gather it up
This commit is contained in:
parent
38105a19db
commit
8641493ed6
@ -4,3 +4,4 @@ language = "en"
|
|||||||
multilingual = false
|
multilingual = false
|
||||||
src = "src"
|
src = "src"
|
||||||
title = "TSYS Group Member Handbook"
|
title = "TSYS Group Member Handbook"
|
||||||
|
|
||||||
|
@ -1,176 +1,176 @@
|
|||||||
|
|
||||||
# Known Element Enterprises LLC (KNEL) Charter
|
# Known Element Enterprises LLC (KNEL) Charter
|
||||||
|
|
||||||
- [Known Element Enterprises LLC (KNEL) Charter](#known-element-enterprises-llc-knel-charter)
|
- [Known Element Enterprises LLC (KNEL) Charter](#known-element-enterprises-llc-knel-charter)
|
||||||
- [Purpose of this document](#purpose-of-this-document)
|
- [Purpose of this document](#purpose-of-this-document)
|
||||||
- [KNEL Mission](#knel-mission)
|
- [KNEL Mission](#knel-mission)
|
||||||
- [Accountability](#accountability)
|
- [Accountability](#accountability)
|
||||||
- [Independence](#independence)
|
- [Independence](#independence)
|
||||||
- [Areas of responsibility](#areas-of-responsibility)
|
- [Areas of responsibility](#areas-of-responsibility)
|
||||||
- [Scope](#scope)
|
- [Scope](#scope)
|
||||||
- [Authority](#authority)
|
- [Authority](#authority)
|
||||||
- [Assessment and Advisory Services](#assessment-and-advisory-services)
|
- [Assessment and Advisory Services](#assessment-and-advisory-services)
|
||||||
- [Risk Management Services](#risk-management-services)
|
- [Risk Management Services](#risk-management-services)
|
||||||
|
|
||||||
|
|
||||||
## Purpose of this document
|
## Purpose of this document
|
||||||
|
|
||||||
The purpose of this document is to outline areas of responsibility and operational interaction within KNEL. The reader should be able to obtain the following information from this document:
|
The purpose of this document is to outline areas of responsibility and operational interaction within KNEL. The reader should be able to obtain the following information from this document:
|
||||||
|
|
||||||
- Understanding the Organizational Structure of KNEL
|
- Understanding the Organizational Structure of KNEL
|
||||||
- Understanding the Operational Responsibilities of the various hierarchical layers within the Organizational Structure
|
- Understanding the Operational Responsibilities of the various hierarchical layers within the Organizational Structure
|
||||||
- Understanding the Intra-Operational Model of KNEL
|
- Understanding the Intra-Operational Model of KNEL
|
||||||
- Understanding the Inter-Operational Model of KNEL
|
- Understanding the Inter-Operational Model of KNEL
|
||||||
|
|
||||||
## KNEL Mission
|
## KNEL Mission
|
||||||
|
|
||||||
Known Element Enterprises LLC (KNEL) supports the TSYS Group mission by fostering the information technology , information security/assurance/assessment and privacy approaches across all component
|
Known Element Enterprises LLC (KNEL) supports the TSYS Group mission by fostering the information technology , information security/assurance/assessment and privacy approaches across all component
|
||||||
entities of TSYS Group.
|
entities of TSYS Group.
|
||||||
|
|
||||||
KNEL is a top level component entity of TSYS Group. KNEL has total responsibility for procurement, deployment, architecture operational support and retirement of the entire infrastructure stack
|
KNEL is a top level component entity of TSYS Group. KNEL has total responsibility for procurement, deployment, architecture operational support and retirement of the entire infrastructure stack
|
||||||
used to provision all IT services across TSYS Group.
|
used to provision all IT services across TSYS Group.
|
||||||
|
|
||||||
Known Element Enterprises seeks to establish a very specific culture that provides consistent, long term, zero variable , predictable , successful and stable outcomes in all tasks/projects and ongoing
|
Known Element Enterprises seeks to establish a very specific culture that provides consistent, long term, zero variable , predictable , successful and stable outcomes in all tasks/projects and ongoing
|
||||||
service delivery and operations.
|
service delivery and operations.
|
||||||
|
|
||||||
KNEL core cultural tenants:
|
KNEL core cultural tenants:
|
||||||
|
|
||||||
- ruthless execution
|
- ruthless execution
|
||||||
- outstanding service delivery that pleasantly surprises and delights all stakeholders every time
|
- outstanding service delivery that pleasantly surprises and delights all stakeholders every time
|
||||||
- integrity and consistency
|
- integrity and consistency
|
||||||
- privacy
|
- privacy
|
||||||
- collaboration
|
- collaboration
|
||||||
- documentation , knowledge capture and dissemination
|
- documentation , knowledge capture and dissemination
|
||||||
- sustainability
|
- sustainability
|
||||||
- stewardship
|
- stewardship
|
||||||
- strong information security/information assurance
|
- strong information security/information assurance
|
||||||
|
|
||||||
This culture underpins KNEL ability to be a good steward of TSYS Group information entrusted to it by its stakeholders.
|
This culture underpins KNEL ability to be a good steward of TSYS Group information entrusted to it by its stakeholders.
