SlideShare a Scribd company logo
1 of 49
© SAP SE
CASE STUDY
Product
SAP ERP 6.08
Global Bike
Level
Beginner
Focus
Company Background
Authors
Simha Magal
Stefan Weidner
Jeff Word
Version
3.0
Last Update
July 2016
MOTIVATION
A general understanding of GBI
(the enterprise) prior to embarking
on hands-on exercises and case
studies in the SAP ERP client is
critical for success.
This narrative provides a historical
background for how GBI began
and an overview of its operations
and strategy. This information will
be used extensively throughout the
curriculum material.
NOTES
The Global Bike (GBI) data set has
exclusively been created for SAP UA
global curricula.
Global Bike Group
Background and overview of GBI strategy and operations.
© SAP SE Page 2
CASE STUDY
Company History
Task Get to know the company’s history.
Short Description Read the below narrative to learn about the
company’s
history.
Time 15 min
The Global Bike Group has a pragmatic design philosophy that
comes from
its deep roots in both the off-road trail racing and long-distance
road racing
sports. Nearly 20 years ago, its founders designed their first
bikes out of
necessity—they had races to win and the bikes that were
available at the
time did not perform to their extremely high standards. So, they
took matters
into their own hands and built legendary bikes that would
outlast and
outperform the competition. From these humble origins, Global
Bike
Incorporated was born and continues to deliver innovative high-
performance
bicycles to the world’s most demanding riders.
This heritage of entrepreneurial spirit and quest for design
perfection is still
the cornerstone of GBI’s corporate philosophy. GBI produces
bikes for the
most demanding competitors—whether the competition is on
pavement or
dirt, for money, fame or just bragging rights.
John Davis earned his racing scars in the mountain racing
circuit in America,
where he won numerous downhill and cross-country
championships. Early
on, John realized that the mass-produced bicycles available
were inadequate
in many ways for the type of racing he was doing. So, John
stripped four of
his old bikes down to the bare metal and rebuilt them into a
single
“Frankenstein” bike that he rode to win the national
championship. Once
news of his Frankenstein bike got out, John’s friends and even
his
competitors began asking him to build them a Frankenstein bike
too. While
recovering from an injury in 1990, John started producing the
first series of
Frankenstein bikes in his garage—each one custom-built from
cannibalized
parts from other bikes. As more and more orders came in, John
successfully
expanded Frankenstein Bikes from his garage operations into a
full-blown
manufacturing facility in Dallas and began producing custom
trail bikes
which he sold through a network of specialized bike dealers
throughout the
country.
At nearly the same time, halfway around the world in
Heidelberg, Germany,
Peter Schwarz was studying engineering and competing in
regional touring
races on weekends. In between his races and studies, Peter
worked at a bike
shop in Heidelberg, fixing student bikes and tuning the touring
bikes that he
and his friends rode for competitions. As Peter’s reputation as a
fierce
competitor and mechanical wizard grew, he also began to design
and build
road bikes based on an ultra-light composite frame that he had
created for
one of his engineering courses. Peter’s innovative use of carbon
composite
materials allowed him to build a frame that was significantly
stronger and
one tenth the weight of competing frames. As a student, Peter
did not have a
great deal of financial resources, so he partnered with a local
company that
manufactured his frame designs as a contract manufacturer.
Soon, Peter’s
frames were being used by racers all over Europe and he started
Heidelberg
Notes
© SAP SE Page 3
CASE STUDY
Composites to market and design frames which would be
fabricated by a
contract manufacturer on a larger scale. Heidelberg Composites
sold its
frames to specialized bike stores throughout Europe and directly
to racing
teams, eventually becoming the leader in lightweight touring
frames in
Europe.
Through a twist of fate, Peter and John met each other in 2000
and
immediately recognized their mutual passion for performance
and
complimentary business models. Each had been looking for a
partner in
another racing field and each had been looking for a partner in a
different
market. They quickly realized that a merger between their two
companies
would be extremely synergistic and that the combination of
their product
lines and regional distribution channels would generate a great
deal of
efficiencies.
So, in 2001, Heidelberg Composites and Frankenstein Bikes
merged to form
Global Bike Incorporated. Today, John and Peter share the
responsibilities
for managing GBI’s growing organization as co-CEO’s. John is
responsible
for sales, marketing, service & support, IT, finance and human
resources
groups and Peter is responsible for research, design,
procurement and
manufacturing groups from an organizational reporting
perspective.
Figure 1:
Organizational Structure
However, GBI is a process-centric organization, so John and
Peter prefer to
think of the processes that they are responsible for, rather than
the functional
areas of the company that report to them. From this perspective,
Peter is
responsible for Idea-to-Market and Build-to-Stock and John is
responsible
for Order-to-Cash and Service & Support, as well as the
supporting services
for all four key processes. The simple way to look at their
responsibilities
would be to say that Peter spends money and builds products
and John sells
products and brings in money.
Board of
Directors
John (Co-CEO)
VP Marketing
Chief
Information
Officer
Chief Financial
Officer
VP Human
Resources
Peter (Co-CEO)
VP Research
and
Development
VP Operations
© SAP SE Page 4
CASE STUDY
Figure 2:
Enterprise Process Map
© SAP SE Page 5
CASE STUDY
Corporate Overview
Task Develop an organizational chart for GBI’s enterprise
structure.
Short Description Read the below narrative to gather all
relevant
information for sketching GBI’s current company structure.
Time 15 min
Due to several tax and export issues, GBI’s headquarters is
located in Dallas
and GBI is registered as a US company, following US GAAP
accounting
standards. GBI operates a subsidiary company, GBI Europe,
which is based
in Heidelberg and is subject to IFRS accounting standards and
German tax
regulations.
Material planning, finance, administration, HR and IT functions
are
consolidated at the Dallas headquarters. The Dallas facility
manufactures
products for the US and export markets and its warehouse
manages product
distribution for the central US and internet retailers. GBI also
has
warehouses for shipping and export in both San Diego and
Miami. San
Diego handles West Coast distribution and exports for Asia,
while Miami
handles East Coast distribution and Latin America exports.
GBI Europe has its headquarters in Heidelberg Germany. The
majority of
research and development is housed in the Heidelberg offices.
Heidelberg is
also the main manufacturing facility for GBI in Europe. The
Heidelberg
warehouse handles all shipping for southern Europe. The
Hamburg
warehouse handles all shipping for the UK, Ireland, Middle East
and Africa.
GBI sells its bikes throughout the world and employs
approximately 100
people, 2/3rds of the employees are in the US and the remaining
1/3 in
Europe.
Notes
Organizational Chart
© SAP SE Page 6
CASE STUDY
Product Strategy
Task Get familiar with GBI’s product strategy.
Short Description Read the below narrative about GBI’s product
strategy.
Time 15 min
GBI is a world class bicycle company serving the professional
and
“prosumer” cyclists for touring and off-road racing. GBI’s
riders demand the
highest level of quality, toughness and performance from their
bikes and
accessories.
Product development is the most critical element of GBI’s past
and future
growth. GBI has invested heavily in this area, focusing on
innovation,
quality, safety and speed to market. GBI has an extensive
innovation
network to source ideas from riders, dealers and professionals
to
continuously improve the performance, reliability and quality of
its bicycles.
In the touring bike category, GBI’s handcrafted bicycles have
won numerous
design awards and are sold in over 10 countries. GBI’s
signature composite
frames are world-renowned for their strength, low weight and
easy
maintenance. GBI bikes are consistently ridden in the Tour de
France and
other major international road races. GBI produces two models
of their
signature road bikes, a deluxe and professional model. The key
difference
between the two models is the type of wheels used, aluminum
for the basic
model and carbon composite for the professional model.
GBI’s off-road are also recognized as incredibly tough and easy
to maintain.
GBI trail bikes are the preferred choice of world champion off-
road racers
and have become synonymous with performance and strength in
one of the
most grueling sports in the world. GBI produces two types of
off-road bike,
a men’s and women’s model. The basic difference between the
two models
is the smaller size and ergonomic shaping of the women’s
frame.
Notes
Figure 3
GBI Finished Products
GBI also sells an accessories product line comprised of helmets,
t-shirts and
other riding accessories. GBI partners with only the highest
quality suppliers
of accessories which will help enhance riders’ performance and
comfort
while riding GBI bikes.
© SAP SE Page 7
CASE STUDY
Figure 4
GBI Trading Goods
© SAP SE Page 8
CASE STUDY
Manufacturing Strategy
Task Get familiar with GBI’s manufacturing strategy.
Short Description Read the below narrative about GBI’s
manufacturing
strategy.
Time 10 min
GBI operates two production facilities, Dallas and Heidelberg.
Each facility
has three assembly lines and can produce around 1000 bikes per
year. Total
production capacity is roughly 6000 bikes per year, but can be
increased by
15%-20% by using overtime hours and part-time workers.
GBI has outsourced the production of both off-road and touring
frames and
the carbon composite wheels to trusted partners who have
specialty facilities
to fabricate the complex materials used. GBI maintains very
collaborative
research and design relationships with these specialty partners
to ensure that
innovations in both material and structural capabilities are
incorporated into
the frames. GBI primarily assembles semi-finished goods into
finished goods
at its production facilities. Finished goods are either stored in
the local
warehouse or shipped to other regional distribution centers to
fulfill
customer orders.
Notes
Figure 5
GBI Raw Materials
GBI Semi-Finished
Goods
© SAP SE Page 9
CASE STUDY
Distribution Network
Task Get familiar with GBI’s distribution network.
Short Description Read the below narrative about GBI’s
distribution
network.
Time 10 min
Given the highly specialized nature of GBI’s bicycles and the
personalized
needs of riders, GBI sells its bikes exclusively through well -
known and
respected Independent Bicycle Dealers (IBDs). These dealers
employ staff
members who are experts in off-road and tour racing to help
consumers
choose the right GBI bike and accessories for their individual
needs.
Notes
Figure 6
GBI Customers in
US and Germany
Due to the highly technical nature of its products, GBI has
embraced the
Internet primarily as an information channel, maximizing its
potential for
educating consumers and partners and marketing its products to
a large
audience.
Since GBI’s main sales channel is through specialty resellers
and there are
complex tax issues associated with selling in multiple states and
countries,
they have a limited amount of internet sales.
© SAP SE Page 10
CASE STUDY
Partner Network
Task Get familiar with GBI’s partner network.
Short Description Read the below narrative about GBI’s partner
network.
Time 10 min
GBI has established an extensive partner operation to ensure
process
continuity between GBI and its partners to deliver best-in-class
products for
its customers. Special attention has been paid to nurturing
strong
relationships with suppliers and GBI is generally the largest
customer of its
main suppliers.
Notes
Figure 7
GBI Vendors in
US and Germany
© SAP SE Page 11
CASE STUDY
IT Strategy
Task Get familiar with GBI’s IT strategy.
Short Description Read the below narrative about GBI’s
information
technology strategy.
Time 5 min
During 2009, GBI integrated a shared services model for all IT
functions,
located in the Dallas office. Along with this move to centralized
IT, GBI also
implemented SAP ERP (version 6.0). Prior to this, divisions
were running
multiple, independent application environments. All ERP
functions are
centralized with the primary objectives to reduce costs and
deliver best-in-
class technology to all divisions globally. This centralized
approach offers
GBI an advanced business platform under a highly controlled
environment,
which enables consistency of operations and process integrity
across the
globe.
Notes
1
Guidelines for Project Proposals*
A technical proposal, often called a "Statement of Work,” is a
persuasive document. Its
objectives are to
1. Identify what work is to be done
2. Explain why this work needs to be done
3. Persuade the reader that the proposers (you) are qualified for
the work, have a plausible
management plan and technical approach, and have the
resources needed to complete the
task within the stated time and cost constraints.
What makes a good proposal? One attribute is appearance. A
strong proposal has an
attractive, professional, inviting appearance. In addition, the
information should easy to access.
A second attribute is substance. A strong proposal has a well -
organized plan of attack. A strong
proposal also has technical details because technical depth is
needed to sell your project.
Remember: A proposal is a persuasive document.
Required Format
Format consists of the layout and typography of a document. In
formatting your
proposal, use the guidelines in Table 1. A template to produce
your proposal exists at the
following web page:
http://www.writing.eng.vt.edu/design/proposal_template.doc
One aspect of layout is the incorporation of illustrations. In
your proposal, each
illustration should have a name and be formally introduced in
the text. Illustrations consist of
figures and tables. Figures include photographs, drawings,
diagrams, and graphs. Each figure
should have a stand-alone caption, and the key points and
features should be labeled. Tables
are arrangement of words and numbers into rows and columns.
Use tables to summarize lists
that the audience will try to find later (the budget, for instance).
Table 1. Format guidelines for requested proposal.
Aspect Description
Font for headings Boldface serif or sans serif: size in
accordance with hierarchy
Font for text portion 12-point serif such as Times New Roman
or Book Antiqua
Margins Standard, at least 1 inch
Layout One column, single-sided
Paragraphing Indented paragraphs, no line skip between
paragraphs in a section
Page number Bottom centered
Figure names Numbered: Figure 1, Figure 2, Figure 3, and so
forth
Figure captions Below figure in 10 point type
Table names Numbered: Table 1, Table 2, Table 3, and so forth
Table headings Above table in 12 point type
* Adapted from Guidelines at the Penn State Learning Factory:
http://www.lf.psu.edu/
