© 2006 The MITRE Corporation. All rights reserved Use of the FEA Reference Models for the Continuity Communications Architecture Charlie Martinez, D440.

Slides:



Advertisements
Similar presentations
CPIC Training Session: Enterprise Architecture
Advertisements

A BPM Framework for KPI-Driven Performance Management
Distributed Data Processing
© 2009 The MITRE Corporation. All rights Reserved. Evolutionary Strategies for the Development of a SOA-Enabled USMC Enterprise Mohamed Hussein, Ph.D.
HP Quality Center Overview.
Enhancing Data Quality of Distributive Trade Statistics Workshop for African countries on the Implementation of International Recommendations for Distributive.
ITIL: Service Transition
IS 700.a NIMS An Introduction. The NIMS Mandate HSPD-5 requires all Federal departments and agencies to: Adopt and use NIMS in incident management programs.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Lecture 5 Themes in this session Building and managing the data warehouse Data extraction and transformation Technical issues.
Business Crisis and Continuity Management (BCCM) Class Session
June 3, E-Gov and the Federal Enterprise Architecture Presentation to the Ontolog Forum Marion A. Royal November 06, 2003.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Reference Models مدل های مرجع معماری.
IT Planning.
Considering an Enterprise Architecture for the NSDI
Doug Nebert FGDC Secretariat June 2006
Course Instructor: Aisha Azeem
Embedding Records Management into Agency Processes The FEA Records Management Profile Laurence Brewer, CRM National Archives and Records Administration.
What is Business Analysis Planning & Monitoring?
FEA DRM Management Strategy 11 October 2006 “Build to Share”
TDT4252/DT8802 Exam 2013 Guidelines to answers
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
Unit 5:Elements of A Viable COOP Capability (cont.)  Define and explain the terms tests, training, and exercises (TT&E)  Explain the importance of a.
PROJECT NAME: DHS Watch List Integration (WLI) Information Sharing Environment (ISE) MANAGER: Michael Borden PHONE: (703) extension 105.
Business Analysis and Essential Competencies
The Challenge of IT-Business Alignment
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 6 Slide 1 Requirements Engineering Processes l Processes used to discover, analyse and.
A GENERIC PROCESS FOR REQUIREMENTS ENGINEERING Chapter 2 1 These slides are prepared by Enas Naffar to be used in Software requirements course - Philadelphia.
Event Management & ITIL V3
How to Manage Data Across Agencies Using the FEA DRM 11 September 2006
IRM304 CDR Course Manager: Denny Involved Competency Leads: 26 (Cybersecurity)-Denman, 19 (Measurement)-Denny, 7 (DBS)-Corcoran [Capability Planning],
P1516.4: VV&A Overlay to the FEDEP 20 September 2007 Briefing for the VV&A Summit Simone Youngblood Simone Youngblood M&S CO VV&A Proponency Leader
FEA DRM Management Strategy Presented by : Mary McCaffery, US EPA.
EPA Geospatial Segment United States Environmental Protection Agency Office of Environmental Information Enterprise Architecture Program Segment Architecture.
Seminar 2 – Part 1 Managing Data to Improve Business Performance Ref: Chapter 3 of Turban and Volonino.
1 DAS Annual Review June 2008 “Build to Share” Suzanne Acar, US DOIAdrian Gardner, US National Weather ServiceCo-Chair, Federal DAS
Overview of FEA Geospatial Profile, Version 0.3 Doug Nebert FGDC Secretariat.
Shaping a Health Statistics Vision for the 21 st Century 2002 NCHS Data Users Conference 16 July 2002 Daniel J. Friedman, PhD Massachusetts Department.
The FEA Data Reference Model V2.0 Michael C. Daconta, DRM Working Group Lead Susan Turnbull, AIC Representative Mary McCaffery, FEA PMO Representative.
1 Sobah Abbas Petersen Adjunct Associate Professor TDT4252 Modelling of Information Systems Advanced Course TDT4252, Spring 2011 Lecture.
Purpose: The purpose of CMM Integration is to provide guidance for improving your organization’s processes and your ability to manage the development,
CSE300 EAIusing EJB & XML CSE Enterprise Application Integration Using EJB and XML by Prithwis Sett Mumtaz Lohawala Nayana Paranjape.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
Name Project Management Symposium June 8 – 9, 2015 Slide 1 Susan Hostetter, Reed Livergood, Amy Squires, and James Treat 2015 Project Management Symposium.
21/1/ Analysis - Model of real-world situation - What ? System Design - Overall architecture (sub-systems) Object Design - Refinement of Design.
1 Chapter 2 Database Environment Pearson Education © 2009.
© 2006 The MITRE Corporation. All rights reserved EA in the Federal Enterprise Life Cycle September 2006 Steve Decker MITRE Corporation Center for Enterprise.
National Geospatial Enterprise Architecture N S D I National Spatial Data Infrastructure An Architectural Process Overview Presented by Eliot Christian.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
1 Federal Emergency Management Agency Charlie Hoffman Disaster Operations Directorate Chief, DEC Programs Disaster Emergency Communications National Public.
Enterprise Architectures Course Code : CPIS-352 King Abdul Aziz University, Jeddah Saudi Arabia.
Financial Services Sector Coordinating Council (FSSCC) 2011 KEY FSSCC INITIATIVES 2011 Key FSSCC Initiatives Project Name: Project Description: All-Hazards.
Introduction: Databases and Database Systems Lecture # 1 June 19,2012 National University of Computer and Emerging Sciences.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
ITIL: Service Transition
Discovering Computers 2010: Living in a Digital World Chapter 14
IC Conceptual Data Model (CDM)
What does the State GIS Coordinator do?
Enterprise Architecture Methods
Standards-based Best Practices and the FEA Business Reference Model
CVE.
Chapter 9 Architectural Design.
Introduction to: National Response Plan (NRP)
, editor October 8, 2011 DRAFT-D
Chapter 1 Database Systems
Continuity of Operations Planning
Project Certification Planning Phase August 27, 2014
Presentation transcript:

