Enterprise Architecture
|
|
- Gervais Harvey
- 7 years ago
- Views:
Transcription
1 Enterprise Architecture Management Plan DoD Conference 3 May 2012 Brian Wilczynski Director, Architecture & Interoperability Office of the DoD CIO brian.wilczynski@osd.mil
2 DoD Enterprise Business Warfighting g Intelligence Information Enterprise Army DON Air Force Dept of Air Force DIA NGA NRO NSA DLA DISA COC COMS Reference Models OMB F DARS Tools DITPR Tech Stds DISR Arch Guidance DODAF Laws, Regs, and Policy Laws Regs Policy 2
3 Reference Architecture Description Enterprise-wide Access to Network and Collaboration Services Reference Architecture Overview and Summary Information (AV-1) Strategic Purpose Principles Department of Defense Enterprise-wide Access to Network and Collaboration Services (NCS) Prepared by the Office of the DoD CIO Reference Architecture Version 3.0 December Architecture Product Identification 1.1 Name: Enterprise-wide Access to Network and Collaboration Services (NCS) 1.2 Lead Organization: Department of Defense Deputy Chief Information Officer. The Enterprise Services Review Group (ESRG), as the architecture owner, is responsible for architecture content and will provide overall coordination to ensure appropriate stakeholders and subject-matter experts are available; the Enterprise Reference Architecture Cell (ERAC), with oversight from the Architecture and Standards Review Group (ASRG), will support the development of appropriate architecture artifacts. 1.3 Approval Authority: DoD CIO Enterprise Guidance Board (EGB) 2 Purpose and Perspective 2.1 Purpose. A Reference Architecture (RA) abstracts and normalizes the institutional understanding of capabilities at the enterprise level, and provides a common set of principles, technical positions, and patterns for use within the DoD to guide development of Enterprise, Segment, or Solution architectures. AV-1 (Overview and Summary) OV-5a (Activity Decomposition) Vocabulary Patterns OV-1 (Concept Consumer & Provider) OV-6c (Event-Trace Description) AV-2 2(Integrated t Dictionary) OV-6a (Operational Rules Model) GROUP TYPE NAME Technical DESCRIPTION Positions OMB Policy M This guidance requires agencies to review new and existing electronic transactions to ensure that authentication processes provide the appropriate level of assurance. It establishes and describes four levels of identity assurance for electronic transactions requiring authentication. Assurance levels also provide a basis for assessing Credential Service Providers (CSPs) on behalf of Federal agencies. This document will assist agencies in determining their e- government needs. Agency business-process owners bear the primary responsibility to identify assurance levels and strategies for providing them. This responsibility extends to electronic authentication systems. OMB Policy M This memo requires the use of a shared service provider to mitigate the risk of commercial managed services for public key infrastructure (PKI) and electronic signatures. OMB Policy M This memorandum provides implementing instructions for HSPD-12 and FIPS-201. OMB Policy M This memorandum provides updated direction for the acquisition of products and services for the implementation of Homeland Security Presidential Directive-12 (HSPD-12) Policy for a Common Identification Standard for Federal Employees and Contractors and also provides status of implementation efforts. Presidential Policy HSPD-12 HSPD-12 calls for a mandatory, government- Directive wide standard for secure and reliable forms of ID issued by the federal government to its employees and employees of federal contractors for access to federally-controlled facilities and networks. NIST Guidance SP This document provides the organizational codes for federal agencies to establish the Federal Agency Smart Credential Number (FASC-N) that is required to be included in the FIPS 201 Card Holder Unique Identifier. SP is a companion document to FIPS 201. StdV-1 (Standards Profile) 3
