Enterprise Architecture

Size: px
Start display at page:

Download "Enterprise Architecture"

Transcription

1 Enterprise Architecture Management Plan DoD Conference 3 May 2012 Brian Wilczynski Director, Architecture & Interoperability Office of the DoD CIO brian.wilczynski@osd.mil

2 DoD Enterprise Business Warfighting g Intelligence Information Enterprise Army DON Air Force Dept of Air Force DIA NGA NRO NSA DLA DISA COC COMS Reference Models OMB F DARS Tools DITPR Tech Stds DISR Arch Guidance DODAF Laws, Regs, and Policy Laws Regs Policy 2

3 Reference Architecture Description Enterprise-wide Access to Network and Collaboration Services Reference Architecture Overview and Summary Information (AV-1) Strategic Purpose Principles Department of Defense Enterprise-wide Access to Network and Collaboration Services (NCS) Prepared by the Office of the DoD CIO Reference Architecture Version 3.0 December Architecture Product Identification 1.1 Name: Enterprise-wide Access to Network and Collaboration Services (NCS) 1.2 Lead Organization: Department of Defense Deputy Chief Information Officer. The Enterprise Services Review Group (ESRG), as the architecture owner, is responsible for architecture content and will provide overall coordination to ensure appropriate stakeholders and subject-matter experts are available; the Enterprise Reference Architecture Cell (ERAC), with oversight from the Architecture and Standards Review Group (ASRG), will support the development of appropriate architecture artifacts. 1.3 Approval Authority: DoD CIO Enterprise Guidance Board (EGB) 2 Purpose and Perspective 2.1 Purpose. A Reference Architecture (RA) abstracts and normalizes the institutional understanding of capabilities at the enterprise level, and provides a common set of principles, technical positions, and patterns for use within the DoD to guide development of Enterprise, Segment, or Solution architectures. AV-1 (Overview and Summary) OV-5a (Activity Decomposition) Vocabulary Patterns OV-1 (Concept Consumer & Provider) OV-6c (Event-Trace Description) AV-2 2(Integrated t Dictionary) OV-6a (Operational Rules Model) GROUP TYPE NAME Technical DESCRIPTION Positions OMB Policy M This guidance requires agencies to review new and existing electronic transactions to ensure that authentication processes provide the appropriate level of assurance. It establishes and describes four levels of identity assurance for electronic transactions requiring authentication. Assurance levels also provide a basis for assessing Credential Service Providers (CSPs) on behalf of Federal agencies. This document will assist agencies in determining their e- government needs. Agency business-process owners bear the primary responsibility to identify assurance levels and strategies for providing them. This responsibility extends to electronic authentication systems. OMB Policy M This memo requires the use of a shared service provider to mitigate the risk of commercial managed services for public key infrastructure (PKI) and electronic signatures. OMB Policy M This memorandum provides implementing instructions for HSPD-12 and FIPS-201. OMB Policy M This memorandum provides updated direction for the acquisition of products and services for the implementation of Homeland Security Presidential Directive-12 (HSPD-12) Policy for a Common Identification Standard for Federal Employees and Contractors and also provides status of implementation efforts. Presidential Policy HSPD-12 HSPD-12 calls for a mandatory, government- Directive wide standard for secure and reliable forms of ID issued by the federal government to its employees and employees of federal contractors for access to federally-controlled facilities and networks. NIST Guidance SP This document provides the organizational codes for federal agencies to establish the Federal Agency Smart Credential Number (FASC-N) that is required to be included in the FIPS 201 Card Holder Unique Identifier. SP is a companion document to FIPS 201. StdV-1 (Standards Profile) 3

4 Reference Architecture Enterprise-wide Access to Network & Collaboration Services RA (NCS RA) I Reference Architectures Brief Description Guides, standardizes, and enables the implementation of authentication and authorization capabilities to access collaboration services in support of secure information sharing across the Department. Remarks Approved Aug 2010 Active Directory Guides the transformation of legacy Windows networks that use AD Approved Feb 2011 Optimization RA (ADORA) to improve security, facilitate secure info sharing across networks, and achieve efficiencies through network consolidation. IT Infrastructure Optimization RA (ITIORA) Guides the optimization of the DoD IT Infrastructure with a focus on Defense ITIL services and management processes. Waiting Approval Core Data Center RA (CDC Defines & standardizes necessary attributes for Core DoD Under development; RA) computing Centers integrating DoD cloud and server virtualization Formal review planned concepts. for Mar-Apr 2012 Network Optimization RA (NORA) Unified Capabilities RA (UC RA) Future Mission Network RA (FMN RA) Guides the implementation of joint networks using network Under development; virtualization or federation techniques and leveraging regional Formal review planned boundary protection (TLA) concepts. for Mar-Apr 2012 Guides implementation and acquisition plans for phasing in voice and video over IP services, and other UC operating on converged networks. Analyzes services (C4 infrastructure and enterprise) required to support FMN, evaluate as is programs and initiatives ability to support these services, and develop DoD-level to be recommendations Under development; Formal review planned for Mar-Apr 2012 Under Development 4

