Skip to main content

Go-Live Readiness

Go-live readiness verification confirms that a system implementation meets all requirements for production deployment. Use this checklist during the final readiness review, completing each category before proceeding to launch.

Functional Readiness

Functional readiness confirms that the system performs its intended business functions correctly and completely.

ItemVerification methodPass criteriaEvidence
Core business processes execute end-to-endExecute test scripts for each documented business processAll critical path transactions complete without error; results match expected outcomesSigned test execution report
Data migration validatedCompare source and target record counts; verify sample records (minimum 5% or 500 records, whichever is greater)Zero critical data discrepancies; all mandatory fields populatedMigration validation report with checksums
Integration points functionalSend test transactions through each integration; verify receipt and processingAll integrations return expected responses within defined timeoutsIntegration test results log
User acceptance testing completeReview UAT sign-off documentationAll critical and high-priority defects resolved; business owner sign-off obtainedUAT completion certificate
Calculated fields and business rules verifiedTest boundary conditions and edge cases for each ruleCalculations match specification; no rounding errors exceeding tolerance (0.01 for currency)Business rules test matrix
Reporting outputs accurateGenerate all standard reports; compare against validated source dataReport totals reconcile to source; formatting meets specificationSample report outputs with validation notes

Technical Readiness

Technical readiness confirms infrastructure, performance, and architectural requirements for production operation.

ItemVerification methodPass criteriaEvidence
Performance under expected loadExecute load test simulating peak concurrent users (1.5× expected maximum)Response times within SLA (page load under 3 seconds, API calls under 500ms); no errors under loadLoad test report with percentile distributions
Stress testing completedIncrease load until failure; document breaking pointSystem degrades gracefully; breaking point exceeds 2× expected peak; recovery automatic after load reductionStress test report with failure analysis
Database performance acceptableRun query execution plans for top 20 queries by frequency; verify index usageNo full table scans on tables exceeding 10,000 rows; query execution under 100ms for interactive operationsQuery analysis report
Storage capacity adequateCalculate current usage plus 12-month growth projectionAvailable capacity exceeds projected requirement by 50% minimumCapacity planning document
Network connectivity verifiedTest connectivity from all user locations and integrated systemsLatency within acceptable range (under 100ms for interactive use); no packet lossNetwork test results by location
SSL/TLS certificates installedVerify certificate chain using openssl or browser inspectionValid certificate from trusted CA; expiry date minimum 90 days future; correct domain namesCertificate verification output
DNS configuration correctQuery DNS from multiple locations; verify A, CNAME, MX records as applicableAll records resolve correctly; TTL set appropriately for failover requirementsDNS query results
Load balancer configuration verifiedTest failover by removing each backend server from poolTraffic redistributes within 30 seconds; no user-visible errors during failoverFailover test documentation
Backup configuration operationalInitiate manual backup; verify completion and test restore to non-production environmentBackup completes within window; restore produces functional system with data integrityBackup and restore test log
Monitoring and alerting configuredTrigger each alert condition; verify notification deliveryAlerts fire within 5 minutes of threshold breach; notifications reach on-call personnelAlert test confirmation

Security Readiness

Security readiness confirms the system meets security requirements and does not introduce unacceptable risk.

ItemVerification methodPass criteriaEvidence
Vulnerability scan completedRun authenticated vulnerability scan against all componentsNo critical or high vulnerabilities; medium vulnerabilities documented with remediation timelineVulnerability scan report
Penetration testing completed (for internet-facing systems)Review penetration test report from qualified testerAll critical and high findings remediated; remaining findings accepted with documented rationalePenetration test report and remediation evidence
Authentication configured correctlyTest login process including MFA enrollment, password reset, account lockoutMFA enforced for all users; lockout after 5 failed attempts; password policy enforcedAuthentication configuration screenshots
Authorisation model implementedTest each role against access matrix; verify denied actions produce appropriate errorsUsers access only permitted functions; privilege escalation not possible; audit trail generatedRole-based access test results
Data encryption at rest verifiedQuery encryption status for databases and file storageAll sensitive data encrypted with AES-256 or equivalent; key management documentedEncryption configuration evidence
Data encryption in transit verifiedCapture traffic sample; verify encryptionAll communications use TLS 1.2 or higher; no unencrypted sensitive data transmissionTraffic analysis results
Audit logging functionalPerform auditable actions; verify log entries generatedAll authentication events, data modifications, and administrative actions logged with timestamp, user, action, and outcomeSample audit log entries
Security configuration baseline appliedCompare configuration against organisational security standardAll mandatory controls implemented; any deviations documented and approvedConfiguration compliance report
Third-party component vulnerabilities assessedCheck all libraries and frameworks against vulnerability databases (NVD, vendor advisories)No known critical vulnerabilities in production dependenciesDependency scan report
Data classification labelling implementedReview sample records for classification markingAll data classified; handling matches classification requirementsData classification audit sample

Operational Readiness

Operational readiness confirms the organisation can support and maintain the system in production.

