A. This Directive applies throughout DHS, unless exempted by statutory authority.



Similar documents
A. Title 5, United States Code (U.S.C.), Section 552a, Records Maintained On Individuals (The Privacy Act of 1974)

2.0 ROLES AND RESPONSIBILITIES

I. Purpose MD #

U.S. Department of Education. Office of the Chief Information Officer

ClOP CHAPTER Departmental Information Technology Governance Policy TABLE OF CONTENTS. Section 39.1

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

DIRECTIVE TRANSMITTAL

5 FAM 670 INFORMATION TECHNOLOGY (IT) PERFORMANCE MEASURES FOR PROJECT MANAGEMENT

Guide to IT Capital Planning and Investment Control (CPIC)

CMS Policy for Information Technology (IT) Investment Management & Governance

Capital Planning and Investment Control Guide

TABLE OF CONTENTS Information Systems Security Handbook Information Systems Security program elements. 7

U.S. Department of Energy Washington, D.C.

CITY OF HOUSTON. Executive Order. Information Technology (IT) Governance

I. Purpose - 1 MD # 0005

United States Secret Service Enterprise Architecture Review Board (EARB) Project Briefing for NAME OF PROJECT

HHS OCIO Policy for Information Technology (IT) Enterprise Performance Life Cycle (EPLC)

UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET Data Administration and Management (Public)

Section 37.1 Purpose Section 37.2 Background Section 37.3 Scope and Applicability Section 37.4 Policy... 5

DHS IT Successes. Rationalizing Our IT Infrastructure

United States Department of Health & Human Services Enterprise Architecture Program Management Office. HHS Enterprise Architecture Governance Plan

Legislative Language

December 8, Security Authorization of Information Systems in Cloud Computing Environments

Human Resources Management. Portfolio Management Concept of Operations

UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET

Concept of Operations for Line of Business Initiatives

GAO ELECTRONIC GOVERNMENT ACT. Agencies Have Implemented Most Provisions, but Key Areas of Attention Remain

CIOP CHAPTER Common Operating Environment (COE) Services Management Policy TABLE OF CONTENTS. Section Purpose

THE STATUS OF ENTERPRISE ARCHITECTURE AND INFORMATION TECHNOLOGY INVESTMENT MANAGEMENT IN THE DEPARTMENT OF JUSTICE

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS

5 FAM 620 INFORMATION TECHNOLOGY (IT) PROJECT MANAGEMENT

Information Security Guide For Government Executives. Pauline Bowen Elizabeth Chew Joan Hash

U.S. Department of Education Federal Student Aid

I. U.S. Government Privacy Laws

Department of Defense INSTRUCTION

Department of Homeland Security DHS Directives System Directive Number: Revision Number: 00 Issue Date: 07/25/2008 SAFETY AND HEALTH PROGRAMS

U.S. Department of Energy Washington, D.C.

Office of Audits and Evaluations Report No. AUD The FDIC s Controls over Business Unit- Led Application Development Activities

Value to the Mission. FEA Practice Guidance. Federal Enterprise Architecture Program Management Office, OMB

Manag. Roles. Novemb. ber 20122

COMMAND, CONTROL, COMMUNICATIONS, COMPUTERS AND INFORMATION TECHNOLOGY (C4&IT) INFRASTRUCTURE MANAGEMENT POLICY

Mixed Life Cycle FY2002

A. Title 44, United States Code, Chapter 35, Coordination of Federal Information Policy

Department of Homeland Security

a GAO GAO INFORMATION SECURITY Department of Homeland Security Needs to Fully Implement Its Security Program

DATA STANDARDS POLICY

IT Baseline Management Policy. Table of Contents

Data Center Consolidation Task Force DATA CENTER CONSOLIDATION TASK FORCE CHARTER

Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.

