SlideShare une entreprise Scribd logo
1  sur  41
Agile Acquisition Roadmap for Secure Cloud,
ISR/C2 Infrastructure & Cyber Solutions
Assuring IT Program Outcomes through Decision Analytics; measuring the
business value of emerging technologies, innovations, and lessons learned.
John Weiler
IT-AAC, Vice Chair
A not-for-profit research institute
John.Weiler@IT-AAC.org
www.IT-AAC.org
703 768 0400
IT Acquisition Advisory Council
Assuring Business Value of IT
“Weapons systems depend on stable requirements, but with IT, technology changes faster than the
requirements process can keep up," he said. "It changes faster than the budget process and it changes
faster than the acquisition milestone process. For all these reasons, the normal acquisition process does
not work for information technology.” DepSec Bill Lynn statement at the IT-AAC Defense IT
Acquisition Summit
ICHnet.org Company Confidential
IT-AAC Public/Private
Partnership
“A knowledgeable & conflict free Community of
Practice bring forward proven methods,
expertise and innovations to empower the
Federal IT Acquisition Ecosystem”
Honorable Mike Wynne, 21st
AFSEC, Co-Founder and Chairman
Emeritus, IT-AAC
“Together, these steps will help to catalyze a fundamental reform of Federal IT, which is essential to improving
the effectiveness and efficiency of the Federal Government” White House, OMB Director Orszag
ICHnet.org Company Confidential
Information Technology Evolution
InformationDrivenCapability
• Central computer center, slow turn around
• One size fits all
• Limited reuse of application modules
1950 1960 1970 1980 1990 2000 2010 2020
1. Centralized - Mainframe
2. Client/Server - Decentralized
3. Internet - Cloud
• PC enabled and network
• Software distributed in both server and client
computers
• Heavy focus on software development and point to
point integration
• Virtualized compute; global
network enabled, plug & play
• IT Infrastructure decoupled from
Applications
• COTS & OSS Integration,
Software as a Service
 Adding functional capability has
become easier with each new wave
 We are in early stages of Wave 3 information technology
 Mainframe and Client-Server waves remain in place
 Waves represent many co-dependent technologies,
matured over time
 But enterprise infrastructure
gaps & vulnerabilities have
become more critical
Innovations of the market and benchmarked best practices are invisible to the Defense Industrial Complex
Cloud Acquisition Challenge
We are delivering yesterdays technology tomorrow
ICHnet.org Company Confidential
Overcoming the Acquisition
Challenges
“ Federal IT Management is Fundamentally Broken ” OMB
1. Good laws, poor enforcement: Clinger Cohen Act, Public Law 104-113, and FAR FFRDC use restrictions have prevented adoption
of innovative solutions and IT standards of practices which should drive establishment of shared IT infrastructure (SOA);
 A robust set of Acquisition Processes are available but not visible to Defense Industrial Complex, requiring a true public/private
partnership like IT-AAC that is not vested in the status quo. Title 10 and lack of strong governance impede long term funding of
infrastructure and drive “Big Bang” stove pipes. New rules needed for SOA ConOps.
2. CULTURE: 15 years of IT reform efforts have fallen short, with only minor changes to current MilSpec methods. (DODAF, JCIDS,
NESI, LISI) compete with standards and orthogonal to Benchmarked Industry Best Practices.
 IT-AAC communities are uniquely dedicated streamlining IT Architecture and Acquisition Processes, structured to establish standards of
practices. ICH’s “clearinghouse” of proven methods and decision tools represent the CMMi of IT Acquisition.
3. INCENTIVES: Traditional SIs and FFRDCs are insulated from commercial IT innovations and vested in status quo. DoD needs an organic,
conflict free mechanisms for tapping innovations of the market, commercial expertise, and real world lessons learned.
 IT-AAC brings a world of innovation, expertise and knowledge that has proven to drive successful outcomes. IT-AAC membership are
CONFLICT FREE & inclusive of innovative businesses, universities, SDOs, think tanks and research institutes.
4. PROCESS: Both CCA and Sec804 will require revamping of IT Requirements, Architecture, Tech Assessment and Decision Support
Processes. Any new process should have both govt/industry buyin, conform to OMB A119 and reflect a proven vs new MilSpec.
 IT-AAC partnership brings to market a collaborative structure for the IT Acquisition community. Its 2 year effort has already created
agency proven methods based on commercial best practices.
5. PEOPLE: IT Acquisition Ecosystem lack IT training or experience needed to make timely decisions; Lack of clear metrics and
incentives put focus on compliance vs outcomes
 ICH’s structured to establish standardized IT performance metrics (MOEs) and Service Level Agreements (SLAs) across the acquisition
lifecycle and validated by benchmarked best practices. Partnership with SDOs and large corporate users provide needed expertise to
enable sound decision making.
ICHnet.org Company Confidential
OMB’s 25 Point IT Reform Plan
IT Investments must Align the Acquisition Process with the
Technology Cycle.
Point 13. Design and develop a cadre of specialized IT acquisition
professionals .
Point 14. Identify IT acquisition best practices and adopt government-wide.
Point 15. Issue contracting guidance and templates to support modular
development
Point 16. Reduce barriers to entry for small innovative technology
companies
“Too often spending on IT is still wasted on duplicative investments, missed opportunities to leverage economies of
scale, rising operational costs that starve new development, and mismanaged projects that lead to cost overruns
and schedule slippages,” OMB Memo to Agencies
ICHnet.org Company Confidential
DoD CIO’s Cloud Strategy First Step:
Foster Adoption of Cloud Computing
 Establish a joint governance structure to drive the transition to the DoD Enterprise Cloud
Environment
 Adopt an Enterprise First approach that will accomplish a cultural shift to facilitate the adoption
and evolution of cloud computing
 Reform DoD IT financial, acquisition, and contracting policy and practices that will improve agility
and reduce costs
 Implement a cloud computing outreach and awareness campaign to gather input from the major
stakeholders, expand the base of consumers and providers, and increase visibility of available
cloud services throughout the Federal Government
“We can't solve problems by using the same kind of thinking we used when we created them.”
Albert Einstein
ICHnet.org Company Confidential
Cloud Adoption Model Requires
different approaches to IT
governance
 Portfolio Mgt: assess to what degree existing infrastructure services, technologies and platforms that can be
reconfigured into a new Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and/or Software as a
Service (SaaS). You can’t manage what you cannot measure
 Acquisition Agility: Streamlined Acquisition Process (per CCA and NDAA Section 804), and maximize use of
commercial innovations of the market. Reduce bureaucratic acquisition barriers and inefficiencies that drive up cost