ItemVerification methodPass criteriaEvidence
Runbooks documentedReview runbook for each operational scenarioRunbooks exist for startup, shutdown, backup, restore, common troubleshooting; reviewed by operations teamRunbook document with review sign-off
On-call roster establishedVerify roster coverage and contact information24/7 coverage for critical systems; all contacts verified reachable; escalation path documentedOn-call schedule and contact verification
Incident management integrationCreate test incident; verify routing and notificationIncidents route to correct team; SLA timers start correctly; notifications deliveredTest incident documentation
Service desk trainedAssess service desk knowledge through scenario testingService desk can handle Level 1 queries; escalation criteria understood; knowledge base articles accessibleTraining completion records; knowledge assessment results
Change management process definedReview change request documentation and approval workflowChange process documented; CAB membership identified; emergency change procedure existsChange management procedure document
Capacity monitoring configuredReview monitoring dashboards; verify threshold alertsCPU, memory, storage, and network utilisation tracked; alerts configured at 80% thresholdMonitoring dashboard screenshots
Log retention configuredVerify log configuration and storage destinationLogs retained per policy (minimum 90 days operational, 12 months for audit); centralised collection operationalLog configuration documentation
Maintenance windows definedReview maintenance schedule with business stakeholdersRegular maintenance windows agreed; communication process defined; change freeze periods documentedMaintenance schedule agreement

User Readiness

User readiness confirms end users can effectively use the system from launch.

ItemVerification methodPass criteriaEvidence
User training completedReview training attendance records; assess competencyAll users in initial rollout group completed training; competency assessment pass rate above 80%Training attendance and assessment records
User documentation availableReview documentation completeness against feature listUser guides cover all standard workflows; quick reference materials available; documentation accessible from within applicationDocumentation review checklist
Help desk knowledge base populatedSearch for common scenarios in knowledge baseArticles exist for top 20 anticipated support queries; content reviewed for accuracyKnowledge base content list
User accounts provisionedVerify account existence and permissions for all initial usersAll users have accounts; permissions match role requirements; users can authenticateUser provisioning verification report
User communication sentReview communication and distributionGo-live announcement sent to all affected users minimum 5 business days before launch; includes access instructions, support contact, key changes summaryCommunication copy and distribution confirmation
Super users identified and preparedReview super user list and additional trainingMinimum one super user per 20 regular users; super users completed advanced training; super users understand escalation processSuper user list and training records

Documentation Readiness

Documentation readiness confirms all required documentation exists and is current.

ItemVerification methodPass criteriaEvidence
Technical architecture documentedReview architecture documentation against deployed systemArchitecture diagrams match deployment; all components documented; integration points shownArchitecture document
Configuration documentedReview configuration management documentationAll non-default configuration values documented; configuration rationale explained; environment-specific values identifiedConfiguration documentation
API documentation currentCompare API documentation against implemented endpointsAll endpoints documented; request/response formats accurate; authentication requirements specifiedAPI documentation
Data dictionary completeReview data dictionary against database schemaAll tables and columns documented; data types and constraints specified; relationships mappedData dictionary document
Operational procedures documentedReview procedures against operational scenariosProcedures exist for routine operations, incident response, and disaster recoveryOperational procedure documents
Vendor contracts and support details accessibleVerify contract storage location and support contact informationContracts accessible to authorised personnel; support contact details current; SLA terms documentedContract storage verification

Support Readiness

Support readiness confirms external support arrangements are in place.

ItemVerification methodPass criteriaEvidence
Vendor support contract activeVerify contract status with vendorSupport contract covers production system; contract period extends minimum 12 months; support level matches requirementsContract confirmation or portal screenshot
Vendor escalation contacts documentedReview escalation matrixNamed contacts for Level 2 and Level 3 support; contact information verified; escalation criteria definedVendor escalation matrix
Support hours aligned with business requirementsReview support contract termsSupport hours cover business-critical periods; out-of-hours support available for critical issuesSupport terms documentation
Support access configuredTest vendor support access mechanismVendors can access system through approved secure method; access is logged and auditable; access can be revokedSupport access test log

Rollback Readiness

Rollback readiness confirms the organisation can revert to the previous state if the deployment fails.

ItemVerification methodPass criteriaEvidence
Rollback procedure documentedReview rollback documentationStep-by-step rollback procedure exists; tested in non-production environment; estimated duration documentedRollback procedure document
Rollback decision criteria definedReview go/no-go criteriaSpecific, measurable criteria for rollback decision; decision authority identified; communication plan for rollback existsRollback decision matrix
Pre-deployment backup completedVerify backup completion immediately before deploymentFull backup of all affected systems completed; backup verified restorable; backup retained until rollback window closesBackup completion confirmation
Rollback testedExecute rollback in non-production environmentRollback completes within defined window; system returns to functional state; data integrity maintainedRollback test documentation
Rollback resources availableConfirm availability of personnel and systemsRequired personnel available for duration of rollback window; necessary system access confirmed; rollback environment accessibleResource availability confirmation

Exit Criteria

Go-live proceeds when all of the following conditions are met:

  1. All items in Functional Readiness, Technical Readiness, and Security Readiness categories pass without exception
  2. All critical and high-priority items in remaining categories pass
  3. Any medium-priority exceptions have documented risk acceptance from the system owner
  4. Business owner provides written go-live authorisation
  5. Technical owner provides written go-live authorisation
  6. Rollback procedure tested and personnel confirmed available

Exception Handling

When a checklist item cannot pass, follow this process:

  1. Document the specific gap: what is missing, why it cannot be resolved before go-live
  2. Assess risk: what is the likelihood and impact of proceeding without this item
  3. Identify compensating controls: temporary measures that reduce risk until full resolution
  4. Obtain approval: system owner approves exceptions for medium-priority items; steering committee or equivalent approves exceptions for high-priority items; critical items cannot be excepted
  5. Document resolution timeline: when and how the gap will be closed post-launch
  6. Add to post-implementation review: track exception resolution as part of deployment follow-up

Record all exceptions in the go-live decision log with approval signatures, compensating controls, and resolution commitments.

See also