Professional Documents
Culture Documents
Semana 3 FEA
Semana 3 FEA
SVR Memo
Shared Services
Is Action Item #6
May 2, 2012
May 2, 2012
IT Reform Agenda’s
25-Point Plan Consumer Agency #7
Consumer Agency #6
(Dec 2010)
Requirements
Consumer Agency #5
M-11-29 Hosting
Hosting
3
The Common Approach to Federal EA
Common Approach
Levels of Primary
Scope Outcomes
Program Framework
Elements
5
Primary Outcomes
Service Delivery
Functional Integration
Resource Optimization
Authoritative Reference
6
EA Project Levels of Scope
International
National
Federal
Sector
Agency
Segment
System
Application
These levels of scope promote consistency in architecture
methods to promote comparability and support varying levels of
complexity. Solution Architecture is done in a similar way at all
levels of scope, using the Collaborative Planning Method (CPM)
7
EA Program Basic Elements
1. Governance
2. Principles
3. Method
4. Tools
5. Standards
6. Use
7. Reporting
8. Audit
8
Element 1: Governance
9
Element 2: Principles
10
Element 3: Method for EA Projects
11
Element 3: Method (continued)
3.2
1.2 2.2 4.2 5.2
Refine the Vision for
Analyze and Validate Analyze Opportuni es Obtain Resources and Measure Performance
Performance and
Needs to Leverage Validate Plan Against Metrics
Outcomes
3.3
1.3 2.3 Analyze the Current 5.3
4.3
Formulate Case to Determine Whether to State, Determine Analyze and Provide
Execute the Plan
Address the Needs Leverage Adjustments, and Plan Feedback
the Target State
3.4
1.4
Formulate the
Iden fy and Engage
Integrated Plan and
Governance
Roadmap
3.5
Ini ate Execu on
Governance
12
Element 4: EA Tools
13
Element 5: Standards
Artifact’s List
Strategic Plan
Workflow Diagram
Dataflow Diagram
System Interface
Network Diagram
Security Controls Design Analysis
14
Element 6: Use
15
Element 7: Reporting
16
Element 8: Audit
Roadmap (Appendix 4)
provides an evaluation of:
– EA Program maturity
– The value of EA projects
Uses EA Management Maturity
Framework v2 (EAMMF), Aug 2010
17
The Federal Enterprise Architecture
Version 2.0 (FEAv2)
18
Common Approach & FEAv2
Common Approach
19
FEAv2: Major Components
Standards:
FEA DoDAF Other
– Framework
– Artifacts
Methods:
– Common Approach
– Collaborative Planning Method (former FSAM)
Analytics / Reporting:
– Consolidated Reference Model
– Ex 53 & 300
– Enterprise Roadmap
20
FEAv2 Standards: Framework & Artifacts
EA3 Cube Artifact Artifact Name Zachman DODAF
The standard artifact list consists Level/Thread ID # (* Composite Artifact) Mapping Mapping
S-1 Strategic Plan* C6/R1 AV-1
Strategic
S-2 SWOT Analysis C5/R1
Goals &
S-3 Concept of Operations Scenario AV-1
Initiatives
OV-2
Business
OV-6a, SV-10a
D-2
D-3
Investment Business Case*
Systems &
Applications
SA-3
SA-4
SA-5
Dataflow Diagram
System Interface Matrix *
System Data Flow Diagram
System/Operations Matrix *
C2/R4
C2/R3
C2/R4
SV-3
SV-4
SV-5
(SA) SA-6 Systems Data Exchange Matrix * C2/R3 SV-6
SA-7 System Performance Matrix * C2/R3 SV-7
SA-8
SA-9
NI-1
System Interfaces
System Evolution Diagram
Web Application Diagram
Network Connectivity Diagram
C2/R4
C2/R3
C3/R5
SV-8
21
FEAv2: Collaborative Planning Method
22
Method (continued)
3.2
1.2 2.2 4.2 5.2
Refine the Vision for
Analyze and Validate Analyze Opportuni es Obtain Resources and Measure Performance
Performance and
Needs to Leverage Validate Plan Against Metrics
Outcomes
3.3
1.3 2.3 Analyze the Current 5.3
4.3
Formulate Case to Determine Whether to State, Determine Analyze and Provide
Execute the Plan
Address the Needs Leverage Adjustments, and Plan Feedback
the Target State
3.4
1.4
Formulate the
Iden fy and Engage
Integrated Plan and
Governance
Roadmap
3.5
Ini ate Execu on
Governance
23
FEAv2: Consolidated Reference Model
24
FEAv2: The CRM’s Reference Models
25
Using EA to Support
Shared Services Implementation
26
IT Shared Service Concept Overview
Financial Mgmt.
