Presentation is loading. Please wait.

Presentation is loading. Please wait.

2010 EA Conference Reference Architecture Track Terry Hagle, Office of DoD CIO/AS&I 703-607-0235 terry.hagle@osd.mil.

Similar presentations


Presentation on theme: "2010 EA Conference Reference Architecture Track Terry Hagle, Office of DoD CIO/AS&I 703-607-0235 terry.hagle@osd.mil."— Presentation transcript:

1 2010 EA Conference Reference Architecture Track Terry Hagle, Office of DoD CIO/AS&I

2 Agenda Enterprise Reference Architecture Cell (ERAC) Overview – Terry Hagle Reference Architecture (RA)– Steve Ring Principles Technical Positions Patterns Enterprise-wide Access to Network and Collaboration Services (EANCS) RA – Norm Minekime DoD Information Enterprise Architecture (IEA) – Al Mazyck Purpose/Background Content Application of the DoD IEA Example EANCS RA Compliance with the DoD IEA

3 ERAC OVERVIEW

4 Enterprise Reference Architecture Cell (ERAC)
Components have expressed the need for more detailed guidance Enterprise patterns and processes Army CIO/G-6 Comment on DoD IEA v1.1: “…establish a separate DoD IEA Reference Architecture with sufficient granularity to enable interoperability across the DOD IE/GIG. To foster such interoperability, these reference architectures would need to include processes, process patterns and service patterns, as well as service interfaces and metrics.” Purpose: Develop the reference architecture (artifacts) Assist IT Decision Makers/Components/Programs/Solution Architects as directed Work as an advisor to the functional architect Assist in the proper application of the DoD IEA, DoDAF and DARS Conduct architecture assessments as directed Assess architecture compliance w/DoD IEA Event Driven - Net Centric Reviews (ED-NCR) JCIDS/DAS Milestone Reviews Management: ERAC funded by and resources managed by EA&S Taskings and guidance from the EGB/ASRG

5 Enterprise Reference Architecture Mission Statement
The intent of Reference Architecture is to: Normalize the institutional understanding of capabilities at the enterprise level and provide a common set of principles, patterns, and technical positions for use within the DoD to guide development of Enterprise, Segment, or Solution architectures. Development of a Reference Architecture is a process that results in the required content 5

6 Reference Architecture Description
Five components of a Reference Architecture: Strategic Purpose Describes the context, scope, goals, purpose, and intended use of the RA Principles High-level statements about the IT environment that tie back to business goals Incorporate values, organizational culture, and business goals Drive Technical Positions (and Patterns) Technical Positions Statements that provide technical guidance (standards, technologies, etc) for use with each major architectural component or service Patterns/Templates Diagrams that address the distribution of systems functions and how they relate topologically Models that show relationships between components specified by the Technical Positions Vocabulary Reference Architecture Description 6

7 ERAC Process for Developing RA
The ERAC leverages the six step architecture development process of the DoDAF The process steps are: Clarify Purpose (Architects & Architecture Owner) Clarify Scope (Architects & Architecture Owner) Identify key questions (Architects & Architecture Owner) Determine required data/information (architects) Collect and Organize data/information (architects collect & organize, SMEs provide) Analyze architecture data/information (architects) Document the results (architects) Use or apply results (Architecture Owner) Architects = ERAC Architecture Owner = ESF SMEs = ESF, CI, COCOMS, JS, SVCs 7

8 Proposed RA Product Structure
DoDAF Models to Be Developed: AV-1, AV-2, OV-1, OV-5a, OV-6a/c, and StdV-1 Overview and Summary Information (AV-1) Contract between Architecture Owner and Architect Guides development of the RA Executive level presentation of RA DM2: Vocabulary and Semantics Reference Architecture Document Introduction (Content from AV-1) Context and Relationships (Resulting Principles) Term Definitions Architectural Patterns Generic Standards and profiles – policy Use Case/Use Case Analysis Implementation Specifics Specific Technical Standards and Profiles Deployment and Performance Considerations 8

9 DoD IEA Website

10 REFERENCE ARCHITECTURE

11 Purpose DoD CIO intends to use Reference Architecture as a means to provide Department-wide Guidance for architectures and solutions Reference Architecture, as currently used within DoD… Is defined at different levels of detail and abstraction (from specific to generalized) with… Has little agreement and much confusion Has multiple meanings relative to the context of the environment To support the DoD CIO intent, a common definition of Reference Architecture is needed that… Provides policy and direction to the DoD enterprise (commands, services, agencies) that guides and constrains architectures and solutions Can be equally applied across the wide spectrum of DoD environments IT/ Business and Service (SOA) domains Warfighter domains