4 Reference Architecture Enterprise-wide Access to Network & Collaboration Services RA (NCS RA) I Reference Architectures Brief Description Guides, standardizes, and enables the implementation of authentication and authorization capabilities to access collaboration services in support of secure information sharing across the Department. Remarks Approved Aug 2010 Active Directory Guides the transformation of legacy Windows networks that use AD Approved Feb 2011 Optimization RA (ADORA) to improve security, facilitate secure info sharing across networks, and achieve efficiencies through network consolidation. IT Infrastructure Optimization RA (ITIORA) Guides the optimization of the DoD IT Infrastructure with a focus on Defense ITIL services and management processes. Waiting Approval Core Data Center RA (CDC Defines & standardizes necessary attributes for Core DoD Under development; RA) computing Centers integrating DoD cloud and server virtualization Formal review planned concepts. for Mar-Apr 2012 Network Optimization RA (NORA) Unified Capabilities RA (UC RA) Future Mission Network RA (FMN RA) Guides the implementation of joint networks using network Under development; virtualization or federation techniques and leveraging regional Formal review planned boundary protection (TLA) concepts. for Mar-Apr 2012 Guides implementation and acquisition plans for phasing in voice and video over IP services, and other UC operating on converged networks. Analyzes services (C4 infrastructure and enterprise) required to support FMN, evaluate as is programs and initiatives ability to support these services, and develop DoD-level to be recommendations Under development; Formal review planned for Mar-Apr 2012 Under Development 4
5 CV-2: Capability Taxonomy 5
6 Reference Architecture DoD I 6
7 A Few Conference Themes What must architects respond to: Operational Context Interoperability Shared/Common infrastructure Joint Information Enterprise (JIE) Future Mission Network (FMN) Information/Data sharing Agility Mapping (MG Rudesheim) 7
8 MITRE Assessment Stakeholder interviews i conducted d in November 2011 Outbriefs conducted in December 2011 Follow on tasks include the development of an Management Plan Develop Enterprise Roadmaps 8
9 Summary of Stakeholder Comments from Interviews Approaches are largely driven from the bottom up Outcomes not clearly defined/prioritized More emphasis on the overall --- all Mission Areas Published RAs should be updated and require expansion in some technology areas In-work RAs are needed, but cultural and policy issues need to be considered along with technology Focus on transition plans Provide better capability to discover and share architecture content Establish an Agile Architecting ti methodology/approach h Focus on consolidation and interoperability 9
10 Drivers (Guiding Development and Use) Developing the Management Plan Federal DoD Program Framework Strategy, Strategy, Mandates, Mandates, Guidance Guidance Development Required Outcomes Management Plan Contents of the Management Plan Stakeholder and Use Analysis Development Process Architecture Framework and Patterns Governance Plan Communications Plan Metrics Workforce Today (As-Is) Time Phased Transition Future (To-Be) Repositories: Standards, etc. Use Requirements Programming, Planning, and Budgeting Acquisition Key Initiatives (e.g. IT Consolidation) Policy Compliance 10
11 Synchronizing Delivery of Solutions Common Situation - Uncoordinated Acquisition and Fielding Acquire FOC FIX Delivery Starts Acquire A Better Way - Integrated Roadmaps FOC Enterprise Mission Area and Component Architectures Integrated Requirements Coordinated Budgets Coordinated Contracting Coordinated Acquisition Integrated Fielding Coordinated Development, Delivery & Fielding Integrated Roadmaps Guide Joint Interoperable Solutions -- Faster and at Lower Cost 11
12 Federation - Managing the Seams DCMO Develop JS Develop USD (I) Develop & Approve & Approve & Approve Business Warfighting Intelligence Architecture Architecture Architecture DoD CIO CO Integrate Information Enterprise Architecture DoD CO CIO Develop & Approve Department Of The Army Department Of The Navy Department Of The Air Force Dept of Air Force DIA NGA NRO NSA DLA DISA COC COMS Components Align Reference Models OMB F DARS Tools DITPR Tech Stds DISR Arch Guidance DODAF Laws, Regs, and Policy Laws Regs Policy DoD CIO Provide 12
13 Enterprise Roadmaps Mission Owner s Products Based on Mission Processes Enterprise Product DoD Time Phased Transition Plan Capabilities Roadmaps JPR Systems Roadmaps coordinated and integrated yields Today (As-Is) Time Phased Transition Future (To-Be) Capability and system changes should be captured in enterprise roadmaps Roadmaps should be used to support decision making by: Providing executive view across capabilities and systems for senior leaders Identifying and tracking key decision points involving multiple capabilities and systems Supporting and reflecting enterprise level investment tradeoff decisions Mission Area and Component products are integrated into an enterprise roadmap by the DoD CIO to maximize re-use, interoperability, and investment management 13
