Project Charter. The E-Enterprise Integrated Identity Solution Project. October 26, New Mexico Environment Department

Size: px
Start display at page:

Download "Project Charter. The E-Enterprise Integrated Identity Solution Project. October 26, 2015. New Mexico Environment Department"

Transcription

1 Project Charter The E-Enterprise Integrated Identity Solution Project October 26, 2015 New Mexico Environment Department 1190 St. Francis Drive Santa Fe, NM 87502

2 Contents 1. Project Description Project Purpose Business Case Business Requirements Assumptions Constraints Risks Project Deliverables Project Milestones Project Manager Project Roles and Responsibilities Project Approach Authorization Page 2 of 10 October 26, 2015

3 1. Project Description The project will assess a set of existing single sign-on (SSO) systems in use at the New Mexico Environment Department (NMED), Wyoming Department of Environmental Quality (WDEQ), and Tennessee Department of Environment and Conservation (TDEC) in order to determine the impact of implementing a proposed federated identity solution. This will include (1) a review of existing state systems and EPA shared services, (2) the design of a proposed future architecture of federated identity for Exchange Network partners, (3) the implementation of a proof of concept, and (4) an analysis of impacts and requirements for a roadmap to transition to the future architecture. 2. Project Purpose The purpose of this project is to evaluate production SSOs at NMED, WDEQ, and TDEC in terms of identity and access management, apply E-Enterprise Architecture principles and methodologies, research future state solutions, and perform a gap analysis on these three systems in order to determine the impact of implementing a proposed federated identity solution. 3. Business Case Regulated entities currently must access multiple websites to report on and access environmental information in order to meet permitting requirements and to actively participate in environmental management. This requirement is redundant and inefficient, wasting the time of participants and impeding their compliance. A key barrier to smooth, seamless interaction between disparate systems is the need to be authenticated and be granted managed access to each system independently. Some partner systems have existing authentication and access management systems, commonly referred to as Single Sign-On (SSO) systems, already in place. A solution to the problem of securely connecting partner systems smoothly from the end user perspective would be to provide the end user with the ability to use existing credentials for submission of reporting criteria across all systems dedicated to the reception of their required data submissions. 4. Business Requirements Tying partner SSO systems together could provide the backbone to a Federated Identity framework that could be built upon for secure transport of documents and data, ereporting requirements, workflow processes, user portal configuration preferences, notifications, user registration information and many other transactions that cross system boundaries. Below is a schematic of how OpenID and disparate SSO systems could be used to accomplish this objective. Page 3 of 10 October 26, 2015

4 A critical component also already in place is the EPA Network Authentication and Authorization Services (NAAS) which facilitates SSO in the Exchange Network through a set of shared security services for authentication and access to all the Exchange Network nodes. Existing EPA resources, including Shared CROMERR Services, will be assessed to see if they can provide required functionality for distributed identity management and authentication services at the application level. Page 4 of 10 October 26, 2015

5 5. Assumptions There are three assumptions. They are as follows: 1. A federated identity solution is practical and feasible; 2. All objectives can be accomplished within 16 months; 3. The budget is sufficient to accomplish the objectives. 6. Constraints The constraints are that (1) the project must complete by May 31, 2017; (2) the project must complete on or below the budget; and (3) the developed solution must employ network, hardware, service, and applications systems already in place. 7. Risks If individual state solutions are non-complaint with CROMERR and other federal data and authentication and security standards, a federated solution may not be cost-effective and/or usable. Also, if partner states are unable or unwilling to fully disclose their SSO technical specifications and requirements, a complete, valid assessment will not be possible. An extensible, REST-based solution is optimal, but some states have not yet adopted the technology. These risks make a federated solution more complex and less efficient. 8. Project Deliverables The following table lists the key project deliverables: Deliverable Activity Target Date Outcome 1) EPA discovery and solutions assessment engagement for Federated Identity Management February 15, 1.1 Assess and document NAAS and Virtual CROMERR services. This task will require contractual staff hired by the host state to work with EPA s information technology staff in the form of interviews and review of system documentation to perform the necessary assessment of these services. This is the discovery portion of the EPA engagement and will require travel to the EPA worksite and collaboration with EPA s information technology staff. 1.2 Perform gap analysis between existing services and recommended tobe services. The recommended to-be services for NAAS and Virtual CROMERR will be identified as a result of work performed for Goal 5. March 31, Documentation of current as-is system from the perspective of application programming interfaces, technical requirements, functionality, and end-user interactions. Documentation that describes the additional or modified services needed for NAAS and Virtual CROMERR to meet the proposed future state documented in Goal 5. Verification of the technical feasibility of the proposed solution in the form of use cases and proof of concept code. Page 5 of 10 October 26, 2015

