Www.actgov.org Networks & Telecom SIG “Modernizing Government” March Membership Meeting Chair – Roxane Rucker, Qwest Government Services, Inc. Vice Chair.

Slides:



Advertisements
Similar presentations
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Advertisements

Advancing Government through Collaboration, Education and Action Cloud Computing Working Group Stacy Cleveland, Chair.
Clouds C. Vuerli Contributed by Zsolt Nemeth. As it started.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Yale University Information Technology Services Administrative Systems Art Hunt 3/22/04 Software Service Level Agreement with Finance, Procurement and.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Information Visualization Solutions March 15-16, 2007 Information Visualization Solutions Team Overview & Analysis ~ Michael Hardy.
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
IT PLANNING Enterprise Architecture (EA) & Updates to the Plan.
The Cloud: Demystified Neil Cattermull Frontier Technology.
Measuring the effectiveness of government IT systems Current ANAO initiatives to enhance IT Audit integration and support in delivering Audit outcomes.
High-Level Assessment Month Year
Be Smart, Use PwrSmart What Is The Cloud?. Where Did The Cloud Come From? We get the term “Cloud” from the early days of the internet where we drew a.
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
by Evolve IP Managed Services
Discussion on LI for Mobile Clouds
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
Basel Accord IITRANSITIONSERVICES Business Integration Support FCM Management Limited Paris New York Toronto.
Introduction to Cloud Computing
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Moving to the Cloud HHS Directions in Cloud Computing Mary Forbes, Chief Enterprise Architect Scott Cory, Capital Planning and Investment Control Officer.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
The Cost of Cheap Understanding Your IT Investment Options.
Cloud Models – Iaas, Paas, SaaS, Chapter- 7 Introduction of cloud computing.
1 expect the best Tuesday October 25, 2005 Service Management Organization Overview.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
EarthLink Server Management and Monitoring Updated August 6, 2015.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
Roles and Responsibilities
In the name of God :).
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
ITIL Overview 1 Configuration Management Working Group February 8, 2011.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
2009 Federal IT Summit Cloud Computing Breakout October 28, 2009.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Module 1 Introduction to Designing a Microsoft® Exchange Server 2010 Deployment.
Cloud Computing Use Case Draft v2.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Network and Telecommunications SIG 3/24/2010 The Year of “Modernizing Government” Chair – Roxanne Rucker, Qwest Government Services, Inc.
Government and Industry IT: one vision, one community Vice Chairs April Meeting Agenda Welcome and Introductions GAPs welcome meeting with ACT Board (John.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
CISC 849 : Applications in Fintech Namami Shukla Dept of Computer & Information Sciences University of Delaware A Cloud Computing Methodology Study of.
Web Technologies Lecture 13 Introduction to cloud computing.
State of Georgia Release Management Training
Federal Acquisition Service U.S. General Services Administration Karl Krumbholz Director, Network Services Programs Integrated Technology Services Federal.
Government and Industry IT: one vision, one community Networks & Telecommunications (N&T) Shared Interest Group (SIG) “Modernizing Government” Chair: Roxane.
Information Technology Assessment Findings Presented to the colleges of the State Center Community College District.
© 2015 TriZetto Corporation Managed Services Overview Presenter Names 2.
G-Cloud - The Delivery of a Shared Computing Platform for Government Ian Osborne Director, Digital Systems KTN Intellect.
Towards the Cloud! Ian Osborne Director, Digital Systems KTN, Intellect.
ITIL and Remedy ITSM Implementation Overview
Pennsylvania Health Information Exchange NJHIMSS - DVHIMSS Enabling Healthcare Transformation Through Information Technology September, 2010.
Microsoft Cloud Adoption Framework Foundation
Review of IT General Controls
Unit 3 Virtualization.
Understanding The Cloud
Cloud Adoption Framework
Federated IdM Across Heterogeneous Clouding Environment
Hyper-V Cloud Proof of Concept Kickoff Meeting <Customer Name>
Introduction to Cloud Computing
Technology Management- A CIO Perspective
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
By Jeff Burklo, Director
Fundamental Concepts and Models
Productive + Hybrid + Intelligent + Trusted
Presentation transcript:

Networks & Telecom SIG “Modernizing Government” March Membership Meeting Chair – Roxane Rucker, Qwest Government Services, Inc. Vice Chair – Chris Chroniger, NetStar-1 12/08/2009

Agenda 10:00 Welcoming/Introduction 10:05 Ed O’Hare, GSA FAS ITS Assistant Commissioner, "GSA Integrated Technology Services - What's Ahead in 2010?" 11:00Business Meeting 12:00Adjourn