© 2006 The MITRE Corporation. All rights reserved Use of the FEA Reference Models for the Continuity Communications Architecture Charlie Martinez, D440 Sheila Cane, W906 7 September 2006 Approved for Public Release Distribution Unlimited Case Number:

© 2006 The MITRE Corporation. All rights reserved 2 Overview n Project Background n CCA Metamodel n CCA Analytical Objectives n Toolset Design Objectives n Relationship to FEA Reference Models n Use of Reference Models in Toolset n Lessons Learned from Use of Reference Models

© 2006 The MITRE Corporation. All rights reserved 3 Continuity Communications Architecture (CCA) Project Background n Overall Objective –Ensure communications among Federal Executive Branch Departments and Agencies (D/As) to support the National Essential Functions (NEFs) under all types of national emergency situations n Three-Phased Approach –Document the As-Is CCA –Assess the As-Is CCA for gaps in capabilities –Propose a To-Be CCA to close the gaps n As-Is CCA Technical Approach –Develop a Metamodel for the CCA –Implement the Metamodel in a CCA Toolset n Use FEA Reference Models to the maximum extent possible –Use the CCA Toolset to document the As-Is CCA n Use “pick lists” to ensure data consistency and integrity –Use relational database to analyze gaps in capabilities

© 2006 The MITRE Corporation. All rights reserved 4 CCA Metamodel Three Major Components n Environment/Situation –The Scenarios under which the D/As must operate n Operations/Business –What the D/As must do in any given Scenario n Infrastructure –The facilities, communications systems, hardware/software, and other capabilities the D/As use to accomplish their priority missions Infrastructure Operations/ Business Environment/ Situation

© 2006 The MITRE Corporation. All rights reserved 5 Communications Computing/Storage Platforms Information Content D/As Applications Reside on Process Store Operations/Business PMEFs NEFs Support Use Perform Require/ Produce Require/ Produce * Fixed and/or Mobile Geographic Locations Reside at Information Representations Connect Described by Exchanges Scenarios Drive Define Effects Affect Other Orgs Operational Services Enable Infrastructure Other Functions Implement Perform Reside at Environment/Situation Security Restricts Protects Facilities* Are Identified With CCA Metamodel Relationships

© 2006 The MITRE Corporation. All rights reserved 6 CCA Analytical Objectives Operational/ Business (As-Is) Infrastructure (To-Be) Infrastructure (As-Is) Operational/ Business (To-Be) NEFs Questions that need to be answered Have the D/As identified the right set of priority functions and partner organizations to support the NEFs? Do the D/As have the existing infrastructure to support performance of their own priority functions? Do the D/As have the existing infrastructure to communicate amongst each other in support of their priority functions? Will proposed changes to priority functions and infrastructure (the To- Be) adequately address gaps in continuity communications and the ability to support the NEFs? Proposed changes to meet operational gaps Proposed changes to meet infrastructure gaps

© 2006 The MITRE Corporation. All rights reserved 7 Communications Information Content D/As Applications PMEFs NEFs Information Representations Scenarios Effects Security Communications Security Information Content D/As Applications PMEFs NEFs Information Representations Geographic Locations Environment/Situation Ops/Business Infrastructure Ops/Business Infrastructure Information Consumer Information Producer Framework for CCA Analysis Assessments of Connectivity, Interoperability, & Compatibility

© 2006 The MITRE Corporation. All rights reserved 8 Toolset Design Objectives n Ability to capture all relevant CCA information –Detailed descriptions of metamodel components –Explicit relationships among the metamodel components n Ability to support analytical objectives –Query and analysis capability –Consistency in contents n Ability to facilitate data collection –Maximum use of standardized terminology –Built-in error checking n Traceability to FEA Reference Models –Performance –Business –Data –Service Component –Technical

© 2006 The MITRE Corporation. All rights reserved 9 Communications Computing/Storage Platforms Information Content D/As Applications Reside on Process Store Operations/Business PMEFs NEFs Support Use Perform Require/ Produce Require/ Produce * Fixed and/or Mobile Geographic Locations Reside at Information Representations Connect Described by Exchanges Scenarios Drive Define Effects Affect Other Orgs Operational Services Enable Infrastructure Other Functions Implement Perform Reside at Environment/Situation Security Restricts Protects Facilities* Are Identified With Relationship to FEA Reference Models SRM BRM Derived From Traceable to DRM TRM Inspired by Derived From PRM