12 Objectives of a Reference Architecture
To direct, guide and constrain architectures and solutions within a domain To serve as a reference foundation of concepts, components and their relationships May be used for comparison and alignment purposes Reference Architecture Guides and constrains the development of Stakeholder Requirements Architectures and Solutions Diagram derived from: The Importance of Reference Architecture, Architecture and Change (A&C), 2007,

13 Reference Architecture is…
an authoritative source of unambiguous architecture information within a domain environment … … that guides and constrains multiple architectures and solutions… … by providing patterns of abstract architectural elements, based on a strategic purpose, principles, technical positions, together with a common vocabulary.

14 Building a Reference Architecture (The Five Components)
Domain Reference Architecture Components Strategic Purpose Principles Technical Positions Authoritative Source Guides Constrains Patterns Vocabulary Architecture/ Solution “A” Architecture/ Solution “B”

15 DoDAF Models Utilized in RA
AV-1 Overview & Summary Information CV-1: Vision – overall strategic concept and high level scope OV-1 High Level Operational Concept Graphic – what solution architectures are intended to do and how they are supposed to do it OV-6a Operational Rules Model SvcV-10a Services Rules Model SV-10a Systems Rules Model OV-4 Organizational Relationships Chart – architectural stakeholders StdV-1 Standards Profile Operational Patterns OV-2 Operational Resource Flows OV-5 {a,b} Activity diagrams Service Patterns SvcV-1 Service Interfaces SvcV-2 Service Resource Flows SvcV-4 Service Functionality SvcV-10b Service State Transitions System Patterns SV-1 System Interfaces SV-2 System Resource Flows SV-4 System Functionality SV-10b System State Transitions Event-Based Scenario Patterns of Dynamic Behavior OV-6c Event-Trace Description SvcV-10c Services Event-Trace Description SV-10c Systems Event-Trace Description AV-2 Integrated Dictionary- definitions of terms used throughout solution architectures Strategic Purpose Principles Technical Positions Patterns

16 Benefits Authoritative source of architecture information within a problem space that guides and constrains architectures and solutions Simplifies and standardizes solutions for complex problems by providing common repeatable patterns Provides early, focused guidance at a sufficient level of abstraction and detail before concrete implementation decisions are known A tool to ensure interoperable architectures and solutions based on common guidance

17 First Usage: EANCS Reference Architecture
Supports development of EANCS implementation guidance and solution architectures “…focuses on that portion of the characteristic dealing with global authentication, authorization and access control to globally accessible resources. It is intended to guide the development of solution architectures and support the development of specific implementation guidance for achieving this capability.”

18 Enterprise-wide Access to Networks and Collaboration Services (EANCS) Reference Architecture (RA)
The Enterprise-wide Access to Networks and Collaboration Services (EANCS) Reference Architecture (RA) is the first Department-level RA developed by the Enterprise Reference Architecture Cell (ERAC) for the DoD Chief Information Officer. The following slides describe the basis for the RA, its purpose and scope, the approach used in its development, its primary data sources, and the DoDAF architecture artifacts used in its description and their relationship to the five key elements of an RA. Slides also describe how the RA was aligned with the DoD Information Enterprise Architecture (DoD IEA) and how compliance with the DoD IEA was documented.