Federal Segment Architecture Methodology (FSAM): An Overview

Department of Homeland Security Office of Inspector General. Review of U.S. Coast Guard Enterprise Architecture Implementation Process

PREFACE TO SELECTED INFORMATION DIRECTIVES CHIEF INFORMATION OFFICER MEMORANDUM

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS

DEPARTMENTAL REGULATION

MEMORANDUM FOR HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES

Information Security Handbook: A Guide for Managers

Statement of Danny Harris, Ph.D. Chief Information Officer U.S. Department of Education

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT

AUDIT REPORT REPORT NUMBER Information Technology Professional Services Oracle Software March 25, 2014

MD 12.5 NRC CYBER SECURITY PROGRAM DT-13-15

This Instruction implements Department of Homeland Security (DHS) Directive , Privacy Policy for Operational Use of Social Media.

Standard. Enterprise Architecture Dispensation. 1. Statement. 2. Scope. 3. Dispensation Requests QH-IMP : Approach

A Practical Guide to. Federal Enterprise Architecture

TITLE III INFORMATION SECURITY

Identity and Access Management Initiatives in the United States Government

Department of Defense DIRECTIVE

Subject: Information Technology Configuration Management Manual

FSIS DIRECTIVE

COMDTINST JUL 2013 COAST GUARD C4I DATA MANAGEMENT (DM) POLICY

CMS Policy for Information Security and Privacy

CMS Policy for Capability Maturity Model Integration (CMMI)

United States Antarctic Program Information Resource Management Directive The USAP Information Security Program

NISTIR 7359 Information Security Guide For Government Executives

Federal Enterprise Architecture Using EA to Design Future-Ready Agencies and Implement Shared Services

Joint Operations Steering Committee Charter

Cybersecurity in the States 2012: Priorities, Issues and Trends

OPM System Development Life Cycle Policy and Standards. Table of Contents

Balanced Workforce Strategy. Guidance

GAO DATA CENTER CONSOLIDATION. Strengthened Oversight Needed to Achieve Cost Savings Goal. Report to Congressional Requesters

Department of Homeland Security Management Directives System MD Number: Issue Date: 03/01/2003 DHS USAGE

All. The President may direct any Federal agency pursuant to the authorities in sections 402, 403, and 502 of the Stafford Act.

Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE May 23, 2000.

Enterprise Performance Life Cycle Framework

DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 CLOUD COMPUTING SERVICES

Department of Defense INSTRUCTION

Transcription:

I. Purpose Department of Homeland Security DHS Directives System Directive Number: 103-02 Revision Number: 00 Issue Date: 6/19/2014 ENTERPRISE ARCHITECTURE MANAGEMENT This Directive establishes the Department of Homeland Security (DHS) policy on Enterprise Architecture (EA) and defines related roles and responsibilities for ensuring compliance with legislative and executive level guidance on EA. II. Scope A. This Directive applies throughout DHS, unless exempted by statutory authority. B. This cancels and supersedes the Addendum E, Enterprise Architecture Management, within Management Directive 0007.1, Information Technology Integration and Management. III. Authorities A. Public Law 104-106, Sections D and E, Clinger-Cohen Act of 1996 B. Public Law 107-347, E-Government Act of 2002 C. Public Law 111-352, The Government Performance and Results Modernization Act of 2010 D. Title 44, United States Code, Chapter 35, Coordination of Federal Information Policy E. Office of Management and Budget (OMB) Circular A-11, Preparing, Submitting and Executing the Budget F. OMB Circular A-130, Management of Federal Information Resources G. OMB Memorandum M-13-13, Open Data Policy Managing Information as an Asset H. DHS Delegation 04000, Delegation for Information Technology - 1 -

