Parent Service Package: SU14
< < SU13.1 : SU14.1 : SU15.1 > >

SU14.1: Remote Access Implementation

This 'implementation' is a holistic view of the SU14 service package, including all Physical Objects, Functional Objects, and Triples associated with the service package. It distinguishes between items that are fundamental to the service and items that are optional. Your specific implementation is likely to include the fundamental items and selected optional items, based on your specific project requirements.

Relevant Regions:

Enterprise

Development Stage Roles and Relationships

Installation Stage Roles and Relationships

Operations and Maintenance Stage Roles and Relationships
(hide)

Source Destination Role/Relationship
Center MaintainerCenter Maintains
Center ManagerCenter Manages
Center ManagerCenter Personnel System Usage Agreement
Center OwnerCenter Maintainer System Maintenance Agreement
Center OwnerCenter Manager Operations Agreement
Center OwnerCenter Personnel Application Usage Agreement
Center OwnerRemote Access Device Maintainer Maintenance Data Exchange Agreement
Center OwnerRemote Access Device Owner Information Exchange Agreement
Center OwnerRemote Access Device User Service Usage Agreement
Center PersonnelCenter Operates
Center PersonnelRemote Access Device Operates
Center SupplierCenter Owner Warranty
Remote Access Device MaintainerRemote Access Device Maintains
Remote Access Device ManagerCenter Personnel System Usage Agreement
Remote Access Device ManagerRemote Access Device Manages
Remote Access Device OwnerCenter Maintainer Maintenance Data Exchange Agreement
Remote Access Device OwnerCenter Owner Information Exchange and Action Agreement
Remote Access Device OwnerCenter Personnel Application Usage Agreement
Remote Access Device OwnerCenter User Service Usage Agreement
Remote Access Device OwnerRemote Access Device Maintainer System Maintenance Agreement
Remote Access Device OwnerRemote Access Device Manager Operations Agreement
Remote Access Device SupplierRemote Access Device Owner Warranty

Functional

This service package includes the following Functional View PSpecs:

Physical Object Functional Object PSpec Number PSpec Name
Center Center Remote Access 10.5.1.7 Provide VPN Connection to Remote Operators
Remote Access Device Remote Access 10.5.1.8 Provide Remote Operator Access

Physical

The physical diagram can be viewed in SVG or PNG format and the current format is SVG.
SVG Diagram
PNG Diagram


Display Legend in SVG or PNG

Includes Physical Objects:

Physical Object Class Description
Center Center This general physical object is used to model core capabilities that are common to any center.
Center Personnel Center 'Center Personnel' represent system operators and other personnel that work within a transportation center. This interface supports modeling of general human interactions that are common to any center.
Remote Access Device Personal The 'Remote Access Device' allows a system operator/user outside a physical center to remotely access a center or support system and interact with that system as if the operator was in the center. This requires a secure, authenticated Virtual Private Network (VPN) connection between the Remote Access Device and the center or support system.

Includes Functional Objects:

Functional Object Description Physical Object
Center Remote Access 'Center Remote Access' provides remote access to system operators outside the center. Center
Remote Access 'Remote Access' provides remote access to system operators outside the center, allowing a remote system operator to interact with a center or support system as if he were local. Remote Access Device

Includes Information Flows:

Information Flow Description
center operator data Data presented to a center operator. This flow represents general status output and other data that broadly applies to transportation centers.
center operator input Input from a center operator. This flow represents operator input that broadly applies to transportation centers.
secure center operator data Operator data normally provided to a local operator within a center. In this case, the data is provided securely to a remote operator via VPN.
secure center operator input Operator inputs provided via VPN to a remote center.

Goals and Objectives

Associated Planning Factors and Goals

Planning Factor Goal

Associated Objective Categories

Objective Category

Associated Objectives and Performance Measures

Objective Performance Measure


 
Since the mapping between objectives and service packages is not always straight-forward and often situation-dependent, these mappings should only be used as a starting point. Users should do their own analysis to identify the best service packages for their region.

Needs and Requirements

Need Functional Object Requirement

Related Sources

Document Name Version Publication Date
None


Security

In order to participate in this service package, each physical object should meet or exceed the following security levels.

Physical Object Security
Physical Object Confidentiality Integrity Availability Security Class
Center  
Remote Access Device  



In order to participate in this service package, each information flow triple should meet or exceed the following security levels.