and harm competition. Buying a service eliminates many steps from traditional top down “design to spec”
approaches.
 Increase Innovation: Establish public/private information exchanges that enable greater access to non-traditional
suppliers and innovations of the market. Leveraging existing sources of IT assessment evidence, testing and
implementation results. Commercial innovation like Cloud, require reaching outside the Defense Industrial Base.
 Information Assurance: address security needs at all stages of the acquisition lifecycle; requirements,
architecture, tech assessment, and procurement, accompanied by well defined SLAs. DoD Architecture Models are
not effective in modeling IA attributes at each layer of the ISO model.
 Workforce readiness: PMs and IT Acquisition Professionals need IT specific training and mentoring that reflects
commercial standards of practice. Current Acquisition Training Curriculums do not prepare the work force for the
unique challenges of IT.
 Continuous Stakeholder Participation: the acquisition process must align with the acquisition process to
accommodate the fast paced market. IT-AAC provides a clearinghouse of innovative solutions and sources of past
performance
ICHnet.org Company Confidential
Lesson Learned from Early
Adopters (A study from NGA)
 Management/People:
– Cloud requires transformation of both organization and leadership
– Achieving benefits from the cloud requires an evolution of skills and expertise
– Transformation of culture and intra-agency agreements required
 Technology
– Not all clouds are created equal – and not all applications behave the same in the cloud
– Software products and versions must be standardized, integrated and deployed on standard
infrastructure blocks
– Cloud can leverage automation from both automatic and scripted sources
 Process
– Maintaining security and compliance when users have access to and control over the
environment
– Integrating the management of multiple resource pools, environments, and clients within
change processes
– Establishing an organizationally driven hierarchy and ensuring logical separation throughout
the stack
ICHnet.org Company Confidential
Best Practices Clearinghouse
leveraging innovations and benchmarked best practices
IT-AAC Partnership brings forth wide range of IT expertise need to mentor PMs:
 Governance and Oversight: how an enterprise supports, oversees and manages IT programs and on-going portfolio. SOA as
defined in the commercial market is governance tool not technology. DoD5000 and BCL represent the current approaches.
 Decision Analytics: enables effective Program Management and Value Stream Analysis execution. As most of these sub-
processes are designed to improve decision making, a relative new discipline has evolved (since 86), that addresses the human and
cultural challenges in decision making. Decision Analytics is the discipline of framing the essence and success criteria of each gate in
the acquisition lifecycle. It brings focus to the high risk areas of a program, and reduces analysis/paralysis.
 Capability Specification: Actionable requirements must be constrained by the realm of the possible. With pressures to do more
with less, we must embrace mechanisms that force a relative valuation/impact of the gap/capability, with clearly defined outcomes
 Solution Architecture: This is one of the most critical elements of the acquisition lifecycle, as it should represent all stake holder
agreements. The market embrace of SOA is not about technology, but a refocusing of the EA on service level management and data.
A good architecture is a lexicon that links requirements, technologies and acquisition strategy.
 Technology Assessment: Understanding the limitation of technology early in the process is key. Without a clear view of the
“realm of the possible” validated by real world results, we often find ourselves in high risk areas and over specification. Market research
must be done early to help users constrain requirements and embrace the inherent business practices that codify. Recognizing that
70% make up of every IT application is vested in IT infrastructure (netcentric, cloud, SOA), it is critical to establish a common
infrastructure/infrastructure standard by which all applications can share. The most prolific is ITIL to date.
 Business Case Analysis: Demonstrating the business value of technology investments, based on evidenced based research and
lifecycle cost. This is a core requirement of Clinger Cohen Act.
 Procurement and Contracting: Software as a Service and SOA portent a new dynamic for acquisition of IT (health IT, cyber,
business systems), that brings focus to Service Level Agreements (SLAs), Software as a Service (SaaS) and SL Management. If the
previous activities do not directly feed the acquisition strategy or provide mechanisms for contractor accountability, all is lost.
ICHnet.org Company Confidential
AAM Aligns IT with Business Needs
increasing stake holder value, reducing risks
BRMTechnical
Solution &
Metrics
(TV, TRM)
Application
Layer 1
Common
Infrastructure
Layer M
BRMService
Components
& Metrics
(SRM/SV)
Appl Service
Components
Layer 1
Infrastructure
Service Components
Layer N
BRMBusiness
Drivers &
Metrics
(BRM/OV)
Core Business
Mission Objectives
Business
Processes &
Infrastructure
SAILSolutionFrameworks
Alignswithbusinessneeds
BusinessDrivenTopDown
Associated MetricsReference Models
Performance Metrics
Effectiveness/Efficiency
Interoperability,
Fit, Finish
AAM
Service
Component
Security Profiles
Common Criteria
Secure Solutions
Vendor
Solution
Templates
User/Integrator
Best Practices
ICHnet.org Company Confidential
Building on Patterns of
Success
Open IT Methods and Standards of Practice outside the reach
of the Defense Industrial Complex!
Navy: Assessment of AFLOAT Program –
CANES SOA & Security Strategy
Eliminated hi-risk Requirements by
23%, $100Ms in potential savings
USAF: Streamlined COTS Acquisition
Process. Applied to Server Virtualization.
Established optimal arch with ROI of
450% & $458 million savings
USAF: Procurement of E-FOIA
System using AAM
Completed AoA, BCA, AQ Selection
in just 4 months.
USMC: AoA and BusCase for Cross
Domain, Thin Client Solutions
Greatly Exceeded Forecasted Saving
in both analysis and acquisition
GSA: Financial Mgt System consolidation
using AAM.
Moved FMS from OMB “red” to
“green”. Eliminated duplicative
investments that saved $200M
BTA: Assessment of External DoD
Hosting Options using AAM
$300 million in potential savings with
minimal investment
BTA: Apply AAM to complete AoA and
BCA for DoD SOA Project
Reduced pre-acquisition cycle time
and cost of Analysis by 80%
(4 months vs 18)
GPO: Developed Acquisition Strategy for
Future Digital System
Led to successful acquisition and
implementation on time, on budget
and 80% cheaper than NARA RMS
JFCOM: MNIS Evaluation of Alternatives
for Cross Domain Solutions
Evaluated 100’s of Options in 90 days,
enabling stake holder buy in and
source selection.
ICHnet.org Company Confidential
Experience + Innovation = IT-
AAC
empowered by Evidenced Base Research