Business Meeting

Government and Industry IT: one vision, one community N&T Overview Focus for Federal Infrastructure Modernization Cloud Computing National Broadband Networx Transition/MTIPS/Transformation Wireless Sub-Committee –Wireless in Health IT –Land-Mobile Radio

Government and Industry IT: one vision, one community N&T Overview Plan to foster working across industry and government in this community –Actively engaging other service providers in program planning –Added new GAP member, DOL CTO –Broadly define N&T SIG programs based on evolving role and definition of Network and Telecom services – “Not just pipes…” –Speaker’s Program targeting senior industry and government participation –Expanded usage of Web 2.0 tools

Government and Industry IT: one vision, one community N&T Overview Target Community – Infrastructure Delivery & Operations –Civilian Agencies: CIO Office, Telecom/Enterprise Services –DOD/DISA: Network Services, Military Departments –Health IT: TriCare, Veterans Affairs, HHS –Regulatory Agencies: FCC –Emergency Responders: DHS, Interior, and State/Local –Program Office, Engineering and Technical Community in industry and government

Announcements New! N&T SIG Communications Officer – Harry Perper, CavTel New! Government Advisory Panel Member – Hamid Ouyachi, Department of Labor – Chief Technology Officer March 24 - IAC Community Fair April 9 – Washington Capitals Fun Night! April 19 – Erik Garr, Federal Communications Commission, National Broadband Strategy Mid June - ACT IAC Cloud Computing Day - A panel of five Government participants addressing their achievements, current challenges, and future opportunities relating to creating and successfully deploying a cloud or virtualization strategy.

Government and Industry IT: one vision, one community N&T SIG Upcoming Activities ProjectGov SponsorObjectiveDeliverableTimeCollab. ITS 2010Ed O’Hare, Asst. Comm. GSA FAS Plans ahead for GSA Network Services, GWACs, and GSA Schedules Speaker & PresentationMarch 05N/A DOL ModernizationHamid Ouyachi, DOL CTO Agency modernization objectives & execution Speaker & PresentationApril 05N/A Emergency Communications Jeff King - Branch Chief, Office of Emergency Communications, DHS Current trends in Emergency Communications including Land Mobile Radio – Speaker and Presentation Panel DiscussionApril 13N/A National Broadband Plan Erik Garr, FCC, General Mgr - NBP National Broadband Plan Rollout Speaker & PresentationApril 19N/A GSA Network Services Conference Karl Krumbholz, Director GSA FAS Networx Transition / Transformation Update Speaker & PresentationJune 21N/A

Cloud Computing Initiative

Background ACT-IAC Cloud Computing Cross SIG working group was formed to leverage expertise of each SIG to support Industry and Governments Cloud Computing initiatives.

Use Case Approach There are numerous Cloud Computing Use Cases or other Cloud Computing documents available. Most if not all of this material is focused on the CXO level providing high-level concepts and strategic and financial benefits of using the Cloud. ACT-IAC’s goal is to develop a Use Case that helps GSA further prepare the Federal Government for Cloud adoption by: Developing a Use Case that focuses on the Federal Environment Targets the Operational details of Cloud Computing within the Federal environment

Use Case Approach Messaging Services (Specifically Microsoft Exchange) was chosen as the first specific Use Case as it is a critical application to all Federal entities with MS achieving an estimated 80%+ usage rate. An Operational View was take to prepare Federal Operations for Cloud implementation. GSA can leverage the Operational details within the Use Case to ensure that any/all RFP’s issued for Cloud Services have a provision to address the operational requirements

Use Case Approach Critical Operational Areas include: –Service Level Agreements (SLA) –End to End Service Management (ITSM) –Security, FISMA Compliance –Enterprise Architecture (EA) –Linkage to External Components and Systems Standards required to prevent vendor lock-in Integration points required to provide service –Procurement Process –Policy –Operational Concerns

Use Case Approach Use Case provides Four Views of Messaging Services: –Current – typical view of messaging services being provided internally by a agency –IAAS – provides a view and impact if IAAS services is used to provide the messaging services –PAAS – provides a view and impact if PAAS services is used to provide the messaging services –SAAS – provides a view and impact if SAAS services is used to provide the messaging services