& Collaboration
Content Mgmt.
Records Mgmt.
& Asset Mgmt.
Federal Health
Infrastructure
Performance
Architecture
Websites &
Geospatial
HR Mgmt.
Mgmt.
Services
(Examples)
27
Architectural Components of a Service
Component Description
This includes the strategic and tactical requirements for the
type(s) of functionality that the service has to provide to
1. Requirements consumers. The type of requirements depends on the type
Consumer Agency #7
Consumer Agency #6 of service area, number and diversity of participating
Requirements
Consumer Agency #5 agencies, sensitivity of information/data being exchanged.
Security and Privacy Controls
Requirements
Consumer Agency #4
Security and Privacy Controls
Requirements
Consumer Agency #3 Business processes that function through the shared service.
Security and Privacy Controls
Requirements
Consumer Agency #2Workflow 2. Workflow
Security and Privacy Controls
Requirements
Consumer Agency #1 Workflow The design of a process must support the functional
Security and Privacy Controls
Requirements
Provider Agency Workflow requirements from #1.
Security and Privacy Controls
Requirements
Workflow
Data Exchange
Security and Privacy Controls
Requirements
Workflow
Workflow
Workflow
Data Exchange
Data Exchange
Data Exchange
Applications
Shared
3. Data Exchange The part of the business process in #2 that involves the
creation, exchange, manipulation, storage, or deletion of
Security and Privacy
Workflow
Data Exchange
Applications
Data Exchange
Applications
Data Exchange
Applications
Hosting
Service data and information.
This includes the software and hardware that provide the
Data Exchange Hosting4. Applications
Applications
Applications
Hosting functionality and data exchange capabilities that are
Applications
Hosting identified in #2 and #3.
Applications
Hosting
Hosting 5. Hosting This is the infrastructure that the application(s) are hosted in.
Hosting
Hosting This includes cloud-based, client-server hosting solutions.
6. Security and The logical, physical, process, and personnel controls that
Privacy achieve required levels of protection and risk mitigation for
the service.
28
Implementation: Two Work Streams
Intra-Agency • Websites/CMS
Service Center Commodity IT • Email/Collaboration
(Dept. CIOs) • Mobile/Wireless
Inter-Agency
• Budget • GIS • Performance
LOBs / BCs
(Managing Partners) • Financial • HR • Security
8
Implementation and Initial Focus
• IT infrastructure
• Enterprise IT systems “Run”
• Business systems
“Walk”
7
IT Shared Service Roles
Managing
Partner Supplier Customers
Managing Partner. The Federal agency that establishes and maintains the
shared service with approval by agency leadership for intra-agency services,
or by OMB for inter-agency services.
Customer. The Federal agency or bureau that contracts with and pays the
managing partner to receive a shared service.
Supplier. A government or commercial organization that actually provides
the shared service to consumers. Managing partners contract with
suppliers using Federal-wide contract vehicles whenever practicable.
R-3
Architectural Components of a Service
Component Description
This includes the strategic and tactical requirements for the type(s) of
functionality that the service has to provide to consumers. The type of
1. Requirements requirements depends on the type of service area, number and diversity
of participating agencies, sensitivity of information/data being exchanged.
2. Workflow Business processes that function through the shared service. The design
of a process must support the functional requirements from #1.
3. Data Exchange The part of the business process in #2 that involves the creation,
exchange, manipulation, storage, or deletion of data and information.
4. Applications This includes the software and hardware that provide the functionality
and data exchange capabilities that are identified in #2 and #3.
5. Hosting This is the infrastructure that the application(s) are hosted in. This
includes cloud-based, client-server hosting solutions.
6. Security and Privacy The logical, physical, process, and personnel controls that achieve
required levels of protection and risk mitigation for the service.
R-11
Using Enterprise Architecture to
Standardize and Improve Information
Sharing Environments
33
Information Sharing Environments
EOs
12286
Top Secret
12333
12829
13388
Multi-Level Standards
13467 Secret
13527
13526
13549
13556
13587 Confidential
NSSIS
34
Questions
Scott Bernard
Scott_Bernard@omb.eop.gov
Federal Chief Enterprise Architect
Office of Management and Budget
Office of E-Government and IT