Project Charter. The E-Enterprise Integrated Identity Solution Project. October 26, New Mexico Environment Department
|
|
- Ira Caldwell
- 8 years ago
- Views:
Transcription
1 Project Charter The E-Enterprise Integrated Identity Solution Project October 26, 2015 New Mexico Environment Department 1190 St. Francis Drive Santa Fe, NM 87502
2 Contents 1. Project Description Project Purpose Business Case Business Requirements Assumptions Constraints Risks Project Deliverables Project Milestones Project Manager Project Roles and Responsibilities Project Approach Authorization Page 2 of 10 October 26, 2015
3 1. Project Description The project will assess a set of existing single sign-on (SSO) systems in use at the New Mexico Environment Department (NMED), Wyoming Department of Environmental Quality (WDEQ), and Tennessee Department of Environment and Conservation (TDEC) in order to determine the impact of implementing a proposed federated identity solution. This will include (1) a review of existing state systems and EPA shared services, (2) the design of a proposed future architecture of federated identity for Exchange Network partners, (3) the implementation of a proof of concept, and (4) an analysis of impacts and requirements for a roadmap to transition to the future architecture. 2. Project Purpose The purpose of this project is to evaluate production SSOs at NMED, WDEQ, and TDEC in terms of identity and access management, apply E-Enterprise Architecture principles and methodologies, research future state solutions, and perform a gap analysis on these three systems in order to determine the impact of implementing a proposed federated identity solution. 3. Business Case Regulated entities currently must access multiple websites to report on and access environmental information in order to meet permitting requirements and to actively participate in environmental management. This requirement is redundant and inefficient, wasting the time of participants and impeding their compliance. A key barrier to smooth, seamless interaction between disparate systems is the need to be authenticated and be granted managed access to each system independently. Some partner systems have existing authentication and access management systems, commonly referred to as Single Sign-On (SSO) systems, already in place. A solution to the problem of securely connecting partner systems smoothly from the end user perspective would be to provide the end user with the ability to use existing credentials for submission of reporting criteria across all systems dedicated to the reception of their required data submissions. 4. Business Requirements Tying partner SSO systems together could provide the backbone to a Federated Identity framework that could be built upon for secure transport of documents and data, ereporting requirements, workflow processes, user portal configuration preferences, notifications, user registration information and many other transactions that cross system boundaries. Below is a schematic of how OpenID and disparate SSO systems could be used to accomplish this objective. Page 3 of 10 October 26, 2015
4 A critical component also already in place is the EPA Network Authentication and Authorization Services (NAAS) which facilitates SSO in the Exchange Network through a set of shared security services for authentication and access to all the Exchange Network nodes. Existing EPA resources, including Shared CROMERR Services, will be assessed to see if they can provide required functionality for distributed identity management and authentication services at the application level. Page 4 of 10 October 26, 2015
5 5. Assumptions There are three assumptions. They are as follows: 1. A federated identity solution is practical and feasible; 2. All objectives can be accomplished within 16 months; 3. The budget is sufficient to accomplish the objectives. 6. Constraints The constraints are that (1) the project must complete by May 31, 2017; (2) the project must complete on or below the budget; and (3) the developed solution must employ network, hardware, service, and applications systems already in place. 7. Risks If individual state solutions are non-complaint with CROMERR and other federal data and authentication and security standards, a federated solution may not be cost-effective and/or usable. Also, if partner states are unable or unwilling to fully disclose their SSO technical specifications and requirements, a complete, valid assessment will not be possible. An extensible, REST-based solution is optimal, but some states have not yet adopted the technology. These risks make a federated solution more complex and less efficient. 8. Project Deliverables The following table lists the key project deliverables: Deliverable Activity Target Date Outcome 1) EPA discovery and solutions assessment engagement for Federated Identity Management February 15, 1.1 Assess and document NAAS and Virtual CROMERR services. This task will require contractual staff hired by the host state to work with EPA s information technology staff in the form of interviews and review of system documentation to perform the necessary assessment of these services. This is the discovery portion of the EPA engagement and will require travel to the EPA worksite and collaboration with EPA s information technology staff. 1.2 Perform gap analysis between existing services and recommended tobe services. The recommended to-be services for NAAS and Virtual CROMERR will be identified as a result of work performed for Goal 5. March 31, Documentation of current as-is system from the perspective of application programming interfaces, technical requirements, functionality, and end-user interactions. Documentation that describes the additional or modified services needed for NAAS and Virtual CROMERR to meet the proposed future state documented in Goal 5. Verification of the technical feasibility of the proposed solution in the form of use cases and proof of concept code. Page 5 of 10 October 26, 2015