5 CV-2: Capability Taxonomy 5

6 Reference Architecture DoD I 6

7 A Few Conference Themes What must architects respond to: Operational Context Interoperability Shared/Common infrastructure Joint Information Enterprise (JIE) Future Mission Network (FMN) Information/Data sharing Agility Mapping (MG Rudesheim) 7

8 MITRE Assessment Stakeholder interviews i conducted d in November 2011 Outbriefs conducted in December 2011 Follow on tasks include the development of an Management Plan Develop Enterprise Roadmaps 8

9 Summary of Stakeholder Comments from Interviews Approaches are largely driven from the bottom up Outcomes not clearly defined/prioritized More emphasis on the overall --- all Mission Areas Published RAs should be updated and require expansion in some technology areas In-work RAs are needed, but cultural and policy issues need to be considered along with technology Focus on transition plans Provide better capability to discover and share architecture content Establish an Agile Architecting ti methodology/approach h Focus on consolidation and interoperability 9

10 Drivers (Guiding Development and Use) Developing the Management Plan Federal DoD Program Framework Strategy, Strategy, Mandates, Mandates, Guidance Guidance Development Required Outcomes Management Plan Contents of the Management Plan Stakeholder and Use Analysis Development Process Architecture Framework and Patterns Governance Plan Communications Plan Metrics Workforce Today (As-Is) Time Phased Transition Future (To-Be) Repositories: Standards, etc. Use Requirements Programming, Planning, and Budgeting Acquisition Key Initiatives (e.g. IT Consolidation) Policy Compliance 10

11 Synchronizing Delivery of Solutions Common Situation - Uncoordinated Acquisition and Fielding Acquire FOC FIX Delivery Starts Acquire A Better Way - Integrated Roadmaps FOC Enterprise Mission Area and Component Architectures Integrated Requirements Coordinated Budgets Coordinated Contracting Coordinated Acquisition Integrated Fielding Coordinated Development, Delivery & Fielding Integrated Roadmaps Guide Joint Interoperable Solutions -- Faster and at Lower Cost 11

12 Federation - Managing the Seams DCMO Develop JS Develop USD (I) Develop & Approve & Approve & Approve Business Warfighting Intelligence Architecture Architecture Architecture DoD CIO CO Integrate Information Enterprise Architecture DoD CO CIO Develop & Approve Department Of The Army Department Of The Navy Department Of The Air Force Dept of Air Force DIA NGA NRO NSA DLA DISA COC COMS Components Align Reference Models OMB F DARS Tools DITPR Tech Stds DISR Arch Guidance DODAF Laws, Regs, and Policy Laws Regs Policy DoD CIO Provide 12

13 Enterprise Roadmaps Mission Owner s Products Based on Mission Processes Enterprise Product DoD Time Phased Transition Plan Capabilities Roadmaps JPR Systems Roadmaps coordinated and integrated yields Today (As-Is) Time Phased Transition Future (To-Be) Capability and system changes should be captured in enterprise roadmaps Roadmaps should be used to support decision making by: Providing executive view across capabilities and systems for senior leaders Identifying and tracking key decision points involving multiple capabilities and systems Supporting and reflecting enterprise level investment tradeoff decisions Mission Area and Component products are integrated into an enterprise roadmap by the DoD CIO to maximize re-use, interoperability, and investment management 13

14 Near-Term Strategy Complete I v2.0 and current Reference Architectures (RA) Pursue continued RA development in a decentralized manner Shift focus toward cross-mission Area integration managing g the seams Review current approach to governance and adjust to align with strategic objectives 14

Role of Reference Architectures

Role of Reference Architectures Role of Reference Architectures Steven J. Ring sring@mitre.org Principal Information Engineer Enterprise Architecture Certificate, NDU Chief Information Officer Certificate, NDU March 5, 2015 MITRE Approved

More information

What s What Ahead For Architectures in the DoD? Mr. Dav Da e v DeVr DeV ies Mr. Martin Westphal

