![]() Checklist: Architecture and Design Review. It is provided as a courtesy for individuals who are still using these technologies. Meier, Alex Mackman, Michael Dunner, Srinath Vasireddy, Ray Escamilla and Anandha Murukan. Microsoft Corporation. Published: June 2. Applies to: Web Applications. ASP. NET version 1. NET Framework version 1. 2008 Design Review Committee Rev. 080311 MALUHIA COUNTRY RANCHES CONSTRUCTION CHECKLIST Please submit a copy of the following with your checklist. Design Review Checklist. ![]() See the . You might also want to perform custom checks that are based on a specific aspect of your architecture or design to ensure that your deployment environment the design. Deployment and Infrastructure Considerations. Check. Description. The design identifies, understands, and accommodates the company security policy. Restrictions imposed by infrastructure security (including available services, protocols, and firewall restrictions) are identified.
The design recognizes and accomodates restrictions imposed by hosting environments (including application isolation requirements). The target environment code- access- security trust level is known. A checklist for the Final Design Review, the last milestone in the design process before release to pilot manufacturing. Design Review Checklist Site Plan – Min. ![]() The design identifies the deployment infrastructure requirements and the deployment configuration of the application. Domain structures, remote application servers, and database servers are identified. The design identifies clustering requirements. The design identifies the application configuration maintenance points (such as what needs to be configured and what tools are available for an IDC admin). Secure communication features provided by the platform and the application are known. The design addresses Web farm considerations (including session state management, machine specific encryption keys, Secure Sockets Layer (SSL), certificate deployment issues, and roaming profiles). The design identifies the certificate authority (CA) to be used by the site to support SSL. The design addresses the required scalability and performance criteria. Application Architecture and Design Considerations. Input Validation. Authentication. Authorization. Configuration Management. Sensitive Data. Session Management. Cryptography. Parameter Manipulation. Exception Management. Auditing and Logging. Retired Content. This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2017
Categories |