6 1.3 Identify and test high risk items from the gap analysis. This task will require to work with EPA s information technology staff to run use case analysis and perhaps develop proof of concept code to test portions of the proposed solution. This is the solutions portion of the EPA engagement and will require travel to the EPA worksite and collaboration with EPA s information technology staff. August 15, 2) Host state (New Mexico Environment Department) discovery and solutions assessment engagement for Federated Identity Management 2.1 Assess and document NMED Secure Extranet Portal (SEP) and associated single-sign on services for access to environmental information systems. This task will require contractual staff hired by the host state to work with NMED s information technology staff in the form of interviews and review of system documentation to perform the necessary assessment of these services. This is the discovery portion of the host state engagement and will require collaboration with NMED s information technology staff. February 16, Documentation of current as-is system from the perspective of application programming interfaces, technical requirements, functionality, and end-user interactions. Documentation that describes the additional or modified services needed for SEP to meet the proposed future state documented in Goal 5. Verification of the technical feasibility of the proposed solution in the form of use cases and proof of concept code. 2.2 Perform gap analysis between existing services and recommended tobe services. The recommended to-be services for SEP will be identified as a result of work performed for Goal 5. March 21, 2.3 Identify and test high risk items from the gap analysis. This task will require to work with NMED s information technology staff to run use case analysis and perhaps develop proof of concept code to test portions of the proposed solution. This is the solutions portion of the host state engagement. October 15, 3) Partner State Tennessee discovery and solutions assessment engagement for Federated 3.1 Assess and document Partner State Tennessee s single-sign on services for access to environmental information systems. This task will require to work with Tennessee s information technology staff in the form of August 20, Documentation of current as-is system from the perspective of application programming interfaces, technical requirements, functionality, and end-user interactions. Documentation that describes the additional or modified services Page 6 of 10 October 26, 2015

7 Identity Management interviews and review of system documentation to perform the necessary assessment of these services. This is the discovery portion of Tennessee s engagement and will require travel to Tennessee s worksite and collaboration with Tennessee s information technology staff. 3.2 Perform gap analysis between existing services and recommended tobe services. The recommended to-be services for Tennessee s Single Sign On System will be identified as a result of work performed for Goal Identify and test high risk items from the gap analysis. This task will require to work with State A s information technology staff to run use case analysis and perhaps develop proof of concept code to test portions of the proposed solution. This is the solutions portion of Tennessee s engagement and will require travel to Tennessee s worksite and collaboration with Tennessee s information technology staff. October 10, November 1, needed for Tennessee s Single Sign On system to meet the proposed future state documented in Goal 5. Verification of the technical feasibility of the proposed solution in the form of use cases and proof of concept code. 4) Partner State Wyoming discovery and solutions assessment engagement for Federated Identity Management 4.1 Assess and document Partner State Wyoming s single-sign on services for access to environmental information systems. This task will require to work with Wyoming s information technology staff in the form of interviews and review of system documentation to perform the necessary assessment of these services. This is the discovery portion of Wyoming s engagement and will require travel to Wyoming s worksite and collaboration with Wyoming s information technology staff. September 19, Documentation of current as-is system from the perspective of application programming interfaces, technical requirements, functionality, and end-user interactions. Documentation that describes the additional or modified services needed for Wyoming s Single Sign On system to meet the proposed future state documented in Goal 5. Verification of the technical feasibility of the proposed solution in the form of use cases and proof of concept code. 4.2 Perform gap analysis between existing services and recommended tobe services. The recommended to-be services for Wyoming s Single Sign On System will be identified as a result of work performed for Goal 5. October 16, Page 7 of 10 October 26, 2015

8 4.3 Identify and test high risk items from the gap analysis. This task will require to work with Wyoming s information technology staff to run use case analysis and perhaps develop proof of concept code to test portions of the proposed solution. This is the solutions portion of Wyoming s engagement and will require travel to Wyoming s worksite and collaboration with Wyoming s information technology staff. December 15, 5) Research, solutions assessment, recommendatio ns and presentations 5.1 Research current guidance and requirements from E-Enterprise Technical Architecture 5.2 Research industry solutions and gather input from experts in e- commerce 5.3 Propose interoperable Federated Identity Management Framework and iterate through the design with EPA and partner states to verify the feasibility of the solution. This will require collaborative work with partner states and EPA to finalize the design. December 13, January 25, 2017 February 21, 2017 Whitepapers comparing industry solutions, design documentation and technical specifications describing the proposed solution the future state Federated Identity Management Framework for interoperability, risk assessment of proposed new services recommended for EPA systems and partner systems, technical specifications and other E-Enterprise artifacts that will be submitted to the E-Enterprise Architecture Repository, and materials for presentation to the E-Enterprise Leadership Council and the Exchange Network Conference. 5.4 High risk components to the solution will be identified and proof of concept use cases will be developed. See tasks 1-3, 2-3, 3-3 and 4-3 above. See above tasks 5.5 Submit artifacts of the recommended solution to the E- Enterprise Architecture Repository. 5.6 Present findings, process, recommendations and outcome to Exchange Network Conference and the Enterprise Leadership Council. The host state, the two partner states and EPA will contribute to and participate in the presentations. April 1, 2017 May 15, 2017 Page 8 of 10 October 26, 2015

9 9. Project Milestones Milestone Date Milestone Name Milestone Description August 15, Deliverable 1 Completed EPA discovery and solutions assessment engagement for Federated Identity Management done October 15, Deliverable 2 Completed Host state (New Mexico Environment Department) discovery and solutions assessment engagement for November 1, December 15, Deliverable 3 Completed Deliverable 4 Completed Federated Identity Management completed Partner State Tennessee discovery and solutions assessment engagement for Federated Identity Management concluded Partner State Wyoming discovery and solutions assessment engagement for Federated Identity Management concluded April 1, 2017 Deliverable 5 Completed Research, solutions assessment and recommendations completed May 15, 2017 EN2017 National Meeting Present findings and recommendations at national conference 10. Project Manager The project manager is Bogi Malecki. Mr. Malecki is an NMED staff member with over 26 years of IT experience, including 20 years of IT project management. He has successfully led and completed over 100 IT projects and is PMI/PMBOK trained and credentialed. 11. Project Roles and Responsibilities Name Role Responsibilities Mark Morell Systems Integrator Bring together component subsystems into a whole and ensuring those subsystems function fully. Sam Jenkins Solutions Architect Interpret and translate the requirements into an information technology architecture for the solution. Create design artifacts that will be used by developers to implement the solution. Select the best technology for the presented problems. Tom McMichael Systems Analyst Specify the business, functional and technical requirements. Review alternative technologies and technological approaches and recommend possible solutions. Evaluate proposed procedures and processes to develop solutions. Help develop project documentation. Karen Craner Technical Writer Organize, clarify and document all technical requirements and specifications. Page 9 of 10 October 26, 2015