2
Organization
As given in the proposal template, your proposal should have
the following sections
and headings:
Title Page
a. Title of project in initial capital letters
b. The sponsoring company and contact person’s name and
information
c. Team name and individual member names
d. Date
e. An appropriate picture of the product, a team logo, or both
Executive Summary
Content: A brief summary of the proposal
Length: one-third to one-half page, never more than one page
Emphasis: highlighting of the proposed technical and
management approach
Table of Contents
Statement of Problem: the “Why?”
Summary of the request by the sponsor (the original problem
statement)
Background:
Brief description of company and their business
Relevance or importance of problem
Background information to educate the reader
Previous related work by others—literature review with credible
sources
Patent search, if applicable
Detailed problem description, as you now understand it
Objectives: the “What?”
In the Objectives section, you translate the customer’s
quantitative and qualitative needs
into clear, objective design specifications. Define the scope of
work and clearly state the project
objectives, including the following:
a. Design specifications in specific, quantitative terms. For
example, “The plate must be
rotated three times at a speed of between 1 and 3 rev/s” or
“Control the temperature of a 1
liter non-insulated standard glass beaker of water to 37.5 ±
0.5oC for three hours without
temperature deviation.”
b. Critical design issues, constraints, limitations.
Technical Approach: the “How?”
Although you may not know all the details of the problem
solution, you should know a
first design on how you will attack the problem, and you should
have some design concepts.
The purpose of this section is to present the process by which
you will arrive at the final answer.
This section answers the following questions:
3
1) What are the steps in the design process? (Describe and use
the nine-step model from
Chapter 1 of Hyman’s text)
2) What are the benefits and advantages of employing a
structured approach to design?
3) How will you generate solution concepts?
4) How will you analyze the performance of your solution?
5) How will you decide on the best alternative?
Specific recommendations for this section include the
following:
a. First, describe your overall design process in general terms.
A one-page synopsis of Chapter
1 in the Hyman text would be appropriate here.
b. Provide at least three possible solution alternatives and
document your methodology to
choose the best alternative. Include illustrations such as Figure
1. Try to be as inclusive and
creative as possible with your ideas. Strive to achieve at least
one non-conventional or “out
of the box” alternative.
c. List and describe all the analytical, or computational tools
you will employ to analyze your
design, such as ProEngineer®, SolidWorks®, MathCAD, and
MATLAB.
d. List and detail all the experimental procedures you will
use to test your design concepts.
e. Evaluate your alternatives based on how well they
satisfy the design specifications. Explain the selection
criteria by which you will evaluate design
alternatives in specific, quantitative terms, such as
cost, weight, reliability, ease of use, and ease of
manufacture. A matrix table can clearly illustrate this
information.
f. If possible at this time, rank your solution concepts
and list the pros and cons of each. At minimum, state
what further information or additional work is
needed in order to arrive at a final solution
alternative.
g. If any solution is totally unfeasible (or may have been
Figure 1. SolidWorks® model of a
tried before), state the reason for its elimination. Manual filter
wheel with C-Mount
adapters.
Project Management: “How and When?”
The Project Management section describes how the project will
be managed, including a
detailed timetable with milestones. Specific items to include in
this section are as follows:
a. Description of task phases (typical development tasks:
Planning, Concept Development,
System-Level Design, Detailed Design, Testing and Refinement,
Production)
b. Division of responsibilities and duties among team members
c. Timeline with milestones: Gantt chart (see Figure 2 for an
example). The following are
required elements of your Gantt chart:
i. Project duration is from the date your project is assigned to
the completion date:
25th April
ii. Each milestone is to be labeled with a title
iii. Schedule all tasks not just “Design” or “Testing.” Break
this schedule down to
specific assignments.
4
iv. Each task is to be labeled with a title and person or persons
assigned to the task.
v. Subdivide larger items so that no task is longer than about
one week
vi. Link tasks which are dependent on the completion of a
previous task.
vii. Continue to update your schedule throughout your project.
This tool is important
for organizing and viewing the progress of your project.
viii. Where possible, avoid a serial timeline (one task at a time,
which must be
completed before next task can proceed).
Figure 2. Example of a Gantt Chart.
Deliverables
The culmination of the proposal negotiation with your sponsor
will be a completed
“Deliverables Agreement.” In this section, provide a detailed
description of what you are
providing and when you will provide it. Be as specific as
possible. Possible items include
Detailed design drawings (specify Computer Aided Design
format)
Physical prototype
Scale model
Engineering analysis (Finite Element Analysis, MATLAB, etc.)
Economic analysis (return on investment calculations)
Detailed description of test procedures
Data from experiments
Computer program code, flowchart, documentation
Circuit diagrams
User-friendly instructions including training for personnel
Budget: “How Much?”
Provide your best estimate of how project funds will be spent
for your first design. For
an example, see Table 2. The sponsor will allow for only this
amount. At this time, you need to
know the details for your initial design. You can divide up your
budget into some major
categories, such as equipment, materials, supplies, shipping (if
Hershey), and Learning Factory
costs (that is, for the computerized numerical control, rapid
prototyping, etc). Remember: You
are spending sponsor dollars and the sponsor needs to see that
the money is spent wisely. If
additional funds or resources are needed from your sponsor
compared to their original “request
for proposals,” ask for them here but justify the request.
1. Be as exact as you can but estimate slightly higher for
shipping. For any quantities, add an
additional 10–20% for error.
5
2. Read all ordering requirements for each company. Some
companies have a minimum
order amount so you need to be aware of this in advance.
3. You’ll need to have all (100%) your items ordered and
reconciled by the week before spring
break for your first design.
4. Additional funds will not be released after this day without
written justification for the
deviation (that is, why do you need to go with your alternate
choice? What went wrong
with the first design?).†
Table 2: Requested items and funds for initial design.
Item Supplier Catalog No# Quantity Unit Price Total
Vacuum Pump McMaster Carr IJ-60825 1 $183.47 $188.72
Flow Pump Northern Tool CJX-689 1 $139.99 $156.62
Water Filter Whirlpool Lowe's Hardware WHER25 1 $33.73
$33.73
23/32" Plywood 4'x8' Lowe's Hardware none 1 $24.95 $24.95
4" Ondine Rainmaker Smartbargain.com 129808 1 $19.99
$37.86
Acrylic Tubing 5' (OD 8") McMaster Carr 8486K626 1 $236.70
$250.95
"8" Flange (13" OD) McMaster Carr KD-ERW 1 $44.24 $44.24
Total $737.07
Communication and Coordination with Sponsor
Specify the interaction with your sponsor:
a. Establish communication schedule and the responsibilities of
each participant. See the
syllabus for exact dates of progress report, mid-semester
presentations, final-presentations,
Showcase, etc.
b. Establish the form of communication (visits, weekly updates,
conference calls,
teleconferences).
c. Specify who will receive information and how it will be
transmitted.
d. Clearly state what actions are requested with each
communication: information only, reply
requested, etc.
Special Topics
Define any sponsor specific items, such as the handling of
confidential information, and
loan and return of equipment.
Team Qualifications: the “Who?”
a. In a paragraph for each person, establish the team
qualifications for the project. Highlight
any specific job or course experiences that are relevant to the
project.
b. Include a one-page resume of each team member in the
Appendix. Do not include your
hobbies.
† If your first approach has problems you should be ready to
switch to your alternate. To do this switch,
you will need to submit a revised “Full Proposal.”
Identification and Authentication
GBI - John Davis & Peter Schwarz
Team - Group 4 (Chase Guss, Alexander Apodaca, Matthew
Ulloa, Tamer Rabea, and Hernan Hernandez)
April 29th, 2022
Executive Summary
The purpose of this paper is to propose an audit on GBI’s
company and suggest things that should be looked into when
given the opportunity to audit their system in the area of
identification and authentication. It would take approximately
four month to complete the audit if given full access to GBI’s
systems. Our objective is to go in depth into your systems
policies on identification and authentication and depict who is
allowed into your company. We will interview employees and
see how much access they are granted and if they are required
to have the necessary authorization that your company provides
them. We want to ensure that we can spot out anyone that has
the necessary credentials and does not exceed their necessitie s
for your company. By the end of this audit, we would be able to
explain how we would appropriately modify your systems and
ensure the safekeeping of all data and information for your
company. We would break it down into a table of significant
issues, types, and priorities. If GBI decides to use Team Four as
their auditor, we will provide dates that we can implement all
solutions by.
Table of Contents
Page 1 - Cover page
Page 2 - Executive Summary
Page 3 - Table of contents
Statement of Problem: the “Why?”
In 2001, two companies merged into one and formed what we
know as GBI. Global Bike Inc. is a North American and German
company run by co-CEOs John Davis and Peter Schwarz. As the
name implies, the company builds innovative bikes made to
outperform others and last for a long time. In terms of
responsibilities, Davis handles selling the products, and
Schwarz deals with manufacturing the product. Departments
such as marketing, IT, HR, service and support, finance, and
sales make up Davis’ portion of the company. He is the money
maker. Schwarz manages research, the designs of the bikes,
getting supplies, and other manufacturing groups. He is the
money spender.
GBI wants a Department of Defense contract, and to be granted
this contract, they must meet the level three requirements of the
CMMC. GBI needs a CMMC audit. The Cybersecurity Maturity
Model Certification audit will carefully dissect GBI’s cyber
hygiene under the “Identity and Authorization” domain. This
domain categorizes the best procedures and practices the
company needs to follow. The identity and authorization domain
deals with employee logins, access to resources, passwords,
etc. GBI must face this cyber challenge, and we can provide the
audit as a company.
Technology has ingrained itself into everyday business and will
continue to do so. With this technology comes good and evil.
On the one hand, we have information systems that handle vast
portions of data, but on the other hand, we have hackers who
want to steal that data for many reasons. A CMMC audit would
test the company’s cyber hygiene and point out what can be
improved to prevent data from being stolen and business
stopping because one employee inserted a thumb drive into their
computer. The audit brings GBI one step closer to protecting
their company, employee, and customer data. While preserving
the company and its assets, this audit gives the potential of
allowing GBI to work with the DOD and expand its business. If
the company fails to reach level three of the CMMC, GBI still
receives an audit that tells them what gaps need to be filled to
reach that level. This may be for expanding work opportunities,
but cyber security is critical currently in today’s climate.
Objectives: the “What?”
During the scope of the project, our objective will be to propose
an audit for Global Bike Inc. We intend to finish the audit
within four months and by doing so, we shall be able to ensure
your business maintains its proper working environment. We
will be able to spread our work in a timely manner to allow your
company to meet its daily requirements. By the time we are
done with this project, we will have a thorough understanding
of the company systems and policies. The company must meet
the requirement of good cyber hygiene according to the CMMC
guidelines. We can assure that our company will take the proper
steps and procedures throughout the auditing process, which
will ultimately decide whether GBI is certified to be at the level
three CMMC and be granted a DOD contract.
·
Design specifications in specific, quantitative terms. For
example, “The plate must be rotated three times at a speed of
between 1 and 3 rev/s” or “Control the temperature of a 1 liter
non-insulated standard glass beaker of water to 37.5 ± 0.5oC for
three hours without temperature deviation.”
·
Critical design issues, constraints, limitations.
Technical Approach: the “How?”
Our goal will be to completely analyze their systems. We will
be focusing on identities and authentications. First thing we will
do is identify all the system users. Identify the processes acting
on behalf of the system and identify all the devices that are
accessing the companies systems. After doing so, we will want
to review all Identification and authentication policies and
procedures. We will review the system security plans and
system design documentation. We will need to review the
configuration settings and any other policies associated with it.
We would need a copy of audit logs and records, and a list of
system accounts. After reviewing all of these documents and
policies, we would want to get some interviews with personnel
that work in system operations, information security, system or
network administrators, and system developers. We would then
be able to evaluate the organizational process for identifying
and authenticating users. We would also evaluate the
mechanisms and process that supports the identification and
authentication process.
Following that we would determine if the identity of each user
is authenticated or verified as a prerequisite to system access,
ensure its acting on behalf of a user is authenticated or verified
to access the system.
By doing so, we would be able to source out any challenges the
company may be enduring. We would be able to come with a
plan to get over these challenges. Our objective is to ensure that
there are policies in place and that the company is abiding by
them. Everyone that requires access to the systems for the
company should be given a certain level of clearance. With this
comes responsibility and trust. Users may be granted access
based on their level of clearance. That being said, we would
