B2B FileMover Grand Valley State University
B2B FileMover Agenda Introduction & Background File Exchange Process Security Infrastructure Design Reporting Capabilities Administration Lessons Learned Questions & Discussion
Introduction & Background Necessity of Secure File Transfer Priority Health Why GVSU Interns? Partnership with GVSU $$$ Why Perl?
File Exchange Process Objective Automated Secure Transfer Why FTP? Most Requested Solves ASCII / EBCDIC Common Free Modular Design Partner or Steelcase Initiated Push or Pull Transfers On Demand Repetitive
B2B FileMover Process
Security Separate User Accounts Filename Verification Encryption Standards Virus Scanning Security Agreement
Incoming Process Data Flow
Security Separate User Accounts Filename Verification Encryption Standards Virus Scanning Security Agreement
Infrastructure Design Architecture Automated Supports FTP and SFTP Independent Capabilities Centralized and Reusable Modules Stateful and Self-Recoverable
Reporting Capabilities Log Contents System Reporting EMU monitoring Heartbeats Normal Alert Notification System Errors Verifications
Administration Platform - Linux Main System Administration Account Process Configuration Values Independent Administration Accounts File Permissions
Lessons Learned Gather Requirements Scope Creep Setting & Understanding Expectations Profuse Testing Use “Warning” Option Linux Permission Settings Sufficient Documentation Instant Messaging
QUESTIONS & DISCUSSION