6 1.3 Identify and test high risk items from the gap analysis. This task will require to work with EPA s information technology staff to run use case analysis and perhaps develop proof of concept code to test portions of the proposed solution. This is the solutions portion of the EPA engagement and will require travel to the EPA worksite and collaboration with EPA s information technology staff. August 15, 2) Host state (New Mexico Environment Department) discovery and solutions assessment engagement for Federated Identity Management 2.1 Assess and document NMED Secure Extranet Portal (SEP) and associated single-sign on services for access to environmental information systems. This task will require contractual staff hired by the host state to work with NMED s information technology staff in the form of interviews and review of system documentation to perform the necessary assessment of these services. This is the discovery portion of the host state engagement and will require collaboration with NMED s information technology staff. February 16, Documentation of current as-is system from the perspective of application programming interfaces, technical requirements, functionality, and end-user interactions. Documentation that describes the additional or modified services needed for SEP to meet the proposed future state documented in Goal 5. Verification of the technical feasibility of the proposed solution in the form of use cases and proof of concept code. 2.2 Perform gap analysis between existing services and recommended tobe services. The recommended to-be services for SEP will be identified as a result of work performed for Goal 5. March 21, 2.3 Identify and test high risk items from the gap analysis. This task will require to work with NMED s information technology staff to run use case analysis and perhaps develop proof of concept code to test portions of the proposed solution. This is the solutions portion of the host state engagement. October 15, 3) Partner State Tennessee discovery and solutions assessment engagement for Federated 3.1 Assess and document Partner State Tennessee s single-sign on services for access to environmental information systems. This task will require to work with Tennessee s information technology staff in the form of August 20, Documentation of current as-is system from the perspective of application programming interfaces, technical requirements, functionality, and end-user interactions. Documentation that describes the additional or modified services Page 6 of 10 October 26, 2015
7 Identity Management interviews and review of system documentation to perform the necessary assessment of these services. This is the discovery portion of Tennessee s engagement and will require travel to Tennessee s worksite and collaboration with Tennessee s information technology staff. 3.2 Perform gap analysis between existing services and recommended tobe services. The recommended to-be services for Tennessee s Single Sign On System will be identified as a result of work performed for Goal Identify and test high risk items from the gap analysis. This task will require to work with State A s information technology staff to run use case analysis and perhaps develop proof of concept code to test portions of the proposed solution. This is the solutions portion of Tennessee s engagement and will require travel to Tennessee s worksite and collaboration with Tennessee s information technology staff. October 10, November 1, needed for Tennessee s Single Sign On system to meet the proposed future state documented in Goal 5. Verification of the technical feasibility of the proposed solution in the form of use cases and proof of concept code. 4) Partner State Wyoming discovery and solutions assessment engagement for Federated Identity Management 4.1 Assess and document Partner State Wyoming s single-sign on services for access to environmental information systems. This task will require to work with Wyoming s information technology staff in the form of interviews and review of system documentation to perform the necessary assessment of these services. This is the discovery portion of Wyoming s engagement and will require travel to Wyoming s worksite and collaboration with Wyoming s information technology staff. September 19, Documentation of current as-is system from the perspective of application programming interfaces, technical requirements, functionality, and end-user interactions. Documentation that describes the additional or modified services needed for Wyoming s Single Sign On system to meet the proposed future state documented in Goal 5. Verification of the technical feasibility of the proposed solution in the form of use cases and proof of concept code. 4.2 Perform gap analysis between existing services and recommended tobe services. The recommended to-be services for Wyoming s Single Sign On System will be identified as a result of work performed for Goal 5. October 16, Page 7 of 10 October 26, 2015