|
||||||
|
|
||||||
The goal of KNEL is to implement a framework of safeguards to protect the:
|
The goal of KNEL is to implement a framework of safeguards to protect the:
|
||||||
|
|
||||||
- confidentiality (authorized access)
|
- confidentiality (authorized access)
|
||||||
- integrity
|
- integrity
|
||||||
- availability
|
- availability
|
||||||
|
|
||||||
of TSYS Group information technology resources and information, and to ensure TSYS Group is able to meet statutory and regulatory obligations in a manner that enables and respects individual privacy.
|
of TSYS Group information technology resources and information, and to ensure TSYS Group is able to meet statutory and regulatory obligations in a manner that enables and respects individual privacy.
|
||||||
|
|
||||||
## Accountability
|
## Accountability
|
||||||
|
|
||||||
The TSYS Group CIO, CISO , VP of Technical Operations and IT Director (the IT Management Committee) manage KNEL assets and staff and are accountable directly to the TSYS Group Board to:
|
The TSYS Group CIO, CISO , VP of Technical Operations and IT Director (the IT Management Committee) manage KNEL assets and staff and are accountable directly to the TSYS Group Board to:
|
||||||
|
|
||||||
- Establish the strategic direction of KNEL
|
- Establish the strategic direction of KNEL
|
||||||
- Ensure the continuous enhancement and effectiveness of KNEL to present a proactive approach to information security at TSYS Group
|
- Ensure the continuous enhancement and effectiveness of KNEL to present a proactive approach to information security at TSYS Group
|
||||||
- Promote public information sharing throughout TSYS Group
|
- Promote public information sharing throughout TSYS Group
|
||||||
- To provide a one-stop point of information and accountability for information security and privacy at TSYS Group
|
- To provide a one-stop point of information and accountability for information security and privacy at TSYS Group
|
||||||
- Provide periodic assessments on the adequacy and effectiveness of the TSYS Group processes for controlling its activities and managing its risks in the areas set forth under the mission and scope of work.
|
- Provide periodic assessments on the adequacy and effectiveness of the TSYS Group processes for controlling its activities and managing its risks in the areas set forth under the mission and scope of work.
|
||||||
- Report significant issues affecting privacy, including recommended process improvements, and provide follow-up on mitigation.
|
- Report significant issues affecting privacy, including recommended process improvements, and provide follow-up on mitigation.
|
||||||
- Provide information on the status and results of campus unit security assessments and Privacy Impact Assessments.
|
- Provide information on the status and results of campus unit security assessments and Privacy Impact Assessments.
|
||||||
- Coordinate with, and provide oversight of, other privacy compliance, control, and monitoring functions.
|
- Coordinate with, and provide oversight of, other privacy compliance, control, and monitoring functions.
|
||||||
|
|
||||||
## Independence
|
## Independence
|
||||||
|
|
||||||
To provide for the independence of KNEL, the IT Management Committee reports directly to the TSYS Group Board. This ensures fierce independence of the IT organization and allows the Board to remain fully informed in it's role of providing effective and engaged group wide oversight and governance.
|
To provide for the independence of KNEL, the IT Management Committee reports directly to the TSYS Group Board. This ensures fierce independence of the IT organization and allows the Board to remain fully informed in it's role of providing effective and engaged group wide oversight and governance.
|
||||||
|
|
||||||
In too many organizations, IT is stymied by senior management and it results in situations like the Equifax breach or ransomware.
|
In too many organizations, IT is stymied by senior management and it results in situations like the Equifax breach or ransomware.
|
||||||
Also by being an independent LLC under TSYS Group, it's able to function on an equal level with other TSYS Group components.
|
Also by being an independent LLC under TSYS Group, it's able to function on an equal level with other TSYS Group components.
|
||||||
Like all TSYS Group component entities, it has an independent P&L (following the TSYS Group zero internal cost center model).
|
Like all TSYS Group component entities, it has an independent P&L (following the TSYS Group zero internal cost center model).
|
||||||
That's right, IT can be a profit center!
|
That's right, IT can be a profit center!
|
||||||
|
|
||||||
## Areas of responsibility
|
## Areas of responsibility
|
||||||
|
|
||||||
- Facilities IT (power/cooling/physical security)
|
- Facilities IT (power/cooling/physical security)
|
||||||
- Enterprise IT (hypervisor/storage/networking/monitoring,alerting/backups)
|
- Enterprise IT (hypervisor/storage/networking/monitoring,alerting/backups)
|
||||||
- Platform IT - Data (database,block,object,file stores)
|
- Platform IT - Data (database,block,object,file stores)
|
||||||
- Platform IT - Middleware (batch/sync/async task execution, API/microservices, enterprise service bus, intra system/application messaging,e-mail)
|
- Platform IT - Middleware (batch/sync/async task execution, API/microservices, enterprise service bus, intra system/application messaging,e-mail)
|
||||||
- Platform IT - Application Runtime (container runtime, legacy applications, PAAS)
|
- Platform IT - Application Runtime (container runtime, legacy applications, PAAS)
|
||||||
- SRE (TSYS Group application catalog)
|
- SRE (TSYS Group application catalog)
|
||||||
|
|
||||||
## Scope
|
## Scope
|
||||||
|
|
||||||
The scope of Information Security/Assurance/Assessment and Privacy comprises multiple focus areas:
|
The scope of Information Security/Assurance/Assessment and Privacy comprises multiple focus areas:
|
||||||
|
|
||||||
- Policy
|
- Policy
|
||||||
- Training/Awareness
|
- Training/Awareness
|
||||||
- Incident Management and Response
|
- Incident Management and Response
|
||||||
- Consulting
|
- Consulting
|
||||||
- Assessments
|
- Assessments
|
||||||
- Risk Management
|
- Risk Management
|
||||||
- Survivability
|
- Survivability
|
||||||
|
|
||||||
- KNEL develops policies and guidelines to assist technology and information users to understand their responsibilities.