Use Case - Current Operational View of Cloud Computing ServicesKey:Internal/Existing Federal Network Cloud Computing Use Case - Microsoft Exchange E- mail Cloud Provider Public Cloud Computing ServiceNew Interface Cloud Computing Category Service DescriptionService ProviderService Level Agreements (SLA) IT Service Management (ITSM) SecurityEnterprise Architecture (EA) Linkage to External Components and Systems Procurement ProcessPolicyOperational Concerns Software as a Service (SaaS) The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based ). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. Delivers a business service to consumers, owns configuration of system based on requirements and end to end delivery of system and all SLA defined Possibilities: System Uptime, Account Mgmt (adds, changes, deletions), Application availability, Disaster Recovery, Capacity Mgmt, Reporting and Metrics, Licensing Users call agency help desk. Help Desk escalates to internal ops team Full FISMA Compliance with ATO as part of the overall General Support System (GSS) Active Directory integration is required to provide standardized single sign-on and user administration Users are added/deleted as needed based on an enterprise level agreement. True-Up process is utilized annually to establish the license costs based on # of users, # of servers, etc. Operational approval for users and associated costs are performed as part of the new user request process. Alternately, peruse licensing is available from provider with no minimum term for use of shared services Internal policy has to synch with Service Provider controls Service provider compliance must be evaluated regularly. The sensitivity of data processed by the service must be aligned to the level of trust and policy compliance to client standards. Capacity Planning, Operational risk, some security risk all assumed by service provider. Some security risk is shared. Processes and Controls for Capacity Planning, Operational risk, some security risk all implemented by service provider. Comsumer is ultimately responsible for impact to the business/mission. Platform as a Service (PaaS) The capability provided to the consumer is to deploy onto the cloud infrastructure consumer- created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. Service Owner - owns the installation, setup, maintenance, patching, etc. of the Application Provides a platform service that supports development of a business service. Owns the installation, setup, maintenance, patching, etc. of the software and SLA's and configuration management of the API to deliver functionality promised Uptime Restore OS and App Restore specific inbox, calendar Proactive Capacity Mgmt - Storage, Memory Systems and Network teams own Tier-2/3 problem identification and resolution. Maintenance/Licensi ng agreements provide access to support through Microsoft to include system patches, configuration reviews and audits, etc. Application Patch Management Operational Security Procedures, SOPs Security Monitoring of Application activity Active Directory integration is required to allow standard system management and administration to include the use fo standardized system images, patch and anti-virus management. Catalog integration to request and change services DNS integration for mail routing Support costs to include (HW, SW, Personnel, etc.) are procured and established annually based on historical trends and future estimates. Daily operational personnel work to manage the environment based on new requests, but do not have hard costs approval or measurements included in the daily process. Internal policy has to synch with Service Provider controls Service provider compliance must be evaluated regularly. The sensitivity of data processed by the service must be aligned to the level of trust and policy compliance to client standards. Capacity Planning, Operational risk assumed by service provider. Processes and Controls for Capacity Planning, Operational risk, some security risk all implemented by service provider. Comsumer is ultimately responsible for impact to the business/mission. Infrastructure as a Service (IaaS) The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). Service Provider - owns the installation, setup, maintenance, patching of the Operating System and the physical servers, data center, storage, etc. Provides a platform component from which systems can be built. Owns the installation, setup, maintenance, patching of the Operating System and the physical servers, data center, storage, etc. Uptime Restore OS Restore DB Proactive Capacity Mgmt - CPU, Network Systems and Network teams own Tier-2/3 problem identification and resolution. Hardware Maintenance is procured from the appropriate vendor based on server models (i.e. Dell, HP, etc.) Server OS Patch Management Operational Procedures, SOPs, Security Monitoring of System, Network, NIST/DISA checklists Storage is provided through a SAN with the appropriate performance and storage scalability chararcteristics VM Management integraiton Catalog integration to request and change services Users are added/deleted as needed based on capacity of the physical infrastructure. Physical Infrastructure capacity is estimated based on historical trends, future estimates and is procured as appropriate once or twice a year utilizing a well defined Federal procurement process. Internal policy has to synch with Service Provider controls Service provider compliance must be evaluated regularly. The sensitivity of data processed by the service must be aligned to the level of trust and policy compliance to client standards. Capacity Planning, some Operational risk assumed by service provider. Processes and Controls for Capacity Planning, Operational risk, some security risk all implemented by service provider. Consumer is ultimately responsible for impact to the business/mission.