IV. Responsibilities A. The DHS Chief Information Officer (CIO): 1. Establishes the DHS Enterprise Architecture Program Management Office (EAPMO); 2. Appoints the Enterprise Architecture Director, who also serves as the DHS Chief Architect; 3. Collaborates with stakeholders across the DHS enterprise to identify strategic improvement opportunities, define target architectures, establish EA transition plans, and monitor the implementation of EA transition plans; 4. Ensures that the Enterprise Architecture program complies with applicable laws, OMB, and DHS policies and procedures, and has an effective governance process; 5. Issues procedures/instructions concerning the ongoing development, maintenance, and maturity of the DHS Enterprise Architecture in accordance with OMB and Government Accountability Office directives, instructions, policies, and memoranda of EA; 6. Promotes the practice of EA by establishing and delivering DHSwide training programs on EA; 7. Ensures that EA practices, principles, and information are incorporated into IT governance, portfolio management, capital planning, investment management, and other processes related to the planning, acquisition, and maintenance of information technology (IT); 8. Establishes annual performance goals for each Component s Enterprise Architecture as well as the overall DHS EA, measures the performance of each the Component s Enterprise Architecture program and overall DHS EA, and provides guidance on methods for continuous improvement; 9. Establishes the Enterprise Architecture Center of Excellence (EA COE) to promote and support the planning, implementation, and maturing of EA across DHS. The EA COE is a collaborative body that is chaired by the DHS Chief Architect and comprises the Chief Architects from each Component along with appropriate specialists from other DHS offices; and - 2 -

10. Ensures that DHS Data Management practices and principles are incorporated into Component s data management, information sharing and EA efforts and measures the performance of each Component s data management and information sharing effort on the Enterprise Data Management Scorecard. B. The Component Chief Information Officers: 1. Appoint and designate the Component Chief Architect (Chief Technology Officer or other like official) and provide resources for the execution of an EA Program; 2. Communicate Departmental EA policies, processes, and procedures throughout the Component and ensure all Component employees and contractors are in compliance; 3. Support the development and implementation of target architectures and transition plans across the segments of the DHS EA in collaboration with mission stakeholders and the DHS CIO or EAPMO; 4. Certify the sufficiency and completeness of Component information in DHS EA annually prior to the submission of the Homeland Security Architecture to OMB; 5. Provide periodic updates to the essential Component-related information at the appropriate level of detail in the DHS EA and in accordance with guidance from the DHS CIO or EAPMO; 6. Monitor the status of all conditions levied by the DHS EA Board on IT programs/projects, ensuring that conditions are resolved in a timely manner, and provide a monthly report to the DHS CIO on the status of any unresolved conditions; 7. Promote the practice of EA by establishing and delivering DHSwide training programs on EA within their respective Component and actively participating in the EA COE; and 8. Ensure that EA practices, principles, and information are incorporated into IT governance, portfolio management, capital planning, investment management, and other processes related to the planning, acquisition, and maintenance of information technology. - 3 -

V. Policy and Requirements A. The DHS EA Program provides a vehicle to tie the strategic mission goals and objectives of DHS to the business processes, information resources and technology investments necessary to reach key performance outcomes. The EA provides a resource of information about the performance metrics, lines of business, information and the enabling services and technologies currently used within DHS. The EA also provides the roadmap for implementing the capabilities needed to achieve the Department s key performance outcomes and ensures efficient use of resources. B. The DHS EA complies with legislative mandates, Federal initiatives, and oversight requirements. Specifically, the Federal Enterprise Architecture is used as guidance. C. All DHS IT systems aligns with the Department s EA. D. Employees and officials implements the EA consistent with the following principles: 1. Develop information systems and services that facilitate interoperability and sharing of applications across DHS; 2. Meet information technology needs through cost effective intraagency and interagency sharing and reuse of existing capabilities, before acquiring new IT resources; 3. Establish a level of security for all information systems that is commensurate to the risk and magnitude of the harm resulting from the loss, misuse, unauthorized access to, or modification of the information stored in or flowing through these systems; and 4. Develop information systems that utilize cost-effective data management and data architecture practices to ensure data is trusted, reliable, and reusable. - 4 -

VI. Questions Address any questions or concerns regarding this Directive to the Office of the Chief Information Officer. - 5 -