|
- KNEL develops policies and guidelines to assist technology and information users to understand their responsibilities.
|
||||||
|
|
||||||
- Through Training and Awareness initiatives, stakeholders learn secure behaviors that support the protection of TSYS Group, as well as personal, information.
|
- Through Training and Awareness initiatives, stakeholders learn secure behaviors that support the protection of TSYS Group, as well as personal, information.
|
||||||
|
|
||||||
- When security incidents or privacy breaches occur, quick and effective response is crucial to limit damage and quickly restore services. The focus area of Incident Management & Response supports this effort by promoting consistent means to prepare, respond to, recover from, and report incidents.
|
- When security incidents or privacy breaches occur, quick and effective response is crucial to limit damage and quickly restore services. The focus area of Incident Management & Response supports this effort by promoting consistent means to prepare, respond to, recover from, and report incidents.
|
||||||
|
|
||||||
- KNEL partners and consults with component entities across TSYS Group to assist them in meeting their privacy and information security objectives.
|
- KNEL partners and consults with component entities across TSYS Group to assist them in meeting their privacy and information security objectives.
|
||||||
|
|
||||||
- KNEL conducts information security and privacy assessments in accordance with approved plans and its established policies and procedures.
|
- KNEL conducts information security and privacy assessments in accordance with approved plans and its established policies and procedures.
|
||||||
|
|
||||||
- Risk Management allows units to determine the risks that exist in their environments and how those risks can be reduced or eliminated.
|
- Risk Management allows units to determine the risks that exist in their environments and how those risks can be reduced or eliminated.
|
||||||
|
|
||||||
- Survivability supports the planning for recovery of technology services following an emergency or system disruption.
|
- Survivability supports the planning for recovery of technology services following an emergency or system disruption.
|
||||||
|
|
||||||
The scope of information security centers on implementing appropriate technical, operational and management controls to protect confidentiality (authorized access), integrity, and availability of resources.
|
The scope of information security centers on implementing appropriate technical, operational and management controls to protect confidentiality (authorized access), integrity, and availability of resources.
|
||||||
|
|
||||||
The information privacy scope of work is to determine whether TSYS Group recognizes the risk associated with collecting and storing protected data and that TSYS Group is aware of and in compliance with applicable policies and laws. This supports:
|
The information privacy scope of work is to determine whether TSYS Group recognizes the risk associated with collecting and storing protected data and that TSYS Group is aware of and in compliance with applicable policies and laws. This supports:
|
||||||
|
|
||||||
- The expectation that personally identifiable information collected, processed, or stored by TSYS Group is protected from misuse or unauthorized access;
|
- The expectation that personally identifiable information collected, processed, or stored by TSYS Group is protected from misuse or unauthorized access;
|
||||||
|
|
||||||
- Limiting personal data collection to only those data items required for legitimate business purposes;
|
- Limiting personal data collection to only those data items required for legitimate business purposes;
|
||||||
|
|
||||||
- Respecting the rights of the data owners as guaranteed by laws, regulations, and contractual obligations;
|
- Respecting the rights of the data owners as guaranteed by laws, regulations, and contractual obligations;
|
||||||
|
|
||||||
- Confirming TSYS Group organizations incorporate privacy procedures as an integral part of business system design processes;
|
- Confirming TSYS Group organizations incorporate privacy procedures as an integral part of business system design processes;
|
||||||
|
|
||||||
- Significant legislative or regulatory privacy issues impacting the organization are recognized and addressed properly.
|
- Significant legislative or regulatory privacy issues impacting the organization are recognized and addressed properly.
|
||||||
|
|
||||||
## Authority
|
## Authority
|
||||||
|
|
||||||
KNEL is authorized to:
|
KNEL is authorized to:
|
||||||
|
|
||||||
- Have access to all functions, records, property, and personnel required for information security and privacy assessments.
|
- Have access to all functions, records, property, and personnel required for information security and privacy assessments.
|
||||||
- Make specific reports directly to TSYS Group Board and other entities as deemed appropriate.
|
- Make specific reports directly to TSYS Group Board and other entities as deemed appropriate.
|
||||||
- Allocate resources, set frequencies, select subjects, determine scopes of work, and apply the techniques required to accomplish information security objectives.
|
- Allocate resources, set frequencies, select subjects, determine scopes of work, and apply the techniques required to accomplish information security objectives.