19 EANCS RA Background Operational Requirements
GIG 2.0 Operational Reference Architecture (ORA) describes requirement for “Global Authentication, Access Control, and Directory Services” Vice Chairman Joint Chiefs of Staff (VCJCS) directed ability to “go anywhere [in DoD], login, and be productive” EANCS RA to address these requirements by: Providing basis for implementation guidance/roadmap for Enterprise Services Security Foundation (ESSF) Describing Authentication and Authorization and Access Control to networks (NIPRNet and SIPRNet) and designated Enterprise Services (e.g., Enterprise Directory Service, Enterprise , DCO, Intelink) Supporting implementation of an initial authentication and access control capability in 6 to 9 months for Enterprise User Initiative Leveraging: Common credentials for authentication (PKI/CAC for NIPR, PKI/hard-token for SIPR) Authoritative identity attributes for authorization and access control (Attribute-Based Access Control) The goal of the EANCS RA is to assist ASD (NII)/DoD CIO in addressing warfighter requirements identified in the Global Information Grid (GIG) 2.0 Operational Reference Architecture (ORA), as expanded upon by the Vice Chairman of the Joint Chiefs of Staff (VCJCS). The GIG 2.0 ORA describes a key attribute for achieving and maintaining an information advantage for the warfighter as “Global Authentication, Access Control, and Directory Services.” Requirements for this attribute are that: Any authorized user, advantaged or disadvantaged, have one identity and be granted authorization and provided with seamless access to the information they need from anywhere, at any time. Commanders know and trust that their units have access to the information they need to conduct their missions and that proper visibility and oversight of access and authentication processes have been established. The VCJCS increased the urgency of this requirement by establishing an immediate need for DoD users to be able to “go anywhere in DoD, login, and be productive.” The EANCS RA was developed as the basis for an implementation roadmap to guide development/acquisition of key elements of the Enterprise Services Security Foundation (ESSF), which defines those security services needed in the DoD Information Enterprise (IE). To meet GIG 2.0 and VCJCS requirements he RA needed to describe authentication and authorization and access control required for a user, regardless of location, to obtain access to a specified set of designated, sometimes called “collaboration,” enterprise services on either NIPRNet or SIPRNet . The RA was to focus on network login, global authentication, and granting of authorization to just designated enterprise services. But it was also to be able to guide implementation of an initial authentication and authorization and access control capability within six to nine months of architecture completion to support the Enterprise User Initiative in providing a “real” capability to “go anywhere, login, and be productive.” Key characteristics of the architecture were to be use of : standard, common credentials for authentication (i.e., PKI/CAC for NIPRNet and PKI/hard token for SIPRNet) and authoritative identity attributes for authorization and access control using the Attribute Based Access Control (ABAC) concept.

20 EANCS RA Purpose and Scope
Gain Department-wide consensus on requirements for authenticating users and authorizing user access to DoD Information Enterprise (IE) and, more specifically, to representative collaborative services, to include portals and enterprise Describe architectural patterns to guide, standardize, and enable the most rapid and cost-effective implementations of an authentication and authorization capability in support of secure information sharing across DoD Scope “To  Be” Architectural Description Document requirements, activities, and information for authentication and authorization and access control Document “standard/common” authentication and authorization and access control processes The purpose of the EANCS RA is to describe the capability for accessing designated/collaboration services in support of secure information sharing across the Department. It provides architectural patterns to guide, standardize, and enable the most rapid and cost-effective implementation of global authentication and authorization and access control capabilities. The EANCS RA is a “to-be” architectural description of an objective capability and its associated requirements. It describes objective requirements, principles/rules, patterns, and technical positions for authentication and authorization and access control applicable across DoD. The RA’s description can be applied to selected use cases to develop specific implementation guidance for authentication and authorization based on a set of conditions described in a scenario or mission thread. The scope of the RA was limited to: Approved DoD Networks Authentication of designated users with portable identity credentials Access to designated, globally accessible enterprise services via end user devices that are hardwired (not wirelessly connected) to a network Control of access to designated enterprise services based on user attributes.

21 EANCS RA Development Approach
Architecture Owner organized Working Group (WG) Composed of SMEs from ASD (NII)/CIO, Military Services, Joint Staff/J6, Defense Manpower Data Center (DMDC), Defense Information Systems Agency (DISA), and National Security Agency (NSA) Team members represented their stakeholder organizations Architecture Owner worked with ERAC to establish RA purpose, perspective, and scope WG developed Concept of Operations (CONOPS) for context WG provided necessary architecture data/information Existing documents served as knowledge baseline SME knowledge and experience provided rest of information ERAC organized collected data into DoDAF-compliant RA description WG approved RA content (Dec 2009) Submitted to Architecture and Standards Review Group (ASRG) for approval and federation into DoD EA The Owner of the RA is the Enterprise Services and Integration (ES&I) directorate in the Office of the DoD Deputy CIO. The Architects were members of the ERAC in the Architecture and Infrastructure (A&I) Directorate, also in the Deputy CIO’s office. The Working Group (WG) was composed of representatives from: ASD(NII) and the Office of the Deputy CIO; Military Services; Joint Staff J6; Defense Information Systems Agency (DISA)/Enterprise User Initiative; National Security Agency (NSA); and the Defense Manpower Data Center (DMDC). The ERAC leveraged the six step architecture development method from the DoD Architecture Framework (DoDAF) v2.0 in developing the EANCS RA. The Purpose, Perspective, and Scope of the RA were first established in collaboration with the Architecture Owner and key members of the WG. The WG developed a Concept of Operations (CONOPS) for EANCS, which served as context for the RA and set boundaries for the architecture. The ERAC used existing documentation provided by the WG as authoritative baseline information for the RA; the remainder of the information needed for architecture development was then collected from Subject Matter Experts (SMEs), either WG members themselves or individuals made available by WG members from their parent organizations. Once sufficient architecture information had been collected, the ERAC organized that information into DoDAF 2.0 viewpoints and views and developed an RA document. The WG was involved in reviewing the document for content and the ERAC adjusted content in accordance with these reviews throughout architecture development. A Final Draft was submitted to the WG, and its content was approved by the Architecture Owner, in December The RA has since been submitted to the Architecture and Standards Review Group (ASRG) and is currently awaiting approval for federation into the DoD Enterprise Architecture (EA).

