Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Refactor and update onboarding for all roles #2878

Merged
merged 20 commits into from
Jan 30, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
20 commits
Select commit Hold shift + click to select a range
d3a82b7
Remove outdated links, add more recent ones, and normalize link format
jameshochadel Jan 24, 2024
576949e
Factor out common onboarding steps from engineer onboarding
jameshochadel Jan 25, 2024
8af11ce
Put team-comms-related items earlier and gate Cloud Ops admin accounts
jameshochadel Jan 25, 2024
30d4190
Clarify two-issue system in description, since it shows in GitHub UI
jameshochadel Jan 25, 2024
983dfe1
Remove common elements from support onboarding template
jameshochadel Jan 26, 2024
12b20f0
Format with Prettier and improve cross-linking
jameshochadel Jan 26, 2024
61fa275
Fix heading levels
jameshochadel Jan 26, 2024
7720a69
Remove fragment from general onboarding ticket
jameshochadel Jan 26, 2024
0c63a09
Improve titles for faster recognition and so general issue appears fi…
jameshochadel Jan 26, 2024
cb5ddc3
Drop outdated and redundant onboarding instructions from supplemental…
jameshochadel Jan 26, 2024
729508c
Install cloud.gov standard CLI tools all at once with a Brewfile
jameshochadel Jan 26, 2024
753b5b6
Remove common elements from Compliance onboarding
jameshochadel Jan 26, 2024
965700a
Fix header levels and other inconsistencies
jameshochadel Jan 26, 2024
a23c921
Add recently suggested note about saving OLU certificates
jameshochadel Jan 26, 2024
432443f
Add Google Group memberships for roles
jameshochadel Jan 26, 2024
0070e35
CG-PRIV Space membership now managed by Google Group
jameshochadel Jan 29, 2024
59438b8
Shorten password reminder window so they don't expire before reminder
jameshochadel Jan 29, 2024
942808c
Fix broken contingency plan link
jameshochadel Jan 29, 2024
0e9d355
Remove link to AWS onboarding page with outdated information
jameshochadel Jan 29, 2024
4e416a1
Small fixes from review with Sean
jameshochadel Jan 30, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
27 changes: 14 additions & 13 deletions .github/ISSUE_TEMPLATE/offboard-team-member.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,9 +2,8 @@
name: Offboard cloud.gov Team Member
title: Checklist for Offboarding a Team Member
about: This is the checklist and requirements for offboarding a team member from the cloud.gov team
labels: ''
assignees: ''

labels: ""
assignees: ""
---

# Team Member Offboarding Checklist
Expand All @@ -13,27 +12,30 @@ assignees: ''

We must offboard a team member when they are:

* Absent for 30 or more days, or about to be. For example, team members on detail or extended leave.
* Permanently separating from the team. For example, terminated or reassigned.
- Absent for 30 or more days, or about to be. For example, team members on detail or extended leave.
- Permanently separating from the team. For example, terminated or reassigned.

See our [AC Policy](https://github.com/cloud-gov/cg-compliance-docs/blob/main/AC-Policy.md), "When a privileged team member has been absent...".

## Special Notes

- **Do not create this issue until the System Owner has formally authorized and requested it.** You can obtain that OK by one of two ways:
A:

- [ ] A: System Owner creates this issue

B:

- [ ] B.1: System owner emails [email protected] and [email protected] with their authorization
- [ ] B.2: An operator adds links to the email archive of the authorizing email.

- **Please only use first names.**

---

## Instructions

* [ ] Assign this ticket to the person currently staffing the maintenance rotation.
- [ ] Assign this ticket to the person currently staffing the maintenance rotation.

In order to complete `Existing Person`'s exit from the cloud.gov team, the assignee should complete a prescribed set of tasks that will remove any special access.