10 12. Project Approach The project approach will be to execute four project engagements with outlined goals and tasks. Three of the engagements will be Exchange Network state partner engagements including the host state. The engagements will perform extensive architecture and design analysis and discovery on existing state system Single Sign On Systems, document the current functionality, capability and technology in use, perform a gap analysis on the existing system, and present recommendations for modifications to achieve the proposed future state. One of the engagements will be with EPA to perform analysis and discovery on the existing Single Sign on in use for the Exchange network partners, NAAS, and to assess the service offering of the Virtual CROMERR system to then develop a proposed future state that incorporates the requirements from the partner states. Gap analysis on the EPA system and recommendations will be documented and presented. Some prototype work is expected in order to verify and further define some of the proposed recommendations. The project methodology and outcomes will be presented at the FY17 Exchange Network Conference and to the E-Enterprise Leadership Council. 13. Authorization Provide the names of those business sponsors that must sign the Project Charter. Once the project Charter is signed by the project sponsors, the project is authorized to start. Approved by the Project Sponsor: Mary Montoya Date: CIO, New Mexico Environment Department Page 10 of 10 October 26, 2015

Enterprise Identity Management Connie Dwyer, US EPA Steve Girt, Wyoming DEQ Luke Gentry, CGI Federal, Inc.

Enterprise Identity Management Connie Dwyer, US EPA Steve Girt, Wyoming DEQ Luke Gentry, CGI Federal, Inc. Enterprise Identity Management Connie Dwyer, US EPA Steve Girt, Wyoming DEQ Luke Gentry, CGI Federal, Inc. 2015 Exchange Network National Meeting Supporting the Business of Environmental Protection September

More information

Systems Development Life Cycle (SDLC)

Systems Development Life Cycle (SDLC) DEPARTMENT OF BUDGET & MANAGEMENT (SDLC) Volume 1 Introduction to the SDLC August 2006 Table of Contents Introduction... 3 Overview... 4 Page 2 of 17 INTRODUCTION 1.0 STRUCTURE The SDLC Manual consists

More information

CAREER TRACKS PHASE 1 UCSD Information Technology Family Function and Job Function Summary

CAREER TRACKS PHASE 1 UCSD Information Technology Family Function and Job Function Summary UCSD Applications Programming Involved in the development of server / OS / desktop / mobile applications and services including researching, designing, developing specifications for designing, writing,

More information

Career Tracks- Information Technology Family

Career Tracks- Information Technology Family Career Tracks- Information Technology Family FUNCTIONAL AREA Applications Programming AV IT AV IT Engineering Bioinformatics Involved in the development of server/os/desktop/mobile applications and services

More information

Interagency Interoperability Oversight Group

Interagency Interoperability Oversight Group Interagency Interoperability Oversight Group DOI-USDA/FS Access / Authentication Project Charter 1. Project Overview It is well known that the wildland firefighting community is a highly integrated, cooperative

More information

Time Monitoring Tool Software Development Plan. Version <1.1>

Time Monitoring Tool Software Development Plan. Version <1.1> Time Monitoring Tool Software Development Plan Version Revision History Date Version Description Author 10/01/01 1.0 First Draft Sabrina Laflamme 12/01/01 1.1 Completion of Document John Lemon Page

More information

Program Lifecycle Methodology Version 1.7

Program Lifecycle Methodology Version 1.7 Version 1.7 March 30, 2011 REVISION HISTORY VERSION NO. DATE DESCRIPTION AUTHOR 1.0 Initial Draft Hkelley 1.2 10/22/08 Updated with feedback Hkelley 1.3 1/7/2009 Copy edited Kevans 1.4 4/22/2010 Updated

More information

Tipping the Mainframe for a Connected Enterprise

Tipping the Mainframe for a Connected Enterprise Tipping the Mainframe for a Connected Enterprise Stop Rebuilding Capabilities and Start Delivering Solutions with EngagePoint Architect Suite. EngagePoint Architect Suite Ready-to-go solutions focused

More information

Software Engineering Reference Framework

Software Engineering Reference Framework Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of

More information

Process Validation Workshops. Overview Session

Process Validation Workshops. Overview Session Process Validation Workshops Overview Session 2 Session Objectives: Prepare staff for participating in a Process Validation Workshop Clarify the Purpose of Process Validation Workshops Clarify Expected

More information

Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology

Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology UC DAVIS: OFFICE OF THE VICE PROVOST INFORMATION & EDUCATIONAL TECHNOLOGY Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology Background Unprecedented growth and an

