DLSU CCS-TSG installation and configuration of a secure service desk and change management system (with workflow capabilities)

The College of Computer Studies Technical Support Group (CCS-TSG) currently manages cloud-based computing cluster services, used for administrative, academic, and research. Due to the ongoing pandemic, there has been an increase in the number of requests as well as concerns being raised by the users...

Full description

Saved in:
Bibliographic Details
Main Author: Tieng, Dejeannie Gayle B.
Format: text
Language:English
Published: Animo Repository 2022
Subjects:
Online Access:https://animorepository.dlsu.edu.ph/etdm_comtech/12
https://animorepository.dlsu.edu.ph/cgi/viewcontent.cgi?article=1011&context=etdm_comtech
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: De La Salle University
Language: English
id oai:animorepository.dlsu.edu.ph:etdm_comtech-1011
record_format eprints
spelling oai:animorepository.dlsu.edu.ph:etdm_comtech-10112023-01-19T00:35:08Z DLSU CCS-TSG installation and configuration of a secure service desk and change management system (with workflow capabilities) Tieng, Dejeannie Gayle B. The College of Computer Studies Technical Support Group (CCS-TSG) currently manages cloud-based computing cluster services, used for administrative, academic, and research. Due to the ongoing pandemic, there has been an increase in the number of requests as well as concerns being raised by the users of the computing cluster services, with various degrees of priority levels as well as request types. Because of this, DLSU CCS-TSG is having difficulties in managing and addressing user requests and concerns due to multiple reasons: decentralized ways of raising requests and concerns, lack of prioritization and escalation, difficulty in tracking and accounting, lack of documentation, logging, triaging, and handling security incidents, among others. To help address these issues, a service desk with change management system (with workflow capabilities) was recommended to be implemented. A service desk can be defined as the single point of contact of a company to help manage customer issues and requests. A service desk can help increase team efficiency, align business processes, improve operational efficiency, and help prioritize important issues. It can also handle incidents and service requests, user communication, prioritize incident handling with proper SLA (Service Level Agreement), and a system to provide timely and organized responses to customer concerns. A service ticket can be opened by the service desk team to address the concern with a configuration change, but for one to be certain that any changes to be applied is uniform throughout their system, it is recommended that a change management system be also implemented. The change management process is responsible for managing all changes to the production environments from inception to completion. It follows a careful and structured approach to make sure that changes are implemented without issues, ensures standard procedure to handle all changes, controls the impact upon the everyday activities of an organization, proper logging of changes made into a centralized repository, accountability, and non-repudiation. For the said implementation, Request Tracker 5.0.1 was installed on an Ubuntu Desktop 20.04 with 8GB RAM and 64GB Storage. After the installation and configuration of Request Tracker, a non-authenticated and authenticated scan was done via OWASP ZAP. During the scan in OWASP ZAP, 6 alerts were found in which four are tagged as low, and two are tagged as informational. Aside from scanning using OWASP ZAP, vulnerabilities that were listed in the CVE and NIST Website that affected Request Tracker, especially the vulnerabilities that have a critical or high score under the CVSS 3.0 Scale were also patched. Implementation of SSH, Firewall Rules and Fail2ban were also done to help secure the environment infrastructure further to help prevent unauthorized access which can help secure the system further. For the configuration of the firewall rules, UFW (Uncomplicated Firewall) was used. Commands such as netstat -tulpn were executed to know which TCP, UDP ports are listening. The ports that are outputted by netstat -tulpn are the ones only allowed for the firewall rules which can help block public access and prevent attackers from exploiting weaknesses. 2022-12-01T08:00:00Z text application/pdf https://animorepository.dlsu.edu.ph/etdm_comtech/12 https://animorepository.dlsu.edu.ph/cgi/viewcontent.cgi?article=1011&context=etdm_comtech Computer Technology Master's Theses English Animo Repository Customer services--Computer networks Cloud computing Web services Information Security
institution De La Salle University
building De La Salle University Library
continent Asia
country Philippines
Philippines