break down all policies and pinpoint the job specifications for
every person through the chain of command. We can then
interview employees around the company and ensure that they
are following their job specifications. After that, we need to
ensure that the employees are given access based on their
identity and authentication clearance level.
Design Process
1) Process Overview
The design process will consist of reviewing documents,
password logs, security logs, configuration settings, policies,
and other information relevant to identity and authentication.
Anything found that has any significance towards policy,
procedure, and relevant information that can help our audit. We
will also be conducting interviews to establish if our findings
match the everyday business workflow.
The identity and authentication domain has one capability and
eleven practices that certifies companies under CMMC. There
are two practices in level one, five in level two, and four in
level three. We will approach the audit one practice at a time,
dividing our time based on the CMMC levels.
Capability
“Grant access to authenticated entities”
2) Step by step guide of design process
3) What are the benefits and advantages of employing a
structured approach to design?
Having a structured approach to design will keep everything
uniform. We will be able to track every step we take and plan
ahead according to the designs and findings we come across.
We will document everything as we find things that work well,
work okay, and do not work at all. There will be a process
organization responsibility matrix that will easily breakdown
the moving parts that work well or have value of being in the
company.
4) How will you generate solution concepts?
We will generate solutions by auditing the policy, interviewing
employees and administration. We shall test all of our findings
and prepare a final report.
5) How will you analyze the performance of your solution?
We will be able to ensure who needs access to what and why it
might be potentially damaging to your company. GBI process
would know there assets would be more secure and not have the
potential to risk losing money on places it should not be
allocated to.
6) How will you decide on the best alternative?
Upon completion of the audit we are proposing, once finished
we would have a breakdown chart of areas in which they are in
compliance with. We will be able to explain to them which
areas they are not in compliance with and that they need to fix it
by the next meeting to gain compliance and meet the standards
for CMMC. We would not be able to change anything for them,
if in doing so, we would no longer be able to audit them.
Specific recommendations for this section include the
following:
First, describe your overall design process in general terms. A
one-page synopsis of Chapter 1 in the Hyman text would be
appropriate here.
·
Provide at least three possible solution alternatives and
document your methodology to choose the best alternative.
Include illustrations such as Figure 1. Try to be as inclusive and
creative as possible with your ideas. Strive to achieve at least
one non-conventional or “out of the box” alternative.
·
List and describe all the analytical, or computational tools you
will employ to analyze your design, such as ProEngineer®,
SolidWorks®, MathCAD, and MATLAB.
·
List and detail all the experimental procedures you will use to
test your design concepts.
·
Evaluate your alternatives based on how well they satisfy the
design specifications. Explain the selection criteria by which
you will evaluate design alternatives in specific, quantitative
terms, such as cost, weight, reliability, ease of use, and ease of
manufacture. A matrix table can clearly illustrate this
information.
·
If possible at this time, rank your solution concepts and list the
pros and cons of each. At minimum, state what further
information or additional work is needed in order to arrive at a
final solution alternative.
·
If any solution is totally unfeasible (or may have been tried
before), state the reason for its elimination.
Project Management: “How and When?”
The Project Management section describes how the project will
be managed, including a detailed timetable with milestones.
Specific items to include in this section are as follows:
a. Description of task phases (typical development tasks:
Planning, Concept Development, System-Level Design, Detailed
Design, Testing and Refinement, Production)
Phases of the Project Development
· Planning (Submission of the proposal) April 24th. From April
24th to May 30, 2022 We will be able to meet with owners of
GBI and discuss project details and ensure we can meet time
frames and plan accordingly for the project to meet its time
restraints.
· Audit/Review / May 1st to May 30th, will be time for our
Team to come in to audit and review policies and documents
pertaining to identity and authentication. We will prepare
ourselves during this period and prepare interview questions.
This would allow GBI time to plan for employees to spare
approximately 1-4 hours for interviews based on the scope of
their assignment.
· Interviews June 1st to June 31st all employees will be
scheduled with two of our team members and we will interview
accordingly based on positions. Our fifth person will be
responsible for ensuring all interviews will be on the proper
schedule and comparing the notes from each interview. We will
compare our findings based on policies and form every
interview.
Responsibilities for each team member
· Team member 1- Project administrator, oversees the project
and meets with the company. Reviews policy and interviews.
Coordinates the tests amongst the rest of the team. Team
member 1 will set up all interviews and divide the work
amongst the team members to ensure nothing is repetitive and or
missed.
· Team member 2 - Responsible for reviewing policies,
auditing, interviewing, and testing.
· Team member 3 - Responsible for reviewing policies,
auditing, interviewing, and testing.
· Team member 4 - Responsible for reviewing policies,
auditing, interviewing, and testing.
· Team member 5 - Responsible for reviewing policies,
auditing, interviewing, and testing.
Gantt Chart
Gantt Chart Attached is a gantt chart with a basic timeline
and the procedure of how and when things will be completed.
This project should take approximately four months in time and
we will be able to spread it in a timely manner to allow your
employees to find coverage during times of interviews and
reviewing documents.
ii. Each milestone is to be labeled with a title
iii. Schedule all tasks not just “Design” or “Testing.” Break this
schedule down to
specific assignments.
iv.
Each task is to be labeled with a title and person or persons
assigned to the task.
v.
Subdivide larger items so that no task is longer than about one
week
vi.
Link tasks which are dependent on the completion of a previous
task.
vii.
Continue to update your schedule throughout your project. This
tool is important
for organizing and viewing the progress of your project.
viii.
Where possible, avoid a serial timeline (one task at a time,
which must be completed before the next task can proceed).
Deliverables
We will provide a document at the end that will show an
overview of our findings. It will be color coordinated and
reflect the CMMC guidelines. Red will indicate critical.
Vulnerabilities will be listed inside the highlighted section that
correlate with the identification and authorization domain.
Critical means that the exploitation of this vulnerability could
cause catastrophic damage to the company’s reputation,
workflow, operations, etc. Anything in orange would be a less
severe vulnerability, but with the potential to be exploited and
cause minor workflow issues. Green will indicate that no
vulnerabilities were found. With this information it is up to GBI
to decide how and if they would want to fix these problems.
After the audit, we can offer our services to fix these
vulnerabilities and implement proper security controls. GBI
would get a 15% discount on this specific service. If accepted,
we would not be able to audit GBI in the future.
The culmination of the proposal negotiation with your sponsor
will be a completed “Deliverables Agreement.” In this section,
provide a detailed description of what you are providing and
when you will provide it. Be as specific as possible. Possible
items include
Detailed design drawings (specify Computer Aided Design
format) Physical prototype
Scale model
Engineering analysis (Finite Element Analysis, MATLAB, etc.)
Economic analysis (return on investment calculations)
Detailed description of test procedures
Data from experiments
Computer program code, flowchart, documentation Circuit
diagrams
User-friendly instructions including training for personnel
Budget: “How Much?”
Provide your best estimate of how project funds will be spent
for your first design. For an example, see Table 2. The sponsor
will allow for only this amount. At this time, you need to know
the details for your initial design. You can divide up your
budget into some major categories, such as equipment,
materials, supplies, shipping (if Hershey), and Learning Factory
costs (that is, for the computerized numerical control, rapid
prototyping, etc). Remember: You are spending sponsor dollars
and the sponsor needs to see that the money is spent wisely. If
additional funds or resources are needed from your sponsor
compared to their original “request for proposals,” ask for them
here but justify the request.
The amount for our budget will be 150,000 for the audit if we
are chosen, there might be an additional 10-20% charge during
the process if errors are made by your company or employees
refusing to comply with the orders given in a timely manner.
Below is a breakdown of where the funds will be supplied.
Budget Breakdown
Personnel/ Labor - 100,000 amongst 5 employees over a four
month period, 5 employees, earning equal wages 20,000 each
for a four month period.
Supplies - 25,000 - Technology and implementation
Transportation- 10,000 - Gas, stays, vehicle wear
Programs - 15,000 - system authentications
0.
Read all ordering requirements for each company. Some
companies have a minimum order amount so you need to be
aware of this in advance.
1.
You’ll need to have all (100%) your items ordered and
reconciled by the week before spring break for your first design.
2.
Additional funds will not be released after this day without
written justification for the deviation (that is, why do you need
to go with your alternate choice? What went wrong with the
first design?).†
Table 2: Requested items and funds for initial design.
Item
Vacuum Pump
Flow Pump
Water Filter Whirlpool 23/32" Plywood 4'x8'
4" Ondine Rainmaker Acrylic Tubing 5' (OD 8") "8" Flange
(13" OD)
Supplier Catalog No#
McMaster Carr IJ-60825 Northern Tool CJX-689 Lowe's
Hardware WHER25 Lowe's Hardware none Smartbargain.com
129808 McMaster Carr 8486K626 McMaster Carr KD-ERW
Quantity
Unit Price
$183.47 $139.99 $33.73 $24.95 $19.99 $236.70 $44.24 Total
Total $188.72
$156.62 $33.73 $24.95 $37.86
$250.95 $44.24 $737.07
Communication and Coordination with Sponsor
Point of Contact:
GBI is to provide their policy documents in regards to security.
This includes documents regarding passwords, authentication,
how users are authorized, etc. They are also to provide any
recurring scripts and access to logs and files.
We will meet with our point of contact at least once per week
for at least a half hour to inform of progress, who we need to
speak with and to rearrange the schedule if there is a conflict
for either party or employee. Parties must be able to meet either
in person or via zoom.
Response to e-mail and phone communications should be
prompt and done within 24 hours, barring weekends having a 48
hour window. In the case of e-mail or phone communications in
which there is only information given and no questions either
asked or that arose; parties will send a message of
acknowledgement.
The final report will be given to the CEO and head of IT (look
on ARRIS). If there is an issue it must be presented to us within
72 hours and we will work to resolve it. Our conclusions will be
drawn based on evidence and word of mouth alone is not
sufficient.
Special Topics
Our company will meet with GBI, during the initial meeting we
can discuss handling of confidential information. We need
access to all policies and procedures that relate to identity and
authentication. These things may require information about the
employees, employers, and company as a whole. We will
discuss the parameters of the project and what our team will be
able to utilize. Our team will ensure the privacy of all
information regarding employees, employers, and the company
itself. We will agree to secure all information when we are done
with the project and we will ensure we do not take any
information and use it for personal gain. Our company will
write up a contract with GBI and both parties will agree to the
terms before the start of an audit. If the contract is voided, the
project will be terminated and our company will no longer have
access to GBI’s information systems. We pride ourselves in
maintaining integrity and confidentiality during the work
process.
Any loaned equipment to our company will be returned on a
daily basis, unless specifically requested by our management
team and agreement with GBI’s management. We will not retain
systems overnight nor transport them off the facility.
Team Qualifications: the “Who?”
In a paragraph for each person, establish the team qualifications
for the project. Highlight any specific job or course experiences
that are relevant to the project.
Alexander Apodaca
Chase Guss - 7 years of working as a Supervisor in my current
line of duty as a Corporal for the Sheriff’s department. I would
maintain computers and technology for my station that I was
assigned to. Familiar with Linux, Windows, and Mac OS’s.
Utilized a Raspberry Pi to link it to an outside network, from
my pc at home I was able to gain access into the Raspberry Pi
and access the outside network from a distance and monitor
traffic, viewing users that have access to certain things or if
they weren't working and just surfing the web. I received a
certificate in AccessData Certified Examiner. I would run audits
of over one hundred personnel in our department and ensure
their training records were up to date and placing them in the
right categories. I would also be responsible for ensuring that
they are given access to department drives when logging into
their user on department systems. I would ensure that they can
access the files they need and no more than that.
Hernan Hernadez
Tamer Rabea
Matthew Ulloa
Include a one-page resume of each team member in the
Appendix. Do not include your hobbies.
† If your first approach has problems you should be ready to
switch to your alternate. To do this switch, you will need to
submit a revised “Full Proposal.”
Ethical and Legal Compliance Statement
As a company, we strive to maintain a trusting relationship with
any company we do business with. Our company will follow all
federal and state laws applicable to GBI’s data. Any work done
with GBI will comply with all laws and ethical business
codes…
Arbitration Clause:
Any disputes that arise should be resolved civilly. In the event
of arbitration, it is to take place in San Bernardino County. …
..
 © SAP SE     CASE STUDY