8 4.3 Identify and test high risk items from the gap analysis. This task will require to work with Wyoming s information technology staff to run use case analysis and perhaps develop proof of concept code to test portions of the proposed solution. This is the solutions portion of Wyoming s engagement and will require travel to Wyoming s worksite and collaboration with Wyoming s information technology staff. December 15, 5) Research, solutions assessment, recommendatio ns and presentations 5.1 Research current guidance and requirements from E-Enterprise Technical Architecture 5.2 Research industry solutions and gather input from experts in e- commerce 5.3 Propose interoperable Federated Identity Management Framework and iterate through the design with EPA and partner states to verify the feasibility of the solution. This will require collaborative work with partner states and EPA to finalize the design. December 13, January 25, 2017 February 21, 2017 Whitepapers comparing industry solutions, design documentation and technical specifications describing the proposed solution the future state Federated Identity Management Framework for interoperability, risk assessment of proposed new services recommended for EPA systems and partner systems, technical specifications and other E-Enterprise artifacts that will be submitted to the E-Enterprise Architecture Repository, and materials for presentation to the E-Enterprise Leadership Council and the Exchange Network Conference. 5.4 High risk components to the solution will be identified and proof of concept use cases will be developed. See tasks 1-3, 2-3, 3-3 and 4-3 above. See above tasks 5.5 Submit artifacts of the recommended solution to the E- Enterprise Architecture Repository. 5.6 Present findings, process, recommendations and outcome to Exchange Network Conference and the Enterprise Leadership Council. The host state, the two partner states and EPA will contribute to and participate in the presentations. April 1, 2017 May 15, 2017 Page 8 of 10 October 26, 2015
9 9. Project Milestones Milestone Date Milestone Name Milestone Description August 15, Deliverable 1 Completed EPA discovery and solutions assessment engagement for Federated Identity Management done October 15, Deliverable 2 Completed Host state (New Mexico Environment Department) discovery and solutions assessment engagement for November 1, December 15, Deliverable 3 Completed Deliverable 4 Completed Federated Identity Management completed Partner State Tennessee discovery and solutions assessment engagement for Federated Identity Management concluded Partner State Wyoming discovery and solutions assessment engagement for Federated Identity Management concluded April 1, 2017 Deliverable 5 Completed Research, solutions assessment and recommendations completed May 15, 2017 EN2017 National Meeting Present findings and recommendations at national conference 10. Project Manager The project manager is Bogi Malecki. Mr. Malecki is an NMED staff member with over 26 years of IT experience, including 20 years of IT project management. He has successfully led and completed over 100 IT projects and is PMI/PMBOK trained and credentialed. 11. Project Roles and Responsibilities Name Role Responsibilities Mark Morell Systems Integrator Bring together component subsystems into a whole and ensuring those subsystems function fully. Sam Jenkins Solutions Architect Interpret and translate the requirements into an information technology architecture for the solution. Create design artifacts that will be used by developers to implement the solution. Select the best technology for the presented problems. Tom McMichael Systems Analyst Specify the business, functional and technical requirements. Review alternative technologies and technological approaches and recommend possible solutions. Evaluate proposed procedures and processes to develop solutions. Help develop project documentation. Karen Craner Technical Writer Organize, clarify and document all technical requirements and specifications. Page 9 of 10 October 26, 2015
10 12. Project Approach The project approach will be to execute four project engagements with outlined goals and tasks. Three of the engagements will be Exchange Network state partner engagements including the host state. The engagements will perform extensive architecture and design analysis and discovery on existing state system Single Sign On Systems, document the current functionality, capability and technology in use, perform a gap analysis on the existing system, and present recommendations for modifications to achieve the proposed future state. One of the engagements will be with EPA to perform analysis and discovery on the existing Single Sign on in use for the Exchange network partners, NAAS, and to assess the service offering of the Virtual CROMERR system to then develop a proposed future state that incorporates the requirements from the partner states. Gap analysis on the EPA system and recommendations will be documented and presented. Some prototype work is expected in order to verify and further define some of the proposed recommendations. The project methodology and outcomes will be presented at the FY17 Exchange Network Conference and to the E-Enterprise Leadership Council. 13. Authorization Provide the names of those business sponsors that must sign the Project Charter. Once the project Charter is signed by the project sponsors, the project is authorized to start. Approved by the Project Sponsor: Mary Montoya Date: CIO, New Mexico Environment Department Page 10 of 10 October 26, 2015
Enterprise Identity Management Connie Dwyer, US EPA Steve Girt, Wyoming DEQ Luke Gentry, CGI Federal, Inc.
Enterprise Identity Management Connie Dwyer, US EPA Steve Girt, Wyoming DEQ Luke Gentry, CGI Federal, Inc. 2015 Exchange Network National Meeting Supporting the Business of Environmental Protection September
More informationSystems Development Life Cycle (SDLC)
DEPARTMENT OF BUDGET & MANAGEMENT (SDLC) Volume 1 Introduction to the SDLC August 2006 Table of Contents Introduction... 3 Overview... 4 Page 2 of 17 INTRODUCTION 1.0 STRUCTURE The SDLC Manual consists