What s What Ahead For Architectures in the DoD? Mr. Dav Da e v DeVr DeV ies Mr. Martin Westphal What s Ahead For Architectures in the DoD? Mr Dave DeVries Mr. Dave DeVries Mr. Martin Westphal What Has Happened Organization changes and declining budgets Progress made in Electronic Health Record Data

More information

Joint Training Enterprise Architecture

Joint Training Enterprise Architecture Joint Training Enterprise Architecture WJTSC M&S WG 19 September 2012 Mandate for Change Reduce JLVC Operating & Sustainment Costs Keep pace with the operating environment Joint Force 2020 CE2T2 Program

More information

Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0

Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0 Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0 Volume I Management Overview of the DoD IEA July 2012 Prepared by: Department of Defense Office of the Chief Information

More information

Core Data Center Reference Architecture

Core Data Center Reference Architecture Core Data Center Reference Architecture DoD Enterprise Architecture Conference 2012 Office of the Chief Information Officer Topics Background DoD CIO Vision for Core Data Centers Core Data Center Reference

More information

DEPARTMENTAL REGULATION

DEPARTMENTAL REGULATION U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information

More information

Federal Enterprise Architecture Using EA to Design Future-Ready Agencies and Implement Shared Services

Federal Enterprise Architecture Using EA to Design Future-Ready Agencies and Implement Shared Services Federal Enterprise Architecture Using EA to Design Future-Ready Agencies and Implement Shared Services Scott A. Bernard, Ph.D. Scott_Bernard@omb.eop.gov Federal Chief Enterprise Architect Executive Office

More information

Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board

Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management An information exchange For Information Security and Privacy Advisory Board Deb Gallagher

More information

DoD CIO ITSM Overview Enterprise Architecture Conference

DoD CIO ITSM Overview Enterprise Architecture Conference DoD CIO ITSM Overview Enterprise Architecture Conference April 14, 2011 Barbara McCain Enterprise Architecture & Infrastructure DoD CIO Barbara.McCain@osd.mil What is IT Service Management (ITSM)? ITSM

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8440.01 December 24, 2015 DoD CIO SUBJECT: DoD Information Technology (IT) Service Management (ITSM) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority

More information

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 CHEF INFORMATION OFFICER FEB 0 8 2013 MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT: Department of Defense Unified Capabilities Reference

More information

Improved Mapping and Modeling of Defense Domain Architectures Backup slides

Improved Mapping and Modeling of Defense Domain Architectures Backup slides Improved Mapping and Modeling of Defense Domain Architectures Backup slides Benton Ben K Bovée Senior Enterprise Architect Principal, Patterndigm 26 Apr 2012, 11:15-12:00 DM2 on IDEF0 Slide 2 Reference:

More information

Interagency Advisory Board Meeting Agenda, March 5, 2009

Interagency Advisory Board Meeting Agenda, March 5, 2009 Interagency Advisory Board Meeting Agenda, March 5, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Federal Identity, Credential, and Access Management (ICAM) The Future of the Government s IDM Strategy

More information

Federal Identity, Credentialing, and Access Management. Identity Scheme Adoption Process

Federal Identity, Credentialing, and Access Management. Identity Scheme Adoption Process Federal Identity, Credentialing, and Access Management Identity Scheme Adoption Process Version 1.0.0 Release Candidate July 8, 2009 ii Document History Status Release Date Comment Audience Draft 0.0.1

More information

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to

More information

A. This Directive applies throughout DHS, unless exempted by statutory authority.

A. This Directive applies throughout DHS, unless exempted by statutory authority. I. Purpose Department of Homeland Security DHS Directives System Directive Number: 103-02 Revision Number: 00 Issue Date: 6/19/2014 ENTERPRISE ARCHITECTURE MANAGEMENT This Directive establishes the Department

More information

DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE

DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE 1 Introduction and Instructions This sample Statement

More information

Defense Information Systems Agency A Combat Support Agency. Identity and Access Management (IdAM): Consistent Access to Capability

Defense Information Systems Agency A Combat Support Agency. Identity and Access Management (IdAM): Consistent Access to Capability Defense Information Systems Agency Identity and Access Management (IdAM): Consistent Access to Capability 17 August 2011 Disclaimer The information provided in this briefing is for general information

More information

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 8320.03 November 4, 2015 USD(AT&L) SUBJECT: Unique Identification (UID) Standards for Supporting DoD Net-Centric Operations References: See Enclosure 1 1. PURPOSE.