More Related Content

More from SilvaGraf83

1 Kilimanjaro is a snow-covered mountain 19,710 feet hi
1  Kilimanjaro is a snow-covered mountain 19,710 feet hi1  Kilimanjaro is a snow-covered mountain 19,710 feet hi
1 Kilimanjaro is a snow-covered mountain 19,710 feet hi
SilvaGraf83
 
1 Assignment 2 Winter 2022Problem 1 Assume yo
1  Assignment 2 Winter 2022Problem 1 Assume yo1  Assignment 2 Winter 2022Problem 1 Assume yo
1 Assignment 2 Winter 2022Problem 1 Assume yo
SilvaGraf83
 
1 COU 680 Adult Psychosocial Assessment Sabrina Da
1  COU 680 Adult Psychosocial Assessment Sabrina  Da1  COU 680 Adult Psychosocial Assessment Sabrina  Da
1 COU 680 Adult Psychosocial Assessment Sabrina Da
SilvaGraf83
 
1 Literature Review on How Biofilm Affect the
1  Literature Review on How Biofilm Affect the1  Literature Review on How Biofilm Affect the
1 Literature Review on How Biofilm Affect the
SilvaGraf83
 
1 Canterbury Tales (c. 12th century)
1  Canterbury Tales        (c. 12th century)  1  Canterbury Tales        (c. 12th century)
1 Canterbury Tales (c. 12th century)
SilvaGraf83
 
1 Math 140 Exam 2 COC Spring 2022 150 Points
1  Math 140 Exam 2 COC Spring 2022 150 Points  1  Math 140 Exam 2 COC Spring 2022 150 Points
1 Math 140 Exam 2 COC Spring 2022 150 Points
SilvaGraf83
 
1 Lessons from the past How the deadly second wave
1  Lessons from the past How the deadly second wave1  Lessons from the past How the deadly second wave
1 Lessons from the past How the deadly second wave
SilvaGraf83
 
1 Lockheed Martin Corporation Abdussamet Akca
1  Lockheed Martin Corporation Abdussamet Akca  1  Lockheed Martin Corporation Abdussamet Akca
1 Lockheed Martin Corporation Abdussamet Akca
SilvaGraf83
 
1 Lab 9 Comparison of Two Field Methods in a Scien
1  Lab 9 Comparison of Two Field Methods in a Scien1  Lab 9 Comparison of Two Field Methods in a Scien
1 Lab 9 Comparison of Two Field Methods in a Scien
SilvaGraf83
 
1 LAB MODULE 5 GLOBAL TEMPERATURE PATTERNS Note P
1  LAB MODULE 5 GLOBAL TEMPERATURE PATTERNS Note P1  LAB MODULE 5 GLOBAL TEMPERATURE PATTERNS Note P
1 LAB MODULE 5 GLOBAL TEMPERATURE PATTERNS Note P
SilvaGraf83
 
1 Instructions for Coming of Age in Mississippi
1  Instructions for Coming of  Age in Mississippi 1  Instructions for Coming of  Age in Mississippi
1 Instructions for Coming of Age in Mississippi
SilvaGraf83
 
1 Institutional Assessment Report 2012-13
1  Institutional Assessment Report 2012-13  1  Institutional Assessment Report 2012-13
1 Institutional Assessment Report 2012-13
SilvaGraf83
 
1 Introduction Screen Narrator As part of the comm
1  Introduction Screen Narrator As part of the comm1  Introduction Screen Narrator As part of the comm
1 Introduction Screen Narrator As part of the comm
SilvaGraf83
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games Text
SilvaGraf83
 
1 Introduction The purpose of studying the raw
1  Introduction The purpose of studying the raw 1  Introduction The purpose of studying the raw
1 Introduction The purpose of studying the raw
SilvaGraf83
 
1 Intersectionality Activity Guide Broadening th
1  Intersectionality Activity Guide Broadening th1  Intersectionality Activity Guide Broadening th
1 Intersectionality Activity Guide Broadening th
SilvaGraf83
 