|
||||||
- When conducting risk reviews and assessments, obtain the necessary assistance of personnel in TSYS Group units, as well as specialized services from within or outside the organization.
|
- When conducting risk reviews and assessments, obtain the necessary assistance of personnel in TSYS Group units, as well as specialized services from within or outside the organization.
|
||||||
|
|
||||||
Responsibilities
|
Responsibilities
|
||||||
|
|
||||||
KNEL has responsibility to:
|
KNEL has responsibility to:
|
||||||
|
|
||||||
- Maintain a professional staff with sufficient knowledge, skills, experience, and professional certifications to meet the requirements of this charter.
|
- Maintain a professional staff with sufficient knowledge, skills, experience, and professional certifications to meet the requirements of this charter.
|
||||||
- Develop an information security strategy that presents a high-level plan for achieving information security goals.
|
- Develop an information security strategy that presents a high-level plan for achieving information security goals.
|
||||||
- Research best practices and technologies that support information security.
|
- Research best practices and technologies that support information security.
|
||||||
- Establish a quality assurance program by which the Director assures the operation of KNEL activities.
|
- Establish a quality assurance program by which the Director assures the operation of KNEL activities.
|
||||||
|
|
||||||
## Assessment and Advisory Services
|
## Assessment and Advisory Services
|
||||||
|
|
||||||
KNEL conducts information security and privacy assessments in accordance with Board approved plans and its established policies and procedures.
|
KNEL conducts information security and privacy assessments in accordance with Board approved plans and its established policies and procedures.
|
||||||
|
|
||||||
KNEL can also conduct independent information security and privacy impact assessments.
|
KNEL can also conduct independent information security and privacy impact assessments.
|
||||||
|
|
||||||
Assessment and Advisory services include:
|
Assessment and Advisory services include:
|
||||||
|
|
||||||
- Developing a flexible annual plan in consultation with the Board using appropriate risk-based methodology, including risks or control concerns identified by TSYS Group corporate/component leadership.
|
- Developing a flexible annual plan in consultation with the Board using appropriate risk-based methodology, including risks or control concerns identified by TSYS Group corporate/component leadership.
|
||||||
- Examining and evaluating the adequacy and effectiveness of the systems of internal privacy controls.
|
- Examining and evaluating the adequacy and effectiveness of the systems of internal privacy controls.
|
||||||
- Evaluating and assessing significant new or changing services, processes, operations, and controls coincident with their development and implementation.
|
- Evaluating and assessing significant new or changing services, processes, operations, and controls coincident with their development and implementation.
|
||||||
- In coordination with the Board assessing compliance with laws, regulations, contract/grant provisions, and internal policies, plans, and procedures.
|
- In coordination with the Board assessing compliance with laws, regulations, contract/grant provisions, and internal policies, plans, and procedures.
|
||||||
- Reviewing operations or programs to ascertain whether results are consistent with established objectives.
|
- Reviewing operations or programs to ascertain whether results are consistent with established objectives.
|
||||||
- Performing consulting services, assurance services, to assist component entities in meeting privacy objectives.
|
- Performing consulting services, assurance services, to assist component entities in meeting privacy objectives.
|
||||||
- Evaluating emerging information technology audit/assessment trends and implementing best practices.
|
- Evaluating emerging information technology audit/assessment trends and implementing best practices.
|
||||||
|
|
||||||
## Risk Management Services
|
## Risk Management Services
|
||||||
|
|
||||||
The focus area of Risk Management is the key to a successful information security program.
|
The focus area of Risk Management is the key to a successful information security program.
|
||||||
|
|
||||||
Information security is not exact or all-encompassing. No one can ever eradicate all risk of improper, malicious or capricious use of information and resources. The goal of information security is that in a particular situation, the controls are commensurate with the value of the protected resource and weighed against the cost that would be incurred --financial or otherwise - in the event of unauthorized disclosure, degradation, or loss. The process of balancing risks, costs of protection strategies, and resource value is risk management.
|
Information security is not exact or all-encompassing. No one can ever eradicate all risk of improper, malicious or capricious use of information and resources. The goal of information security is that in a particular situation, the controls are commensurate with the value of the protected resource and weighed against the cost that would be incurred --financial or otherwise - in the event of unauthorized disclosure, degradation, or loss. The process of balancing risks, costs of protection strategies, and resource value is risk management.
|
||||||
|
|
||||||
Risk Management Services include:
|
Risk Management Services include:
|
||||||
|
|
||||||
- Partnering with TSYS Group units to conduct risk reviews that highlight strengths and weaknesses of a unit's information security profile;
|
- Partnering with TSYS Group units to conduct risk reviews that highlight strengths and weaknesses of a unit's information security profile;
|
||||||
- Consulting with TSYS Group units determine how best to minimize risk and protect resources;
|
- Consulting with TSYS Group units determine how best to minimize risk and protect resources;
|
||||||
- Directing assessments of critical program areas or new services to ensure appropriate security controls are in place;
|
- Directing assessments of critical program areas or new services to ensure appropriate security controls are in place;
|
||||||
- Perform network monitoring, intrusion detection/prevention, web scanning, and other security procedures to help secure the infrastructure and in response to malicious activity.