PMs will need access to proven IT expertise and commercial innovations to achieve
OMB and OSD Efficiency and IT Reform objectives:
Speed -- achieve 6-12 month cycle times vice 7-8 years (early pilots prove this is possible)
Incremental development, testing, and fielding -- vice one "big bang"
Actionable Requirements -- Sacrifice or defer customization for speed and COTS/OS utilization -
Leverage established standards of practice and open modular platforms
Meet DoD's wide-range IT needs -- from modernizing C2 to updating word processing software
Focused on Outcomes and Operational Effectiveness - Health IT, InfoSharing, Cyber Security,
Consolidated IT Infrastructure, Business Systems
To provide the PMs and Decision Makers with an alternative resources
and expertise needed to maximizes innovations of the market and
mitigate risk.
ICHnet.org Company Confidential
13
Fortune 100 SOA/Cloud Benchmarked
Best Practices and Lessons Learned
OSD HA SOA Implementation Best Practices
ICHnet.org Company Confidential
14
SOA is about the Business: An architectures style and enterprise governance
structure for communicating business needs and measurable service agreements
associated with shared enterprise technology services.
SOA is not about Technology, Cloud is the Implementation Side of SOA!
SOA concepts can be operationalized with almost any technology; Web Services, COBAL, ISB, JAVA, RDB,
WSDL, UDDI, etc… But focusing on technology & Standards is a common failure/anti-pattern
What is SOA/Cloud
A Fortune 100 User Perspective
ICHnet.org Company Confidential
15
Six CSFs for SOA/Cloud Transformation
that ICH can Assist you in achieving Success
To establish an SOA/Cloud Leadership must address six critical success factors;
1. Establish common requirements and capability development methods that remove
ambiguity and over specification. Consider adoption of Capability Assessment
Method refinement.
2. Revamp current Architecture Governance and Solution Engineering processes that
drive a technology neutral SOA paradigm in automating Business Process and
Infrastructure Capabilities. This requires access to commercial expertise and best
practices.
3. Adopt SOA enabled methods that drive Reusable & Standardized Solution
Architectures, Performance Metrics and Assessment Results. Reuse can
significantly reduce cost, risk and cycle times.
4. Adopt a standardized data interoperability framework the establishes a common
vocabulary and standards of practice established within a true public/private
partnership.
5. Leverage public/private partnership structure and Solution Architecture Working
Group approach that will establish standards of practice for community adoption
and criteria for assessing the business fit of COTS, GOTS and Open Source
Solutions.
6. Establish collaborative mechanisms by which practitioners, non-traditional
suppliers, innovators, standards bodies and communities of practice can
participate.
Weapons Systems Style Processes doesn’t work for
IT or SOA
Weapons Systems Style Processes doesn’t work for
IT or SOA
ICHnet.org Company Confidential
16
– Governance: Most Critical, Senior Mgt have Iron Fist on Common Data Model and Infrastructure
services. Funding control is paramount.
– Enterprise Architecture (EA): DODAF lacks Business Outcomes, COTS/Open Source
Assessments and Performance Metrics. EHR EA efforts must be complimented with Bottom up
Solution Architecture Views and Service Level Agreement (SLA) linkages. Using OMB’s FEA
PMO would better enable VA architecture alignment
– Document and assess your current portfolio of IT Capabilities in a Services/Value Context.
Leverage your current investments and licences.
– Shift Requirements focus to Capability & Service Component outcomes and measures.
– Evaluating IT (COTS) in a Services and Capability context: View IT for what business and
infrastructure services are provided vs technology/standards focus.
– Assessments (TA, AoA, Market Research, JCIDS, DODAF): Must have a bottom/service view of
COTS/Open Source that drives decisions
– Key SOA Standards (process and technology), BPM, BPEL, AAM, FEA PMO Reference Models.
– Key Technology and Approaches: Focus on Measures of Effectiveness (MOE) and SLAs
– Security and ID Mgt Decisions also must be addressed early on at each level of architecture
decomposition.
– Certification and Accreditation (C&A) and Testing considerations must be incorporated into the
Acquisition Lifecycle.
Cloud Key Impact Areas
Each must be re-oriented towards Services/Outcomes
ICHnet.org Company Confidential
17
The Desired Outcome – Agility Through
Design- Time & Real-Time SOA with Active Policy Enforcement
Real Time and Non-
Real Time Services
Presentation
Services
Security Services
Discovery Services
Management
Services
Mediation Services
Messaging Services
Runtime Infrastructure Components Model
of the CANES SOA ReferenceArchitecture
Machine-Machine enforcement
ICHnet.org Company Confidential
18
SOA/Cloud Success is Predicated
on Common Service Infrastructure
ICHnet.org Company Confidential
19
A 10 Company Distillation of
Best Practices
Best Practice Number 1: To succeed at SOA: align with your
organization’s leadership by building services that are tightly coupled with
the organization’s most important goals.
Best Practice Number 2: Services must be easy to find and understand.
Those who do use them must be rewarded.
Best Practice Number 3: Ensure that services are well documented
and widely publicized.
Best Practice Number 4: The SOA must allow data to flow from one
end of the enterprise to the other with its meaning intact and in a secure
fashion.
Best Practice Number 5: Don’t build SOA. Solve a business problem ….
Agility and cost saving will follow. This ancillary to Best Practice 1. Build
from within.
ICHnet.org Company Confidential
20
Best Practice Number 1: To succeed at SOA/Cloud: align with your organization’s
leadership by building services that are tightly coupled with the organization’s most
important goals
 Positive Pattern - FEDEX’S fourth SOA implementation has been successful because it was aligned to a
business crisis that had to be solved. Fedex’s IT costs were out of control and they could not make
changes fast enough. They believed that they could reduce technology costs by eliminating point-to-point
solutions. They succeeded at that. They believed that they could get to market faster with new business
capabilities by reusing services. They have not yet fully succeeded and have determined that the results
they want must build agility across the IT organization.
 Anti- Pattern - CITI’s SOA is a set of technology fiefdoms, rather than a set of shared services. They are
unable to further the bank’s inter- and intra-operability but instead squabble with each other over the
crumbs of a ruined enterprise. Conceivably, this enterprise might not have been ruined if an alignment of
technology and business goals could have been achieved.
 Anti- Pattern - Kaiser still views themselves as set of uncommented service domains that has severely
impeded the success in created agility or cost reductions. It proves that SOA when applied to a system has