content_provider De La Salle University Library
collection DLSU Institutional Repository
language English
topic Customer services--Computer networks
Cloud computing
Web services
Information Security
spellingShingle Customer services--Computer networks
Cloud computing
Web services
Information Security
Tieng, Dejeannie Gayle B.
DLSU CCS-TSG installation and configuration of a secure service desk and change management system (with workflow capabilities)
description The College of Computer Studies Technical Support Group (CCS-TSG) currently manages cloud-based computing cluster services, used for administrative, academic, and research. Due to the ongoing pandemic, there has been an increase in the number of requests as well as concerns being raised by the users of the computing cluster services, with various degrees of priority levels as well as request types. Because of this, DLSU CCS-TSG is having difficulties in managing and addressing user requests and concerns due to multiple reasons: decentralized ways of raising requests and concerns, lack of prioritization and escalation, difficulty in tracking and accounting, lack of documentation, logging, triaging, and handling security incidents, among others. To help address these issues, a service desk with change management system (with workflow capabilities) was recommended to be implemented. A service desk can be defined as the single point of contact of a company to help manage customer issues and requests. A service desk can help increase team efficiency, align business processes, improve operational efficiency, and help prioritize important issues. It can also handle incidents and service requests, user communication, prioritize incident handling with proper SLA (Service Level Agreement), and a system to provide timely and organized responses to customer concerns. A service ticket can be opened by the service desk team to address the concern with a configuration change, but for one to be certain that any changes to be applied is uniform throughout their system, it is recommended that a change management system be also implemented. The change management process is responsible for managing all changes to the production environments from inception to completion. It follows a careful and structured approach to make sure that changes are implemented without issues, ensures standard procedure to handle all changes, controls the impact upon the everyday activities of an organization, proper logging of changes made into a centralized repository, accountability, and non-repudiation. For the said implementation, Request Tracker 5.0.1 was installed on an Ubuntu Desktop 20.04 with 8GB RAM and 64GB Storage. After the installation and configuration of Request Tracker, a non-authenticated and authenticated scan was done via OWASP ZAP. During the scan in OWASP ZAP, 6 alerts were found in which four are tagged as low, and two are tagged as informational. Aside from scanning using OWASP ZAP, vulnerabilities that were listed in the CVE and NIST Website that affected Request Tracker, especially the vulnerabilities that have a critical or high score under the CVSS 3.0 Scale were also patched. Implementation of SSH, Firewall Rules and Fail2ban were also done to help secure the environment infrastructure further to help prevent unauthorized access which can help secure the system further. For the configuration of the firewall rules, UFW (Uncomplicated Firewall) was used. Commands such as netstat -tulpn were executed to know which TCP, UDP ports are listening. The ports that are outputted by netstat -tulpn are the ones only allowed for the firewall rules which can help block public access and prevent attackers from exploiting weaknesses.
format text
author Tieng, Dejeannie Gayle B.
author_facet Tieng, Dejeannie Gayle B.
author_sort Tieng, Dejeannie Gayle B.
title DLSU CCS-TSG installation and configuration of a secure service desk and change management system (with workflow capabilities)
title_short DLSU CCS-TSG installation and configuration of a secure service desk and change management system (with workflow capabilities)
title_full DLSU CCS-TSG installation and configuration of a secure service desk and change management system (with workflow capabilities)
title_fullStr DLSU CCS-TSG installation and configuration of a secure service desk and change management system (with workflow capabilities)
title_full_unstemmed DLSU CCS-TSG installation and configuration of a secure service desk and change management system (with workflow capabilities)
title_sort dlsu ccs-tsg installation and configuration of a secure service desk and change management system (with workflow capabilities)
publisher Animo Repository
publishDate 2022
url https://animorepository.dlsu.edu.ph/etdm_comtech/12
https://animorepository.dlsu.edu.ph/cgi/viewcontent.cgi?article=1011&context=etdm_comtech
_version_ 1756432632580669440