22 EANCS RA Sources “What” To Do “How” To Do It Provide Analysis Federal
ICAM Legend ESSF – Enterprise Security Services Framework ESM – Enterprise Security Management ICAM – Identity, Credential, and Access Management ORA -Operational Reference Architecture Process & Function Operational Requirements ESM GIG 2.0 ORA ESSF Service Descriptions - Patterns - Rules - Technical Positions EANCS CONOPS - Operational Requirements - Implementation Considerations EANCS RA The content of the EANCS RA was extracted or derived primarily from four authoritative sources: Enterprise Security Management (ESM) Documents (Draft) – These documents, developed by NSA and based on the GIG Information Assurance (IA) Architecture, describe required functions and high level processes associated with ESM. These functions provide for dynamic IA services, processes, and devices to optimize the enterprise for mission operations. The EANCS RA used the ESM authentication and privilege management functions and related processes as the basis for process patterns. Global Information Grid (GIG) 2.0 Operational Reference Architecture (ORA) - Provides a decomposition of the activities associated with GIG 2.0 attributes. The EANCS RA used authentication and authorization activities from the GIG 2.0 ORA “Global Authentication, Access Control, and Directory Services” attribute as steps in process patterns. Enterprise Services Security Foundation (ESSF) Implementation Roadmap (Draft) - The unifying construct for aligning security-related efforts to enable the delivery of DoD Enterprise Service (ES) capabilities. This document provides a taxonomy and description for DoD security services. The EANCS RA used the ESSF Authentication and Authorization & Access Control services as the framework for its capability description. Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance, v1.0 – This document outlines a common framework for ICAM within the Federal Government and provides supporting implementation guidance for program managers, leadership, and other stakeholders as they plan and execute segment architecture for ICAM management programs. The ESSF structure was based on the FICAM. The EANCS RA aligned with the FICAM to ensure the authentication and authorization and access control it described were compliant with Federal guidelines. Many of the Technical Positions in the RA were taken from the FICAM. - NIPRnet - SIPRnet - Deployed User Unanticipated User Maritime User VPN ??? USE CASES IMP PLAN - 6 to 9 months - Longer Period - Impacts - Metrics - Guidance Provide Analysis “What” To Do “How” To Do It

23 EANCS RA Architecture Artifacts
Architecture Federation Principles Strategic Purpose AV-1 (Overview and Summary) OV-1 (Concept – Consumer & Provider) OV-6a (Operational Rules Model) Patterns Technical Positions OV-6c (Event-Trace Description) StdV-1 (Standards Profile) OV-5a (Activity Decomposition) EANCS RA Document The resulting RA contains the five key elements of a Department-level RA, as shown in this diagram. Strategic Purpose consists of: AV-1 Overview and Summary Information: based on CONOPS with WG input and approval; describes scope and context for RA OV-1 High-Level Operational Concept: describes concept for authentication, and authorization and access control to enable requirement to login and be productive (access designated enterprise services) from anywhere in DoD; provides both a User/Consumer and a Service Provider perspective Principles are contained in: OV-6a Operational Rules Model: identifies principles and rules to constrain development of solutions; extracted from source documents and established during RA development Patterns consist of: OV-5a Operational Activity Decomposition Tree: organizes and defines activities required to accomplish operational concept; derived from GIG 2.0 ORA activities (Global Authentication, Access Control, and Directory Services pillar) and functions from draft Enterprise Security Management (ESM) documents OV-6c Event Trace Description (Process Pattern): describes process pattern for authentication and authorization and access control; uses activities from OV-5a Technical Positions are contained in: StdV-1 Standards Profile: list of high-level policies and standards that apply to authentication and authorization and access control; derived from Federal Identity, Credential, and Access Management (FICAM) Vocabulary consists of: AV-2 Integrated Dictionary: provides definitions for EANCS RA activities, process steps, swim lanes, and information elements Provides Department-level guidance for implementation of common access control elements AV-2 (Integrated Dictionary) Vocabulary