|
- Perform network monitoring, intrusion detection/prevention, web scanning, and other security procedures to help secure the infrastructure and in response to malicious activity.
|
||||||
- Evaluating new and emerging security strategies and technologies for use in TSYS Group environment;
|
- Evaluating new and emerging security strategies and technologies for use in TSYS Group environment;
|
||||||
- Collaborating with the information security technology team to plan and implement the SANS Top 20 Security Controls.
|
- Collaborating with the information security technology team to plan and implement the SANS Top 20 Security Controls.
|
||||||
|
@ -1 +0,0 @@
|
|||||||
# Processes - Move To Production
|
|
50
src/CIO/Systems/Admin-Network/WAN-HQ-routable.md
Normal file
50
src/CIO/Systems/Admin-Network/WAN-HQ-routable.md
Normal file
@ -0,0 +1,50 @@
|
|||||||
|
- [WAN Network - HQ - Public Routed Space](#wan-network---hq---public-routed-space)
|
||||||
|
- [Proxmox/opnsense interface / layer 2 info](#proxmoxopnsense-interface--layer-2-info)
|
||||||
|
- [AT&T Small business fiber network information](#att-small-business-fiber-network-information)
|
||||||
|
|
||||||
|
# WAN Network - HQ - Public Routed Space
|
||||||
|
|
||||||
|
## Proxmox/opnsense interface / layer 2 info
|
||||||
|
|
||||||
|
net1 5c:74 vmbr1000 wan 5c:74
|
||||||
|
net17 3a:bc vmbr1000 uversebiz vtnet17 3a:bc
|
||||||
|
|
||||||
|
## AT&T Small business fiber network information
|
||||||
|
|
||||||
|
- Address: 99.91.198.81 01100011.01011011.11000110.01010 001
|
||||||
|
- Netmask: 255.255.255.248 = 29 11111111.11111111.11111111.11111 000
|
||||||
|
- Wildcard: 0.0.0.7 00000000.00000000.00000000.00000 111
|
||||||
|
|
||||||
|
- Network: 99.91.198.80/29 01100011.01011011.11000110.01010 000 (Class A)
|
||||||
|
- Broadcast: 99.91.198.87 01100011.01011011.11000110.01010 111
|
||||||
|
- HostMin: 99.91.198.81 01100011.01011011.11000110.01010 001
|
||||||
|
- HostMax: 99.91.198.86 01100011.01011011.11000110.01010 110
|
||||||
|
- Hosts/Net: 6
|
||||||
|
|
||||||
|
- WAN Rtr 1 IP: 99.91.198.81
|
||||||
|
- WAN Rtr 2 IP: 99.91.198.82
|
||||||
|
|
||||||
|
- wireguard vpn, WAN Float, SIP, other services not on 80/443 IP: 99.91.198.83
|
||||||
|
|
||||||
|
- Cloudron IP: 99.91.198.84
|
||||||
|
- Conost IP: 99.91.198.85
|
||||||
|
|
||||||
|
- GW IP: 99.91.198.86
|
||||||
|
|
||||||
|
```shell
|
||||||
|
|
||||||
|
dig @8.8.8.8 -x 99.91.198.81 +short
|
||||||
|
tsyshq-corertr-01.knownelement.com.
|
||||||
|
|
||||||
|
dig @8.8.8.8 -x 99.91.198.82 +short
|
||||||
|
tsyshq-corertr-02.knownelement.com.
|
||||||
|
|
||||||
|
dig @8.8.8.8 -x 99.91.198.83 +short
|
||||||
|
tsyshq-wanfloat.knownelement.com.
|
||||||
|
|
||||||
|
dig @8.8.8.8 -x 99.91.198.84 +short
|
||||||
|
my.knownelement.com.
|
||||||
|
|
||||||
|
dig @8.8.8.8 -x 99.91.198.85 +short
|
||||||
|
app02.knownelement.com.