Expand All @@ -52,14 +54,14 @@ If the person offboarding is a contractor, reach out to the COR to ensure any of
- [ ] Remove their access to [StatusPage](https://manage.statuspage.io/organizations/btc69fwyvjh7/team)
- [ ] Remove their agent access to Zendesk - [switch their role to "end user"](https://cloud-gov.zendesk.com/agent/admin/people)
- [ ] Remove them from `@cg-team`, `@cg-operators`, and any other `@cg-` teams in the Slack Team Directory [using the three-dot menu (instructions)](https://get.slack.help/hc/en-us/articles/212906697-User-Groups)
* Check one of the following:
* [ ] Temporary federal departure: Remove them all private cloud.gov Slack channels, except `#cg-priv-gov`, so they may continue to receive essential team communications.
* [ ] Permanent departure: If the person is leaving permanently, they will be removed from all channels automatically.
- Check one of the following:
- [ ] Temporary federal departure: Remove them all private cloud.gov Slack channels, except `#cg-priv-gov`, so they may continue to receive essential team communications.
- [ ] Permanent departure: If the person is leaving permanently, they will be removed from all channels automatically.
- [ ] Remove them from the [team roster](https://docs.google.com/spreadsheets/d/187663k5MYJBNlKExLu_nhuovcZQfIbqYCu2n4noNY1o/edit#gid=0)
- [ ] Remove them from the [squad list](https://github.com/cloud-gov/product/blob/main/DeliveryProcess.md#squads)
- [ ] In the [training tracker](https://docs.google.com/spreadsheets/d/1hqU6cNeEB293OT0j3OvbdAFRkrf2zDOrPVxGfnr4sSw/edit#gid=0): if they're staying at TTS, move them to the "former teammates" tab; if they're leaving TTS, delete them from the spreadsheet
- [ ] Remove them as invitees for any meetings on the cloud.gov calendar where they are specifically named
- Invites where they are listed as part of the `cloud.gov` invitee group will be removed when they are removed from that group by the System Owner
- Invites where they are listed as part of the `cloud.gov` invitee group will be removed when they are removed from that group by the System Owner
- [ ] Remove them from [our dockerhub org](https://hub.docker.com/orgs/cloudgov)

## System Owner (or person delegated by System Owner)
Expand All @@ -79,7 +81,6 @@ The following do not directly impact cloud.gov security & operations and can hap

- [ ] Remove them from [Nessus](https://nessus.fr.cloud.gov/#/settings/users)
- [ ] Remove them from [Tenable (if Compliance Team)](https://community.tenable.com/s/contacts]
- [ ] Remove them from the [CG-PRIV Space](https://mail.google.com/mail/u/0/#chat/space/AAAAr60JXAc)
- [ ] Remove them from the [Cloud Foundry Community GitHub org cloud.gov team](https://github.com/orgs/cloudfoundry-community/teams/cloud-gov/members)
- [ ] Remove them from [the cloud.gov operations Google Group](https://groups.google.com/a/gsa.gov/forum/#!managemembers/cloud-gov-operations/members/active)
- [ ] Remove them from [the cloud.gov compliance team Google Group](https://groups.google.com/a/gsa.gov/forum/?hl=en#!managemembers/cloud-gov-compliance/members/active)
Expand All @@ -95,12 +96,12 @@ The following do not directly impact cloud.gov security & operations and can hap

**The following steps must be conducted and documented within 24 hours of departure**:

* [ ] Not a member of Engineering
- [ ] Not a member of Engineering

-- or --

- [ ] Delete the user in all cloud.gov AWS accounts by submitting a PR to [`aws-admin`](https://github.com/cloud-gov/aws-admin)
- [ ] [Remove their access as an admin](https://cloud.gov/docs/ops/managing-users/#managing-admins) on the platform
- [ ] Remove any privileges that their cloud.gov account has due to membership in the cloud.gov team (even if not in Cloud Ops), such as `admin_ui.user` and `scim.read`
- [ ] Verify these permissions have been removed using the [cg-scripts validate-admins.sh](https://github.com/18F/cg-scripts/blob/master/validate-admins.sh) run from a jumpbox
- [ ] Verify these permissions have been removed using the [cg-scripts validate-admins.sh](https://github.com/18F/cg-scripts/blob/master/validate-admins.sh) run from a jumpbox
- [ ] Remove any Org or Space roles that their cloud.gov account holds due to membership in the cloud.gov team (for example, remove them from the `cloud-gov` and `cloud-gov-operators` organizations)
Loading