14 Near-Term Strategy Complete I v2.0 and current Reference Architectures (RA) Pursue continued RA development in a decentralized manner Shift focus toward cross-mission Area integration managing g the seams Review current approach to governance and adjust to align with strategic objectives 14
Role of Reference Architectures
Role of Reference Architectures Steven J. Ring sring@mitre.org Principal Information Engineer Enterprise Architecture Certificate, NDU Chief Information Officer Certificate, NDU March 5, 2015 MITRE Approved
More informationWhat s What Ahead For Architectures in the DoD? Mr. Dav Da e v DeVr DeV ies Mr. Martin Westphal
What s Ahead For Architectures in the DoD? Mr Dave DeVries Mr. Dave DeVries Mr. Martin Westphal What Has Happened Organization changes and declining budgets Progress made in Electronic Health Record Data
More informationJoint Training Enterprise Architecture
Joint Training Enterprise Architecture WJTSC M&S WG 19 September 2012 Mandate for Change Reduce JLVC Operating & Sustainment Costs Keep pace with the operating environment Joint Force 2020 CE2T2 Program
More informationDepartment of Defense Information Enterprise Architecture (DoD IEA) Version 2.0
Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0 Volume I Management Overview of the DoD IEA July 2012 Prepared by: Department of Defense Office of the Chief Information
More informationCore Data Center Reference Architecture
Core Data Center Reference Architecture DoD Enterprise Architecture Conference 2012 Office of the Chief Information Officer Topics Background DoD CIO Vision for Core Data Centers Core Data Center Reference
More informationDEPARTMENTAL REGULATION
U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information
More informationFederal Enterprise Architecture Using EA to Design Future-Ready Agencies and Implement Shared Services
Federal Enterprise Architecture Using EA to Design Future-Ready Agencies and Implement Shared Services Scott A. Bernard, Ph.D. Scott_Bernard@omb.eop.gov Federal Chief Enterprise Architect Executive Office
More informationIdentity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management An information exchange For Information Security and Privacy Advisory Board Deb Gallagher
More informationDoD CIO ITSM Overview Enterprise Architecture Conference
DoD CIO ITSM Overview Enterprise Architecture Conference April 14, 2011 Barbara McCain Enterprise Architecture & Infrastructure DoD CIO Barbara.McCain@osd.mil What is IT Service Management (ITSM)? ITSM
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8440.01 December 24, 2015 DoD CIO SUBJECT: DoD Information Technology (IT) Service Management (ITSM) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority
More informationDEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 CHEF INFORMATION OFFICER FEB 0 8 2013 MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT: Department of Defense Unified Capabilities Reference
More informationImproved Mapping and Modeling of Defense Domain Architectures Backup slides
Improved Mapping and Modeling of Defense Domain Architectures Backup slides Benton Ben K Bovée Senior Enterprise Architect Principal, Patterndigm 26 Apr 2012, 11:15-12:00 DM2 on IDEF0 Slide 2 Reference:
More informationInteragency Advisory Board Meeting Agenda, March 5, 2009
Interagency Advisory Board Meeting Agenda, March 5, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Federal Identity, Credential, and Access Management (ICAM) The Future of the Government s IDM Strategy
More informationFederal Identity, Credentialing, and Access Management. Identity Scheme Adoption Process
Federal Identity, Credentialing, and Access Management Identity Scheme Adoption Process Version 1.0.0 Release Candidate July 8, 2009 ii Document History Status Release Date Comment Audience Draft 0.0.1
More informationDepartment of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT
Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to
More informationA. This Directive applies throughout DHS, unless exempted by statutory authority.