|
||||||
|
```
|
27
src/CIO/ThingsToDocument.md
Normal file
27
src/CIO/ThingsToDocument.md
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
|
||||||
|
- [Things to document](#things-to-document)
|
||||||
|
- [System Admin](#system-admin)
|
||||||
|
- [Facilities](#facilities)
|
||||||
|
- [Network](#network)
|
||||||
|
- [Hypervisor](#hypervisor)
|
||||||
|
- [Storage](#storage)
|
||||||
|
- [Authentication](#authentication)
|
||||||
|
- [SRE](#sre)
|
||||||
|
|
||||||
|
# Things to document
|
||||||
|
|
||||||
|
## System Admin
|
||||||
|
|
||||||
|
### Facilities
|
||||||
|
|
||||||
|
### Network
|
||||||
|
|
||||||
|
VPN user addition to algo (opnsense soon)
|
||||||
|
|
||||||
|
### Hypervisor
|
||||||
|
|
||||||
|
### Storage
|
||||||
|
|
||||||
|
### Authentication
|
||||||
|
|
||||||
|
## SRE
|
@ -1,6 +1,5 @@
|
|||||||
# TSYS Group Handbook - Engineering Documentation - Team HwEng - Supply Chain
|
# TSYS Group Handbook - Engineering Documentation - Team HwEng - Supply Chain
|
||||||
|
|
||||||
|
|
||||||
## Introduction
|
## Introduction
|
||||||
|
|
||||||
This article covers the high level overview of the hardware supply chain for all aspects of
|
This article covers the high level overview of the hardware supply chain for all aspects of
|
||||||
@ -22,9 +21,9 @@ the orbiter:
|
|||||||
## Pi Systems and USB accessories
|
## Pi Systems and USB accessories
|
||||||
|
|
||||||
* raspberry pi
|
* raspberry pi
|
||||||
* subopi1
|
* subopi1
|
||||||
* MorsePOD M6
|
* MorsePOD M6
|
||||||
* subopi2
|
* subopi2
|
||||||
* Lora Concentrator Pi Hat (Rak 833, 915mhz, SPI, FCC: 2AF6B-RAK833)
|
* Lora Concentrator Pi Hat (Rak 833, 915mhz, SPI, FCC: 2AF6B-RAK833)
|
||||||
* Arduino Uno connected to motor shield connected to
|
* Arduino Uno connected to motor shield connected to
|
||||||
* Servo
|
* Servo
|
||||||
@ -34,12 +33,12 @@ the orbiter:
|
|||||||
* Dragino Lora/GPS hat
|
* Dragino Lora/GPS hat
|
||||||
* subopi5
|
* subopi5
|
||||||
* SenseHAT
|
* SenseHAT
|
||||||
* Seeduino LorawanGPS connected to
|
* Seeduino LorawanGPS connected to
|
||||||
* IMU
|
* IMU
|
||||||
* Motor Controller
|
* Motor Controller
|
||||||
* subopi6
|
* subopi6
|
||||||
* SenseHAT
|
* SenseHAT
|
||||||
* Seeduino LorawanGPS connected to
|
* Seeduino LorawanGPS connected to
|
||||||
* IMU
|
* IMU
|
||||||
* Motor Controller
|
* Motor Controller
|
||||||
|
|
||||||
@ -67,7 +66,7 @@ Much to write here, very soon.
|
|||||||
|
|
||||||
## Orbiter Avionics - Seeduino
|
## Orbiter Avionics - Seeduino
|
||||||
|
|
||||||
This is the core of the "smarts" (electronic) system for the orbiter. It's where all domain awarness and decision making happens (along with communication), and is subject to full regulatory review/compliance requirements.
|
This is the core of the "smarts" (electronic) system for the orbiter. It's where all domain awareness and decision making happens (along with communication), and is subject to full regulatory review/compliance requirements.
|
||||||
|
|
||||||
It must do very few things, and it must do them perfectly.
|
It must do very few things, and it must do them perfectly.
|
||||||
|
|
||||||
@ -79,7 +78,7 @@ It will be running FreeRTOS, with a handful of custom routines.
|
|||||||
|
|
||||||
* With the following groove boards connected to the seeduino:
|
* With the following groove boards connected to the seeduino:
|
||||||
|
|
||||||
* IMU: <https://www.seeedstudio.com/Grove-IMU-10DOF-p-2386.html>
|
* IMU: <https://www.seeedstudio.com/Grove-IMU-10DOF-p-2386.html>
|
||||||
|
|
||||||
* Motor driver board: <https://www.seeedstudio.com/Grove-I2C-Motor-Driver-L298P-p-4534.html> (or very similar , need to confirm)
|
* Motor driver board: <https://www.seeedstudio.com/Grove-I2C-Motor-Driver-L298P-p-4534.html> (or very similar , need to confirm)
|
||||||
|
|
||||||
@ -92,7 +91,6 @@ This is where the batteries, cells, load all comes together:
|
|||||||
|
|
||||||
* <http://www.switchdoc.com/sunairplus-solar-power-controllerdata-collector/>
|
* <http://www.switchdoc.com/sunairplus-solar-power-controllerdata-collector/>
|
||||||
|
|
||||||
|
|
||||||
### Hardware Watchdog
|
### Hardware Watchdog
|
||||||
|
|
||||||
This is a critical fail safe component, and will reboot the seeduino or pi automatically if countdown timer expires:
|
This is a critical fail safe component, and will reboot the seeduino or pi automatically if countdown timer expires:
|
||||||
@ -101,13 +99,13 @@ This is a critical fail safe component, and will reboot the seeduino or pi autom
|
|||||||
|
|
||||||
## Orbiter Avionics - Raspberry pi
|
## Orbiter Avionics - Raspberry pi
|
||||||
|
|
||||||
The pi is essentially a large disk (for geospatial db, holding avionics firmware, holding log data etc) and beefy CPU (for geospatial lookups, processing ads-b data, perhaps some data crunching for local optimizations based on weather) attached to the avionics. The pi is important, but not completely critical. It can crash (and if not fixed by watchdog) can remain offline and the orbiter can come in for service safely. We will utilize best practices with the pi, to ensure it's as reliable/avaiable as possible.