limited results ad SOA value is in reuse across significant parts of the organization (enterprise model).
 Emerging- Pattern - BTA (Business Transformation Agency)- it is too soon to tell although their planning
has already shown the management commitment, a key success criteria.
ICHnet.org Company Confidential
21
Best Practice Number 2: Services must be easy to find and understand. Those who
do use them must be rewarded. This means control and management (governance of the
metadata).
 Positive Pattern - FEDEX defined the organization into service component business managers; moving from a vertical
structure that created stove pipe applications to a horizontal organization that produced common business services. They
went from an organization where cost of application here rising at rate that they endangered the health of their business
model. They went from a back office that delayed time to market (aka services to the warfighter) that had near zero time to
deliver. Now the organization is SOA’ing their front-end application and then will “SOA” their testing going from three releases
a year to real-time offering s (needed in CANES). A common object broker controls the metadata and enforced through
LEGAL SOA Document on how to build their 12 service components (note: corporate SOA have yielded large service
domains that are differentiated within the service). FEEX uses SAML fro real-time control for machine to machine policy
enforcement ( another CANES requirement).
 Anti-Pattern - Kaiser, Oracle managers still maintain large discretionary controls and with self-contained budgets and
rewards. These organizations have large numbers of levels of management underneath them. In these circumstances, there
exists a strong disincentive to reuse services which has lead to weak results in their internal SOA efforts.
 Anti-Pattern – Citi reinforced its design discipline with bonuses. The new services had to replace an existing system.
Building a service wasn’t enough; bonuses were paid only when an old system’s hardware was decommissioned and signed-
off.
 Emerging Pattern - BTA is in the early stage of this effort, they are establishing they have begun searching for reuse service,
setting up a repository, defining a common way for describing services. It is still too early to see how the organization will be
able to migrate their 27 business systems into common services. Like many government organization budgets are on
systems/applications the government acquisition model has yet to allow service component funding equivalent to the Fedex
enterprise model.
ICHnet.org Company Confidential
22
Best Practice Number 3: Ensure that services are well documented and widely
publicized.
 Positive Pattern – FEDEX has become a service- based enterprise. Their business expansion is
dominated by acquisition of new types of delivery companies. Each is being effectively integrated by the
built service components keeping them competitive in their market.
 Positive Pattern – The Hartford accomplished a profound alignment between the business and the IT
department by creating transparency in what is usually very opaque, the registry. It has built business-
significant capabilities such as address verification, a Department of Motor Vehicles driver's license check
etc. and it has retired the many solutions stuck in silos doing these functions. In fact, according to web
reports, the Harford’s SOA is moving into the mainstream and being asked to handle mission-critical
functions. But their unyielding demand to establish, first and foremost, the transparent public awareness of
their services through their registry, is core to their success.
 Anti-Pattern – Kaiser - In too many SOA implementations, the registry is a second thought. Kaiser
Permanente (where one of our authors was the head of technology architecture) is the sterling anti-pattern
here. In a multi-year, multimillion dollar program to create a SOA infrastructure, they chose not only to not
choose an enterprise repository, but, in fact, retired the license for a registry they had purchased some time
ago, rather than pay a maintenance bill. Kaiser has a number of non-integrated registries of data. They are
implementing a complete metadata project for their business intelligence efforts. They are defining the
enterprise’s business services in relation to their data. They are not capturing the firm’s XML schemas or
bind to any other governance or metadata program. Service Discovery is by word of mouth alone. The
result of this is that in 2009 the organization has a proliferation of web services and no reusable services to
speak of. The web services are used to contribute to the point-to-point legacy rather than pulling the
organization to a more business-aligned organization that uses technology to serve its business goals.
ICHnet.org Company Confidential
23
Best Practice Number 4: The SOA/Cloud must allow data to flow from one end of the
enterprise to the other with its meaning intact and in a secure fashion. Being late lets
inferior information products in decreasing business mission effectiveness. WarFighters
need the best from the get-go.
 Positive Pattern – BT’s architecture has been conceived of and built which solves data integration
problem in a coherent and solid way. This is exciting because this particular pattern and architecture solves
at least 90% of the problems presented by the business case we see before the OSD HA. In other words,
just as in the OSD HA, information is produced in the field in a set of native applications. This information
must flow though the organization coherently and, in some cases, in semi-real time. This business unit
does not have the particular problem of needing to transform data on the fly to redact it sufficiently to make
it capable of crossing security boundaries. However, the solution employed includes an ESB, which can
easily accommodate the insertion of a semantic engine into the architecture which could do this work.
When the data is so sensitive that human approval would be necessary to have it cross borders, an
approval process could be inserted in the data flow just shown in this pattern solution.
 Anti-Pattern - Kaiser - The health care industry lacks clear data policy. Institutions like the Cleveland
Clinic end up with complex projects to reconcile these vocabularies in real time, with experimental
reasoners and intense de-normalized data warehouses that are all but impossible to maintain. In medicine,
there are multiple conflicting vocabularies mandated by various regulatory agencies. SNOMED, a tool to
record clinical facts is somewhat in conflict with LOINC, which is in conflict with X.12, an insurance
standard which describes some of the same observations, procedures and lab tests. Within particular
specialties, there might be one way to describe something, and within another it might be described in
another way.
ICHnet.org Company Confidential
24
Best Practice Number 5: Don’t build a Cloud before you first solve a business problem
with a key user …. Agility and cost saving will follow.
This is ancillary to Problem 1. Build from within.
Positive Pattern – FEDEX built from within turning application parts in to a shared