© 2006 The MITRE Corporation. All rights reserved 10 Uses of FEA Reference Models in CCA n Performance Reference Model (PRM) –Operational performance (NEFs and PMEFs) n Identify enterprise-level performance measures n E.g., timeliness of essential function startup during emergency –Programmatic performance (CCA) n Program Mgmt Plan specifies performance of the architecture toolset n Does the toolset function as intended? E.g., does it find gaps in capabilities? D/As PMEFs NEFs Support Perform Require/ Produce Enable PRM

© 2006 The MITRE Corporation. All rights reserved 11 Uses of FEA Reference Models in CCA n Business Reference Model (BRM) –Applies to PMEFs and functions performed by other organizations in support of PMEFs –Supports coverage of Federal Executive Branch (FEB) Business Areas n Analysis compares PMEFS with Business Areas (BA) and Lines of Business (LOB) to ensure coverage of FEB responsibilities n Simple example: All FEB Departments and Agencies (D/As) should have disaster management (BA) including disaster repair and restore (LOB) for their services to citizens D/As PMEFs Perform Require/ Produce Drive Other Orgs Other Functions Perform Reside at BRM Traceable to

© 2006 The MITRE Corporation. All rights reserved 12 Uses of FEA Reference Models in CCA n DRM –Used for Information Content & Information Representations –As recommended in the FEA, begins with the first two levels of the BRM and adds a 3 rd layer to describe broad types of information exchange within a line of business n Report of facts or statistics, guidance, direction, request for information, request for authority, financial transaction –Links information content with information representation n Shows which information standards meet operational information content needs Information Content Information Representations Described by Exchanges DRM Derived From

© 2006 The MITRE Corporation. All rights reserved 13 Uses of FEA Reference Models in CCA n SRM –Used directly as a pick list to identify operational services n Some extensions necessary –Used as reference for applications –Used to link business service needs with applications n Shows how applications meet operational needs Applications Operational Services Implement SRM Derived From

© 2006 The MITRE Corporation. All rights reserved 14 Uses of FEA Reference Models in CCA n TRM –Used as a reference model to develop pick lists for all infrastructure components –Via links to applications and information representation, shows how technology infrastructure meets operational needs Communications Computing/Storage Platforms Applications Reside on Process Store * Fixed and/or Mobile Reside at Information Representations Connect Exchanges Affect Infrastructure Security Restricts Protects TRM Inspired by

© 2006 The MITRE Corporation. All rights reserved 15 Lessons Learned from Using FEA Reference Models n FEA reference models are just that: reference models –Do not have to be used exactly as specified –They keep us from re-inventing the wheel –They help us standardize on terminology –They remind us about important aspects of a problem we may not have considered n Hierarchies in the reference models are good, but there are places where they are difficult to use –Not an easy job in the first place

© 2006 The MITRE Corporation. All rights reserved 16 n Performance Reference Model (PRM) –The PRM is made for problems like COOP/COG n Responsiveness and timeliness to implement services in a crisis –PRM gives categories but does not provide example metrics n Requires creativity (re-invention) on the part of the PRM user –Programmatic performance is more difficult to define at the enterprise level n Measuring system response time is useful as long as the “right” system is responsive n Financial metrics such as ROI are difficult to calculate n How do we know we have performed? ­Gaps found and resolved does not lend itself to measurement as a percentage to be tracked over time. We can however, measure this as yes or no, or as integer quantities that we would like to see increase. Lessons Learned from Using FEA Reference Models

© 2006 The MITRE Corporation. All rights reserved 17 n BRM –Useful for categorizing information needs and identifying relevant activities n DRM –DRM recommendation to use top 2 levels of BRM and then add detail was helpful n Provided data context n We generalized the information content across contexts –CCA is not attempting detailed data modeling across the FEB n Too complex, too much coordination required for results time- horizon n CCA models information representation standards rather than data standards Lessons Learned from Using FEA Reference Models

© 2006 The MITRE Corporation. All rights reserved 18 n SRM –Includes good coverage of operational services –Confusion between FEA SRM, Service Oriented Architectures (SOA), and how they relate n Includes some operational services which are hard to distinguish from application services n Can be difficult to decide which to use where n TRM –Provides ideas for technologies and standards that should be considered –Does not try to lock you into a particular set of technologies –Technology lists provides examples only, not enough detail within categories Lessons Learned from Using FEA Reference Models

© 2006 The MITRE Corporation. All rights reserved Backups

© 2006 The MITRE Corporation. All rights reserved 20 National Essential Functions (NEFs) n Preserve our Constitutional form of government n Provide visible leadership to the Nation and the world n Defend against all enemies, foreign or domestic n Maintain and foster foreign relations n Protect against threats to the homeland n Provide rapid response to emergency situations n Protect and stabilize the nation's economy n Provide critical Federal government services