I. Purpose Department of Homeland Security DHS Directives System Directive Number: 103-02 Revision Number: 00 Issue Date: 6/19/2014 ENTERPRISE ARCHITECTURE MANAGEMENT This Directive establishes the Department
More informationDEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE
DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE 1 Introduction and Instructions This sample Statement
More informationDefense Information Systems Agency A Combat Support Agency. Identity and Access Management (IdAM): Consistent Access to Capability
Defense Information Systems Agency Identity and Access Management (IdAM): Consistent Access to Capability 17 August 2011 Disclaimer The information provided in this briefing is for general information
More informationDoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO
DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8320.03 November 4, 2015 USD(AT&L) SUBJECT: Unique Identification (UID) Standards for Supporting DoD Net-Centric Operations References: See Enclosure 1 1. PURPOSE.
More informationDOD BUSINESS SYSTEMS MODERNIZATION. Additional Action Needed to Achieve Intended Outcomes
United States Government Accountability Office Report to Congressional Committees July 2015 DOD BUSINESS SYSTEMS MODERNIZATION Additional Action Needed to Achieve Intended Outcomes GAO-15-627 July 2015
More informationWritten Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications
Written Testimony of Mark Kneidinger Director, Federal Network Resilience Office of Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee
More informationMission Assurance and Security Services
Mission Assurance and Security Services Dan Galik, Chief Federation of Tax Administrators Computer Security Officer Conference March 2007 Security, privacy and emergency preparedness issues are front page
More informationHuman Resources Management. Portfolio Management Concept of Operations
Human Resources Management Portfolio Management Concept of Operations September 30, 2012 Table of Contents 1.0 Overview... 2 1.1 Background... 2 1.2 Purpose... 2 1.3 Organization of This Document... 2
More informationAFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015
AFCEA Aberdeen Luncheon Army Common Operating Environment (COE) Update Mr. Phillip Minor, Deputy Director, COE Directorate Assistant Secretary of the Army for Acquisition, Logistics and Technology (ASA(ALT))
More informationSpace Ground Services in the Joint Information Environment (JIE)
Space Ground Services in the Joint Information Environment (JIE) Scott Niebuhr, Jeremy Burton, Judy Kerner, Sky Troyer The Aerospace Corporation 2015 The Aerospace Corporation Space Ground Services in
More informationUnited States Department of Defense
Defense.gov News Release: DOD Releases Cloud Computing Str... http://www.defense.gov/releases/release.aspx?releaseid=15435 1 of 3 7/11/2012 3:57 PM United States Department of Defense TOP LINKS Subscribe
More informationCloud Computing Strategy
Department of Defense Chief Information Officer Cloud Computing Strategy July 2012 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is
More informationEnterprise Continuous Monitoring Bridging Shared Services, Clouds, and In-House Solutions
Enterprise Continuous Monitoring Bridging Shared Services, Clouds, and In-House Solutions Benjamin Bergersen Certified in the Governance of Enterprise IT - CGEIT Certified Information Systems Security
More informationDISA Testing Services for the Enterprise. Luanne Overstreet
DISA Testing Services for the Enterprise Luanne Overstreet DISA T&E Executive 13 December 2012 Our Mission DISA, a Combat Support Agency, provides, operates, and assures command and control, information
More informationNOV. 2 2 2q11. DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTOr D.C. 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTOr D.C. 20301-6000 CHIEF INFORMATION OFFICER NOV 2 2 2q11 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF STAFF
More informationCloud Computing Strategy
Department of Defense Chief Information Officer Cloud Computing Strategy July 2012 This page intentionally left blank EXECUTIVE SUMMARY In the current political, economic, and technological landscape,
More informationSecurity Control Standard
Department of the Interior Security Control Standard Program Management April 2011 Version: 1.1 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information
More informationDepartment of Defense End-to-End Business Process Integration Framework
Department of Defense End-to-End Business Process Integration Framework May 17, 2013 Table of Contents 1 Overview... 3 2 End-to-End Business Processes... 6 3 Applying the End-to-End Framework to the DoD
More informationI. U.S. Government Privacy Laws