service and managed them as services. New shipping products were a combination
of their shipping service domain and their pricing service domain. They trusted their
legacy systems. This was not a start from scratch.
Anti-Pattern – CITI had a service processing SWIFT transactions that was so
powerful it processed over 20% of all SWIFT transactions in the world. When the
SWIFT teams asked their SOA team how to do SOA, the SOA team’s response
was, “We can help you move to a better technology, but you should be teaching us
how to do SOA”. The SWIFT team, their management and the SOA team’s
management in corporate technology did not accept this answer. They did not trust
their legacy systems.
ICHnet.org Company Confidential
25
Recommendations to the FEDS
IT-AAC is organized to help implement these CSFs
1. Focus on a major problem and let a SOA approach evolve from that problem.
2. Determine what is a good service and enforce it
3. Don’t start till your metadata is defined … you will never recover
4. Use strongly enforced data policy and active governance policy enforcement to create
machine-machine mechanism for a real-time SOA needed in the Afloat program
5. Reuse as much as possible from legacy (do not start from scratch)
6. Determine how services are to built for the OSD HA, you cannot assume separate
funding will achieve enterprise SOA service components and pay for themselves
during the life-cycle
7. Create and fund service component owners who’s customers will be the function al
application owners
8. Build service domain that cover large major functions and not an array of small
service components (subroutine-like; remember FEDEX has only 12)
9. Learn how to accredit a reusable service component, possibly from enclave testing
policy.
ICHnet.org Company Confidential
26
SOA GOVERNANCE IMPLICATIONS
the management/policy that enables effective Cloud Utilization
ICHnet.org Company Confidential
27
Fortune 100 companies view SOA as a business driven, capability based architecture style .
It provides a governance model for enabling an Agile Enterprise and reducing cost through
elimination of redundant functions and integration cost.
Its about the business, not about the technology.
SOA is Business and Management-Centric
SOA = Business & Services Driven Lifecycle
ICHnet.org Company Confidential
28
SOA/Cloud Acquisition Approach
Using the Acquisition Assurance Method
Many of our Case Studies tried a SOA centric approach many times and FAILED.
However Real Business issues Common Application Services and Infrastructure services
followed.
ICHnet.org Company Confidential
29
Pre- SOA/Cloud
Separate System, Separate Funding, Little Enterprise Governance
Application Structure
Data Policy 1 Data Policy 3Data Policy 2 Data Policy 4
System 1
Owned by Funding
Line and PM
System 2
Owned by Funding Line
and PM
System 3 Owned
by Funding Line and PM
System 4
Owned by Funding
Line and PM
Application Structure 1 Application Structure 3Application Structure 2 Application Structure 4
Stovepipe are Inevitable
ICHnet.org Company Confidential
30
SOA/Cloud in Government
Shared Infrastructure Services (IaaS, PaaS, SaaS)
Governed by Strict Policies to Achieve Reuse, Still System-Centric
Enterprise
MetaData
Model
Service
Component
Specifications
Discoverable
Orchestratable
Based on Manual Governance
ICHnet.org Company Confidential
31
Enterprise Data Policy
System 1
Owned by Funding Line
and PM
System 2
Owned by Funding Line
and PM
System 3 Owned
by Funding Line and PM
System 4
Owned by Funding
Line and PM
Service 2
Service 3
Service 1
Service 4
SVC
PM
SVC
PM
SVC
PM
SVC
PM
SVC
PM
New Pattern of Planning for Reuse – Collaboration between System
Owner and Service Owners and not ad hoc integration
Re-Use Enterprise (SOA Services Modules)
Multiple systems Planned to use the Same Services. Must Fund Service
Components and assign Service PMs
ICHnet.org Company Confidential
Agile Acquisition Process Case Study
How Acquisition Assurance Method (AAM)
Aligns Cloud/IT Infrastructure Lifecycle with the
Federal Acquisition Process
AAM is the only known Agile Acquisition Framework to fully conform to OMB A119, CCA and
NDAA Section 804
ICHnet.org Company Confidential
IT-AAC Capabilities Accelerate Success
leveraging what works
1. Non-profit free think tank composed of the worlds most respected public service institutes and domain experts
not available through traditional contracting mechanisms
2. Innovation Clearinghouse and Knowledge Exchange that captures proven market innovations in an acquisition
ready context (canonical form)
3. Benchmarked Best Practices and Lessons Learned (SOA, Cloud, IaaS, PaaS, SaaS, Web Services) provided
by customers who share business value from real world implementation and testing results
4. Acquisition Decision Framework that pools and normalizes infrastructure requirements, architectures, tech
assessments, performance metrics (SLAs) business case analysis, and evaluation criteria.
5. Leadership Roundtables and Educational Forums that provides a hype free interchange with government and
industry leaders
6. Virtual Solution Architecture Integration Lab (SAIL) and Solution Architecture Working Groups (SAWG),
that detail realm of the possible and pre-validate fit and finish of commercial solutions.
7. Acquisition Advisory Contract Vehicles that reduce time to market and accelerate acquisition outcomes
"It is not a great mystery what needs to change, what it takes is the political will and willingness, as Eisenhower
possessed, to make hard choices -- choices that will displease powerful people both inside the Pentagon and out”
Defense Secretary Robert Gates
ICHnet.org Company Confidential
34
 Determine Sponsor and Stake Holder
representatives
 Codify Business Problem statement
 Validate Project Scope, Timeline, Outcomes
 Collect and evaluate existing data from RFI
responses and other sources
 Establish Stake Holder Agreement and
Success Criteria
 Establish Measures of Effectiveness
 Clear Problem Statement, Capability
Gaps
 RFI Assessment
 Realm of the Possible
 Measures of Effectiveness
 Other data as Price lists
Project
Strategy
Project
Strategy
Capability
Analysis
Capability
Analysis
Capability
Prioritization
Capability
Prioritization
Capability
Determination
Capability
Determination
AAM Decision Analytics
Activities Artifacts/Deliverables
Critical Success Factors
Entry Criteria
 Initial Data collection
 Initial identification of Capabilities
 Business Needs & Gaps
Feasibility
Assessment
Feasibility
Assessment
Economic
Analysis
Economic
Analysis
Exit Criteria - Outcomes
 Approval of Project Plan
 Approval of Business Problem and Outcome
 Criteria: Adequacy of Capabilities or Plan for
correction
1 month 2 months 3 months 4 months0 months
ICHnet.org Company Confidential
35
 Capture Problem Statement w/Sponsor
 Assess current Portfolio of Capabilities
 Establish Performance Measurements
 Document Agency Services Baseline
 Determine industry capabilities and metrics
 Capture Function Capabilities
 Determine level of granularity needed
 Hold Requirements WGs w/Sponsor's Key
Stakeholders
 Publish Capability Analysis Report (CAR)