More informationCAREER TRACKS PHASE 1 UCSD Information Technology Family Function and Job Function Summary
UCSD Applications Programming Involved in the development of server / OS / desktop / mobile applications and services including researching, designing, developing specifications for designing, writing,
More informationCareer Tracks- Information Technology Family
Career Tracks- Information Technology Family FUNCTIONAL AREA Applications Programming AV IT AV IT Engineering Bioinformatics Involved in the development of server/os/desktop/mobile applications and services
More informationInteragency Interoperability Oversight Group
Interagency Interoperability Oversight Group DOI-USDA/FS Access / Authentication Project Charter 1. Project Overview It is well known that the wildland firefighting community is a highly integrated, cooperative
More informationTime Monitoring Tool Software Development Plan. Version <1.1>
Time Monitoring Tool Software Development Plan Version Revision History Date Version Description Author 10/01/01 1.0 First Draft Sabrina Laflamme 12/01/01 1.1 Completion of Document John Lemon Page
More informationProgram Lifecycle Methodology Version 1.7
Version 1.7 March 30, 2011 REVISION HISTORY VERSION NO. DATE DESCRIPTION AUTHOR 1.0 Initial Draft Hkelley 1.2 10/22/08 Updated with feedback Hkelley 1.3 1/7/2009 Copy edited Kevans 1.4 4/22/2010 Updated
More informationTipping the Mainframe for a Connected Enterprise
Tipping the Mainframe for a Connected Enterprise Stop Rebuilding Capabilities and Start Delivering Solutions with EngagePoint Architect Suite. EngagePoint Architect Suite Ready-to-go solutions focused
More informationSoftware Engineering Reference Framework
Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of
More informationProcess Validation Workshops. Overview Session
Process Validation Workshops Overview Session 2 Session Objectives: Prepare staff for participating in a Process Validation Workshop Clarify the Purpose of Process Validation Workshops Clarify Expected
More informationEnterprise Directory Project Pre-Feasibility Study Information and Educational Technology
UC DAVIS: OFFICE OF THE VICE PROVOST INFORMATION & EDUCATIONAL TECHNOLOGY Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology Background Unprecedented growth and an
More informationHow To Write An Slcm Project Plan
SLCM 2003.1 Artifacts in a Nutshell ( as of 01/21/2005) Project Development Phases Pension Benefit Guaranty Corporation s (PBGC) System Life Cycle Methodology (SLCM) is comprised of five project development
More informationDepartment of Homeland Security Office of Inspector General. Review of U.S. Coast Guard Enterprise Architecture Implementation Process
Department of Homeland Security Office of Inspector General Review of U.S. Coast Guard Enterprise Architecture Implementation Process OIG-09-93 July 2009 Contents/Abbreviations Executive Summary...1 Background...2
More informationIT Project: System Implementation Project Template Description
2929 Campus Drive Suite 250 IT Project: System Implementation Project Template Description Table of Contents Introduction... 2 Project Phases... 3 Initiation & Requirements Gathering Milestone... 3 Initiation
More informationGlendale Community College Microsoft Office SharePoint Server 2007 Initiative Vision/Scope Document. Version 1.0
ware Architects, Inc. Proposal to XXXXX Date Glendale Community College Microsoft Office SharePoint Server 2007 Initiative Vision/Scope Document Software Architects, Inc. Proposal to XXXXX Date Version
More informationPractice Overview. REQUIREMENTS DEFINITION Issue Date: <mm/dd/yyyy> Revision Date: <mm/dd/yyyy>
DEPARTMENT OF HEALTH AND HUMAN SERVICES ENTERPRISE PERFORMANCE LIFE CYCLE FRAMEWORK PRACTIICES GUIIDE REQUIREMENTS DEFINITION Issue Date: Revision Date: Document
More informationSoftware Quality Assurance Plan
For Database Applications Document ID: Version: 2.1a Planning Installation & Acceptance Integration & Test Requirements Definition Design Development 1 / 54 Copyright 2000-2006 Digital Publications LLC.
More informationPrintshop Workflow Automation System
Fictitious Corp. Software Project Plan Revision 1 Printshop Workflow Automation System CEN4021 Spring 2010 Professor: Masoud Sadjadi Paul White 16 th February 2010 TABLE OF CONTENTS 1 Overview... 3 1.1
More informationProject Management Plan for
Project Management Plan for [Project ID] Prepared by: Date: [Name], Project Manager Approved by: Date: [Name], Project Sponsor Approved by: Date: [Name], Executive Manager Table of Contents Project Summary...
More informationGovernment's Adoption of SOA and SOA Examples
Government's Adoption of SOA and SOA Examples Presented by : Ajay Budhraja, Chief of Enterprise Services ME (Engg), MS (Management), PMP, CICM, CSM, ECM (Master) AIIM, ITIL-F Copyright 2008 Ajay Budhraja
More informationHow To Develop An Enterprise Architecture
OSI Solution Architecture Framework Enterprise Service Center April 2008 California Health and Human Services Agency Revision History REVISION HISTORY REVISION/WORKSITE # DATE OF RELEASE OWNER SUMMARY
More informationEstablishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology
Establishing A Multi-Factor Authentication Solution Report to the Joint Legislative Oversight Committee on Information Technology Keith Werner State Chief Information Officer Department of Information
More informationIdentity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management An information exchange For Information Security and Privacy Advisory Board Deb Gallagher
More informationHRMS - HRMS Charter - AI.18. Project Charter Human Resource Management System (HRMS) Replacement - Implementation Project Number: 2209.