I. U.S. Government Privacy Laws A. Privacy Definitions and Principles a. Privacy Definitions i. Privacy and personally identifiable information (PII) b. Privacy Basics Definition of PII 1. Office of Management
More informationBY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-48 UNITED STATES TRANSPORTATION COMMAND 22 JUNE 2015
BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-48 UNITED STATES TRANSPORTATION COMMAND 22 JUNE 2015 Communications and Information DATA MANAGEMENT POLICY AND RESPONSIBILITIES COMPLIANCE WITH THIS
More informationDoD ESI & The Joint Information Environment (JIE)
DoD ESI & The Joint Information Environment (JIE) DISA Mission Partners Conference 2012 May 7, 2012 www.esi.mil Agenda DoD ESI Overview Economies of Scale for COTS IT Acquisition Alignment with JIE & DoD
More informationOFFICE OF THE ASSISTANT SECRETARY OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000
OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 NETWORKS AND INFORMATION INTEGRATION MEMORANDUM FOR ARCHITECTURE AND STANDARDS REVIEW GROUP (ASRG) SUBJECT:
More informationThe DoD CIO Charter:
George Mason University, Fairfax, VA The DoD CIO Charter: A Template for I.T. Governance? Paul A. Strassmann,October 3, 2005 1 Authority for the DoD CIO 2 Traditional Views of the CIO Roles 3 An Expansive
More informationGAO ELECTRONIC GOVERNMENT ACT. Agencies Have Implemented Most Provisions, but Key Areas of Attention Remain
GAO United States Government Accountability Office Report to the Committee on Homeland Security and Governmental Affairs, U.S. Senate September 2012 ELECTRONIC GOVERNMENT ACT Agencies Have Implemented
More informationRT 24 - Architecture, Modeling & Simulation, and Software Design
RT 24 - Architecture, Modeling & Simulation, and Software Design Dennis Barnabe, Department of Defense Michael zur Muehlen & Anne Carrigy, Stevens Institute of Technology Drew Hamilton, Auburn University
More informationHow To Improve The Defense Communications System
Briefing to the AFCEA International Cyber Symposium 26 June 2013 Lt Gen Ronnie D. Hawkins, Jr. Director, Defense Information Systems Agency 1 1 UNCLASSIFIED Organizational Changes Command Staff Financial
More informationStudent Background Personal Background & Learning Objectives
Systems Engineering Program (SYSE) Integrated Workshop Portfolio Student Background Personal Background & Learning Objectives Version 1.0 Tam Nguyen 1 The following section describes the student s personal
More informationLocation: [North America] [United States] [Home Working, United States]
Architect II Location: [North America] [United States] [Home Working, United States] Category: Information Technology Job Type: Fixed term, Full-time PURPOSE OF POSITION: The Architect II role is expected
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
More informationDepartment of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)
Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction
More informationFederal Identity, Credential, and Access Management Trust Framework Solutions. Overview
Federal Identity, Credential, and Access Management Trust Framework Solutions Overview Version 1.0 02/07/2014 Questions? Contact the FICAM TFS Program Manager at TFS.EAO@gsa.gov 1 Table of Contents 1.
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 3115.12 August 24, 2010 USD(I) SUBJECT: Open Source Intelligence (OSINT) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes policy, assigns
More informationDEFENSE BUSINESS SYSTEMS. Further Refinements Needed to Guide the Investment Management Process
United States Government Accountability Office Report to Congressional Committees May 2014 DEFENSE BUSINESS SYSTEMS Further Refinements Needed to Guide the Investment Management Process GAO-14-486 May
More informationMigrating and consolidating even the simplest of data
CALIBRE An Employee-Owned Management and Technology Services Company 6354 Walker Lane, Suite 300, Metro Park Alexandria, Virginia 22310-3252 USA p. 703.797.8500 or 1.888.CALIBRE international p. 011.1.888.CALIBRE
More informationReport via OMB s Integrated Data Collection (IDC), https://community.max.gov/x/lhtgjw 10
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 June 2, 2016 M-16-12 MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung United States Chief
More informationDefense Business Systems Investment Management Process Guidance. June 2012
Defense Business Systems Investment Management Process Guidance June 2012 Executive Summary Section 901 of the Fiscal Year 2012 National Defense Authorization Act (FY2012 NDAA), now codified at Title 10
More informationFederal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance
Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance December 2, 2011 Powered by the Federal Chief Information Officers Council and the Federal Enterprise Architecture
More information2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.
Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout
More informationCORPORATE CAPABILITIES. DOD RDT&E Services Enterprise Architecture & Portfolio Management Training & Logistics
CORPORATE CAPABILITIES DOD RDT&E Services Enterprise Architecture & Portfolio Management Training & Logistics Droidan is a Certified 8(a), Minority, Veteran-Owned Small Business providing professional
More informationFOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM
FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM Four Pillars that HSPD-12 Programs must consider for a secure, efficient, interoperable PIV enterprise deployment. Continued HSPD-12 Implementation under OMB
More informationSecurity Authorization Process Guide
Security Authorization Process Guide Office of the Chief Information Security Officer (CISO) Version 11.1 March 16, 2015 TABLE OF CONTENTS Introduction... 1 1.1 Background... 1 1.2 Purpose... 2 1.3 Scope...
More informationService Oriented Architecture (SOA) for DoD
Service Oriented Architecture (SOA) for DoD Prof. Paul A. Strassmann January 9, 2008 1 Part 1 SOA Requirements 2 The DoD Challenge 3 Most DoD Projects Have Own Data Projects 07 Budget $ Millions Number
More informationINFORMATION SHARING ENVIRONMENT GUIDANCE (ISE-G) IDENTITY AND ACCESS MANAGEMENT FRAMEWORK FOR THE ISE VERSION 1.0
INFORMATION SHARING ENVIRONMENT GUIDANCE (ISE-G) IDENTITY AND ACCESS MANAGEMENT FRAMEWORK FOR THE ISE VERSION 1.0 1. Authority. The National Security Act of 1947, as amended; The Intelligence Reform and
More informationSecurity Content Automation Protocol for Governance, Risk, Compliance, and Audit
UNCLASSIFIED Security Content Automation Protocol for Governance, Risk, Compliance, and Audit presented by: Tim Grance The National Institute of Standards and Technology UNCLASSIFIED Agenda NIST s IT Security
More informationSTRATEGIC SOURCING. Opportunities Exist to Better Manage Information Technology Services Spending
United States Government Accountability Office Report to Congressional Requesters September 2015 STRATEGIC SOURCING Opportunities Exist to Better Manage Information Technology Services Spending GAO-15-549
More informationFederal Segment Architecture Methodology (FSAM): An Overview
Information Resources Management College Federal Segment Architecture Methodology (FSAM): An Overview Dr. Stan Boddie & Prof. Matt Newman 1 a global learning community for government s most promising information
More informationGAO DEPARTMENT OF HOMELAND SECURITY. Actions Taken Toward Management Integration, but a Comprehensive Strategy Is Still Needed
GAO November 2009 United States Government Accountability Office Report to the Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia, Committee on Homeland
More informationWHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT
WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT IntelliDyne, LLC MARCH 2012 STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT
More informationEnterprise Email in the Cloud. Consolidating 21 email systems into an enterprise system using Cloud Services. March 8, 2011
Enterprise Email in the Cloud Consolidating 21 email systems into an enterprise system using Cloud Services March 8, 2011 U.S. Department of Agriculture, Office of the Chief Information Officer 1 Executive
More informationEnterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength
Enterprise IT Aligning Strong Solutions, Assuring Enterprise Strength Strategic planning aligns your enterprise IT infrastructure with your mission, operational and efficiency goals. From the start, we
More informationDepartment of Homeland Security Office of Inspector General. Review of U.S. Coast Guard Enterprise Architecture Implementation Process
Department of Homeland Security Office of Inspector General Review of U.S. Coast Guard Enterprise Architecture Implementation Process OIG-09-93 July 2009 Contents/Abbreviations Executive Summary...1 Background...2
More informationARC Outreach on HSPD 12 and Mandatory Use of ODIN
ARC Outreach on HSPD 12 and Mandatory Use of ODIN August 28 & 29, 2007 Agenda Center Management Opening Remarks CIO Perspective Homeland Security Presidential Directive (HSPD) 12 Questions & Answers Mandatory
More informationGAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards
GAO United States Government Accountability Office Report to Congressional Requesters September 2011 PERSONAL ID VERIFICATION Agencies Should Set a Higher Priority on Using the Capabilities of Standardized
More informationGOVERNMENT USE OF MOBILE TECHNOLOGY
GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...