(Requirements and their Justification)
 Work papers on:
– Justification of Requirements, & Capabilities
– Problem Statement Validation
Project
Strategy
Project
Strategy
Capability
Analysis
Capability
Analysis
Capability
Prioritization
Capability
Prioritization
Capability
Determination
Capability
Determination
Activities Artifacts/Deliverables
Critical Success Factors
Entry Criteria
 Approved Project Plan and POAM
Feasibility
Assessment
Feasibility
Assessment
Economic
Analysis
Economic
Analysis
Exit Criteria
 Approval of the CAR by the Functional Sponsor
Criteria: Adequacy of Capabilities or Plan for
correction
1 month 2 months 3 months 4 months0 months
AAM Decision Analytics
ICHnet.org Company Confidential
36
 Refine Capabilities into Service Component
solution models (per OMB FEA-PMO)
 Conduct Market Survey
 Establish Service Component & Groupings
 Review RFQ for adequacy of detail
 If RFI responses lack depth or breadth, ICH will
conduct Industry Outreach and Benchmarking
 Construct Service Component Analysis Groups
 PMO review
 Analysis Group; Service Components reference
model mapping to capabilities/requirements
 Work papers on:
– Results of the Market Survey
– Standards of Practice
– Industry Benchmarking Data
– Standardized Vocabulary for describing
service components and basis for
establishing SLAs (not in scope)
Project
Strategy
Project
Strategy
Capability
Analysis
Capability
Analysis
Capability
Prioritization
Capability
Prioritization
Capability
Determination
Capability
Determination
Activities Artifacts/Deliverables
Critical Success Factors
Entry Criteria
 Approved CAR (Validated Capabilities)
Feasibility
Assessment
Feasibility
Assessment
Economic
Analysis
Economic
Analysis
Exit Criteria
 Approval of Service Component by the PM
Criteria: Adequate industry metrics or plan for
correction
1 month 2 months 3 months 4 months0 months
AAM Decision Analytics
ICHnet.org Company Confidential
37
 Hold Functional WG w/Sponsor's Key
Stakeholders
 Develop Prioritization Weighting Scale
 Team Normalized weighting of the Service
Components
 Document each weights rationale
 Capability Prioritization Matrix
 Work papers on:
– Service Component Prioritization Scale
– Rationale for each weight given (traceability)
Project
Strategy
Project
Strategy
Capability
Analysis
Capability
Analysis
Capability
Prioritization
Capability
Prioritization
Capability
Determination
Capability
Determination
Activities Artifacts/Deliverables
Critical Success Factors
Entry Criteria
 Approved Analysis Groups, Service
Components and Standards of Practice
Feasibility
Assessment
Feasibility
Assessment
Economic
Analysis
Economic
Analysis
Exit Criteria
 Approved Capability Prioritization Matrix
Criteria: Functional Sponsor Approval
1 month 2 months 3 months 4 months0 months
AAM Decision Analytics
ICHnet.org Company Confidential
38
 Evaluate RFI Responses
 Establish alternatives for the assessment
 Establish Scoring WG team
 Develop Scoring Plan
 Score Alternatives + +
 Perform Sensitivity Analysis on Scoring
Results
 Analyze results
 Review AoA date points
 Present Results to Functional Sponsor - May
included Functional WG team
 Analysis of Alternative (Compare New/Existing
Solutions against Prioritized Capability)
 Work papers on:
– Scoring Plan
– Scoring Rationale
– Sensitivity analyses performed
– Technology Maturity Assessment
Project
Strategy
Project
Strategy
Capability
Analysis
Capability
Analysis
Capability
Prioritization
Capability
Prioritization
Capability
Determination
Capability
Determination
Activities Artifacts/Deliverables
Critical Success Factors
Entry Criteria
 Approved Capability Prioritization Matrix
Feasibility
Assessment
Feasibility
Assessment
Economic
Analysis
Economic
Analysis
Exit Criteria
 Approval of Feasibility Assessment Report by DBSAE/ PMO
Criteria: (1) Assessment Team agreement on the scores.
(2) Reference material justifying scores
1 month 2 months 3 months 4 months0 months
AAM Decision Analytics
ICHnet.org Company Confidential
 Setup Main Cost Model
 Determine the quantities and time frame to be
Evaluate
 "Setup Sub-Models for direct, indirect &
migration cost + savings"
 Determine Model's elements related to ROI
 Determine the models for each alternative
 Collect Data industry data and assumptions
 Conduct TCO
 Review of Economic Analysis Results
Present Results to Functional Sponsor - May
included Functional WG team
 Develop Economic Analysis Report
 Economic Analysis Report
 Solution Architecture
 Documented CCA compliance
 Work papers on:
– Model Documentation
– Documentation of each Alternative
– Documentation on costs developed for the
Mode;
– Documentation of Industry Metric
determined
Project
Strategy
Project
Strategy
Capability
Analysis
Capability
Analysis
Capability
Prioritization
Capability
Prioritization
Capability
Determination
Capability
Determination
Activities Artifacts/Deliverables
Critical Success Factors
Entry Criteria
 Approved Feasibility Assessment, AoA
3
Feasibility
Assessment
Feasibility
Assessment
Economic
Analysis
Economic
Analysis
Exit Criteria
 Approval of Economic Analysis Report by Functional Sponsor
Criteria: (1) Functional Sponsor Agreement
(2) Reference material justifying cost models
1 month 2 months 3 months 4 months0 months
DBSAE
Assessment
AAM Decision Analytics
ICHnet.org Company Confidential
Sample Cloud
Reference Architecture
NT
4.0
WS
Application Libs (C, DLL, MFC)
Security Service (PKI X.509)
IDL StubRMI Runtime
Win 32 Subsystem | NT Device Drivers
J2EE Web Services
EJB
Comms (TCP/IP) SSL
IDE Runtime (Javascript, PB, C++, JDK)
Java JITC
Directory Svrs.
X.500, or
DNS,
DHCP
J2EE /Web Services
Systems Management Server
(Patrol)
Certificate Validation
Win 32 Subsystem - NT Device Drivers
Comms (TCP/IP)/ SSL
CDS Service
Backup
Network Mgt.
(Open View)
Apha or
Pentium-
Pro
NT 4.0
Server
Application Client
Systems Server
Alpha,
Pentium
Pro
NT 4.0
Server
Application & System Runtime Modules
Security Service (PKI Certificate)
Directory Svrs.
X.500,
DNS, DHCP,
LDAP (v1.22)
CDS
EJB Server (or CORBA Server)
TP Mntr.
(Encina++)
Win 32 Subsystem - NT Device Drivers
Comms (TCP/IP) SSL
Time Servicer
JDBC API Client
(Connection Client)
Compilers (Java JITC)
Application Server
or
A
P
I
EJB Module
RDBMS Server
SQL Proxy Server (Connection Server)
HP,
Sun, or
IBM
Unix
or
Alpha
NT 40
Server
Posix Subsystem (Native or NT), Drivers
Comms (TCP/IP) SSL
ebXML Server
Database Server
JDBC Driver OCI/INET
XA Lib.
(Encina)
RDBMS API (ODBC or JDBC)
ebXML API
HP,
Sun, or
IBM
Unix
or
Alpha
NT 40
Server
Posix Subsystem (Native or NT), Drivers
Comms (TCP/IP) SSL
Web Services
WEB Server
ODBC Driver (Intersolve) OCI/INET
RMI/
IIOP
MFI/
Gateway
Browser, Native GUI
ICHnet.org Company Confidential
S.A.I.L.
Acceleration
RiskLevel
Acquisition Lifecycle Stages (cost & time line)
High
Low
Risk
Delta
Cost/time
Delta
IT-AAC: Accelerating Innovation through Collaboration
reduces time, cost and risk of redundant IT research and
validation efforts
Acceptable Risk Level
Redundant Market Research and Testing
SAIL Collaborative Research and Validation
Project A
Project B
Project C
Strategy Architecture Research Validation Acquisition Execution
Inconclusive
findings