More information

How To Write An Slcm Project Plan

How To Write An Slcm Project Plan SLCM 2003.1 Artifacts in a Nutshell ( as of 01/21/2005) Project Development Phases Pension Benefit Guaranty Corporation s (PBGC) System Life Cycle Methodology (SLCM) is comprised of five project development

More information

Department of Homeland Security Office of Inspector General. Review of U.S. Coast Guard Enterprise Architecture Implementation Process

Department of Homeland Security Office of Inspector General. Review of U.S. Coast Guard Enterprise Architecture Implementation Process Department of Homeland Security Office of Inspector General Review of U.S. Coast Guard Enterprise Architecture Implementation Process OIG-09-93 July 2009 Contents/Abbreviations Executive Summary...1 Background...2

More information

IT Project: System Implementation Project Template Description

IT Project: System Implementation Project Template Description 2929 Campus Drive Suite 250 IT Project: System Implementation Project Template Description Table of Contents Introduction... 2 Project Phases... 3 Initiation & Requirements Gathering Milestone... 3 Initiation

More information

Glendale Community College Microsoft Office SharePoint Server 2007 Initiative Vision/Scope Document. Version 1.0

Glendale Community College Microsoft Office SharePoint Server 2007 Initiative Vision/Scope Document. Version 1.0 ware Architects, Inc. Proposal to XXXXX Date Glendale Community College Microsoft Office SharePoint Server 2007 Initiative Vision/Scope Document Software Architects, Inc. Proposal to XXXXX Date Version

More information

Practice Overview. REQUIREMENTS DEFINITION Issue Date: <mm/dd/yyyy> Revision Date: <mm/dd/yyyy>

Practice Overview. REQUIREMENTS DEFINITION Issue Date: <mm/dd/yyyy> Revision Date: <mm/dd/yyyy> DEPARTMENT OF HEALTH AND HUMAN SERVICES ENTERPRISE PERFORMANCE LIFE CYCLE FRAMEWORK PRACTIICES GUIIDE REQUIREMENTS DEFINITION Issue Date: Revision Date: Document

More information

Software Quality Assurance Plan

Software Quality Assurance Plan For Database Applications Document ID: Version: 2.1a Planning Installation & Acceptance Integration & Test Requirements Definition Design Development 1 / 54 Copyright 2000-2006 Digital Publications LLC.

More information

Printshop Workflow Automation System

Printshop Workflow Automation System Fictitious Corp. Software Project Plan Revision 1 Printshop Workflow Automation System CEN4021 Spring 2010 Professor: Masoud Sadjadi Paul White 16 th February 2010 TABLE OF CONTENTS 1 Overview... 3 1.1

More information

Project Management Plan for

Project Management Plan for Project Management Plan for [Project ID] Prepared by: Date: [Name], Project Manager Approved by: Date: [Name], Project Sponsor Approved by: Date: [Name], Executive Manager Table of Contents Project Summary...

More information

Government's Adoption of SOA and SOA Examples

Government's Adoption of SOA and SOA Examples Government's Adoption of SOA and SOA Examples Presented by : Ajay Budhraja, Chief of Enterprise Services ME (Engg), MS (Management), PMP, CICM, CSM, ECM (Master) AIIM, ITIL-F Copyright 2008 Ajay Budhraja

More information

How To Develop An Enterprise Architecture

How To Develop An Enterprise Architecture OSI Solution Architecture Framework Enterprise Service Center April 2008 California Health and Human Services Agency Revision History REVISION HISTORY REVISION/WORKSITE # DATE OF RELEASE OWNER SUMMARY

More information

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology

Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology Establishing A Multi-Factor Authentication Solution Report to the Joint Legislative Oversight Committee on Information Technology Keith Werner State Chief Information Officer Department of Information

More information

Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board

Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management An information exchange For Information Security and Privacy Advisory Board Deb Gallagher

More information

HRMS - HRMS Charter - AI.18. Project Charter Human Resource Management System (HRMS) Replacement - Implementation Project Number: 2209.

HRMS - HRMS Charter - AI.18. Project Charter Human Resource Management System (HRMS) Replacement - Implementation Project Number: 2209. Project Charter Human Resource Management System (HRMS) Replacement - Implementation Project Number: 2209 Final Version: 1.0 Date: June 5, 2012 Distribution List: Name Dan Guimond MaryAnn Kempe Heather

More information

Development, Acquisition, Implementation, and Maintenance of Application Systems

Development, Acquisition, Implementation, and Maintenance of Application Systems Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of

More information

Presented By: Leah R. Smith, PMP. Ju ly, 2 011

Presented By: Leah R. Smith, PMP. Ju ly, 2 011 Presented By: Leah R. Smith, PMP Ju ly, 2 011 Business Intelligence is commonly defined as "the process of analyzing large amounts of corporate data, usually stored in large scale databases (such as a

More information

Fixed Scope Offering for Oracle Fusion HCM. Slide 1

Fixed Scope Offering for Oracle Fusion HCM. Slide 1 Fixed Scope Offering for Oracle Fusion HCM Slide 1 Today s Business Challenges Adopt leading Global HCM practices. Streamline the HCM processes and achieve measurable efficiencies. Achieve HR excellence

More information

Montana Department of Transportation Information Services Division. System Development Life Cycle (SDLC) Guide

Montana Department of Transportation Information Services Division. System Development Life Cycle (SDLC) Guide Montana Department of Transportation Information Services Division System Development Life Cycle (SDLC) Guide Version 2 August 2, 2007 \mdt_sdlc_process\mdt_sdlc_v02.doc Table of Contents 1 Business Analysis...3

More information

Gartner, Inc. DIR-SDD-2042

Gartner, Inc. DIR-SDD-2042 Texas Department of Information Resources STATEMENT OF WORK (SOW) FOR DELIVERABLES-BASED INFORMATION TECHNOLOGY SERVICES Identity & Access Management Analysis IT Assessment & Planning Gartner, Inc. DIR-SDD-2042

More information

Enterprise Content Management

Enterprise Content Management The State Bar of California Enterprise Content Management Request for Proposal: Questions & Responses April 4, 2014 1. What do you consider to be the top three critical success factors for this project?