1 Academic Session 2021 May 2021 Semester A
1  Academic Session 2021 May 2021 Semester   A1  Academic Session 2021 May 2021 Semester   A
1 Academic Session 2021 May 2021 Semester A
SilvaGraf83
 
1 8 MODULE 8 PRINCIPLES OF MANAGEMENT, SPRING 202
1  8 MODULE 8 PRINCIPLES OF MANAGEMENT, SPRING 2021  8 MODULE 8 PRINCIPLES OF MANAGEMENT, SPRING 202
1 8 MODULE 8 PRINCIPLES OF MANAGEMENT, SPRING 202
SilvaGraf83
 
1 Lab Title Physical Geography of the Big island
1   Lab Title Physical Geography of the Big island1   Lab Title Physical Geography of the Big island
1 Lab Title Physical Geography of the Big island
SilvaGraf83
 
1 CDEV 108 Foundations Assignment 50 points For
1  CDEV 108 Foundations Assignment 50 points For1  CDEV 108 Foundations Assignment 50 points For
1 CDEV 108 Foundations Assignment 50 points For
SilvaGraf83
 

More from SilvaGraf83 (20)

1 Kilimanjaro is a snow-covered mountain 19,710 feet hi
1  Kilimanjaro is a snow-covered mountain 19,710 feet hi1  Kilimanjaro is a snow-covered mountain 19,710 feet hi
1 Kilimanjaro is a snow-covered mountain 19,710 feet hi
 
1 Assignment 2 Winter 2022Problem 1 Assume yo
1  Assignment 2 Winter 2022Problem 1 Assume yo1  Assignment 2 Winter 2022Problem 1 Assume yo
1 Assignment 2 Winter 2022Problem 1 Assume yo
 
1 COU 680 Adult Psychosocial Assessment Sabrina Da
1  COU 680 Adult Psychosocial Assessment Sabrina  Da1  COU 680 Adult Psychosocial Assessment Sabrina  Da
1 COU 680 Adult Psychosocial Assessment Sabrina Da
 
1 Literature Review on How Biofilm Affect the
1  Literature Review on How Biofilm Affect the1  Literature Review on How Biofilm Affect the
1 Literature Review on How Biofilm Affect the
 
1 Canterbury Tales (c. 12th century)
1  Canterbury Tales        (c. 12th century)  1  Canterbury Tales        (c. 12th century)
1 Canterbury Tales (c. 12th century)
 
1 Math 140 Exam 2 COC Spring 2022 150 Points
1  Math 140 Exam 2 COC Spring 2022 150 Points  1  Math 140 Exam 2 COC Spring 2022 150 Points
1 Math 140 Exam 2 COC Spring 2022 150 Points
 
1 Lessons from the past How the deadly second wave
1  Lessons from the past How the deadly second wave1  Lessons from the past How the deadly second wave
1 Lessons from the past How the deadly second wave
 
1 Lockheed Martin Corporation Abdussamet Akca
1  Lockheed Martin Corporation Abdussamet Akca  1  Lockheed Martin Corporation Abdussamet Akca
1 Lockheed Martin Corporation Abdussamet Akca
 
1 Lab 9 Comparison of Two Field Methods in a Scien
1  Lab 9 Comparison of Two Field Methods in a Scien1  Lab 9 Comparison of Two Field Methods in a Scien
1 Lab 9 Comparison of Two Field Methods in a Scien
 
1 LAB MODULE 5 GLOBAL TEMPERATURE PATTERNS Note P
1  LAB MODULE 5 GLOBAL TEMPERATURE PATTERNS Note P1  LAB MODULE 5 GLOBAL TEMPERATURE PATTERNS Note P
1 LAB MODULE 5 GLOBAL TEMPERATURE PATTERNS Note P
 
1 Instructions for Coming of Age in Mississippi
1  Instructions for Coming of  Age in Mississippi 1  Instructions for Coming of  Age in Mississippi
1 Instructions for Coming of Age in Mississippi
 
1 Institutional Assessment Report 2012-13
1  Institutional Assessment Report 2012-13  1  Institutional Assessment Report 2012-13
1 Institutional Assessment Report 2012-13
 
1 Introduction Screen Narrator As part of the comm
1  Introduction Screen Narrator As part of the comm1  Introduction Screen Narrator As part of the comm
1 Introduction Screen Narrator As part of the comm
 
1 IT 140 A Mini History of Text-Based Games Text
1  IT 140 A Mini History of Text-Based Games  Text1  IT 140 A Mini History of Text-Based Games  Text
1 IT 140 A Mini History of Text-Based Games Text
 
1 Introduction The purpose of studying the raw
1  Introduction The purpose of studying the raw 1  Introduction The purpose of studying the raw
1 Introduction The purpose of studying the raw
 
1 Intersectionality Activity Guide Broadening th
1  Intersectionality Activity Guide Broadening th1  Intersectionality Activity Guide Broadening th
1 Intersectionality Activity Guide Broadening th
 
1 Academic Session 2021 May 2021 Semester A
1  Academic Session 2021 May 2021 Semester   A1  Academic Session 2021 May 2021 Semester   A
1 Academic Session 2021 May 2021 Semester A
 
1 8 MODULE 8 PRINCIPLES OF MANAGEMENT, SPRING 202
1  8 MODULE 8 PRINCIPLES OF MANAGEMENT, SPRING 2021  8 MODULE 8 PRINCIPLES OF MANAGEMENT, SPRING 202
1 8 MODULE 8 PRINCIPLES OF MANAGEMENT, SPRING 202
 
1 Lab Title Physical Geography of the Big island
1   Lab Title Physical Geography of the Big island1   Lab Title Physical Geography of the Big island
1 Lab Title Physical Geography of the Big island
 
1 CDEV 108 Foundations Assignment 50 points For
1  CDEV 108 Foundations Assignment 50 points For1  CDEV 108 Foundations Assignment 50 points For
1 CDEV 108 Foundations Assignment 50 points For
 