24 Compliance with DoD IEA
Development of RA guided by Department’s Net-centric vision “to function as one unified DoD Enterprise, creating an information advantage” for DoD, its people, and its mission partners, as described in DoD IEA Alignment with DoD IEA “built-in” during RA development IAW DoD IEA Appendix D Compliance with DoD IEA documented in IAW DoD IEA Appendix E The EANCS RA was built with the DoD IEA and its description of net-centric concepts and requirements in mind. The result is a description of authentication and authorization and access control services that can operate effectively in the net-centric DoD IE.

25 DoD Information Enterprise Architecture (IEA)

26 DoD Net-centric Vision
Purpose Unify the concepts embedded in the DoD’s net-centric strategies into a common vision Drive common solutions and promote consistency Describe the integrated Defense Information Enterprise and the rules for information assets and resources that enable it Foster alignment of DoD architectures with the enterprise net-centric vision DoD Net-centric Vision To function as one unified DoD Enterprise, creating an information advantage for our people and mission partners by providing: A rich information sharing environment in which data and services are visible, accessible, understandable, and trusted across the enterprise. An available and protected network infrastructure (the GIG) that enables responsive information-centric operations using dynamic and interoperable communications and computing capabilities.

27 Background Major Net-Centric Strategies
DoD IEA v1.0 (Approved 11 April 2008) Established five priority areas for realizing net-centric goals Provided key principles, rules, and activities for priority areas Positioned as a tool to guide the net-centric transformation of the Information Enterprise (IE) DoD IEA v1.1 (Approved 27 May 2009) Describes a process for applying the DoD IEA content (App D) Describes compliance areas and criteria (App E) Provides activity mapping between the DoD IEA and the NCOW RM (App F) Data (9 May 2003) Spectrum Management (3 Aug 2006) Services (4 May 2007) NetOps (February 2008) Information Assurance (26 April 2006) Communications/Transport Computing Infrastructure (September 2007) Information Sharing (4 May 2007)

28 Audience & Intended Use
IT Architects Align architecture with the DoD IEA Apply DoD IEA content (rules, activities, etc) to guide and constrain information enterprise solutions Managers of IT Programs (PM, PEO, etc.) Use the DoD IEA to support program design, development, and implementation Through solution architectures properly aligned with the DoD IEA IT Decision-Makers (CPM, IRB, CIO, etc.) Use the DoD IEA to support investment decisions Through enterprise and solution architectures properly aligned with the DoD IEA

29 DoD IEA v1.2 (Draft) Adds DoD EA Compliance Requirements (Appendix G) Compliance with DoD IEA Compliance with Capability and Component EAs Compliance with the DISR Compliance with Mandatory Core and Shared Designated DoD Enterprise Services (ES) Architecture Registration Requirements Provides a table of Mandatory Core and Shared Designated DoD ES Adds content to the Rules, App D, and App E to maintain consistency with App G Draft