Information Flow Security
Source Destination Information Flow Confidentiality Integrity Availability
Basis Basis Basis
Center Remote Access Device secure center operator data Moderate Moderate Moderate
This flow represents an operator control flow; observation may expose procedures and vulnerabilities, and may enable nefarious activity. Manipulation of flow contents, may enable nefarious activity, whlie interruptions or accidental changes to flow contents are likely to disrupt transportation operations. The whole point of this flow is to secure remote operations of ITS centers. This flow represents an operator control flow; observation may expose procedures and vulnerabilities, and may enable nefarious activity. Manipulation of flow contents, may enable nefarious activity, whlie interruptions or accidental changes to flow contents are likely to disrupt transportation operations. The whole point of this flow is to secure remote operations of ITS centers. This flow represents an operator control flow; observation may expose procedures and vulnerabilities, and may enable nefarious activity. Manipulation of flow contents, may enable nefarious activity, whlie interruptions or accidental changes to flow contents are likely to disrupt transportation operations. The whole point of this flow is to secure remote operations of ITS centers.
Center Personnel Remote Access Device center operator input Moderate Moderate Moderate
This flow represents an operator control flow; observation may expose procedures and vulnerabilities, and may enable nefarious activity. Manipulation of flow contents, may enable nefarious activity, whlie interruptions or accidental changes to flow contents are likely to disrupt transportation operations. The whole point of this flow is to secure remote operations of ITS centers. This flow represents an operator control flow; observation may expose procedures and vulnerabilities, and may enable nefarious activity. Manipulation of flow contents, may enable nefarious activity, whlie interruptions or accidental changes to flow contents are likely to disrupt transportation operations. The whole point of this flow is to secure remote operations of ITS centers. This flow represents an operator control flow; observation may expose procedures and vulnerabilities, and may enable nefarious activity. Manipulation of flow contents, may enable nefarious activity, whlie interruptions or accidental changes to flow contents are likely to disrupt transportation operations. The whole point of this flow is to secure remote operations of ITS centers.
Remote Access Device Center secure center operator input Moderate Moderate Moderate
This flow represents an operator control flow; observation may expose procedures and vulnerabilities, and may enable nefarious activity. Manipulation of flow contents, may enable nefarious activity, whlie interruptions or accidental changes to flow contents are likely to disrupt transportation operations. The whole point of this flow is to secure remote operations of ITS centers. This flow represents an operator control flow; observation may expose procedures and vulnerabilities, and may enable nefarious activity. Manipulation of flow contents, may enable nefarious activity, whlie interruptions or accidental changes to flow contents are likely to disrupt transportation operations. The whole point of this flow is to secure remote operations of ITS centers. This flow represents an operator control flow; observation may expose procedures and vulnerabilities, and may enable nefarious activity. Manipulation of flow contents, may enable nefarious activity, whlie interruptions or accidental changes to flow contents are likely to disrupt transportation operations. The whole point of this flow is to secure remote operations of ITS centers.
Remote Access Device Center Personnel center operator data Moderate Moderate Moderate
This flow represents an operator control flow; observation may expose procedures and vulnerabilities, and may enable nefarious activity. Manipulation of flow contents, may enable nefarious activity, whlie interruptions or accidental changes to flow contents are likely to disrupt transportation operations. The whole point of this flow is to secure remote operations of ITS centers. This flow represents an operator control flow; observation may expose procedures and vulnerabilities, and may enable nefarious activity. Manipulation of flow contents, may enable nefarious activity, whlie interruptions or accidental changes to flow contents are likely to disrupt transportation operations. The whole point of this flow is to secure remote operations of ITS centers. This flow represents an operator control flow; observation may expose procedures and vulnerabilities, and may enable nefarious activity. Manipulation of flow contents, may enable nefarious activity, whlie interruptions or accidental changes to flow contents are likely to disrupt transportation operations. The whole point of this flow is to secure remote operations of ITS centers.

Standards

Currently, there are no standards associated with the physical objects in this service package. For standards related to interfaces, see the specific information flow triple pages. These pages can be accessed directly from the SVG diagram(s) located on the Physical tab, by clicking on each information flow line on the diagram.





System Requirements

No System Requirements