More information

Openbravo Services for Partners

Openbravo Services for Partners Openbravo for Partners A pure channel organization devoted to Partner success # Devoted to Partner Success Openbravo for Partners are especially designed to accelerate partners practice towards business

More information

About ERP Software Whitepaper

About ERP Software Whitepaper About ERP Software Whitepaper Many people have heard the term ERP used in a conversation but don t fully understand what it means. This whitepaper will provide information about the processes and advantages

More information

Knowledge Base Data Warehouse Methodology

Knowledge Base Data Warehouse Methodology Knowledge Base Data Warehouse Methodology Knowledge Base's data warehousing services can help the client with all phases of understanding, designing, implementing, and maintaining a data warehouse. This

More information

Attachment 3: Questions and Answers

Attachment 3: Questions and Answers Attachment 3: Questions and Answers I. OVERVIEW A. VISION & MISSION For 20 years, USAC has engaged stakeholders and applicants for funding in what has increasingly become a digital landscape. Seven months

More information

From Chaos to Clarity: Embedding Security into the SDLC

From Chaos to Clarity: Embedding Security into the SDLC From Chaos to Clarity: Embedding Security into the SDLC Felicia Nicastro Security Testing Services Practice SQS USA Session Description This session will focus on the security testing requirements which

More information

What Business and Process Analysts Need to Know About BPM Suites

What Business and Process Analysts Need to Know About BPM Suites What Business and Process Analysts Need to Know About BPM Suites Bruce Silver Principal, Bruce Silver Associates and BPMS Watch 1 Agenda What is a BPMS? Specifying BPM requirements What BA s need to understand

More information

SCOPE MANAGEMENT PLAN <PROJECT NAME>

SCOPE MANAGEMENT PLAN <PROJECT NAME> SCOPE MANAGEMENT PLAN TEMPLATE This Project Scope Management Plan Template is free for you to copy and use on your project and within your organization. We hope that you find this template useful and welcome

More information

Module 11 Stakeholder Management PMP Exam Questions

Module 11 Stakeholder Management PMP Exam Questions Module 11 Stakeholder Management PMP Exam Questions PMP, PMBOK and the Registered Education Provider logo are registered marks of the Project Management Institute, Inc Question 1 You are the project manager

More information

Ellucian Implementation Methodology. Summary of Project Management and Solution Delivery Phases

Ellucian Implementation Methodology. Summary of Project Management and Solution Delivery Phases Ellucian Implementation Methodology Summary of Project Management and Solution Delivery Phases Rev. 5/10/2013 Table of Contents Overview 3 Project Management Initiation 4 Planning 5 Execution 6 Monitor

More information

Re: RFP # 08-X-39202 MOTOR VEHICLE AUTOMATED TRANSACTION SYSTEM (MATRX) FOR MVC ADDENDUM #10

Re: RFP # 08-X-39202 MOTOR VEHICLE AUTOMATED TRANSACTION SYSTEM (MATRX) FOR MVC ADDENDUM #10 State of New Jersey DEPARTMENT OF THE TREASURY JON S. CORZINE DIVISION OF PURCHASE AND PROPERTY BRADLEY I. ABELOW Governor PURCHASE BUREAU State Treasurer P.O. BOX 230 TRENTON, NEW JERSEY 08625-0230 September

More information

Institutional Data Recommendations for UC Berkeley: A Roadmap for the Way Forward

Institutional Data Recommendations for UC Berkeley: A Roadmap for the Way Forward InstitutionalDataRecommendations forucberkeley: ARoadmapfortheWayForward June29,2009 Preparedby:MaryBethBaker,ExternalConsultant InstitutionalDataRoadmap,06/29/09 1 I. OVERVIEW of INSTITUTIONAL DATA RECOMMENDATIONS

More information

California Department of Mental Health Information Technology Attention: MHSA-IT 1600 9 th Street, Room 141 Sacramento, CA 95814

California Department of Mental Health Information Technology Attention: MHSA-IT 1600 9 th Street, Room 141 Sacramento, CA 95814 IT Project Status Report For an MHSA-Funded IT Project Please send the Signed Original to the following address: California Department of Mental Health Information Technology Attention: MHSA-IT 1600 9

More information

PROJECT SCOPE STATEMENT

PROJECT SCOPE STATEMENT PROJECT SCOPE STATEMENT Note: Any work not explicitly included in the Project Scope Statement is implicitly excluded from the project. Project Name: Prepared by: BI - IT Governance Amy Winkel Date: 12/20/2010

More information

Charter & Scope Statement Web & Portal Redesign. Brookdale Community College

Charter & Scope Statement Web & Portal Redesign. Brookdale Community College Charter & Scope Statement Web & Portal Redesign Brookdale Community College May October, 2012 Table of Contents PROJECT PURPOSE AND JUSTIFICATION 3 EXECUTIVE SUMMARY 3 PROJECT SCOPE AND DELIVERABLES PROJECT