© SAP SE CASE STUDY

  • 1. © SAP SE CASE STUDY Product SAP ERP 6.08 Global Bike Level
  • 2. Beginner Focus Company Background Authors Simha Magal Stefan Weidner Jeff Word Version 3.0 Last Update July 2016 MOTIVATION A general understanding of GBI (the enterprise) prior to embarking on hands-on exercises and case studies in the SAP ERP client is critical for success. This narrative provides a historical background for how GBI began and an overview of its operations
  • 3. and strategy. This information will be used extensively throughout the curriculum material. NOTES The Global Bike (GBI) data set has exclusively been created for SAP UA global curricula. Global Bike Group Background and overview of GBI strategy and operations. © SAP SE Page 2 CASE STUDY Company History Task Get to know the company’s history. Short Description Read the below narrative to learn about the company’s history.
  • 4. Time 15 min The Global Bike Group has a pragmatic design philosophy that comes from its deep roots in both the off-road trail racing and long-distance road racing sports. Nearly 20 years ago, its founders designed their first bikes out of necessity—they had races to win and the bikes that were available at the time did not perform to their extremely high standards. So, they took matters into their own hands and built legendary bikes that would outlast and outperform the competition. From these humble origins, Global Bike Incorporated was born and continues to deliver innovative high- performance bicycles to the world’s most demanding riders. This heritage of entrepreneurial spirit and quest for design perfection is still the cornerstone of GBI’s corporate philosophy. GBI produces bikes for the
  • 5. most demanding competitors—whether the competition is on pavement or dirt, for money, fame or just bragging rights. John Davis earned his racing scars in the mountain racing circuit in America, where he won numerous downhill and cross-country championships. Early on, John realized that the mass-produced bicycles available were inadequate in many ways for the type of racing he was doing. So, John stripped four of his old bikes down to the bare metal and rebuilt them into a single “Frankenstein” bike that he rode to win the national championship. Once news of his Frankenstein bike got out, John’s friends and even his competitors began asking him to build them a Frankenstein bike too. While recovering from an injury in 1990, John started producing the first series of Frankenstein bikes in his garage—each one custom-built from cannibalized parts from other bikes. As more and more orders came in, John
  • 6. successfully expanded Frankenstein Bikes from his garage operations into a full-blown manufacturing facility in Dallas and began producing custom trail bikes which he sold through a network of specialized bike dealers throughout the country. At nearly the same time, halfway around the world in Heidelberg, Germany, Peter Schwarz was studying engineering and competing in regional touring races on weekends. In between his races and studies, Peter worked at a bike shop in Heidelberg, fixing student bikes and tuning the touring bikes that he and his friends rode for competitions. As Peter’s reputation as a fierce competitor and mechanical wizard grew, he also began to design and build road bikes based on an ultra-light composite frame that he had created for one of his engineering courses. Peter’s innovative use of carbon composite
  • 7. materials allowed him to build a frame that was significantly stronger and one tenth the weight of competing frames. As a student, Peter did not have a great deal of financial resources, so he partnered with a local company that manufactured his frame designs as a contract manufacturer. Soon, Peter’s frames were being used by racers all over Europe and he started Heidelberg Notes © SAP SE Page 3 CASE STUDY Composites to market and design frames which would be fabricated by a contract manufacturer on a larger scale. Heidelberg Composites sold its frames to specialized bike stores throughout Europe and directly to racing
  • 8. teams, eventually becoming the leader in lightweight touring frames in Europe. Through a twist of fate, Peter and John met each other in 2000 and immediately recognized their mutual passion for performance and complimentary business models. Each had been looking for a partner in another racing field and each had been looking for a partner in a different market. They quickly realized that a merger between their two companies would be extremely synergistic and that the combination of their product lines and regional distribution channels would generate a great deal of efficiencies. So, in 2001, Heidelberg Composites and Frankenstein Bikes merged to form Global Bike Incorporated. Today, John and Peter share the responsibilities for managing GBI’s growing organization as co-CEO’s. John is responsible
  • 9. for sales, marketing, service & support, IT, finance and human resources groups and Peter is responsible for research, design, procurement and manufacturing groups from an organizational reporting perspective. Figure 1: Organizational Structure However, GBI is a process-centric organization, so John and Peter prefer to think of the processes that they are responsible for, rather than the functional areas of the company that report to them. From this perspective, Peter is responsible for Idea-to-Market and Build-to-Stock and John is responsible for Order-to-Cash and Service & Support, as well as the supporting services for all four key processes. The simple way to look at their responsibilities would be to say that Peter spends money and builds products and John sells products and brings in money.
  • 10. Board of Directors John (Co-CEO) VP Marketing Chief Information Officer Chief Financial Officer VP Human Resources Peter (Co-CEO) VP Research and Development VP Operations © SAP SE Page 4 CASE STUDY
  • 11. Figure 2: Enterprise Process Map © SAP SE Page 5 CASE STUDY Corporate Overview Task Develop an organizational chart for GBI’s enterprise structure. Short Description Read the below narrative to gather all relevant information for sketching GBI’s current company structure. Time 15 min Due to several tax and export issues, GBI’s headquarters is located in Dallas and GBI is registered as a US company, following US GAAP accounting
  • 12. standards. GBI operates a subsidiary company, GBI Europe, which is based in Heidelberg and is subject to IFRS accounting standards and German tax regulations. Material planning, finance, administration, HR and IT functions are consolidated at the Dallas headquarters. The Dallas facility manufactures products for the US and export markets and its warehouse manages product distribution for the central US and internet retailers. GBI also has warehouses for shipping and export in both San Diego and Miami. San Diego handles West Coast distribution and exports for Asia, while Miami handles East Coast distribution and Latin America exports. GBI Europe has its headquarters in Heidelberg Germany. The majority of research and development is housed in the Heidelberg offices. Heidelberg is also the main manufacturing facility for GBI in Europe. The Heidelberg
  • 13. warehouse handles all shipping for southern Europe. The Hamburg warehouse handles all shipping for the UK, Ireland, Middle East and Africa. GBI sells its bikes throughout the world and employs approximately 100 people, 2/3rds of the employees are in the US and the remaining 1/3 in Europe. Notes Organizational Chart
  • 14. © SAP SE Page 6 CASE STUDY Product Strategy Task Get familiar with GBI’s product strategy. Short Description Read the below narrative about GBI’s product strategy. Time 15 min GBI is a world class bicycle company serving the professional and “prosumer” cyclists for touring and off-road racing. GBI’s riders demand the highest level of quality, toughness and performance from their bikes and accessories. Product development is the most critical element of GBI’s past and future growth. GBI has invested heavily in this area, focusing on innovation, quality, safety and speed to market. GBI has an extensive innovation network to source ideas from riders, dealers and professionals
  • 15. to continuously improve the performance, reliability and quality of its bicycles. In the touring bike category, GBI’s handcrafted bicycles have won numerous design awards and are sold in over 10 countries. GBI’s signature composite frames are world-renowned for their strength, low weight and easy maintenance. GBI bikes are consistently ridden in the Tour de France and other major international road races. GBI produces two models of their signature road bikes, a deluxe and professional model. The key difference between the two models is the type of wheels used, aluminum for the basic model and carbon composite for the professional model. GBI’s off-road are also recognized as incredibly tough and easy to maintain. GBI trail bikes are the preferred choice of world champion off- road racers and have become synonymous with performance and strength in one of the most grueling sports in the world. GBI produces two types of
  • 16. off-road bike, a men’s and women’s model. The basic difference between the two models is the smaller size and ergonomic shaping of the women’s frame. Notes Figure 3 GBI Finished Products GBI also sells an accessories product line comprised of helmets, t-shirts and other riding accessories. GBI partners with only the highest quality suppliers of accessories which will help enhance riders’ performance and comfort while riding GBI bikes. © SAP SE Page 7 CASE STUDY
  • 17. Figure 4 GBI Trading Goods © SAP SE Page 8 CASE STUDY Manufacturing Strategy Task Get familiar with GBI’s manufacturing strategy. Short Description Read the below narrative about GBI’s manufacturing strategy. Time 10 min GBI operates two production facilities, Dallas and Heidelberg. Each facility has three assembly lines and can produce around 1000 bikes per
  • 18. year. Total production capacity is roughly 6000 bikes per year, but can be increased by 15%-20% by using overtime hours and part-time workers. GBI has outsourced the production of both off-road and touring frames and the carbon composite wheels to trusted partners who have specialty facilities to fabricate the complex materials used. GBI maintains very collaborative research and design relationships with these specialty partners to ensure that innovations in both material and structural capabilities are incorporated into the frames. GBI primarily assembles semi-finished goods into finished goods at its production facilities. Finished goods are either stored in the local warehouse or shipped to other regional distribution centers to fulfill customer orders. Notes
  • 19. Figure 5 GBI Raw Materials GBI Semi-Finished Goods © SAP SE Page 9 CASE STUDY Distribution Network Task Get familiar with GBI’s distribution network. Short Description Read the below narrative about GBI’s distribution network. Time 10 min Given the highly specialized nature of GBI’s bicycles and the personalized needs of riders, GBI sells its bikes exclusively through well -
  • 20. known and respected Independent Bicycle Dealers (IBDs). These dealers employ staff members who are experts in off-road and tour racing to help consumers choose the right GBI bike and accessories for their individual needs. Notes Figure 6 GBI Customers in US and Germany Due to the highly technical nature of its products, GBI has embraced the Internet primarily as an information channel, maximizing its potential for educating consumers and partners and marketing its products to a large audience. Since GBI’s main sales channel is through specialty resellers and there are complex tax issues associated with selling in multiple states and countries, they have a limited amount of internet sales.
  • 21. © SAP SE Page 10 CASE STUDY Partner Network Task Get familiar with GBI’s partner network. Short Description Read the below narrative about GBI’s partner network. Time 10 min GBI has established an extensive partner operation to ensure process continuity between GBI and its partners to deliver best-in-class products for its customers. Special attention has been paid to nurturing strong relationships with suppliers and GBI is generally the largest customer of its
  • 22. main suppliers. Notes Figure 7 GBI Vendors in US and Germany © SAP SE Page 11 CASE STUDY IT Strategy Task Get familiar with GBI’s IT strategy. Short Description Read the below narrative about GBI’s information technology strategy. Time 5 min During 2009, GBI integrated a shared services model for all IT
  • 23. functions, located in the Dallas office. Along with this move to centralized IT, GBI also implemented SAP ERP (version 6.0). Prior to this, divisions were running multiple, independent application environments. All ERP functions are centralized with the primary objectives to reduce costs and deliver best-in- class technology to all divisions globally. This centralized approach offers GBI an advanced business platform under a highly controlled environment, which enables consistency of operations and process integrity across the globe. Notes 1 Guidelines for Project Proposals*
  • 24. A technical proposal, often called a "Statement of Work,” is a persuasive document. Its objectives are to 1. Identify what work is to be done 2. Explain why this work needs to be done 3. Persuade the reader that the proposers (you) are qualified for the work, have a plausible management plan and technical approach, and have the resources needed to complete the task within the stated time and cost constraints. What makes a good proposal? One attribute is appearance. A strong proposal has an attractive, professional, inviting appearance. In addition, the information should easy to access. A second attribute is substance. A strong proposal has a well - organized plan of attack. A strong proposal also has technical details because technical depth is needed to sell your project. Remember: A proposal is a persuasive document. Required Format Format consists of the layout and typography of a document. In formatting your proposal, use the guidelines in Table 1. A template to produce your proposal exists at the following web page: http://www.writing.eng.vt.edu/design/proposal_template.doc One aspect of layout is the incorporation of illustrations. In your proposal, each illustration should have a name and be formally introduced in
  • 25. the text. Illustrations consist of figures and tables. Figures include photographs, drawings, diagrams, and graphs. Each figure should have a stand-alone caption, and the key points and features should be labeled. Tables are arrangement of words and numbers into rows and columns. Use tables to summarize lists that the audience will try to find later (the budget, for instance). Table 1. Format guidelines for requested proposal. Aspect Description Font for headings Boldface serif or sans serif: size in accordance with hierarchy Font for text portion 12-point serif such as Times New Roman or Book Antiqua Margins Standard, at least 1 inch Layout One column, single-sided Paragraphing Indented paragraphs, no line skip between paragraphs in a section Page number Bottom centered Figure names Numbered: Figure 1, Figure 2, Figure 3, and so forth Figure captions Below figure in 10 point type Table names Numbered: Table 1, Table 2, Table 3, and so forth Table headings Above table in 12 point type * Adapted from Guidelines at the Penn State Learning Factory: http://www.lf.psu.edu/ 2 Organization