More informationMedicaid Information Technology Architecture (MITA) Overview Compiled from MITA Framework 2.0 documents issued by CMS - March 2006
Medicaid Information Technology Architecture (MITA) Overview Compiled from MITA Framework 2.0 documents issued by CMS - March 2006 CMS has worked with a number of stakeholders over the past two years to
More informationWhitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff
Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff The Challenge IT Executives are challenged with issues around data, compliancy, regulation and making confident decisions on their business
More informationDoD Needs an Effective Process to Identify Cloud Computing Service Contracts
Inspector General U.S. Department of Defense Report No. DODIG-2016-038 DECEMBER 28, 2015 DoD Needs an Effective Process to Identify Cloud Computing Service Contracts INTEGRITY EFFICIENCY ACCOUNTABILITY
More informationSTATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
More informationDepartment of Technology Services
Department of Technology Services 2016-2019 Strategic Plan DTS Dept. of Technology Services Utah Code 63F- 1-203 explicitly requires the Chief Information Officer (CIO) to prepare an executive branch strategic
More informationDoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process
Inspector General U.S. Department of Defense Report No. DODIG-2015-045 DECEMBER 4, 2014 DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process INTEGRITY EFFICIENCY ACCOUNTABILITY
More informationIdentity and Access Management Initiatives in the United States Government
Identity and Access Management Initiatives in the United States Government Executive Office of the President November 2008 Importance of Identity Management within the Federal Government "Trusted Identity"
More informationIT Service Management in the JIE and the DoD Enterprise Service Management Framework
IT Service Management in the JIE and the DoD Enterprise Service Management Framework Office of the Chief Information Officer/ Defense Information Systems Agency Office of the Chief Information Officer
More informationEssential Next Steps for the U.S. Government in the Transition to IPv6
Essential Next Steps for the U.S. Government in the Transition to IPv6 An Executive Summary for Agency Chief Information Officers of the Latest Federal Policies and Guidance for Continuing the Enterprise
More informationCLOUD COMPUTING. Agencies Need to Incorporate Key Practices to Ensure Effective Performance
United States Government Accountability Office Report to Congressional Requesters April 2016 CLOUD COMPUTING Agencies Need to Incorporate Key Practices to Ensure Effective Performance GAO-16-325 April
More informationMEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES
M-XX-XX MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung, United States Chief Acquisition Officer Tony Scott, United States Chief Information Officer SUBJECT: Category Management
More informationHow To Use Cloud Computing For Federal Agencies
Cloud Computing Briefing Scott Renda Office of Management and Budget www.whitehouse.gov/omb/egov Cloud Computing Basics Style of computing Cloud Computing: What Does it Mean? Close public/private sector
More informationBest Practices. Dr. Gerald R. Gray Principal Technical Leader
Utility Enterprise Architecture: Best Practices Dr. Gerald R. Gray Principal Technical Leader Agenda Background Case Studies APQC-based Survey Application / Use 2 Background 2012 Utility CIO report While
More informationDoD Architecture Framework Version 1.5
DoD Architecture Framework Version 1.5 Technical Standards View Systems/Services View Operational View All View Core Architecture Data Model Volume II: Product Descriptions 23 April 2007 SECTION TABLE
More informationDepartment of Defense Net-Centric Data Strategy
Department of Defense Net-Centric Data Strategy May 9, 2003 Prepared by: Department of Defense Chief Information Officer (CIO) TABLE OF CONTENTS 1. PURPOSE... 1 2. INTRODUCTION... 1 2.1 DOD DATA VISION...