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

Tools for Managing and Measuring the Value of Big Data Projects

Tools for Managing and Measuring the Value of Big Data Projects Tools for Managing and Measuring the Value of Big Data Projects Abstract Big Data and analytics focused projects have undetermined scope and changing requirements at their core. There is high risk of loss

More information

Quality Assurance. Ministry of Community Development and Ministry of Tourism, Culture and the Arts

Quality Assurance. Ministry of Community Development and Ministry of Tourism, Culture and the Arts Ministry of Community Development and Ministry of Date: August 2006 Prepared By: Fredo Vanlierop Project: CAWS Standards Documentation Harvest Package Name: Harvest Version: Contract: N/A 1 Document Revision

More information

Wyoming DEQ Envite CROMERR Solution

Wyoming DEQ Envite CROMERR Solution Wyoming DEQ Envite CROMERR Solution (Cross-Media Electronic Reporting Regulation) EN2014 - February 26, 2014 2 In the early days CROMERR was one of those acronyms that was just hard to spell and something

More information

Request for Proposal to

Request for Proposal to Request for Proposal to ( 2016 /ح ك/ 3 ) No. Tender General Response for All Raised Questions Taking into consideration the requirements outlined in the RFP and this Q&A document, bidders need to respond

More information

Project Charter. Ben Canlas, Bobbi Walker & Tom North. Project Charter Version Control

Project Charter. Ben Canlas, Bobbi Walker & Tom North. Project Charter Version Control Project Charter Project Name: PeopleSoft Expense 9.0 Module Implementation UM Business Unit: UMSYS Department: Division of IT: Enterprise Applications Services Strategic Priority: FY08 Strategic Goal #2

More information

General Problem Solving Model. Software Development Methodology. Chapter 2A

General Problem Solving Model. Software Development Methodology. Chapter 2A General Problem Solving Model Software Development Methodology These focus on understanding what the problem is about Chapter 2A Concerned with understanding more about the nature of the problem and possible

More information

Appendix 2-A. Application and System Development Requirements

Appendix 2-A. Application and System Development Requirements Appendix 2-A. Application and System Development Requirements Introduction AHRQ has set up a Distributed Systems Engineering Lab (DSEL) to support all internal development efforts and provide a facility

More information

Online Chapter A The Role of the Systems Analyst

Online Chapter A The Role of the Systems Analyst Systems Analysis and Design in a Changing World, sixth edition A-1 Online Chapter A The Role of the Systems Analyst Table of Contents Chapter Overview Learning Objectives Why read this chapter? This chapter

More information

U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment

U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE Privacy Impact Assessment Enterprise Software Services PTOI-020-00 July 8, 2015 Privacy Impact Assessment This Privacy Impact Assessment

More information

PHASE 6: DEVELOPMENT PHASE

PHASE 6: DEVELOPMENT PHASE PHASE 6: DEVELOPMENT PHASE The Phase features a key step in the project: system construction. The previous phases lay the foundation for system development; the following phases ensure that the product

More information

Classical Software Life Cycle Models

Classical Software Life Cycle Models Classical Software Life Cycle Models SWEN 301 Trimester 1, 2015 Lecturer: Dr Hui Ma Engineering and Computer Science Lecture slides make use of material provided on the textbook's companion website Motivation

More information

RUP Design. Purpose of Analysis & Design. Analysis & Design Workflow. Define Candidate Architecture. Create Initial Architecture Sketch

RUP Design. Purpose of Analysis & Design. Analysis & Design Workflow. Define Candidate Architecture. Create Initial Architecture Sketch RUP Design RUP Artifacts and Deliverables RUP Purpose of Analysis & Design To transform the requirements into a design of the system to-be. To evolve a robust architecture for the system. To adapt the

More information

Overview. FedRAMP CONOPS

Overview. FedRAMP CONOPS Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,

More information

User experience prototype requirements PROJECT MANAGEMENT PLAN

User experience prototype requirements PROJECT MANAGEMENT PLAN Tallinn University Institute of Informatics User experience prototype requirements PROJECT MANAGEMENT PLAN Authors Roger Puks Erkki Saarnit Ekaterina Shafeeva Maria Angelica Medina Angarita Lecturer Peeter

More information

Minnesota Health Insurance Exchange (MNHIX)

Minnesota Health Insurance Exchange (MNHIX) Minnesota Health Insurance Exchange (MNHIX) 1.2 Plan September 21st, 2012 Version: FINAL v.1.0 11/9/2012 2:58 PM Page 1 of 87 T A B L E O F C O N T E N T S 1 Introduction to the Plan... 12 2 Integration

More information

GOVERNMENT USE OF MOBILE TECHNOLOGY

GOVERNMENT USE OF MOBILE TECHNOLOGY GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...