30 Applying the DoD IEA (Appendix D)

31 Applying the DoD IEA Establish Net Centric Context for EANCS RA
Relevant DoD IEA Priority Areas Secured Availability (SA) Data and Services Deployment (DSD) Understand Net-Centric Concepts Align with Net-Centric Vision Identify Net-Centric Assumptions Net-Centric Assumptions Portable identity credentials will be used to support user authentication Authorization attributes have already been defined, collected, regularly updated, and made available through standard interfaces from reliable attribute sources Consumer/ User Perspective OV-1 (Operational Concept Graphic) The next two slides describe how the EANCS RA was developed in line with the DoD IEA. As the ERAC worked with the Architecture Owner to establish purpose, perspective, and scope for the RA, it also reviewed the DoD IEA, related net-centric concepts, and the DoD net-centric vision to understand how EANCS should operate in a net-centric DoD IE. During this assessment, it was determined the DoD IEA Priority Areas of Secured Availability (SA) and Data and Services Deployment (DSD) were most applicable to the RA – authentication and authorization and access control are key enablers of SA and are to be delivered as services in the ESSF, with a need to conform to DSD. To address SA principles and rules, two net-centric assumptions, as shown, were incorporated into the AV-1 for the RA. The CONOPS developed by the EANCS WG took the perspective of a user who needs access to a network and enterprise services while away from his home station. In order to describe how authentication and authorization and access control services would need to operate to enable this requirement, the EANCS RA needed to extend this perspective to include that of providers of these two services. A net-centric operational concept with these two perspectives was developed as part of the RA’s Strategic Purpose. This CONOPS includes the two OV-1s shown. At the same time, the ERAC assessed which of the JCAs authentication and authorization and access control would enable. It was determined the RA was primarily describing services enabling the Tier 4 JCA of User Access within the Net- Centric/Enterprise Services/Core Enterprise Services JCA. However, these services would also indirectly enable the Tier 3 JCAs subordinate to the Net-Centric/ Information Assurance JCA: Secure Information Exchange, Protect Data and Networks, and Respond to Attack/Event. The scope associated with these JCAs was built into the RA and its description shows how authentication and authorization and access control address these related capabilities. Identify DoD IE Perspective for Architecture Develop Net-Centric Operational Concept Provider/ Producer Perspective Relevant JCAs Net-Centric/Enterprise Services/Core Enterprise Services/User Access Net-Centric/Information Assurance Align with JCA Taxonomy

32 Applying the DoD IEA Align EANCS RA Description with DoD IEA
Guiding Principles and Rules for RA Data assets, services, and applications on the GIG shall be visible, accessible, understandable, and trusted to authorized (including unanticipated) users. (DoD IEA, GP 03) Global missions and globally dispersed users require global network reach. Information Assurance mechanisms and processes must be designed, implemented, and operated so as to enable a seamless Defense Information Enterprise. (DoD IEA, SAP 03) Authoritative data assets, services, and applications shall be accessible to all authorized users in the Department of Defense, and accessible except where limited by law, policy, security classification, or operational necessity. (DoD IEA, DSDR 01) All DoD information services and applications must uniquely and persistently digitally identify and authenticate users and devices. These services, applications, and networks shall enforce authorized access to information and other services or devices according to specified access control rules and quality of protection requirements for all individuals, organizations, COIs, automated services, and devices. (DoD IEA, SAR 07) Incorporate applicable DoD IEA Principles Apply DoD IEA Rules Oversee Authentication Initiatives Align Operational Activities and Processes with related DoD IEA Activities OV-6c (Event-Trace Description) The ERAC developed a set of guiding principles and rules from key authoritative sources to provide context and constrain and direct development of the RA. These principles and rules were used as constraints in developing the OV-1 high-level operational concept graphic, the OV-5a activity decomposition, and the OV-6c process patterns in the RA. They also are designed to influence and direct development of follow-on implementation guidance and solution architectures. The RA’s Guiding Principles and Rules incorporate one Global Principle, one SA Principle, one DSD Rule, and one SA Rule from the DoD IEA. The process patterns in the RA were determined to align with three activities in the DoD IEA: A2.8.4 Oversee Authentication Processes and its sole child activity A Manage Authentication Processes enable and constrain the authentication process in the RA. The Oversee Authentication Processes activity constrains development of mechanisms that perform authentication; in doing so, it determines how the authentication process pattern in the RA can be done. SA authorities will “identify, test, and certify” any of these authentication mechanisms in accordance with the Manage Authentication Processes activity to ensure they meet specific requirements from the parent activity. A2.8.5 Oversee Privilege Management Initiative enables and constrains the authorization and access control process. SA authorities use this activity “to develop and maintain an attribute management infrastructure for the Department.” Such an infrastructure is essential for carrying out authorization and access control in a net- centric DoD IE. By governing available attributes and associated mechanisms enabling authorization and access control, the DoD IEA activity constrains how the process steps defined in the RA can be carried out. Net-centric terminology from the DoD IEA was incorporated throughout the RA description. In particular, the RA uses this terminology in discussing the DoD Net-Centric vision and how it applies, the perspectives the RA takes of the DoD IE, and the DSD and SA priority areas and their role in constraining EANCS operations. Constrain A2.8.4 Manage Authentication Processes A DoD IEA Terminology DoD Net-Centric Vision DoD IE Perspective User/Consumer Producer/Provider Priority Areas Data and Services Deployment Secured Availability Oversee Privilege Mgmt Initiatives Use net-centric terminology in architecture description A2.8.5