More informationIs Your Identity Management Program Protecting Your Federal Systems?
Is Your Identity Management Program Protecting Your Federal Systems? With the increase in integrated, cloud and remote technologies, it is more challenging than ever for federal government agencies to
More informationDoD Enterprise Architecture
DoD Enterprise Architecture DoD EA Conference 2012 Chris White 3 May, 2012 accelerating growth reducing risk increasing profitability Enterprise Architecture Enterprise Architecture is Discipline i of
More informationARCHITECTURE DESIGN OF SECURITY SYSTEM
Trakia Journal of Sciences, Vol. 8, No. 3, pp 77-82, 2010 Copyright 2009 Trakia University Available online at: http://www.uni-sz.bg ISSN 1313-7050 (print) ISSN 1313-3551 (online) Review ARCHITECTURE DESIGN
More informationDeputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.
Deputy Chief Financial Officer Peggy Sherry And Chief Information Security Officer Robert West U.S. Department of Homeland Security Testimony Before the Subcommittee on Government Organization, Efficiency
More informationRisk Management Framework (RMF): The Future of DoD Cyber Security is Here
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Authors: Rebecca Onuskanich William Peterson 3300 N Fairfax Drive, Suite 308 Arlington, VA 22201 Phone: 571-481-9300 Fax: 202-315-3003
More informationOverview. FedRAMP CONOPS
Concept of Operations (CONOPS) Version 1.0 February 7, 2012 Overview Cloud computing technology allows the Federal Government to address demand from citizens for better, faster services and to save resources,
More informationAPPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
More informationStrategic Plan OCIO. Vision, Leadership and Commitment. energy.gov/cio FY 2012 - FY 2017. Enabling the Future through Technology and Information
OCIO FY 2012 - FY 2017 Strategic Plan Vision, Leadership and Commitment Enabling the Future through Technology and Information View online at energy.gov/cio Innovation. Transformation. Sustainability.
More informationDepartment of Defense SHA-256 Migration Overview
Department of Defense SHA-256 Migration Overview 18 March 2011 Tim Fong DoD-CIO/ IIA Timothy.Fong@osd.mil General Observations This is Important INFOSEC: Algorithms can be compromised over time. Crypto
More informationNATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC
Committee on National Security Systems 1 CNSSD No. 507 January 2014 NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC
More informationDepartment of Defense INSTRUCTION. SUBJECT: Information Technology Portfolio Management Implementation
Department of Defense INSTRUCTION NUMBER 8115.02 October 30, 2006 ASD(NII)/DoD CIO SUBJECT: Information Technology Portfolio Management Implementation References: (a) DoD Directive 8115.01, Information
More informationEnable Your Applications for CAC and PIV Smart Cards
Enable Your Applications for CAC and PIV Smart Cards Executive Summary Since HSPD-2 was signed in 2004, government agencies have issued over 5 million identity badges. About 90% of government workers and
More informationEnterprise Resource Planning Systems Schedule Delays and Reengineering Weaknesses Increase Risks to DoD's Auditability Goals
Report No. DODIG-2012-111 July 13, 2012 Enterprise Resource Planning Systems Schedule Delays and Reengineering Weaknesses Increase Risks to DoD's Auditability Goals Additional Copies To obtain additional
More informationGuidance for Review and Certification of Defense Business Systems
Guidance for Review and Certification of Defense Business Systems Version 3.4 February 2015 Table of Contents 1. Introduction... 3 2. Investment Management Process... 7 3. Governance... 22 4. Investment
More informationFollowing is a discussion of the Hub s role within the health insurance exchanges, the results of our review, and concluding observations.
Testimony of: Kay Daly Assistant Inspector General for Audit Services Office of Inspector General, U.S. Department of Health and Human Services Hearing Title: The Threat to Americans Personal Information:
More information