Contenu connexe

Tendances

TechniClick - GWEA & EA Governance
TechniClick - GWEA & EA GovernanceTechniClick - GWEA & EA Governance
TechniClick - GWEA & EA Governance
guestea68b0
 

Tendances (20)

Keynote Address: Changing Public Sector Through ICT-innovation
Keynote Address: Changing Public Sector Through ICT-innovationKeynote Address: Changing Public Sector Through ICT-innovation
Keynote Address: Changing Public Sector Through ICT-innovation
 
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
 
Infosys Information Platform - Translating data into action
Infosys Information Platform - Translating data into actionInfosys Information Platform - Translating data into action
Infosys Information Platform - Translating data into action
 
GovTech Market Overview
GovTech Market Overview GovTech Market Overview
GovTech Market Overview
 
Big data and it characterstic
Big data and it charactersticBig data and it characterstic
Big data and it characterstic
 
IT Capability Maturity Framework & Capability Improvement Program
IT Capability Maturity Framework & Capability Improvement ProgramIT Capability Maturity Framework & Capability Improvement Program
IT Capability Maturity Framework & Capability Improvement Program
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction
 
How to fix the Governance Model for the Public Sector (Government)
How to fix the Governance Model for the Public Sector (Government)How to fix the Governance Model for the Public Sector (Government)
How to fix the Governance Model for the Public Sector (Government)
 
IT-CMF BAR
IT-CMF BARIT-CMF BAR
IT-CMF BAR
 
Resilience Engineering as an IT Cultural Discipline
Resilience Engineering as an IT Cultural DisciplineResilience Engineering as an IT Cultural Discipline
Resilience Engineering as an IT Cultural Discipline
 
TechniClick - GWEA & EA Governance
TechniClick - GWEA & EA GovernanceTechniClick - GWEA & EA Governance
TechniClick - GWEA & EA Governance
 
Madison Park Group - EHSQ Software Market Update - Initial Report (2019)
Madison Park Group - EHSQ Software Market Update - Initial Report (2019)Madison Park Group - EHSQ Software Market Update - Initial Report (2019)
Madison Park Group - EHSQ Software Market Update - Initial Report (2019)
 
Cloud Adoption in Capital Markets: A Perspective
Cloud Adoption in Capital Markets: A PerspectiveCloud Adoption in Capital Markets: A Perspective
Cloud Adoption in Capital Markets: A Perspective
 
Madison Park Group - Engineering & Design Software M&A Market Update - H2 2017
Madison Park Group - Engineering & Design Software M&A Market Update - H2 2017Madison Park Group - Engineering & Design Software M&A Market Update - H2 2017
Madison Park Group - Engineering & Design Software M&A Market Update - H2 2017
 
Bringing cross-sectoral together in industry 4.0
Bringing cross-sectoral together in industry 4.0Bringing cross-sectoral together in industry 4.0
Bringing cross-sectoral together in industry 4.0
 
System Error
System ErrorSystem Error
System Error
 
Implementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkImplementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance Framework
 
The fourth industrial revolution
The fourth industrial revolutionThe fourth industrial revolution
The fourth industrial revolution
 
MPG Engineering, Design, PLM, and Simulation Software Market Update - 2019
MPG Engineering, Design, PLM, and Simulation Software Market Update - 2019MPG Engineering, Design, PLM, and Simulation Software Market Update - 2019
MPG Engineering, Design, PLM, and Simulation Software Market Update - 2019
 

En vedette

102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)
102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)
102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)
平原 謝
 
Do d cloud computing security requirements guide (srg) version 1
Do d cloud computing security requirements guide (srg) version 1Do d cloud computing security requirements guide (srg) version 1
Do d cloud computing security requirements guide (srg) version 1
BaddddBoyyyy
 
Implementing ibm storage data deduplication solutions sg247888
Implementing ibm storage data deduplication solutions sg247888Implementing ibm storage data deduplication solutions sg247888
Implementing ibm storage data deduplication solutions sg247888
Banking at Ho Chi Minh city
 
Cloud Computing - Availability Issues and Controls
Cloud Computing - Availability Issues and ControlsCloud Computing - Availability Issues and Controls
Cloud Computing - Availability Issues and Controls
lylcheng88
 

En vedette (11)

Gov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_finalGov cloud pressclub_29mar2011_final
Gov cloud pressclub_29mar2011_final
 
DISA: Cloud Computing And SaaS
DISA: Cloud Computing And SaaSDISA: Cloud Computing And SaaS
DISA: Cloud Computing And SaaS
 
Privacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal SectorPrivacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal Sector
 
102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)
102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)
102.12.25 中正大學資管系古政元教授 屏東科技大學演講(2013-12-25)
 
Cloud Computing for DoD and Government 2010
Cloud Computing for DoD and Government 2010Cloud Computing for DoD and Government 2010
Cloud Computing for DoD and Government 2010
 
Do d cloud computing security requirements guide (srg) version 1
Do d cloud computing security requirements guide (srg) version 1Do d cloud computing security requirements guide (srg) version 1
Do d cloud computing security requirements guide (srg) version 1
 
Cloud Computing In DoD, IDGA Presentation
Cloud Computing In DoD, IDGA PresentationCloud Computing In DoD, IDGA Presentation
Cloud Computing In DoD, IDGA Presentation
 
Implementing ibm storage data deduplication solutions sg247888
Implementing ibm storage data deduplication solutions sg247888Implementing ibm storage data deduplication solutions sg247888
Implementing ibm storage data deduplication solutions sg247888
 
Cloud Computing - Availability Issues and Controls
Cloud Computing - Availability Issues and ControlsCloud Computing - Availability Issues and Controls
Cloud Computing - Availability Issues and Controls
 
Privacy issues in the cloud
Privacy issues in the cloudPrivacy issues in the cloud
Privacy issues in the cloud
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 

Similaire à It aac cloud-acquisition_roadmap2012

Weiler slideshow
Weiler slideshowWeiler slideshow
Weiler slideshow
vjairam
 
IT-AAC Cloud Acquisition Roadmap
IT-AAC Cloud Acquisition RoadmapIT-AAC Cloud Acquisition Roadmap
IT-AAC Cloud Acquisition Roadmap
GovCloud Network
 
WEFUSA_IndustrialInternet_Report2015
WEFUSA_IndustrialInternet_Report2015WEFUSA_IndustrialInternet_Report2015
WEFUSA_IndustrialInternet_Report2015
Michael Cihra
 
strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1
Carol Jackson
 

Similaire à It aac cloud-acquisition_roadmap2012 (20)

Weiler slideshow
Weiler slideshowWeiler slideshow
Weiler slideshow
 
IT-AAC Roadmap for Sustainable Defense IT Reforms
IT-AAC Roadmap for Sustainable Defense IT ReformsIT-AAC Roadmap for Sustainable Defense IT Reforms
IT-AAC Roadmap for Sustainable Defense IT Reforms
 
IT-AAC Cloud Acquisition Roadmap
IT-AAC Cloud Acquisition RoadmapIT-AAC Cloud Acquisition Roadmap
IT-AAC Cloud Acquisition Roadmap
 
Bending the IT Op-Ex Cost Curve Through IT Simplification
Bending the IT Op-Ex Cost Curve Through IT SimplificationBending the IT Op-Ex Cost Curve Through IT Simplification
Bending the IT Op-Ex Cost Curve Through IT Simplification
 
Two speed-it
Two speed-itTwo speed-it
Two speed-it
 
FINAL VER - 2015_09
FINAL VER - 2015_09FINAL VER - 2015_09
FINAL VER - 2015_09
 
Enhancing competitive-advantage-through-connected-equipment-1 (1)
Enhancing competitive-advantage-through-connected-equipment-1 (1)Enhancing competitive-advantage-through-connected-equipment-1 (1)
Enhancing competitive-advantage-through-connected-equipment-1 (1)
 
How to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureHow to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT Infrastructure
 
Tech Trends 2015: The fusion of business and IT | Deloitte Australia | Techno...
Tech Trends 2015: The fusion of business and IT | Deloitte Australia | Techno...Tech Trends 2015: The fusion of business and IT | Deloitte Australia | Techno...
Tech Trends 2015: The fusion of business and IT | Deloitte Australia | Techno...
 
