We will be convert an older antiquated hardware server environment that is coming to end of life and will be in need up replacement or upgrade. These systems will be applied into a full functional virtualized environment by moving the older hardware OS systems to VM’s (Virtual Media), as well as migrate any and all legacy software onto these system. Than we will Identify and implement any and all potential security requirements needed for the internal network structure, both local and remote server access, any potential or required application access for client, and the encryption and storage of any given data. The final step will be to develop …show more content…
We will need to inquire as to the required software environment to be run on the virtual servers, network infrastructure needs, user access, and any IA (Information Assurance) concerns and/or requirements for this project, as well as a complete search of the Security Technical Implementation Guides (STIGs) for any additional information pertaining to all of the hardware, software and network equipment. This search will provide us with more details as to the acceptable hardware, software and network firmware and update levels for this