  • 26. As given in the proposal template, your proposal should have the following sections and headings: Title Page a. Title of project in initial capital letters b. The sponsoring company and contact person’s name and information c. Team name and individual member names d. Date e. An appropriate picture of the product, a team logo, or both Executive Summary Content: A brief summary of the proposal Length: one-third to one-half page, never more than one page Emphasis: highlighting of the proposed technical and management approach Table of Contents Statement of Problem: the “Why?” Summary of the request by the sponsor (the original problem statement) Background: Brief description of company and their business Relevance or importance of problem Background information to educate the reader Previous related work by others—literature review with credible sources
  • 27. Patent search, if applicable Detailed problem description, as you now understand it Objectives: the “What?” In the Objectives section, you translate the customer’s quantitative and qualitative needs into clear, objective design specifications. Define the scope of work and clearly state the project objectives, including the following: a. Design specifications in specific, quantitative terms. For example, “The plate must be rotated three times at a speed of between 1 and 3 rev/s” or “Control the temperature of a 1 liter non-insulated standard glass beaker of water to 37.5 ± 0.5oC for three hours without temperature deviation.” b. Critical design issues, constraints, limitations. Technical Approach: the “How?” Although you may not know all the details of the problem solution, you should know a first design on how you will attack the problem, and you should have some design concepts. The purpose of this section is to present the process by which you will arrive at the final answer. This section answers the following questions: 3 1) What are the steps in the design process? (Describe and use the nine-step model from
  • 28. Chapter 1 of Hyman’s text) 2) What are the benefits and advantages of employing a structured approach to design? 3) How will you generate solution concepts? 4) How will you analyze the performance of your solution? 5) How will you decide on the best alternative? Specific recommendations for this section include the following: a. First, describe your overall design process in general terms. A one-page synopsis of Chapter 1 in the Hyman text would be appropriate here. b. Provide at least three possible solution alternatives and document your methodology to choose the best alternative. Include illustrations such as Figure 1. Try to be as inclusive and creative as possible with your ideas. Strive to achieve at least one non-conventional or “out of the box” alternative. c. List and describe all the analytical, or computational tools you will employ to analyze your design, such as ProEngineer®, SolidWorks®, MathCAD, and MATLAB. d. List and detail all the experimental procedures you will use to test your design concepts. e. Evaluate your alternatives based on how well they satisfy the design specifications. Explain the selection criteria by which you will evaluate design alternatives in specific, quantitative terms, such as cost, weight, reliability, ease of use, and ease of manufacture. A matrix table can clearly illustrate this
  • 29. information. f. If possible at this time, rank your solution concepts and list the pros and cons of each. At minimum, state what further information or additional work is needed in order to arrive at a final solution alternative. g. If any solution is totally unfeasible (or may have been Figure 1. SolidWorks® model of a tried before), state the reason for its elimination. Manual filter wheel with C-Mount adapters. Project Management: “How and When?” The Project Management section describes how the project will be managed, including a detailed timetable with milestones. Specific items to include in this section are as follows: a. Description of task phases (typical development tasks: Planning, Concept Development, System-Level Design, Detailed Design, Testing and Refinement, Production) b. Division of responsibilities and duties among team members c. Timeline with milestones: Gantt chart (see Figure 2 for an example). The following are required elements of your Gantt chart: i. Project duration is from the date your project is assigned to the completion date: 25th April ii. Each milestone is to be labeled with a title iii. Schedule all tasks not just “Design” or “Testing.” Break
  • 30. this schedule down to specific assignments. 4 iv. Each task is to be labeled with a title and person or persons assigned to the task. v. Subdivide larger items so that no task is longer than about one week vi. Link tasks which are dependent on the completion of a previous task. vii. Continue to update your schedule throughout your project. This tool is important for organizing and viewing the progress of your project. viii. Where possible, avoid a serial timeline (one task at a time, which must be completed before next task can proceed). Figure 2. Example of a Gantt Chart. Deliverables The culmination of the proposal negotiation with your sponsor will be a completed “Deliverables Agreement.” In this section, provide a detailed description of what you are providing and when you will provide it. Be as specific as possible. Possible items include Detailed design drawings (specify Computer Aided Design
  • 31. format) Physical prototype Scale model Engineering analysis (Finite Element Analysis, MATLAB, etc.) Economic analysis (return on investment calculations) Detailed description of test procedures Data from experiments Computer program code, flowchart, documentation Circuit diagrams User-friendly instructions including training for personnel Budget: “How Much?” Provide your best estimate of how project funds will be spent for your first design. For an example, see Table 2. The sponsor will allow for only this amount. At this time, you need to know the details for your initial design. You can divide up your budget into some major categories, such as equipment, materials, supplies, shipping (if Hershey), and Learning Factory costs (that is, for the computerized numerical control, rapid prototyping, etc). Remember: You are spending sponsor dollars and the sponsor needs to see that the money is spent wisely. If additional funds or resources are needed from your sponsor compared to their original “request for proposals,” ask for them here but justify the request. 1. Be as exact as you can but estimate slightly higher for shipping. For any quantities, add an additional 10–20% for error. 5
  • 32. 2. Read all ordering requirements for each company. Some companies have a minimum order amount so you need to be aware of this in advance. 3. You’ll need to have all (100%) your items ordered and reconciled by the week before spring break for your first design. 4. Additional funds will not be released after this day without written justification for the deviation (that is, why do you need to go with your alternate choice? What went wrong with the first design?).† Table 2: Requested items and funds for initial design. Item Supplier Catalog No# Quantity Unit Price Total Vacuum Pump McMaster Carr IJ-60825 1 $183.47 $188.72 Flow Pump Northern Tool CJX-689 1 $139.99 $156.62 Water Filter Whirlpool Lowe's Hardware WHER25 1 $33.73 $33.73 23/32" Plywood 4'x8' Lowe's Hardware none 1 $24.95 $24.95 4" Ondine Rainmaker Smartbargain.com 129808 1 $19.99 $37.86 Acrylic Tubing 5' (OD 8") McMaster Carr 8486K626 1 $236.70 $250.95 "8" Flange (13" OD) McMaster Carr KD-ERW 1 $44.24 $44.24 Total $737.07 Communication and Coordination with Sponsor Specify the interaction with your sponsor: a. Establish communication schedule and the responsibilities of each participant. See the
  • 33. syllabus for exact dates of progress report, mid-semester presentations, final-presentations, Showcase, etc. b. Establish the form of communication (visits, weekly updates, conference calls, teleconferences). c. Specify who will receive information and how it will be transmitted. d. Clearly state what actions are requested with each communication: information only, reply requested, etc. Special Topics Define any sponsor specific items, such as the handling of confidential information, and loan and return of equipment. Team Qualifications: the “Who?” a. In a paragraph for each person, establish the team qualifications for the project. Highlight any specific job or course experiences that are relevant to the project. b. Include a one-page resume of each team member in the Appendix. Do not include your hobbies. † If your first approach has problems you should be ready to switch to your alternate. To do this switch, you will need to submit a revised “Full Proposal.”
  • 34. Identification and Authentication GBI - John Davis & Peter Schwarz Team - Group 4 (Chase Guss, Alexander Apodaca, Matthew Ulloa, Tamer Rabea, and Hernan Hernandez) April 29th, 2022 Executive Summary The purpose of this paper is to propose an audit on GBI’s company and suggest things that should be looked into when given the opportunity to audit their system in the area of identification and authentication. It would take approximately four month to complete the audit if given full access to GBI’s systems. Our objective is to go in depth into your systems policies on identification and authentication and depict who is allowed into your company. We will interview employees and see how much access they are granted and if they are required to have the necessary authorization that your company provides them. We want to ensure that we can spot out anyone that has the necessary credentials and does not exceed their necessitie s for your company. By the end of this audit, we would be able to explain how we would appropriately modify your systems and ensure the safekeeping of all data and information for your company. We would break it down into a table of significant issues, types, and priorities. If GBI decides to use Team Four as their auditor, we will provide dates that we can implement all solutions by. Table of Contents Page 1 - Cover page
  • 35. Page 2 - Executive Summary Page 3 - Table of contents Statement of Problem: the “Why?” In 2001, two companies merged into one and formed what we know as GBI. Global Bike Inc. is a North American and German company run by co-CEOs John Davis and Peter Schwarz. As the name implies, the company builds innovative bikes made to outperform others and last for a long time. In terms of responsibilities, Davis handles selling the products, and Schwarz deals with manufacturing the product. Departments such as marketing, IT, HR, service and support, finance, and sales make up Davis’ portion of the company. He is the money maker. Schwarz manages research, the designs of the bikes, getting supplies, and other manufacturing groups. He is the money spender. GBI wants a Department of Defense contract, and to be granted this contract, they must meet the level three requirements of the CMMC. GBI needs a CMMC audit. The Cybersecurity Maturity Model Certification audit will carefully dissect GBI’s cyber hygiene under the “Identity and Authorization” domain. This domain categorizes the best procedures and practices the company needs to follow. The identity and authorization domain deals with employee logins, access to resources, passwords, etc. GBI must face this cyber challenge, and we can provide the audit as a company. Technology has ingrained itself into everyday business and will continue to do so. With this technology comes good and evil. On the one hand, we have information systems that handle vast portions of data, but on the other hand, we have hackers who want to steal that data for many reasons. A CMMC audit would test the company’s cyber hygiene and point out what can be improved to prevent data from being stolen and business stopping because one employee inserted a thumb drive into their computer. The audit brings GBI one step closer to protecting their company, employee, and customer data. While preserving
  • 36. the company and its assets, this audit gives the potential of allowing GBI to work with the DOD and expand its business. If the company fails to reach level three of the CMMC, GBI still receives an audit that tells them what gaps need to be filled to reach that level. This may be for expanding work opportunities, but cyber security is critical currently in today’s climate. Objectives: the “What?” During the scope of the project, our objective will be to propose an audit for Global Bike Inc. We intend to finish the audit within four months and by doing so, we shall be able to ensure your business maintains its proper working environment. We will be able to spread our work in a timely manner to allow your company to meet its daily requirements. By the time we are done with this project, we will have a thorough understanding of the company systems and policies. The company must meet the requirement of good cyber hygiene according to the CMMC guidelines. We can assure that our company will take the proper steps and procedures throughout the auditing process, which will ultimately decide whether GBI is certified to be at the level three CMMC and be granted a DOD contract. · Design specifications in specific, quantitative terms. For example, “The plate must be rotated three times at a speed of between 1 and 3 rev/s” or “Control the temperature of a 1 liter non-insulated standard glass beaker of water to 37.5 ± 0.5oC for three hours without temperature deviation.” · Critical design issues, constraints, limitations. Technical Approach: the “How?”
  • 37. Our goal will be to completely analyze their systems. We will be focusing on identities and authentications. First thing we will do is identify all the system users. Identify the processes acting on behalf of the system and identify all the devices that are accessing the companies systems. After doing so, we will want to review all Identification and authentication policies and procedures. We will review the system security plans and system design documentation. We will need to review the configuration settings and any other policies associated with it. We would need a copy of audit logs and records, and a list of system accounts. After reviewing all of these documents and policies, we would want to get some interviews with personnel that work in system operations, information security, system or network administrators, and system developers. We would then be able to evaluate the organizational process for identifying and authenticating users. We would also evaluate the mechanisms and process that supports the identification and authentication process. Following that we would determine if the identity of each user is authenticated or verified as a prerequisite to system access, ensure its acting on behalf of a user is authenticated or verified to access the system. By doing so, we would be able to source out any challenges the company may be enduring. We would be able to come with a plan to get over these challenges. Our objective is to ensure that there are policies in place and that the company is abiding by them. Everyone that requires access to the systems for the company should be given a certain level of clearance. With this comes responsibility and trust. Users may be granted access based on their level of clearance. That being said, we would break down all policies and pinpoint the job specifications for every person through the chain of command. We can then interview employees around the company and ensure that they are following their job specifications. After that, we need to