More information

DOD BUSINESS SYSTEMS MODERNIZATION. Additional Action Needed to Achieve Intended Outcomes

DOD BUSINESS SYSTEMS MODERNIZATION. Additional Action Needed to Achieve Intended Outcomes United States Government Accountability Office Report to Congressional Committees July 2015 DOD BUSINESS SYSTEMS MODERNIZATION Additional Action Needed to Achieve Intended Outcomes GAO-15-627 July 2015

More information

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications Written Testimony of Mark Kneidinger Director, Federal Network Resilience Office of Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee

More information

Mission Assurance and Security Services

Mission Assurance and Security Services Mission Assurance and Security Services Dan Galik, Chief Federation of Tax Administrators Computer Security Officer Conference March 2007 Security, privacy and emergency preparedness issues are front page

More information

Human Resources Management. Portfolio Management Concept of Operations

Human Resources Management. Portfolio Management Concept of Operations Human Resources Management Portfolio Management Concept of Operations September 30, 2012 Table of Contents 1.0 Overview... 2 1.1 Background... 2 1.2 Purpose... 2 1.3 Organization of This Document... 2

More information

AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015

AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015 AFCEA Aberdeen Luncheon Army Common Operating Environment (COE) Update Mr. Phillip Minor, Deputy Director, COE Directorate Assistant Secretary of the Army for Acquisition, Logistics and Technology (ASA(ALT))

More information

Space Ground Services in the Joint Information Environment (JIE)

Space Ground Services in the Joint Information Environment (JIE) Space Ground Services in the Joint Information Environment (JIE) Scott Niebuhr, Jeremy Burton, Judy Kerner, Sky Troyer The Aerospace Corporation 2015 The Aerospace Corporation Space Ground Services in

More information

United States Department of Defense

United States Department of Defense Defense.gov News Release: DOD Releases Cloud Computing Str... http://www.defense.gov/releases/release.aspx?releaseid=15435 1 of 3 7/11/2012 3:57 PM United States Department of Defense TOP LINKS Subscribe

More information

Cloud Computing Strategy

Cloud Computing Strategy Department of Defense Chief Information Officer Cloud Computing Strategy July 2012 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is

More information

Enterprise Continuous Monitoring Bridging Shared Services, Clouds, and In-House Solutions

Enterprise Continuous Monitoring Bridging Shared Services, Clouds, and In-House Solutions Enterprise Continuous Monitoring Bridging Shared Services, Clouds, and In-House Solutions Benjamin Bergersen Certified in the Governance of Enterprise IT - CGEIT Certified Information Systems Security

More information

DISA Testing Services for the Enterprise. Luanne Overstreet

DISA Testing Services for the Enterprise. Luanne Overstreet DISA Testing Services for the Enterprise Luanne Overstreet DISA T&E Executive 13 December 2012 Our Mission DISA, a Combat Support Agency, provides, operates, and assures command and control, information

More information

NOV. 2 2 2q11. DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTOr D.C. 20301-6000

NOV. 2 2 2q11. DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTOr D.C. 20301-6000 DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTOr D.C. 20301-6000 CHIEF INFORMATION OFFICER NOV 2 2 2q11 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF STAFF

More information

Cloud Computing Strategy

Cloud Computing Strategy Department of Defense Chief Information Officer Cloud Computing Strategy July 2012 This page intentionally left blank EXECUTIVE SUMMARY In the current political, economic, and technological landscape,

More information

Security Control Standard

Security Control Standard Department of the Interior Security Control Standard Program Management April 2011 Version: 1.1 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information

More information

Department of Defense End-to-End Business Process Integration Framework

Department of Defense End-to-End Business Process Integration Framework Department of Defense End-to-End Business Process Integration Framework May 17, 2013 Table of Contents 1 Overview... 3 2 End-to-End Business Processes... 6 3 Applying the End-to-End Framework to the DoD

More information

I. U.S. Government Privacy Laws

I. U.S. Government Privacy Laws I. U.S. Government Privacy Laws A. Privacy Definitions and Principles a. Privacy Definitions i. Privacy and personally identifiable information (PII) b. Privacy Basics Definition of PII 1. Office of Management

More information

BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-48 UNITED STATES TRANSPORTATION COMMAND 22 JUNE 2015

BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-48 UNITED STATES TRANSPORTATION COMMAND 22 JUNE 2015 BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-48 UNITED STATES TRANSPORTATION COMMAND 22 JUNE 2015 Communications and Information DATA MANAGEMENT POLICY AND RESPONSIBILITIES COMPLIANCE WITH THIS

More information

DoD ESI & The Joint Information Environment (JIE)

DoD ESI & The Joint Information Environment (JIE) DoD ESI & The Joint Information Environment (JIE) DISA Mission Partners Conference 2012 May 7, 2012 www.esi.mil Agenda DoD ESI Overview Economies of Scale for COTS IT Acquisition Alignment with JIE & DoD