Project Charter Human Resource Management System (HRMS) Replacement - Implementation Project Number: 2209 Final Version: 1.0 Date: June 5, 2012 Distribution List: Name Dan Guimond MaryAnn Kempe Heather
More informationDevelopment, Acquisition, Implementation, and Maintenance of Application Systems
Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of
More informationPresented By: Leah R. Smith, PMP. Ju ly, 2 011
Presented By: Leah R. Smith, PMP Ju ly, 2 011 Business Intelligence is commonly defined as "the process of analyzing large amounts of corporate data, usually stored in large scale databases (such as a
More informationFixed Scope Offering for Oracle Fusion HCM. Slide 1
Fixed Scope Offering for Oracle Fusion HCM Slide 1 Today s Business Challenges Adopt leading Global HCM practices. Streamline the HCM processes and achieve measurable efficiencies. Achieve HR excellence
More informationMontana Department of Transportation Information Services Division. System Development Life Cycle (SDLC) Guide
Montana Department of Transportation Information Services Division System Development Life Cycle (SDLC) Guide Version 2 August 2, 2007 \mdt_sdlc_process\mdt_sdlc_v02.doc Table of Contents 1 Business Analysis...3
More informationGartner, Inc. DIR-SDD-2042
Texas Department of Information Resources STATEMENT OF WORK (SOW) FOR DELIVERABLES-BASED INFORMATION TECHNOLOGY SERVICES Identity & Access Management Analysis IT Assessment & Planning Gartner, Inc. DIR-SDD-2042
More informationEnterprise Content Management
The State Bar of California Enterprise Content Management Request for Proposal: Questions & Responses April 4, 2014 1. What do you consider to be the top three critical success factors for this project?
More informationOpenbravo Services for Partners
Openbravo for Partners A pure channel organization devoted to Partner success # Devoted to Partner Success Openbravo for Partners are especially designed to accelerate partners practice towards business
More informationAbout ERP Software Whitepaper
About ERP Software Whitepaper Many people have heard the term ERP used in a conversation but don t fully understand what it means. This whitepaper will provide information about the processes and advantages
More informationKnowledge Base Data Warehouse Methodology
Knowledge Base Data Warehouse Methodology Knowledge Base's data warehousing services can help the client with all phases of understanding, designing, implementing, and maintaining a data warehouse. This
More informationAttachment 3: Questions and Answers
Attachment 3: Questions and Answers I. OVERVIEW A. VISION & MISSION For 20 years, USAC has engaged stakeholders and applicants for funding in what has increasingly become a digital landscape. Seven months
More informationFrom Chaos to Clarity: Embedding Security into the SDLC
From Chaos to Clarity: Embedding Security into the SDLC Felicia Nicastro Security Testing Services Practice SQS USA Session Description This session will focus on the security testing requirements which
More informationWhat Business and Process Analysts Need to Know About BPM Suites
What Business and Process Analysts Need to Know About BPM Suites Bruce Silver Principal, Bruce Silver Associates and BPMS Watch 1 Agenda What is a BPMS? Specifying BPM requirements What BA s need to understand
More informationSCOPE MANAGEMENT PLAN <PROJECT NAME>
SCOPE MANAGEMENT PLAN TEMPLATE This Project Scope Management Plan Template is free for you to copy and use on your project and within your organization. We hope that you find this template useful and welcome
More informationModule 11 Stakeholder Management PMP Exam Questions
Module 11 Stakeholder Management PMP Exam Questions PMP, PMBOK and the Registered Education Provider logo are registered marks of the Project Management Institute, Inc Question 1 You are the project manager
More informationEllucian Implementation Methodology. Summary of Project Management and Solution Delivery Phases
Ellucian Implementation Methodology Summary of Project Management and Solution Delivery Phases Rev. 5/10/2013 Table of Contents Overview 3 Project Management Initiation 4 Planning 5 Execution 6 Monitor
More informationRe: RFP # 08-X-39202 MOTOR VEHICLE AUTOMATED TRANSACTION SYSTEM (MATRX) FOR MVC ADDENDUM #10
State of New Jersey DEPARTMENT OF THE TREASURY JON S. CORZINE DIVISION OF PURCHASE AND PROPERTY BRADLEY I. ABELOW Governor PURCHASE BUREAU State Treasurer P.O. BOX 230 TRENTON, NEW JERSEY 08625-0230 September
More informationInstitutional Data Recommendations for UC Berkeley: A Roadmap for the Way Forward
InstitutionalDataRecommendations forucberkeley: ARoadmapfortheWayForward June29,2009 Preparedby:MaryBethBaker,ExternalConsultant InstitutionalDataRoadmap,06/29/09 1 I. OVERVIEW of INSTITUTIONAL DATA RECOMMENDATIONS
More informationCalifornia Department of Mental Health Information Technology Attention: MHSA-IT 1600 9 th Street, Room 141 Sacramento, CA 95814
