[CyberSource logo]


Search documentation:

  Help  Advanced
        Published 01/14/2002 Table of ContentsPreviousNextIndex

Chapter 4

Reporting Migration Checklist

Use the following checklists as you plan your migration to the new reporting system.

Note  The tasks listed below are a general summary and are not intended to be all-inclusive. There may be tasks specific to your migration that are not listed here.

Choosing the Project Team 

Assign a project team lead

Assign a business lead

Assign a finance lead

Assign an engineering lead

Assign a QA lead

Assign a database and server administrator

Assign an information security lead

Project Team Lead Tasks 

Create an overall project plan

Distribute checklists to team leads

Get plan for each group involved in the project

Business Tasks 

Determine which CyberSource reports you currently use

Determine which reports will replace your current reports

Decide which new reports to use

Identify back-office systems to integrate with the new reporting system

Engineering Tasks 

Download the CyberSource Reporting Developer's Guide from the CyberSource Support Center

Find out which detail reports your company will use

Implement an HTTPS client to download the appropriate reports from the new reporting server

Write code to parse the detail reports and add information from them to your back-office systems

Implement access controls for each group of people that needs access to confidential data

QA Tasks 

Write a test plan, including test cases, to verify that the HTTPS client works correctly

Verify that the HTTPS client works correctly

Verify that data from the reports is added to the correct back-office systems

Database and Server Administrator Tasks 

Analyze your current database schemas and determine whether they are compatible with the detail report formats

Work with developers to integrate detail reports into your back-office systems

Information Security Tasks 

Determine who needs access to confidential data

Define access levels for each group of people that needs access to confidential data

Verify that the HTTPS client operates and stores data securely

Test your servers and firewalls for security holes


Copyright © 2002 CyberSource Corporation.
TOC PREV NEXT INDEX