More information

OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000

OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 NETWORKS AND INFORMATION INTEGRATION MEMORANDUM FOR ARCHITECTURE AND STANDARDS REVIEW GROUP (ASRG) SUBJECT:

More information

The DoD CIO Charter:

The DoD CIO Charter: George Mason University, Fairfax, VA The DoD CIO Charter: A Template for I.T. Governance? Paul A. Strassmann,October 3, 2005 1 Authority for the DoD CIO 2 Traditional Views of the CIO Roles 3 An Expansive

More information

GAO ELECTRONIC GOVERNMENT ACT. Agencies Have Implemented Most Provisions, but Key Areas of Attention Remain

GAO ELECTRONIC GOVERNMENT ACT. Agencies Have Implemented Most Provisions, but Key Areas of Attention Remain GAO United States Government Accountability Office Report to the Committee on Homeland Security and Governmental Affairs, U.S. Senate September 2012 ELECTRONIC GOVERNMENT ACT Agencies Have Implemented

More information

RT 24 - Architecture, Modeling & Simulation, and Software Design

RT 24 - Architecture, Modeling & Simulation, and Software Design RT 24 - Architecture, Modeling & Simulation, and Software Design Dennis Barnabe, Department of Defense Michael zur Muehlen & Anne Carrigy, Stevens Institute of Technology Drew Hamilton, Auburn University

More information

How To Improve The Defense Communications System

How To Improve The Defense Communications System Briefing to the AFCEA International Cyber Symposium 26 June 2013 Lt Gen Ronnie D. Hawkins, Jr. Director, Defense Information Systems Agency 1 1 UNCLASSIFIED Organizational Changes Command Staff Financial

More information

Student Background Personal Background & Learning Objectives

Student Background Personal Background & Learning Objectives Systems Engineering Program (SYSE) Integrated Workshop Portfolio Student Background Personal Background & Learning Objectives Version 1.0 Tam Nguyen 1 The following section describes the student s personal

More information

Location: [North America] [United States] [Home Working, United States]

Location: [North America] [United States] [Home Working, United States] Architect II Location: [North America] [United States] [Home Working, United States] Category: Information Technology Job Type: Fixed term, Full-time PURPOSE OF POSITION: The Architect II role is expected

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive

More information

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)

Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT) Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction

More information

Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview

Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview Federal Identity, Credential, and Access Management Trust Framework Solutions Overview Version 1.0 02/07/2014 Questions? Contact the FICAM TFS Program Manager at TFS.EAO@gsa.gov 1 Table of Contents 1.

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3115.12 August 24, 2010 USD(I) SUBJECT: Open Source Intelligence (OSINT) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes policy, assigns

More information

DEFENSE BUSINESS SYSTEMS. Further Refinements Needed to Guide the Investment Management Process

DEFENSE BUSINESS SYSTEMS. Further Refinements Needed to Guide the Investment Management Process United States Government Accountability Office Report to Congressional Committees May 2014 DEFENSE BUSINESS SYSTEMS Further Refinements Needed to Guide the Investment Management Process GAO-14-486 May

More information

Migrating and consolidating even the simplest of data

Migrating and consolidating even the simplest of data CALIBRE An Employee-Owned Management and Technology Services Company 6354 Walker Lane, Suite 300, Metro Park Alexandria, Virginia 22310-3252 USA p. 703.797.8500 or 1.888.CALIBRE international p. 011.1.888.CALIBRE

More information

Report via OMB s Integrated Data Collection (IDC), https://community.max.gov/x/lhtgjw 10

Report via OMB s Integrated Data Collection (IDC), https://community.max.gov/x/lhtgjw 10 EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 June 2, 2016 M-16-12 MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung United States Chief

More information

Defense Business Systems Investment Management Process Guidance. June 2012

Defense Business Systems Investment Management Process Guidance. June 2012 Defense Business Systems Investment Management Process Guidance June 2012 Executive Summary Section 901 of the Fiscal Year 2012 National Defense Authorization Act (FY2012 NDAA), now codified at Title 10

More information

Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance

Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance December 2, 2011 Powered by the Federal Chief Information Officers Council and the Federal Enterprise Architecture

More information

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed. Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout

More information

CORPORATE CAPABILITIES. DOD RDT&E Services Enterprise Architecture & Portfolio Management Training & Logistics

