Agile Game Development with Scrum by Clinton Keith Agile Product Ownership by Roman Pichler Agile Project Management with Scrum by Ken Schwaber Agile Retrospectives by Esther Derby and Diana Larsen Agile Testing: A Practical Guide for Testers and Agile Teams by Lisa Crispin and .

Agile World View "Agility" has manydimensions other than IT It ranges from leadership to technological agility Today's focus is on organizational & enterprise agility Agile Leaders Agile Organization Change Agile Acquisition & Contracting Agile Strategic Planning Agile Capability Analysis Agile Program Management Agile Tech.

The most popular agile methodologies include: extreme programming (XP), Scrum, Crystal, Dynamic Sys-tems Development (DSDM), Lean Development, and Feature Driven Development (FDD). All Agile methods share a common vision and core values of the Agile Manifesto. Agile Methods: Some well-known agile software development methods include: Agile .

1. Agile methods are undisciplined and not measurable. 2. Agile methods have no project management. 3. Agile methods apply only to software development. 4. Agile methods have no documentation. 5. Agile methods have no requirements. 6. Agile methods only work with small colocated teams.-7. Agile methods do not include planning. 8.

The Agile Customer . 9/6/2012 6 Agile Development Team Agile Analyst . 9/6/2012 7 Agile Programmer Agile Tester . 9/6/2012 8 Agile Manager Agile Usability Designer . 9/6/2012 9 Kicking off a project The Inception Deck –Ten questions you’d be crazy not to ask before starting any

The Agile Customer. 9/4/2013 6 Agile Development Team Agile Analyst. 9/4/2013 7 Agile Programmer Agile Tester. 9/4/2013 8 Agile Manager Agile Usability Designer. 9/4/2013 9 Kicking off a project The Inception Deck –Ten questions you’d be crazy not to ask before starting any software