More information

CHAPTER 3: MANAGING IMPLEMENTATION PROJECTS

CHAPTER 3: MANAGING IMPLEMENTATION PROJECTS Chapter 3: Managing Implementation Projects CHAPTER 3: MANAGING IMPLEMENTATION PROJECTS Objectives Introduction The objectives are: Describe common problems that occur in implementation projects. Describe

More information

Office of the Chief Information Officer Department of Energy Identity, Credential, and Access Management (ICAM)

Office of the Chief Information Officer Department of Energy Identity, Credential, and Access Management (ICAM) Department of Energy Identity, Credential, and Access Management (ICAM) Cyber Security Training Conference Tuesday, May 18, 2010 1 Announcement LACS Birds-of-a-Feather Session Logistics Wednesday, May

More information

NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0

NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0 NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5

More information

Computing & Communications Services

Computing & Communications Services 2010 Computing & Communications Services 2010 / 10 / 04 Final Kent Percival, M.Sc., P.Eng. Defining the Value of the Business Analyst In achieving its vision, key CCS partnerships involve working directly

More information

ITS Project Management Methodology

ITS Project Management Methodology ITS Project Management Methodology Standards and Guidelines for managing projects at Information Technology Services, NYU July, 2008 Version 1.4 TABLE OF CONTENTS 1 INTRODUCTION.3 1.1 Overview..3 1.2 Purpose....3

More information

ORIGINAL PLAN DATE: MARCH 1, 2012 REVISION DATE: REVISION:

ORIGINAL PLAN DATE: MARCH 1, 2012 REVISION DATE: REVISION: WATER RIGHTS BUSINESS PROCESS MANAGEMENT SYSTEM PROJECT CHARTER FOR CERTIFICATION EXECUTIVE SPONSORS: RENEE MARTINEZ, CHIEF INFORMATION OFFICE JOHN ROMERO, WATER RIGHTS DIVISION CHIEF BUSINESS OWNER WRAP

More information

PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME >

PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME > PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME > Date of Issue: < date > Document Revision #: < version # > Project Manager: < name > Project Management Plan < Insert Project Name > Revision History Name

More information

Enterprise Architecture Governance Procedure

Enterprise Architecture Governance Procedure Governance Procedure Adrian Hollister Head of Strategy and Craig Douglas Architect 26 February 2014 Version Control Version Date Detail Contributor 0.1 26/2/2014 Initial Document CJD 0.2 14/3/2014 Amended

More information

Custom Software Development Approach

Custom Software Development Approach Custom Software Development Approach Our approach to custom software development combines benefits from several standard development process models. We tend to have a well-defined, predictable and highly

More information

Project Management Best Practices: Key Processes and Common Sense

Project Management Best Practices: Key Processes and Common Sense Copyright and Material Usage Guidelines January 30, 2003 Project Management Best Practices: Key Processes and Common Sense Giga Position Margo Visitacion Organizations continue to look for the key to unlocking

More information

Agile Master Data Management TM : Data Governance in Action. A whitepaper by First San Francisco Partners

Agile Master Data Management TM : Data Governance in Action. A whitepaper by First San Francisco Partners Agile Master Data Management TM : Data Governance in Action A whitepaper by First San Francisco Partners First San Francisco Partners Whitepaper Executive Summary What do data management, master data management,

More information

SECUREAUTH IDP AND OFFICE 365

SECUREAUTH IDP AND OFFICE 365 WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that

More information

Traventec. September 2004. Technology Feature. Roadmap for Adoption of Service Oriented Architecture

Traventec. September 2004. Technology Feature. Roadmap for Adoption of Service Oriented Architecture Traventec September 2004 Technology Feature Roadmap for Adoption of Service Oriented Architecture ROADMAP FOR ADOPTION OF SERVICE ORIENTED ARCHITECTURE... 2 1. INTRODUCTION...2 2. GET PEOPLE INVOLVED...2

More information

The Data Integration Strategy

The Data Integration Strategy White Paper The Data Integration Strategy Take Aim Before You Shoot Introduction Much has been written about the need to align business and technology, but that alignment has to begin up front. In fact,

More information

Improved Management Practices Needed to Increase Use of Exchange Network

Improved Management Practices Needed to Increase Use of Exchange Network OFFICE OF INSPECTOR GENERAL Audit Report Catalyst for Improving the Environment Improved Management Practices Needed to Increase Use of Exchange Network Report No. 2007-P-00030 August 20, 2007 Report Contributors:

More information

Assumptions. It is assumed that:

Assumptions. It is assumed that: It is assumed that: Assumptions 1. The State will establish a MICAM project steering committee to oversee the progress of the project. This steering committee will have representation from Contractor.

More information

SAN DIEGO CITY SCHOOLS Office of the Superintendent. District Wide Applications November 12, 2002

SAN DIEGO CITY SCHOOLS Office of the Superintendent. District Wide Applications November 12, 2002 SAN DIEGO CITY SCHOOLS Office of the Superintendent District Wide Applications November 12, 2002 Introductory Statement After extensive analysis, staff has negotiated with vendors the software, hardware,

More information

Extended Enterprise Architecture Framework Essentials Guide

Extended Enterprise Architecture Framework Essentials Guide Extended Enterprise Architecture Framework Essentials Guide Editorial Writer: J. Schekkerman Version 1.5 2006 Preface An enterprise architecture (EA) establishes the organization-wide roadmap to achieve

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 4630.09 July 15, 2015 DoD CIO SUBJECT: Communication Waveform Management and Standardization References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues

More information

Documentation Management Portal Implementation Statement of Work

Documentation Management Portal Implementation Statement of Work Documentation Management Portal Implementation Statement of Work Prepared For: State of Michigan Department of Community Health 400 South Pine Street Lansing, Michigan 48909 Prepared By: CNSI 6465 Millennium

More information

IT Services Management Service Brief

IT Services Management Service Brief IT Services Management Service Brief Release Management Prepared by: Rick Leopoldi May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction of content is strictly forbidden.