CORPORATE CAPABILITIES. DOD RDT&E Services Enterprise Architecture & Portfolio Management Training & Logistics CORPORATE CAPABILITIES DOD RDT&E Services Enterprise Architecture & Portfolio Management Training & Logistics Droidan is a Certified 8(a), Minority, Veteran-Owned Small Business providing professional

More information

FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM

FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM Four Pillars that HSPD-12 Programs must consider for a secure, efficient, interoperable PIV enterprise deployment. Continued HSPD-12 Implementation under OMB

More information

Security Authorization Process Guide

Security Authorization Process Guide Security Authorization Process Guide Office of the Chief Information Security Officer (CISO) Version 11.1 March 16, 2015 TABLE OF CONTENTS Introduction... 1 1.1 Background... 1 1.2 Purpose... 2 1.3 Scope...

More information

Service Oriented Architecture (SOA) for DoD

Service Oriented Architecture (SOA) for DoD Service Oriented Architecture (SOA) for DoD Prof. Paul A. Strassmann January 9, 2008 1 Part 1 SOA Requirements 2 The DoD Challenge 3 Most DoD Projects Have Own Data Projects 07 Budget $ Millions Number

More information

INFORMATION SHARING ENVIRONMENT GUIDANCE (ISE-G) IDENTITY AND ACCESS MANAGEMENT FRAMEWORK FOR THE ISE VERSION 1.0

INFORMATION SHARING ENVIRONMENT GUIDANCE (ISE-G) IDENTITY AND ACCESS MANAGEMENT FRAMEWORK FOR THE ISE VERSION 1.0 INFORMATION SHARING ENVIRONMENT GUIDANCE (ISE-G) IDENTITY AND ACCESS MANAGEMENT FRAMEWORK FOR THE ISE VERSION 1.0 1. Authority. The National Security Act of 1947, as amended; The Intelligence Reform and

More information

Security Content Automation Protocol for Governance, Risk, Compliance, and Audit

Security Content Automation Protocol for Governance, Risk, Compliance, and Audit UNCLASSIFIED Security Content Automation Protocol for Governance, Risk, Compliance, and Audit presented by: Tim Grance The National Institute of Standards and Technology UNCLASSIFIED Agenda NIST s IT Security

More information

STRATEGIC SOURCING. Opportunities Exist to Better Manage Information Technology Services Spending

STRATEGIC SOURCING. Opportunities Exist to Better Manage Information Technology Services Spending United States Government Accountability Office Report to Congressional Requesters September 2015 STRATEGIC SOURCING Opportunities Exist to Better Manage Information Technology Services Spending GAO-15-549

More information

Federal Segment Architecture Methodology (FSAM): An Overview

Federal Segment Architecture Methodology (FSAM): An Overview Information Resources Management College Federal Segment Architecture Methodology (FSAM): An Overview Dr. Stan Boddie & Prof. Matt Newman 1 a global learning community for government s most promising information

More information

GAO DEPARTMENT OF HOMELAND SECURITY. Actions Taken Toward Management Integration, but a Comprehensive Strategy Is Still Needed

GAO DEPARTMENT OF HOMELAND SECURITY. Actions Taken Toward Management Integration, but a Comprehensive Strategy Is Still Needed GAO November 2009 United States Government Accountability Office Report to the Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia, Committee on Homeland

More information

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT IntelliDyne, LLC MARCH 2012 STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

More information

Enterprise Email in the Cloud. Consolidating 21 email systems into an enterprise system using Cloud Services. March 8, 2011

Enterprise Email in the Cloud. Consolidating 21 email systems into an enterprise system using Cloud Services. March 8, 2011 Enterprise Email in the Cloud Consolidating 21 email systems into an enterprise system using Cloud Services March 8, 2011 U.S. Department of Agriculture, Office of the Chief Information Officer 1 Executive

More information

Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength

Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength Enterprise IT Aligning Strong Solutions, Assuring Enterprise Strength Strategic planning aligns your enterprise IT infrastructure with your mission, operational and efficiency goals. From the start, we

More information

Department of Homeland Security Office of Inspector General. Review of U.S. Coast Guard Enterprise Architecture Implementation Process

Department of Homeland Security Office of Inspector General. Review of U.S. Coast Guard Enterprise Architecture Implementation Process Department of Homeland Security Office of Inspector General Review of U.S. Coast Guard Enterprise Architecture Implementation Process OIG-09-93 July 2009 Contents/Abbreviations Executive Summary...1 Background...2

More information

ARC Outreach on HSPD 12 and Mandatory Use of ODIN

ARC Outreach on HSPD 12 and Mandatory Use of ODIN ARC Outreach on HSPD 12 and Mandatory Use of ODIN August 28 & 29, 2007 Agenda Center Management Opening Remarks CIO Perspective Homeland Security Presidential Directive (HSPD) 12 Questions & Answers Mandatory

More information

GAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards

GAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards GAO United States Government Accountability Office Report to Congressional Requesters September 2011 PERSONAL ID VERIFICATION Agencies Should Set a Higher Priority on Using the Capabilities of Standardized

More information

GOVERNMENT USE OF MOBILE TECHNOLOGY

GOVERNMENT USE OF MOBILE TECHNOLOGY GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...