|
The pi is essentially a large disk (for geospatial db, holding avionics firmware, holding log data etc) and beefy CPU (for geo spatial lookups, processing ads-b data, perhaps some data crunching for local optimizations based on weather) attached to the avionics. The pi is important, but not completely critical. It can crash (and if not fixed by watchdog) can remain offline and the orbiter can come in for service safely. We will utilize best practices with the pi, to ensure it's as reliable/available as possible.
|
||||||
|
|
||||||
In poc the pi will be attached via USB (and also serving as a host for the arduino for firware updates of the avionics ), in prototype/prod it will be on an integrated board as a Pi CM.
|
In poc the pi will be attached via USB (and also serving as a host for the arduino for firware updates of the avionics ), in prototype/prod it will be on an integrated board as a Pi CM.
|
||||||
|
|
||||||
* Payload power control:
|
* Payload power control:
|
||||||
|
|
||||||
Control of the power payload, on a geospatial basis, in a black box/non customer changeable is also super critical, and will likely receive the second most regulatory scruity.
|
Control of the power payload, on a geo spatial basis, in a black box/non customer changeable is also super critical, and will likely receive the second most regulatory scrutiny.
|
||||||
|
|
||||||
This is used for power cycling the payload for regulatory compliance (geofence):
|
This is used for power cycling the payload for regulatory compliance (geofence):
|
||||||
|
|
||||||
|
@ -1,100 +0,0 @@
|
|||||||
# Lab Component Inventory
|
|
||||||
|
|
||||||
| Drawer # | Contents | Source|
|
|
||||||
|---|---|---|
|
|
||||||
| 1 | Jumper Wires F2F 6" |to be identified|
|
|
||||||
| 2 | Jumper Wires F2F 6" |to be identified|
|
|
||||||
| 3 | Jumper Wires M2M 6" |to be identified|
|
|
||||||
| 4 | Jumper Wires M2M 6" |to be identified|
|
|
||||||
| 5 | Jumper Wires M2F 6" |to be identified|
|
|
||||||
| 6 | Mixed Jumper Wires M2M 6" |to be identified|
|
|
||||||
| 7 | Header Strips|to be identified|
|
|
||||||
| 8 | Heatshrink Tubing|<https://www.harborfreight.com/120-piece-heat-shrink-tubing-set-67530.html>|
|
|
||||||
| 9 | Heatshrink Tubing|""|
|
|
||||||
| 10 | Heatshrink Tubing|""|
|
|
||||||
| 11 | Wire Connector Butt Splice| <https://www.harborfreight.com/30-pack-watertight-heat-shrink-butt-connectors-66729.html> |
|
|
||||||
| 12| Zipties| <https://www.homedepot.com/p/Commercial-Electric-4-in-Cable-Tie-Natural-1000-Pack-GT-100M/203531927>|
|
|
||||||
| 13| Push Buttons| amz,ck|
|
|
||||||
| 14| LED Screen|unknown origin|
|
|
||||||
| 15| Relays | amz but no specific link|
|
|
||||||
| 16| Sound | ck |
|
|
||||||
| 17| Diodes | <https://www.amazon.com/gp/product/B007L4DX6Q/ref=ppx_yo_dt_b_asin_title_o04_s01?ie=UTF8&psc=1>|
|
|
||||||
| 18| Crystal Oscillators | <https://www.amazon.com/gp/product/B07C4WN68Z/ref=ppx_yo_dt_b_asin_title_o00_s00?ie=UTF8&psc=1> |
|
|
||||||
| 19| Switches | ck |
|
|
||||||
| 20| Empty Drawer | n/a |
|
|
||||||
| 21| Empty Drawer | n/a |
|
|
||||||
| 22| Empty Drawer | n/a |
|
|
||||||
| 23| Empty Drawer | n/a |
|
|
||||||
| 24| Empty Drawer | n/a |
|
|
||||||
| 25| Empty Drawer | n/a |
|
|
||||||
| 26| Empty Drawer | n/a |
|
|
||||||
| 27| Empty Drawer | n/a |
|
|
||||||
| 28| Empty Drawer | n/a |
|
|
||||||
| 29| Empty Drawer | n/a |
|
|
||||||
| 30| Empty Drawer | n/a |
|
|
||||||
| 31| USB to DB9 | <https://www.altex.com/manhattan-18-usb-to-serial-converter> |
|
|
||||||
| 32| LiPO Batteries | misc |
|
|
||||||
| 33| LED assortment | <https://www.amazon.com/gp/product/B005GL9ENC/ref=ppx_yo_dt_b_asin_title_o04_s00?ie=UTF8&psc=1> |
|
|
||||||
| 34| Dual Row DIP IC Socket Adaptor Assortment | <https://www.amazon.com/gp/product/B07CFWWQ1M/ref=ppx_yo_dt_b_asin_title_o00_s00?ie=UTF8&psc=1> |
|
|
||||||