More information

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity

More information

Migrating and consolidating even the simplest of data

Migrating and consolidating even the simplest of data CALIBRE An Employee-Owned Management and Technology Services Company 6354 Walker Lane, Suite 300, Metro Park Alexandria, Virginia 22310-3252 USA p. 703.797.8500 or 1.888.CALIBRE international p. 011.1.888.CALIBRE

More information

Draft Requirements Management Plan

Draft Requirements Management Plan BAO111: Core Competencies for the Business Analyst Draft Requirements Management Plan 1.0 INTRODUCTION 1.1 Purpose This document outlines requirements roles and responsibilities, presents a stakeholder

More information

Foundations for Systems Development

Foundations for Systems Development Foundations for Systems Development ASSIGNMENT 1 Read this assignment introduction. Then, read Chapter 1, The Systems Development Environment, on pages 2 25 in your textbook. What Is Systems Analysis and

More information

A discussion of information integration solutions November 2005. Deploying a Center of Excellence for data integration.

A discussion of information integration solutions November 2005. Deploying a Center of Excellence for data integration. A discussion of information integration solutions November 2005 Deploying a Center of Excellence for data integration. Page 1 Contents Summary This paper describes: 1 Summary 1 Introduction 2 Mastering

More information

LDAP Authentication Configuration Appendix

LDAP Authentication Configuration Appendix 1 Overview LDAP Authentication Configuration Appendix Blackboard s authentication technology is considered a focal point in the company s ability to provide true enterprise software. Natively, the Blackboard

More information

PHASE 8: IMPLEMENTATION PHASE

PHASE 8: IMPLEMENTATION PHASE PHASE 8: IMPLEMENTATION PHASE The Implementation Phase has one key activity: deploying the new system in its target environment. Supporting actions include training end-users and preparing to turn the

More information

Software Configuration Management Plan

Software Configuration Management Plan For Database Applications Document ID: Version: 2.0c Planning Installation & Acceptance Integration & Test Requirements Definition Design Development 1 / 22 Copyright 2000-2005 Digital Publications LLC.

More information

Enterprise Content Management - ECM Program for New Mexico State Government

Enterprise Content Management - ECM Program for New Mexico State Government Enterprise Content Management - ECM Program for New Mexico State Government a.k.a. ELECTRONIC DOCUMENT MANAGEMENT SYSTEM (EDMS) ELECTRONIC RECORDS MANAGEMENT SYSTEM (ERMS) Informational Presentation to

More information

Post-Implementation Review

Post-Implementation Review Table of Contents 1. Post Implementation Review ()... 1 1.1. What is a Post Implementation Review?...1 1.2. Why is the Used?... 1 1.3. Where does a fit in?... 2 1.4. What constitutes the process?... 2

More information

IT Services Management Service Brief

IT Services Management Service Brief IT Services Management Service Brief Capacity Management Prepared by: Rick Leopoldi May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction of content is strictly forbidden.

More information

Qlik UKI Consulting Services Catalogue

Qlik UKI Consulting Services Catalogue Qlik UKI Consulting Services Catalogue The key to a successful Qlik project lies in the right people, the right skills, and the right activities in the right order www.qlik.co.uk Table of Contents Introduction

More information

REQUEST FOR INFORMATION. Identity and Access Management Administration Software RFI 2012-44

REQUEST FOR INFORMATION. Identity and Access Management Administration Software RFI 2012-44 REQUEST FOR INFORMATION FOR Identity and Access Management Administration Software RFI 2012-44 Florida Department of Education 325 West Gaines Street Tallahassee, Florida 32399-0400 Please email submissions

More information

March 22, 2002 Audit Report No. 02-008. The FDIC s Efforts To Implement a Single Sign-on Process

March 22, 2002 Audit Report No. 02-008. The FDIC s Efforts To Implement a Single Sign-on Process March 22, 2002 Audit Report No. 02-008 The FDIC s Efforts To Implement a Single Sign-on Process 1 Federal Deposit Insurance Corporation Washington, D.C. 20434 Office of Audits Office of Inspector General

More information

Organising, planning and scheduling software projects. Software management distinctions

Organising, planning and scheduling software projects. Software management distinctions Project management Organising, planning and scheduling software projects Software management distinctions The product is intangible The product is uniquely flexible Software engineering is not recognized

More information

OE PROJECT CHARTER TEMPLATE

OE PROJECT CHARTER TEMPLATE PROJECT : PREPARED BY: DATE (MM/DD/YYYY): Project Name Typically the Project Manager Project Charter Last Modified Date PROJECT CHARTER VERSION HISTORY VERSION DATE (MM/DD/YYYY) COMMENTS (DRAFT, SIGNED,

More information

Crosswalk Between Current and New PMP Task Classifications

Crosswalk Between Current and New PMP Task Classifications Crosswalk Between Current and New PMP Task Classifications Domain 01 Initiating the Project Conduct project selection methods (e.g., cost benefit analysis, selection criteria) through meetings with the

More information

Approaches to Successfully Implementing Statewide ERP

Approaches to Successfully Implementing Statewide ERP Approaches to Successfully Implementing Statewide ERP August 24, 2015 NASACT Clark Partridge, State of Arizona Michael J. Smarik, State of Arizona Daniel Keene, CGI James Colbert, CGI Agenda Statewide

More information