More information

Medicaid Information Technology Architecture (MITA) Overview Compiled from MITA Framework 2.0 documents issued by CMS - March 2006

Medicaid Information Technology Architecture (MITA) Overview Compiled from MITA Framework 2.0 documents issued by CMS - March 2006 Medicaid Information Technology Architecture (MITA) Overview Compiled from MITA Framework 2.0 documents issued by CMS - March 2006 CMS has worked with a number of stakeholders over the past two years to

More information

Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff

Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff The Challenge IT Executives are challenged with issues around data, compliancy, regulation and making confident decisions on their business

More information

DoD Needs an Effective Process to Identify Cloud Computing Service Contracts

DoD Needs an Effective Process to Identify Cloud Computing Service Contracts Inspector General U.S. Department of Defense Report No. DODIG-2016-038 DECEMBER 28, 2015 DoD Needs an Effective Process to Identify Cloud Computing Service Contracts INTEGRITY EFFICIENCY ACCOUNTABILITY

More information

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS

More information

Department of Technology Services

Department of Technology Services Department of Technology Services 2016-2019 Strategic Plan DTS Dept. of Technology Services Utah Code 63F- 1-203 explicitly requires the Chief Information Officer (CIO) to prepare an executive branch strategic

More information

DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process

DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process Inspector General U.S. Department of Defense Report No. DODIG-2015-045 DECEMBER 4, 2014 DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process INTEGRITY EFFICIENCY ACCOUNTABILITY

More information

Identity and Access Management Initiatives in the United States Government

Identity and Access Management Initiatives in the United States Government Identity and Access Management Initiatives in the United States Government Executive Office of the President November 2008 Importance of Identity Management within the Federal Government "Trusted Identity"

More information

IT Service Management in the JIE and the DoD Enterprise Service Management Framework

IT Service Management in the JIE and the DoD Enterprise Service Management Framework IT Service Management in the JIE and the DoD Enterprise Service Management Framework Office of the Chief Information Officer/ Defense Information Systems Agency Office of the Chief Information Officer

More information

Essential Next Steps for the U.S. Government in the Transition to IPv6

Essential Next Steps for the U.S. Government in the Transition to IPv6 Essential Next Steps for the U.S. Government in the Transition to IPv6 An Executive Summary for Agency Chief Information Officers of the Latest Federal Policies and Guidance for Continuing the Enterprise

More information

CLOUD COMPUTING. Agencies Need to Incorporate Key Practices to Ensure Effective Performance

CLOUD COMPUTING. Agencies Need to Incorporate Key Practices to Ensure Effective Performance United States Government Accountability Office Report to Congressional Requesters April 2016 CLOUD COMPUTING Agencies Need to Incorporate Key Practices to Ensure Effective Performance GAO-16-325 April

More information

MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES

MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES M-XX-XX MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung, United States Chief Acquisition Officer Tony Scott, United States Chief Information Officer SUBJECT: Category Management

More information

How To Use Cloud Computing For Federal Agencies

How To Use Cloud Computing For Federal Agencies Cloud Computing Briefing Scott Renda Office of Management and Budget www.whitehouse.gov/omb/egov Cloud Computing Basics Style of computing Cloud Computing: What Does it Mean? Close public/private sector

More information

Best Practices. Dr. Gerald R. Gray Principal Technical Leader

Best Practices. Dr. Gerald R. Gray Principal Technical Leader Utility Enterprise Architecture: Best Practices Dr. Gerald R. Gray Principal Technical Leader Agenda Background Case Studies APQC-based Survey Application / Use 2 Background 2012 Utility CIO report While

More information

DoD Architecture Framework Version 1.5

DoD Architecture Framework Version 1.5 DoD Architecture Framework Version 1.5 Technical Standards View Systems/Services View Operational View All View Core Architecture Data Model Volume II: Product Descriptions 23 April 2007 SECTION TABLE

More information

Department of Defense Net-Centric Data Strategy

Department of Defense Net-Centric Data Strategy Department of Defense Net-Centric Data Strategy May 9, 2003 Prepared by: Department of Defense Chief Information Officer (CIO) TABLE OF CONTENTS 1. PURPOSE... 1 2. INTRODUCTION... 1 2.1 DOD DATA VISION...