| 35| Inductors | <https://www.amazon.com/gp/product/B085Y6XJL1/ref=ppx_yo_dt_b_asin_title_o00_s00?ie=UTF8&psc=1> |
|
|
||||||
| 36| Elenco CK Kit Electronic components not otherwise categorized| ck |
|
|
||||||
| 37| Resistors | <https://www.amazon.com/gp/product/B0002HBQHW/ref=ppx_yo_dt_b_asin_title_o03_s00?ie=UTF8&psc=1> |
|
|
||||||
| 38| Resistors | ""|
|
|
||||||
| 39| Empty Drawer | "" |
|
|
||||||
| 40| LED | amz |
|
|
||||||
| 41| USBA-proprietary | misc|
|
|
||||||
| 42| USBA-proprietary| misc |
|
|
||||||
| 43| USB (misc to misc) | misc |
|
|
||||||
| 44| Electrical Clip Assortment | <https://www.harborfreight.com/28-piece-electrical-clip-set-67589.html?_br_psugg_q=electrical+connectors> |
|
|
||||||
| 45| Test Leads | <https://www.harborfreight.com/18-inch-low-voltage-multi-colored-test-leads-66717.html> |
|
|
||||||
| 46| USBA-Mini | misc |
|
|
||||||
| 47| USBA-Micro| misc |
|
|
||||||
| 48| Empty Drawer | n/a |
|
|
||||||
| 49| Empty Drawer | n/a |
|
|
||||||
| 50|Empty Drawer | n/a |
|
|
||||||
| 51|Empty Drawer | n/a |
|
|
||||||
| 52|Empty Drawer | n/a |
|
|
||||||
| 53|Empty Drawer | n/a |
|
|
||||||
| 54| Misc electronics/Rpi etc | misc |
|
|
||||||
| 55| Empty Drawer | n/a|
|
|
||||||
| 56| Wifi components | misc |
|
|
||||||
| 57| USB networking devices | misc|
|
|
||||||
| 58| Electrical Terminals | <https://www.harborfreight.com/150-piece-terminal-and-connector-set-67683.html> |
|
|
||||||
| 59| Electrical Terminals | "" |
|
|
||||||
| 60| Electrical Terminals | "" |
|
|
||||||
| 61| misc electronic components to be identified | amz |
|
|
||||||
| 62| misc electronic components to be identified | amz |
|
|
||||||
| 63| Wire| misc electronic components to be identified |
|
|
||||||
| 64| empty drawer| n/a|
|
|
||||||
| 65| empty drawer| n/a |
|
|
||||||
| 66| empty drawer| n/a |
|
|
||||||
| 67| empty drawer| n/a |
|
|
||||||
| 68| empty drawer| n/a |
|
|
||||||
| 69| screw terminals | misc electronic components to be identified |
|
|
||||||
| 70| misc electronic components to be identified | |
|
|
||||||
| 71| servos | unknown |
|
|
||||||
| 72| servos | unknown |
|
|
||||||
| 73| motors | unknown |
|
|
||||||
| 74| Transitors | <https://www.amazon.com/gp/product/B00D8J4EZ2/ref=ppx_yo_dt_b_asin_title_o02_s00?ie=UTF8&psc=1> |
|
|
||||||
| 75| Transistors| "" |
|
|
||||||
| 76| Transistors | "" |
|
|
||||||
| 77| Capacitors | <https://www.amazon.com/gp/product/B004YHZDW0/ref=ppx_yo_dt_b_asin_title_o04_s00?ie=UTF8&psc=1> |
|
|
||||||
| 78| Capacitors | "" |
|
|
||||||
| 79| Capacitors | "" |
|
|
||||||
| 80| mystery component | amz
|
|
||||||
| 81| mystery component | amz
|
|
||||||
| 82| empty drawer | n/a
|
|
||||||
| 83| empty drawer | n/a
|
|
||||||
| 84| empty drawer | n/a
|
|
||||||
| 85| empty drawer | n/a
|
|
||||||
| 86| empty drawer | n/a
|
|
||||||
| 87| empty drawer | n/a
|
|
||||||
| 88| empty drawer | n/a
|
|
||||||
| 89| empty drawer | n/a
|
|
||||||
| 90| empty drawer | n/a
|
|
||||||
| 91| empty drawer | n/a
|
|
||||||
| 92| empty drawer | n/a
|
|
||||||
| 93| empty drawer | n/a
|
|
||||||
| 94| empty drawer | n/a
|
|
||||||
| 95| LED Strip Connectors | misc |
|
|
||||||
| 96| empty drawer
|
|
@ -67,7 +67,6 @@
|
|||||||
- [TeamMecheng - Supply Chain](./CTO/team-mecheng/MechEngSupplyChain.md)
|
- [TeamMecheng - Supply Chain](./CTO/team-mecheng/MechEngSupplyChain.md)
|
||||||
- [TeamMecheng - Tooling](./CTO/team-mecheng/MechEngTooling.md)
|
- [TeamMecheng - Tooling](./CTO/team-mecheng/MechEngTooling.md)
|
||||||
|
|
||||||
|
|
||||||
# Part 10: Functional Area: Chief Information Technology Officer
|
# Part 10: Functional Area: Chief Information Technology Officer
|
||||||
|
|
||||||
- [Known Element Enterprises Charter](./CIO/KnelCharter.md)
|
- [Known Element Enterprises Charter](./CIO/KnelCharter.md)
|
||||||
|
Loading…
Reference in New Issue
Block a user