  • 38. ensure that the employees are given access based on their identity and authentication clearance level. Design Process 1) Process Overview The design process will consist of reviewing documents, password logs, security logs, configuration settings, policies, and other information relevant to identity and authentication. Anything found that has any significance towards policy, procedure, and relevant information that can help our audit. We will also be conducting interviews to establish if our findings match the everyday business workflow. The identity and authentication domain has one capability and eleven practices that certifies companies under CMMC. There are two practices in level one, five in level two, and four in level three. We will approach the audit one practice at a time, dividing our time based on the CMMC levels. Capability “Grant access to authenticated entities” 2) Step by step guide of design process 3) What are the benefits and advantages of employing a structured approach to design? Having a structured approach to design will keep everything uniform. We will be able to track every step we take and plan ahead according to the designs and findings we come across. We will document everything as we find things that work well, work okay, and do not work at all. There will be a process organization responsibility matrix that will easily breakdown the moving parts that work well or have value of being in the company. 4) How will you generate solution concepts? We will generate solutions by auditing the policy, interviewing
  • 39. employees and administration. We shall test all of our findings and prepare a final report. 5) How will you analyze the performance of your solution? We will be able to ensure who needs access to what and why it might be potentially damaging to your company. GBI process would know there assets would be more secure and not have the potential to risk losing money on places it should not be allocated to. 6) How will you decide on the best alternative? Upon completion of the audit we are proposing, once finished we would have a breakdown chart of areas in which they are in compliance with. We will be able to explain to them which areas they are not in compliance with and that they need to fix it by the next meeting to gain compliance and meet the standards for CMMC. We would not be able to change anything for them, if in doing so, we would no longer be able to audit them. Specific recommendations for this section include the following: First, describe your overall design process in general terms. A one-page synopsis of Chapter 1 in the Hyman text would be appropriate here. · Provide at least three possible solution alternatives and document your methodology to choose the best alternative. Include illustrations such as Figure 1. Try to be as inclusive and creative as possible with your ideas. Strive to achieve at least one non-conventional or “out of the box” alternative.
  • 40. · List and describe all the analytical, or computational tools you will employ to analyze your design, such as ProEngineer®, SolidWorks®, MathCAD, and MATLAB. · List and detail all the experimental procedures you will use to test your design concepts. · Evaluate your alternatives based on how well they satisfy the design specifications. Explain the selection criteria by which you will evaluate design alternatives in specific, quantitative terms, such as cost, weight, reliability, ease of use, and ease of manufacture. A matrix table can clearly illustrate this information. · If possible at this time, rank your solution concepts and list the pros and cons of each. At minimum, state what further information or additional work is needed in order to arrive at a final solution alternative. · If any solution is totally unfeasible (or may have been tried before), state the reason for its elimination. Project Management: “How and When?” The Project Management section describes how the project will
  • 41. be managed, including a detailed timetable with milestones. Specific items to include in this section are as follows: a. Description of task phases (typical development tasks: Planning, Concept Development, System-Level Design, Detailed Design, Testing and Refinement, Production) Phases of the Project Development · Planning (Submission of the proposal) April 24th. From April 24th to May 30, 2022 We will be able to meet with owners of GBI and discuss project details and ensure we can meet time frames and plan accordingly for the project to meet its time restraints. · Audit/Review / May 1st to May 30th, will be time for our Team to come in to audit and review policies and documents pertaining to identity and authentication. We will prepare ourselves during this period and prepare interview questions. This would allow GBI time to plan for employees to spare approximately 1-4 hours for interviews based on the scope of their assignment. · Interviews June 1st to June 31st all employees will be scheduled with two of our team members and we will interview accordingly based on positions. Our fifth person will be responsible for ensuring all interviews will be on the proper schedule and comparing the notes from each interview. We will compare our findings based on policies and form every interview. Responsibilities for each team member · Team member 1- Project administrator, oversees the project and meets with the company. Reviews policy and interviews. Coordinates the tests amongst the rest of the team. Team member 1 will set up all interviews and divide the work amongst the team members to ensure nothing is repetitive and or missed. · Team member 2 - Responsible for reviewing policies, auditing, interviewing, and testing. · Team member 3 - Responsible for reviewing policies,
  • 42. auditing, interviewing, and testing. · Team member 4 - Responsible for reviewing policies, auditing, interviewing, and testing. · Team member 5 - Responsible for reviewing policies, auditing, interviewing, and testing. Gantt Chart Gantt Chart Attached is a gantt chart with a basic timeline and the procedure of how and when things will be completed. This project should take approximately four months in time and we will be able to spread it in a timely manner to allow your employees to find coverage during times of interviews and reviewing documents. ii. Each milestone is to be labeled with a title iii. Schedule all tasks not just “Design” or “Testing.” Break this schedule down to specific assignments. iv. Each task is to be labeled with a title and person or persons assigned to the task. v. Subdivide larger items so that no task is longer than about one week vi. Link tasks which are dependent on the completion of a previous task. vii. Continue to update your schedule throughout your project. This
  • 43. tool is important for organizing and viewing the progress of your project. viii. Where possible, avoid a serial timeline (one task at a time, which must be completed before the next task can proceed). Deliverables We will provide a document at the end that will show an overview of our findings. It will be color coordinated and reflect the CMMC guidelines. Red will indicate critical. Vulnerabilities will be listed inside the highlighted section that correlate with the identification and authorization domain. Critical means that the exploitation of this vulnerability could cause catastrophic damage to the company’s reputation, workflow, operations, etc. Anything in orange would be a less severe vulnerability, but with the potential to be exploited and cause minor workflow issues. Green will indicate that no vulnerabilities were found. With this information it is up to GBI to decide how and if they would want to fix these problems. After the audit, we can offer our services to fix these vulnerabilities and implement proper security controls. GBI would get a 15% discount on this specific service. If accepted, we would not be able to audit GBI in the future. The culmination of the proposal negotiation with your sponsor will be a completed “Deliverables Agreement.” In this section, provide a detailed description of what you are providing and when you will provide it. Be as specific as possible. Possible items include Detailed design drawings (specify Computer Aided Design format) Physical prototype Scale model
  • 44. Engineering analysis (Finite Element Analysis, MATLAB, etc.) Economic analysis (return on investment calculations) Detailed description of test procedures Data from experiments Computer program code, flowchart, documentation Circuit diagrams User-friendly instructions including training for personnel Budget: “How Much?” Provide your best estimate of how project funds will be spent for your first design. For an example, see Table 2. The sponsor will allow for only this amount. At this time, you need to know the details for your initial design. You can divide up your budget into some major categories, such as equipment, materials, supplies, shipping (if Hershey), and Learning Factory costs (that is, for the computerized numerical control, rapid prototyping, etc). Remember: You are spending sponsor dollars and the sponsor needs to see that the money is spent wisely. If additional funds or resources are needed from your sponsor compared to their original “request for proposals,” ask for them here but justify the request. The amount for our budget will be 150,000 for the audit if we are chosen, there might be an additional 10-20% charge during the process if errors are made by your company or employees refusing to comply with the orders given in a timely manner. Below is a breakdown of where the funds will be supplied. Budget Breakdown Personnel/ Labor - 100,000 amongst 5 employees over a four month period, 5 employees, earning equal wages 20,000 each for a four month period. Supplies - 25,000 - Technology and implementation Transportation- 10,000 - Gas, stays, vehicle wear
  • 45. Programs - 15,000 - system authentications 0. Read all ordering requirements for each company. Some companies have a minimum order amount so you need to be aware of this in advance. 1. You’ll need to have all (100%) your items ordered and reconciled by the week before spring break for your first design. 2. Additional funds will not be released after this day without written justification for the deviation (that is, why do you need to go with your alternate choice? What went wrong with the first design?).† Table 2: Requested items and funds for initial design. Item Vacuum Pump Flow Pump Water Filter Whirlpool 23/32" Plywood 4'x8' 4" Ondine Rainmaker Acrylic Tubing 5' (OD 8") "8" Flange (13" OD) Supplier Catalog No# McMaster Carr IJ-60825 Northern Tool CJX-689 Lowe's Hardware WHER25 Lowe's Hardware none Smartbargain.com 129808 McMaster Carr 8486K626 McMaster Carr KD-ERW Quantity
  • 46. Unit Price $183.47 $139.99 $33.73 $24.95 $19.99 $236.70 $44.24 Total Total $188.72 $156.62 $33.73 $24.95 $37.86 $250.95 $44.24 $737.07 Communication and Coordination with Sponsor Point of Contact: GBI is to provide their policy documents in regards to security. This includes documents regarding passwords, authentication, how users are authorized, etc. They are also to provide any recurring scripts and access to logs and files. We will meet with our point of contact at least once per week for at least a half hour to inform of progress, who we need to speak with and to rearrange the schedule if there is a conflict for either party or employee. Parties must be able to meet either in person or via zoom. Response to e-mail and phone communications should be prompt and done within 24 hours, barring weekends having a 48 hour window. In the case of e-mail or phone communications in which there is only information given and no questions either asked or that arose; parties will send a message of acknowledgement. The final report will be given to the CEO and head of IT (look on ARRIS). If there is an issue it must be presented to us within 72 hours and we will work to resolve it. Our conclusions will be drawn based on evidence and word of mouth alone is not sufficient. Special Topics Our company will meet with GBI, during the initial meeting we can discuss handling of confidential information. We need access to all policies and procedures that relate to identity and
  • 47. authentication. These things may require information about the employees, employers, and company as a whole. We will discuss the parameters of the project and what our team will be able to utilize. Our team will ensure the privacy of all information regarding employees, employers, and the company itself. We will agree to secure all information when we are done with the project and we will ensure we do not take any information and use it for personal gain. Our company will write up a contract with GBI and both parties will agree to the terms before the start of an audit. If the contract is voided, the project will be terminated and our company will no longer have access to GBI’s information systems. We pride ourselves in maintaining integrity and confidentiality during the work process. Any loaned equipment to our company will be returned on a daily basis, unless specifically requested by our management team and agreement with GBI’s management. We will not retain systems overnight nor transport them off the facility. Team Qualifications: the “Who?” In a paragraph for each person, establish the team qualifications for the project. Highlight any specific job or course experiences that are relevant to the project. Alexander Apodaca Chase Guss - 7 years of working as a Supervisor in my current line of duty as a Corporal for the Sheriff’s department. I would maintain computers and technology for my station that I was assigned to. Familiar with Linux, Windows, and Mac OS’s. Utilized a Raspberry Pi to link it to an outside network, from my pc at home I was able to gain access into the Raspberry Pi and access the outside network from a distance and monitor traffic, viewing users that have access to certain things or if they weren't working and just surfing the web. I received a certificate in AccessData Certified Examiner. I would run audits
  • 48. of over one hundred personnel in our department and ensure their training records were up to date and placing them in the right categories. I would also be responsible for ensuring that they are given access to department drives when logging into their user on department systems. I would ensure that they can access the files they need and no more than that. Hernan Hernadez Tamer Rabea Matthew Ulloa Include a one-page resume of each team member in the Appendix. Do not include your hobbies. † If your first approach has problems you should be ready to switch to your alternate. To do this switch, you will need to submit a revised “Full Proposal.” Ethical and Legal Compliance Statement As a company, we strive to maintain a trusting relationship with any company we do business with. Our company will follow all federal and state laws applicable to GBI’s data. Any work done with GBI will comply with all laws and ethical business codes… Arbitration Clause: Any disputes that arise should be resolved civilly. In the event of arbitration, it is to take place in San Bernardino County. … ..