33 Compliance with the DoD IEA (Appendix E)
Compliance is about conveying the application of DoD IEA Principles, Rules, and Activities Use the process described in App D and provided in App E, Tab A Questions that expose the compliance process and application of DoD IEA content are captured in the Enhanced ISP tool Assessment of compliance is based on: Completed Compliance table ISP and Architecture EISP Report To make compliance with the DoD IEA visible to users and reviewers and to ensure it was understood how solutions guided by the RA are to comply with the DoD IEA, two sections dealing with DoD IEA alignment were specifically added to the RA Document: A section describing RA alignment with JCAs and the DoD IEA Priority Areas was added to Section 2 Context. Text descriptions for how process patterns align with selected DoD IEA activities were added to Section Authentication Process Pattern and Authorization and Access Control Process Pattern. For Assessment purposes, the Tab A table in DoD IEA Appendix E was used as a template in completing a Compliance Matrix for the EANCS RA. In addition, the Enhanced Information Support Plan (EISP) tool was used to develop an ISP excerpt for the RA addressing DoD IEA alignment. The “Guidance for DoD Information Enterprise Architecture in EISP 2.0” document was used to determine the questions that needed to be answered to make DoD IEA compliance visible. Information and text from the RA document was then inserted into the tool in the proper places to answer these questions. When this was complete, a Compliance Matrix was generated using the reporting application for EISP and the appropriate style sheet.

34 Compliance w/the DoD IEA
Tab A to Appendix E: DoD IEA Compliance Assessment Table B. Align Architecture Description with the DoD IEA B1. Use Net-Centric Terminology Use key terms contained in the DoD IEA Glossary across architecture descriptions. Describe applicable DoD IEA key terms. Describe in the: - AV-2 Integrated Dictionary. - Related taxonomies. - ISP descriptions of the IE. Q12 - Identify key terminology from the DoD IEA used in your architecture/program documents. B2. Incorporate Applicable DoD IEA Principles - Identify applicable DoD IEA Principles and use in architecture descriptions to place restrictions or limitations on operations. - Use applicable Principles… Describe DoD IEA Principles. - OV-1 Operational Concept. - OV-5 Operational Activity Model. - Process Models Q13 - Which DoD IEA Principles apply to your Program? Q14 - How do the Principles apply to your Program? Q15 - How are the applicable Principles addressed in your architecture/program documents?

35 Compliance with the DoD IEA EANCS RA Example
Incorporated description of key alignment aspects into RA document Added section describing RA alignment with JCAs and DoD IEA Priority Areas Added text descriptions of how process patterns align with DoD IEA activities into pattern discussions Filled out Tab A Compliance Matrix for RA Developed eISP excerpt for RA Used “Guidance for DoD Information Enterprise Architecture in EISP 2.0” to identify and locate DoD IEA questions to be answered Incorporated information and text from RA document Generated compliance matrix using Xml2PDF 2007 application and ISP_DoD_IEA_Compliance_Table style sheet

36 Initiatives and Projects
Reference Architecture Description Comment Adjudication for ASRG Approval DoD IEA Comment Adjudication (v1.2) for DCIO Approval Work on future versions of the DoD IEA EANCS RA Delivered to owner; now in FAC/ASRG approval process Document Process for Developing RA Describe the process used to develop the EANCS RA FEA BRM Extension Extend DoD LOBs for the FEA BRM Recommended changes provided to OMB FEA for action

37 DoD IEA Site: http://cio-nii.defense.gov/sites/diea/ Questions?

38 BACKUP SLIDES

39 Information Enterprise Services and Infrastructure Architecture
28 March 2017

40 IE Service/Infrastructure Context Diagram
DRAFT IE Service/Infrastructure Context Diagram Human Computer Interaction Warfighter Defense Intel NetOps Mission Partners Business Mission & Business IT Force Application Portfolio Command & Control Portfolio Battlespace Awareness Portfolio Force Support Portfolio Building Partnerships Portfolio Logistics Portfolio Protection Portfolio Corporate Mgmt & Support Portfolio Functional Capability Enterprise Services Information Sharing Messaging Portal Collaboration Mediation Content Delivery Discovery People/Service Discovery Content Discovery Metadata Discovery Geospatial Visualization Enterprise Management Services Management Resource Management Content Handling Enterprise Services Security Foundation Digital Identity Privilege Management Credentialing Authentication Authorization & Access Auditing & Reporting Cryptography Configuration Computer Network Defense COOP/CIP Enterprise Services & Infrastructure Mandatory Core & Shared Enterprise Services (ES) Computing & Communications Infrastructure IA Infrastructure Dynamic Policy Management Assured Resource Allocation Mgmt of IA Assets and Mechanisms NetOps Infrastructure Enterprise Management Content Management Net Assurance