IT Project Status Report For an MHSA-Funded IT Project Please send the Signed Original to the following address: California Department of Mental Health Information Technology Attention: MHSA-IT 1600 9
More informationPROJECT SCOPE STATEMENT
PROJECT SCOPE STATEMENT Note: Any work not explicitly included in the Project Scope Statement is implicitly excluded from the project. Project Name: Prepared by: BI - IT Governance Amy Winkel Date: 12/20/2010
More informationCharter & Scope Statement Web & Portal Redesign. Brookdale Community College
Charter & Scope Statement Web & Portal Redesign Brookdale Community College May October, 2012 Table of Contents PROJECT PURPOSE AND JUSTIFICATION 3 EXECUTIVE SUMMARY 3 PROJECT SCOPE AND DELIVERABLES PROJECT
More informationDomain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
More informationTools for Managing and Measuring the Value of Big Data Projects
Tools for Managing and Measuring the Value of Big Data Projects Abstract Big Data and analytics focused projects have undetermined scope and changing requirements at their core. There is high risk of loss
More informationQuality Assurance. Ministry of Community Development and Ministry of Tourism, Culture and the Arts
Ministry of Community Development and Ministry of Date: August 2006 Prepared By: Fredo Vanlierop Project: CAWS Standards Documentation Harvest Package Name: Harvest Version: Contract: N/A 1 Document Revision
More informationWyoming DEQ Envite CROMERR Solution
Wyoming DEQ Envite CROMERR Solution (Cross-Media Electronic Reporting Regulation) EN2014 - February 26, 2014 2 In the early days CROMERR was one of those acronyms that was just hard to spell and something
More informationRequest for Proposal to
Request for Proposal to ( 2016 /ح ك/ 3 ) No. Tender General Response for All Raised Questions Taking into consideration the requirements outlined in the RFP and this Q&A document, bidders need to respond
More informationProject Charter. Ben Canlas, Bobbi Walker & Tom North. Project Charter Version Control
Project Charter Project Name: PeopleSoft Expense 9.0 Module Implementation UM Business Unit: UMSYS Department: Division of IT: Enterprise Applications Services Strategic Priority: FY08 Strategic Goal #2
More informationGeneral Problem Solving Model. Software Development Methodology. Chapter 2A
General Problem Solving Model Software Development Methodology These focus on understanding what the problem is about Chapter 2A Concerned with understanding more about the nature of the problem and possible
More informationAppendix 2-A. Application and System Development Requirements
Appendix 2-A. Application and System Development Requirements Introduction AHRQ has set up a Distributed Systems Engineering Lab (DSEL) to support all internal development efforts and provide a facility
More informationOnline Chapter A The Role of the Systems Analyst
Systems Analysis and Design in a Changing World, sixth edition A-1 Online Chapter A The Role of the Systems Analyst Table of Contents Chapter Overview Learning Objectives Why read this chapter? This chapter
More informationU.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment
U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE Privacy Impact Assessment Enterprise Software Services PTOI-020-00 July 8, 2015 Privacy Impact Assessment This Privacy Impact Assessment
More informationPHASE 6: DEVELOPMENT PHASE
PHASE 6: DEVELOPMENT PHASE The Phase features a key step in the project: system construction. The previous phases lay the foundation for system development; the following phases ensure that the product
More informationClassical Software Life Cycle Models
Classical Software Life Cycle Models SWEN 301 Trimester 1, 2015 Lecturer: Dr Hui Ma Engineering and Computer Science Lecture slides make use of material provided on the textbook's companion website Motivation
More informationRUP Design. Purpose of Analysis & Design. Analysis & Design Workflow. Define Candidate Architecture. Create Initial Architecture Sketch
RUP Design RUP Artifacts and Deliverables RUP Purpose of Analysis & Design To transform the requirements into a design of the system to-be. To evolve a robust architecture for the system. To adapt the
More informationOverview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
More informationUser experience prototype requirements PROJECT MANAGEMENT PLAN
Tallinn University Institute of Informatics User experience prototype requirements PROJECT MANAGEMENT PLAN Authors Roger Puks Erkki Saarnit Ekaterina Shafeeva Maria Angelica Medina Angarita Lecturer Peeter
More informationMinnesota Health Insurance Exchange (MNHIX)
Minnesota Health Insurance Exchange (MNHIX) 1.2 Plan September 21st, 2012 Version: FINAL v.1.0 11/9/2012 2:58 PM Page 1 of 87 T A B L E O F C O N T E N T S 1 Introduction to the Plan... 12 2 Integration
More informationGOVERNMENT USE OF MOBILE TECHNOLOGY
GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...