More information

Is Your Identity Management Program Protecting Your Federal Systems?

Is Your Identity Management Program Protecting Your Federal Systems? Is Your Identity Management Program Protecting Your Federal Systems? With the increase in integrated, cloud and remote technologies, it is more challenging than ever for federal government agencies to

More information

DoD Enterprise Architecture

DoD Enterprise Architecture DoD Enterprise Architecture DoD EA Conference 2012 Chris White 3 May, 2012 accelerating growth reducing risk increasing profitability Enterprise Architecture Enterprise Architecture is Discipline i of

More information

ARCHITECTURE DESIGN OF SECURITY SYSTEM

ARCHITECTURE DESIGN OF SECURITY SYSTEM Trakia Journal of Sciences, Vol. 8, No. 3, pp 77-82, 2010 Copyright 2009 Trakia University Available online at: http://www.uni-sz.bg ISSN 1313-7050 (print) ISSN 1313-3551 (online) Review ARCHITECTURE DESIGN

More information

Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.

Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security. Deputy Chief Financial Officer Peggy Sherry And Chief Information Security Officer Robert West U.S. Department of Homeland Security Testimony Before the Subcommittee on Government Organization, Efficiency

More information

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Authors: Rebecca Onuskanich William Peterson 3300 N Fairfax Drive, Suite 308 Arlington, VA 22201 Phone: 571-481-9300 Fax: 202-315-3003

More information

Overview. FedRAMP CONOPS

Overview. FedRAMP CONOPS Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,

More information

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations

More information

Strategic Plan OCIO. Vision, Leadership and Commitment. energy.gov/cio FY 2012 - FY 2017. Enabling the Future through Technology and Information

Strategic Plan OCIO. Vision, Leadership and Commitment. energy.gov/cio FY 2012 - FY 2017. Enabling the Future through Technology and Information OCIO FY 2012 - FY 2017 Strategic Plan Vision, Leadership and Commitment Enabling the Future through Technology and Information View online at energy.gov/cio Innovation. Transformation. Sustainability.

More information

Department of Defense SHA-256 Migration Overview

Department of Defense SHA-256 Migration Overview Department of Defense SHA-256 Migration Overview 18 March 2011 Tim Fong DoD-CIO/ IIA Timothy.Fong@osd.mil General Observations This is Important INFOSEC: Algorithms can be compromised over time. Crypto

More information

NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC

NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC Committee on National Security Systems 1 CNSSD No. 507 January 2014 NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC

More information

Department of Defense INSTRUCTION. SUBJECT: Information Technology Portfolio Management Implementation

Department of Defense INSTRUCTION. SUBJECT: Information Technology Portfolio Management Implementation Department of Defense INSTRUCTION NUMBER 8115.02 October 30, 2006 ASD(NII)/DoD CIO SUBJECT: Information Technology Portfolio Management Implementation References: (a) DoD Directive 8115.01, Information

More information

Enable Your Applications for CAC and PIV Smart Cards

Enable Your Applications for CAC and PIV Smart Cards Enable Your Applications for CAC and PIV Smart Cards Executive Summary Since HSPD-2 was signed in 2004, government agencies have issued over 5 million identity badges. About 90% of government workers and

More information

Enterprise Resource Planning Systems Schedule Delays and Reengineering Weaknesses Increase Risks to DoD's Auditability Goals

Enterprise Resource Planning Systems Schedule Delays and Reengineering Weaknesses Increase Risks to DoD's Auditability Goals Report No. DODIG-2012-111 July 13, 2012 Enterprise Resource Planning Systems Schedule Delays and Reengineering Weaknesses Increase Risks to DoD's Auditability Goals Additional Copies To obtain additional

More information

Guidance for Review and Certification of Defense Business Systems

Guidance for Review and Certification of Defense Business Systems Guidance for Review and Certification of Defense Business Systems Version 3.4 February 2015 Table of Contents 1. Introduction... 3 2. Investment Management Process... 7 3. Governance... 22 4. Investment

More information

Following is a discussion of the Hub s role within the health insurance exchanges, the results of our review, and concluding observations.

Following is a discussion of the Hub s role within the health insurance exchanges, the results of our review, and concluding observations. Testimony of: Kay Daly Assistant Inspector General for Audit Services Office of Inspector General, U.S. Department of Health and Human Services Hearing Title: The Threat to Americans Personal Information:

More information