Use Case - IaaS Cloud Computing Category Service DescriptionService ProviderService Level Agreements (SLA) IT Service Management (ITSM) SecurityEnterprise Architecture (EA) Linkage to External Components and Systems Procurement ProcessPolicyOperational Concerns Software as a Service (SaaS) The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based ). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. Delivers a business service to consumers, owns configuration of system based on requirements and end to end delivery of system and all SLA defined Possibilites: System Uptime, Account Mgmt (adds, changes, deletions), Application availability, Disaster Recovery, Capacity Mgmt, Reporting and Metrics, Licensing Users call agency help desk. Help Desk escalates to internal ops team Full FISMA Compliance with ATO as part of the overall General Support System (GSS) Active Directory integration is required to provide standardized single sign-on and user administration Users are added/deleted as needed based on an enterprise level agreement. True-Up process is utilized annually to establish the license costs based on # of users, # of servers, etc. Operational approval for users and associated costs are performed as part of the new user request process. Alternately, peruse licensing is available from provider with no minimum term for use of shared services Internal policy has to synch with Service Provider controls Service provider compliance must be evaluated regularly. The sensitivity of data processed by the service must be aligned to the level of trust and policy compliance to client standards. Capacity Planning, Operational risk, some security risk all assumed by service provider. Some security risk is shared. Processes and Controls for Capacity Planning, Operational risk, some security risk all implemented by service provider. Comsumer is ultimately responsible for impact to the business/mission. Platform as a Service (PaaS) The capability provided to the consumer is to deploy onto the cloud infrastructure consumer- created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. Service Owner - owns the installation, setup, maintenance, patching, etc. of the Application Provides a platform service that supports development of a business service. Owns the installation, setup, maintenance, patching, etc. of the software and SLA's and configuration management of the API to deliver functionality promised Uptime Restore OS and App Restore specific inbox, calendar Proactive Capacity Mgmt - Storage, Memory Systems and Network teams own Tier-2/3 problem identification and resolution. Maintenance/Licensi ng agreements provide access to support through Microsoft to include system patches, configuration reviews and audits, etc. Application Patch Management Operational Security Procedures, SOPs Security Monitoring of Application activity Active Directory integration is required to allow standard system management and administration to include the use fo standardized system images, patch and anti-virus management. Catalog integration to request and change services DNS integration for mail routing Support costs to include (HW, SW, Personnel, etc.) are procured and established annually based on historical trends and future estimates. Daily operational personnel work to manage the environment based on new requests, but do not have hard costs approval or measurements included in the daily process. Internal policy has to synch with Service Provider controls Service provider compliance must be evaluated regularly. The sensitivity of data processed by the service must be aligned to the level of trust and policy compliance to client standards. Capacity Planning, Operational risk assumed by service provider. Processes and Controls for Capacity Planning, Operational risk, some security risk all implemented by service provider. Comsumer is ultimately responsible for impact to the business/mission. New Service Management Interface Tools will be required to monitor and report on SLAs E-Bonding Systems, SOPs and other Service Management mechanisms must be updated to integrate and provide end to end service management Audit and validation methodologies must be detailed in MOU/ISA documentation Need defined rules as to who is authorized to acquire new services or expand capacity. Requires operational changes and integration with financial management processes Infrastructure as a Service (IaaS) The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). Service Provider - owns the installation, setup, maintenance, patching of the Operating System and the physical servers, data center, storage, etc. Provides a platform component from which systems can be built. Owns the installation, setup, maintenance, patching of the Operating System and the physical servers, data center, storage, etc. Uptime Restore OS Restore DB Proactive Capacity Mgmt - CPU, Network Systems and Network teams own Tier-2/3 problem identification and resolution. Hardware Maintenance is procured from the appropriate vendor based on server models (i.e. Dell, HP, etc.) Server OS Patch Management Operational Procedures, SOPs, Security Monitoring of System, Network, NIST/DISA checklists Storage is provided through a SAN with the appropriate performance and storage scalability chararcteristics VM Management integraiton Catalog integration to request and change services Users are added/deleted as needed based on capacity of the physical infrastructure. Physical Infrastructure capacity is estimated based on historical trends, future estimates and is procured as appropriate once or twice a year utilizing a well defined Federal procurement process. Internal policy has to synch with Service Provider controls Service provider compliance must be evaluated regularly. The sensitivity of data processed by the service must be aligned to the level of trust and policy compliance to client standards. Capacity Planning, some Operational risk assumed by service provider. Processes and Controls for Capacity Planning, Operational risk, some security risk all implemented by service provider. Consumer is ultimately responsible for impact to the business/mission.

Use Case Next Steps Once Model is reviewed and approved, the Cloud Computing Cross SIG group can quickly adapt the Use Case for other specific services or views to include: –Specific Services example: Development Environments Major Applications (Financial Systems, HR Systems, etc.) Data Center Services –Specific Views examples: CIO View CFO View Procurement View