More informationCHAPTER 3: MANAGING IMPLEMENTATION PROJECTS
Chapter 3: Managing Implementation Projects CHAPTER 3: MANAGING IMPLEMENTATION PROJECTS Objectives Introduction The objectives are: Describe common problems that occur in implementation projects. Describe
More informationOffice of the Chief Information Officer Department of Energy Identity, Credential, and Access Management (ICAM)
Department of Energy Identity, Credential, and Access Management (ICAM) Cyber Security Training Conference Tuesday, May 18, 2010 1 Announcement LACS Birds-of-a-Feather Session Logistics Wednesday, May
More informationNASCIO EA Development Tool-Kit Solution Architecture. Version 3.0
NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5
More informationComputing & Communications Services
2010 Computing & Communications Services 2010 / 10 / 04 Final Kent Percival, M.Sc., P.Eng. Defining the Value of the Business Analyst In achieving its vision, key CCS partnerships involve working directly
More informationITS Project Management Methodology
ITS Project Management Methodology Standards and Guidelines for managing projects at Information Technology Services, NYU July, 2008 Version 1.4 TABLE OF CONTENTS 1 INTRODUCTION.3 1.1 Overview..3 1.2 Purpose....3
More informationORIGINAL PLAN DATE: MARCH 1, 2012 REVISION DATE: REVISION:
WATER RIGHTS BUSINESS PROCESS MANAGEMENT SYSTEM PROJECT CHARTER FOR CERTIFICATION EXECUTIVE SPONSORS: RENEE MARTINEZ, CHIEF INFORMATION OFFICE JOHN ROMERO, WATER RIGHTS DIVISION CHIEF BUSINESS OWNER WRAP
More informationPROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME >
PROJECT MANAGEMENT PLAN TEMPLATE < PROJECT NAME > Date of Issue: < date > Document Revision #: < version # > Project Manager: < name > Project Management Plan < Insert Project Name > Revision History Name
More informationEnterprise Architecture Governance Procedure
Governance Procedure Adrian Hollister Head of Strategy and Craig Douglas Architect 26 February 2014 Version Control Version Date Detail Contributor 0.1 26/2/2014 Initial Document CJD 0.2 14/3/2014 Amended
More informationCustom Software Development Approach
Custom Software Development Approach Our approach to custom software development combines benefits from several standard development process models. We tend to have a well-defined, predictable and highly
More informationProject Management Best Practices: Key Processes and Common Sense
Copyright and Material Usage Guidelines January 30, 2003 Project Management Best Practices: Key Processes and Common Sense Giga Position Margo Visitacion Organizations continue to look for the key to unlocking
More informationAgile Master Data Management TM : Data Governance in Action. A whitepaper by First San Francisco Partners
Agile Master Data Management TM : Data Governance in Action A whitepaper by First San Francisco Partners First San Francisco Partners Whitepaper Executive Summary What do data management, master data management,
More informationSECUREAUTH IDP AND OFFICE 365
WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that
More informationTraventec. September 2004. Technology Feature. Roadmap for Adoption of Service Oriented Architecture
Traventec September 2004 Technology Feature Roadmap for Adoption of Service Oriented Architecture ROADMAP FOR ADOPTION OF SERVICE ORIENTED ARCHITECTURE... 2 1. INTRODUCTION...2 2. GET PEOPLE INVOLVED...2
More informationThe Data Integration Strategy
White Paper The Data Integration Strategy Take Aim Before You Shoot Introduction Much has been written about the need to align business and technology, but that alignment has to begin up front. In fact,
More informationImproved Management Practices Needed to Increase Use of Exchange Network
OFFICE OF INSPECTOR GENERAL Audit Report Catalyst for Improving the Environment Improved Management Practices Needed to Increase Use of Exchange Network Report No. 2007-P-00030 August 20, 2007 Report Contributors:
More informationAssumptions. It is assumed that:
It is assumed that: Assumptions 1. The State will establish a MICAM project steering committee to oversee the progress of the project. This steering committee will have representation from Contractor.
More informationSAN DIEGO CITY SCHOOLS Office of the Superintendent. District Wide Applications November 12, 2002
SAN DIEGO CITY SCHOOLS Office of the Superintendent District Wide Applications November 12, 2002 Introductory Statement After extensive analysis, staff has negotiated with vendors the software, hardware,
More informationExtended Enterprise Architecture Framework Essentials Guide
Extended Enterprise Architecture Framework Essentials Guide Editorial Writer: J. Schekkerman Version 1.5 2006 Preface An enterprise architecture (EA) establishes the organization-wide roadmap to achieve
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 4630.09 July 15, 2015 DoD CIO SUBJECT: Communication Waveform Management and Standardization References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues
More informationDocumentation Management Portal Implementation Statement of Work
Documentation Management Portal Implementation Statement of Work Prepared For: State of Michigan Department of Community Health 400 South Pine Street Lansing, Michigan 48909 Prepared By: CNSI 6465 Millennium
More informationIT Services Management Service Brief
IT Services Management Service Brief Release Management Prepared by: Rick Leopoldi May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction of content is strictly forbidden.
More informationOracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003
Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity
More informationMigrating and consolidating even the simplest of data
CALIBRE An Employee-Owned Management and Technology Services Company 6354 Walker Lane, Suite 300, Metro Park Alexandria, Virginia 22310-3252 USA p. 703.797.8500 or 1.888.CALIBRE international p. 011.1.888.CALIBRE
More informationDraft Requirements Management Plan
BAO111: Core Competencies for the Business Analyst Draft Requirements Management Plan 1.0 INTRODUCTION 1.1 Purpose This document outlines requirements roles and responsibilities, presents a stakeholder
More informationFoundations for Systems Development
Foundations for Systems Development ASSIGNMENT 1 Read this assignment introduction. Then, read Chapter 1, The Systems Development Environment, on pages 2 25 in your textbook. What Is Systems Analysis and
More informationA discussion of information integration solutions November 2005. Deploying a Center of Excellence for data integration.
A discussion of information integration solutions November 2005 Deploying a Center of Excellence for data integration. Page 1 Contents Summary This paper describes: 1 Summary 1 Introduction 2 Mastering
More informationLDAP Authentication Configuration Appendix
1 Overview LDAP Authentication Configuration Appendix Blackboard s authentication technology is considered a focal point in the company s ability to provide true enterprise software. Natively, the Blackboard
More informationPHASE 8: IMPLEMENTATION PHASE
PHASE 8: IMPLEMENTATION PHASE The Implementation Phase has one key activity: deploying the new system in its target environment. Supporting actions include training end-users and preparing to turn the
More informationSoftware Configuration Management Plan
For Database Applications Document ID: Version: 2.0c Planning Installation & Acceptance Integration & Test Requirements Definition Design Development 1 / 22 Copyright 2000-2005 Digital Publications LLC.
More informationEnterprise Content Management - ECM Program for New Mexico State Government
Enterprise Content Management - ECM Program for New Mexico State Government a.k.a. ELECTRONIC DOCUMENT MANAGEMENT SYSTEM (EDMS) ELECTRONIC RECORDS MANAGEMENT SYSTEM (ERMS) Informational Presentation to
More informationPost-Implementation Review
Table of Contents 1. Post Implementation Review ()... 1 1.1. What is a Post Implementation Review?...1 1.2. Why is the Used?... 1 1.3. Where does a fit in?... 2 1.4. What constitutes the process?... 2
More informationIT Services Management Service Brief
IT Services Management Service Brief Capacity Management Prepared by: Rick Leopoldi May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction of content is strictly forbidden.
More informationQlik UKI Consulting Services Catalogue
Qlik UKI Consulting Services Catalogue The key to a successful Qlik project lies in the right people, the right skills, and the right activities in the right order www.qlik.co.uk Table of Contents Introduction
More informationREQUEST FOR INFORMATION. Identity and Access Management Administration Software RFI 2012-44
REQUEST FOR INFORMATION FOR Identity and Access Management Administration Software RFI 2012-44 Florida Department of Education 325 West Gaines Street Tallahassee, Florida 32399-0400 Please email submissions
More informationMarch 22, 2002 Audit Report No. 02-008. The FDIC s Efforts To Implement a Single Sign-on Process
March 22, 2002 Audit Report No. 02-008 The FDIC s Efforts To Implement a Single Sign-on Process 1 Federal Deposit Insurance Corporation Washington, D.C. 20434 Office of Audits Office of Inspector General
More informationOrganising, planning and scheduling software projects. Software management distinctions
Project management Organising, planning and scheduling software projects Software management distinctions The product is intangible The product is uniquely flexible Software engineering is not recognized
More informationOE PROJECT CHARTER TEMPLATE
PROJECT : PREPARED BY: DATE (MM/DD/YYYY): Project Name Typically the Project Manager Project Charter Last Modified Date PROJECT CHARTER VERSION HISTORY VERSION DATE (MM/DD/YYYY) COMMENTS (DRAFT, SIGNED,
More informationCrosswalk Between Current and New PMP Task Classifications
Crosswalk Between Current and New PMP Task Classifications Domain 01 Initiating the Project Conduct project selection methods (e.g., cost benefit analysis, selection criteria) through meetings with the
More informationApproaches to Successfully Implementing Statewide ERP
Approaches to Successfully Implementing Statewide ERP August 24, 2015 NASACT Clark Partridge, State of Arizona Michael J. Smarik, State of Arizona Daniel Keene, CGI James Colbert, CGI Agenda Statewide
More information