41 Use Enterprise Services Framework to Organize and Focus ES Efforts
FOR OFFICIAL USE ONLY Use Enterprise Services Framework to Organize and Focus ES Efforts Enterprise Services Security Foundation (ESSF) FOR OFFICIAL USE ONLY

42 Use ESSF Segment Architecture to Organize and Focus Security Efforts
FOR OFFICIAL USE ONLY Use ESSF Segment Architecture to Organize and Focus Security Efforts FOR OFFICIAL USE ONLY

43 Development Approach Describe the components of the context diagram
Build use cases based on GIG 2.0 Attributes to establish relationships between its functional components (Mandatory Core & Shared Enterprise Services) Global Authentication, Access Control, and Directory Services Information and Services From The Edge Joint Infrastructure Common Policies and Standards Unity of Command Analyze use cases through identification, sequencing, and prioritization of functional components to develop key or foundational Services first Apply analysis to prioritize and manage: Reference Architecture Development (Principles, Technical Positions, Patterns) Sequence and Monitor Initiatives, Projects, and Programs Identify Issues, Gaps, and Shortfalls

44 Apply Enterprise Services & Infrastructure to GIG 2
Apply Enterprise Services & Infrastructure to GIG 2.0 Requirements through Use Cases Enterprise Services Foundation Computing & Communications Infrastructure Services Foundation Enterprise Security

45 Use Case Example (EANCS)
Collaboration Services Printer Capability Storage Office Automation Applications Collaboration Document Sharing Portal Enterprise Directory Desktop/ Browser User End User Device (EUD) Local Access Request (Logon) + Authentication Factors Authorization Decision Request Policy Constrained Access Authentication Decision Response Resource Metadata Response ESSF Authentication ESSF Authorization & Access Control Secondary Authentication (if required) Portable Identity Credential Environmental Data Response Credential Validation Response Resource Access Policy Response User Attribute Response Mission Manager Policy Management ESSF Credentialing Identity Information ESSF Digital Identity Indicates Dependency Identity Updates

46 Sample Use Case (Content Request)
Information Sharing Discovery 1 Content Discovery Portal 3 10 User Mediation 4 9 2 Content Delivery 8 7 Infrastructure 6 Content Mgmt Enterprise Management 5 Authentication Authorization & Access Control Enterprise Services Security Framework

47 IE Service/Infrastructure Context Diagram
DRAFT IE Service/Infrastructure Context Diagram Human Computer Interaction Warfighter Defense Intel NetOps Mission Partners Business Mission & Business IT Force Application Portfolio Command & Control Portfolio Battlespace Awareness Portfolio Force Support Portfolio Building Partnerships Portfolio Logistics Portfolio Protection Portfolio Corporate Mgmt & Support Portfolio Functional Capability Enterprise Services Information Sharing Messaging Portal Collaboration Mediation Content Delivery Discovery People/Service Discovery Content Discovery Metadata Discovery Geospatial Visualization Enterprise Management Services Management Resource Management Content Handling SAR SA EANCS RA Enterprise Services Security Foundation Digital Identity Privilege Management Credentialing Authentication Authorization & Access Auditing & Reporting Cryptography Configuration Computer Network Defense COOP/CIP Enterprise Services & Infrastructure EU Mandatory Core & Shared Enterprise Services (ES) AD Opt Arch ITI Opt Arch Computing & Communications Infrastructure IA Infrastructure Dynamic Policy Management Assured Resource Allocation Mgmt of IA Assets and Mechanisms NetOps Infrastructure Enterprise Management Content Management Net Assurance


Download ppt "2010 EA Conference Reference Architecture Track Terry Hagle, Office of DoD CIO/AS&I 703-607-0235 terry.hagle@osd.mil."

Similar presentations


Ads by Google