Essential Services¶
Scope: OIT
Type: Guideline
Version: 2025
Goal¶
To help teams running important services see which standards they need to meet, and ensure that they have the resources they need to do so.
Ownership¶
Direct questions to the Owner: Seth A. Roby email redacted
Resources to comply with this standard should be directed to the team’s Division Director.
Timeline & Enforcement¶
This document is purely informative. It does not impose any new requirements; all MUSTs in this document are already required by other standards, which are linked when mentioned. Those linked standards have their own timelines.
Exception Process¶
Use the exception processes in the appropriate linked standard.
Terminology¶
- An
IT Resourceis defined as per the UCOP IT Glossary (page 24): “A term that broadly describes IT infrastructure, software and/or hardware with computing and networking capability.” - An
IT Serviceis anIT Resourcemeant to provide a campus function - An
Essential Serviceis anyIT Servicethat meets the criteria set out in the scope section of this document - A
Development Teamis the group writing code that makes anIT Servicework. Not allIT Serviceshave a development team. Not all development teams work at UC; some are external Suppliers. - An
Operations Teamis the group responsible for monitoring anIT Service. This team often deploys and hosts the service as well, unless the service is hosted by an external Supplier. - The
Service Recordis an entry in theIT Resources Inventorythat describes theIT Service - The
IT Resources Inventoryis OIT’s shared list ofIT Resources - A service
Depends Onother services that are required for it to operate; these are itsDependencies. It can be said to beDependenton those other services. - The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in RFC 2119
Requirements¶
Scope¶
- A service is deemed essential if it meets any of the following criteria:
- It is rated as Recovery Level 3+
- It is rated as Availability Level 4
- It is rated as both Availability Level 3+ and handles data rated Protection Level 3+
- It meets the definition of Critical IT Infrastructure (see page 13)
- It has three of more
Dependent Servicesthat rely on it - It has been designated essential by OIT Leadership
Service Record¶
- Essential services MUST have a complete
Service Record, with more detail to come in an upcoming standard- The record MUST be reviewed at least yearly
- Essential services MUST include a “Responsible Party” in their
Service Record- This group SHOULD be the service’s
Operations TeamorDevelopment Team
- This group SHOULD be the service’s
- Essential services MUST include all
Dependenciesin theirService Record- All
DependenciesSHOULD have an Availability Level equal to or higher than the Essential service. - If the Dependency’s Availability Level is lower, the Essential service MUST work to maintain operation even if the Dependency is offline.
- All
- Essential services MUST have a defined Recovery Level in its
Service Record- See IT Recovery for details and information
User Management¶
- Essential services SHOULD use Single Sign On for authentication
- This requirement can be waived by a Director if the service is technologically incapable of doing so
- Essential services MUST perform user audits per ISS §9 - Access Control
Accessibility¶
- Essential services MUST comply with IMT-1300 - Information Technology Accessibility and meet the Accessibility Standard therein
Security¶
- Essential services MUST have a designated Unit Information Security Lead and SHOULD direct security questions to them
- Documentation
- Essential services provided by external suppliers MUST do a Supplier Security Review
- Essential services that deal with data of Protection Level 3 or higher MUST have an entry in the Protected Data & Systems Inventory
- Essential services that deal with data of Protection Level 3 or higher MUST complete the Risk Assessment process
- This must be updated at least every two years
- Compliance
- Essential services MUST comply with UCI’s ISS
- Essential services MUST comply with UCOP’s IS-3
- Essential services that are subject to external compliance requirements (such as FERPA, PCI, HIPAA, CJIS, etc) MUST comply with those policies
- Any security incidents with an essential service must be reported to Security
Operations¶
- Essential services MUST follow the backup and recovery policies found in ISS § 12.5
- Essential services MUST meet baseline logging requirements
- They MUST also follow ISS §12.7 - Logging
- Essential services MUST have tooling to verify their Availability Level
- This tooling SHOULD notify the
Operations Teamin case of downtime
- This tooling SHOULD notify the
- Essential services MAY benefit from Load Balancing
- Essential services SHOULD have a defined Incident Management process
- Their
Service Recordshould have contact information for theOperations Team - Security Incidents MUST follow ISS §16 - Information Security Incident Management
- Their
- Essential services MUST be ranked 2 or higher in the release management maturity for all areas, with more detail to come in an upcoming standard
Development¶
- The
Development TeamSHOULD follow modern development practices- They MUST use version control
- They MUST do code review
- They MUST follow UCOP’s Secure Software Development Standard
- The
Development TeamSHOULD verify business and technical requirements before each deployment- This verification SHOULD be as automated as possible, and run using an appropriate testing tool
- Tests SHOULD track code coverage and aim for 80% coverage or higher
- The
Development TeamandOperations TeamSHOULD endeavor to keep all software dependencies up to date- This includes the operating system, programming language, runtime, third party libraries, middleware, and any other software needed to operate the service
- All software dependencies SHOULD be audited for critical updates before each deployment
- This process SHOULD be as automated as possible
Change Management¶
- Service deployment SHOULD be routine and well communicated
- User disruption SHOULD be minimized as much as possible
- Deployments SHOULD follow a regular schedule that allows users to anticipate updates
- Deployments SHOULD be announced beforehand so that no one is taken by surprise
- Deployment announcements SHOULD include information about all user-facing changes
- Deployments SHOULD be coordinated to minimize impact on all
Dependent Services
- The hosting environment SHOULD also follow change management
- Changes SHOULD follow a process similar to deploys
- This includes resource allocations (storage, memory, compute, etc)
- This includes changes to network connectivity, firewalls, etc
- This includes changes to permissions and
- Environments SHOULD seek isolation from other services through Virtualization, Containerization, etc
- Changes SHOULD follow a process similar to deploys
Supporting Team¶
- All Essential services MUST have a Supporting Team that ensures business continuity, with more detail to come in an upcoming standard
- This is often the
Operations Team,Development Team, or an external Supplier - Teams MUST cross-train to ensure that any given task can be carried out by at least two people
- This is often the
- Essential services MAY benefit by writing a Service Level Agreement (SLA)
- Any such documents should be stored in a central location, with more detail to come in an upcoming standard
- Essential services SHOULD have assigned time from trained personnel
- Quality Assurance (QA) SHOULD be available and integrated into the development process
- Business Analysis and Design work SHOULD proceed any development effort