Industry in transition fb note jan 2015
Industry in transition fb note jan 2015Industry in transition fb note jan 2015
Industry in transition fb note jan 2015
 
The Industrial Internet Of Things - Potential Of Connected Products And Services
The Industrial Internet Of Things - Potential Of Connected Products And ServicesThe Industrial Internet Of Things - Potential Of Connected Products And Services
The Industrial Internet Of Things - Potential Of Connected Products And Services
 
WEFUSA_IndustrialInternet_Report2015
WEFUSA_IndustrialInternet_Report2015WEFUSA_IndustrialInternet_Report2015
WEFUSA_IndustrialInternet_Report2015
 
Flex mode framework architectural overview v 2.1 19-08-2013
Flex mode framework   architectural overview v 2.1 19-08-2013Flex mode framework   architectural overview v 2.1 19-08-2013
Flex mode framework architectural overview v 2.1 19-08-2013
 
The overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure managementThe overwhelming challenges of IT infrastructure management
The overwhelming challenges of IT infrastructure management
 
Congressional it reform-roadmap_2011
Congressional it reform-roadmap_2011Congressional it reform-roadmap_2011
Congressional it reform-roadmap_2011
 
The path to self-disruption
The path to self-disruptionThe path to self-disruption
The path to self-disruption
 
Going Digital? Not Without a Simple, Modern and Secure IT Backbone
Going Digital? Not Without a Simple, Modern and Secure IT BackboneGoing Digital? Not Without a Simple, Modern and Secure IT Backbone
Going Digital? Not Without a Simple, Modern and Secure IT Backbone
 
Motorola Case Study: Digitization of the IAM Lifecycle
Motorola Case Study: Digitization of the IAM LifecycleMotorola Case Study: Digitization of the IAM Lifecycle
Motorola Case Study: Digitization of the IAM Lifecycle
 
Hybrid IT
Hybrid ITHybrid IT
Hybrid IT
 
strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1strategies-align-OT-IT-whitepaper-1
strategies-align-OT-IT-whitepaper-1
 

Plus de John Weiler (9)

Why DOD is Woefully Behind in IT
Why DOD is Woefully Behind in ITWhy DOD is Woefully Behind in IT
Why DOD is Woefully Behind in IT
 
Cyber Resilience Summit Briefing March 15, 2016
Cyber Resilience Summit Briefing March 15, 2016Cyber Resilience Summit Briefing March 15, 2016
Cyber Resilience Summit Briefing March 15, 2016
 
Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing
 
Lungren Letter
Lungren LetterLungren Letter
Lungren Letter
 
ICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_finalICH_Press_release_DHS-Agilecontract_final
ICH_Press_release_DHS-Agilecontract_final
 
OSD letter
OSD letterOSD letter
OSD letter
 
INSA_ IT-AAC MOU
INSA_ IT-AAC MOUINSA_ IT-AAC MOU
INSA_ IT-AAC MOU
 
OSD ATL class on Agile Acquisition
OSD ATL class on Agile AcquisitionOSD ATL class on Agile Acquisition
OSD ATL class on Agile Acquisition
 
It aac defense-it-cloud2013
It aac defense-it-cloud2013It aac defense-it-cloud2013
It aac defense-it-cloud2013
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

It aac cloud-acquisition_roadmap2012

  • 1. Agile Acquisition Roadmap for Secure Cloud, ISR/C2 Infrastructure & Cyber Solutions Assuring IT Program Outcomes through Decision Analytics; measuring the business value of emerging technologies, innovations, and lessons learned. John Weiler IT-AAC, Vice Chair A not-for-profit research institute John.Weiler@IT-AAC.org www.IT-AAC.org 703 768 0400 IT Acquisition Advisory Council Assuring Business Value of IT “Weapons systems depend on stable requirements, but with IT, technology changes faster than the requirements process can keep up," he said. "It changes faster than the budget process and it changes faster than the acquisition milestone process. For all these reasons, the normal acquisition process does not work for information technology.” DepSec Bill Lynn statement at the IT-AAC Defense IT Acquisition Summit
  • 2. ICHnet.org Company Confidential IT-AAC Public/Private Partnership “A knowledgeable & conflict free Community of Practice bring forward proven methods, expertise and innovations to empower the Federal IT Acquisition Ecosystem” Honorable Mike Wynne, 21st AFSEC, Co-Founder and Chairman Emeritus, IT-AAC “Together, these steps will help to catalyze a fundamental reform of Federal IT, which is essential to improving the effectiveness and efficiency of the Federal Government” White House, OMB Director Orszag
  • 3. ICHnet.org Company Confidential Information Technology Evolution InformationDrivenCapability • Central computer center, slow turn around • One size fits all • Limited reuse of application modules 1950 1960 1970 1980 1990 2000 2010 2020 1. Centralized - Mainframe 2. Client/Server - Decentralized 3. Internet - Cloud • PC enabled and network • Software distributed in both server and client computers • Heavy focus on software development and point to point integration • Virtualized compute; global network enabled, plug & play • IT Infrastructure decoupled from Applications • COTS & OSS Integration, Software as a Service  Adding functional capability has become easier with each new wave  We are in early stages of Wave 3 information technology  Mainframe and Client-Server waves remain in place  Waves represent many co-dependent technologies, matured over time  But enterprise infrastructure gaps & vulnerabilities have become more critical Innovations of the market and benchmarked best practices are invisible to the Defense Industrial Complex Cloud Acquisition Challenge We are delivering yesterdays technology tomorrow
  • 4. ICHnet.org Company Confidential Overcoming the Acquisition Challenges “ Federal IT Management is Fundamentally Broken ” OMB 1. Good laws, poor enforcement: Clinger Cohen Act, Public Law 104-113, and FAR FFRDC use restrictions have prevented adoption of innovative solutions and IT standards of practices which should drive establishment of shared IT infrastructure (SOA);  A robust set of Acquisition Processes are available but not visible to Defense Industrial Complex, requiring a true public/private partnership like IT-AAC that is not vested in the status quo. Title 10 and lack of strong governance impede long term funding of infrastructure and drive “Big Bang” stove pipes. New rules needed for SOA ConOps. 2. CULTURE: 15 years of IT reform efforts have fallen short, with only minor changes to current MilSpec methods. (DODAF, JCIDS, NESI, LISI) compete with standards and orthogonal to Benchmarked Industry Best Practices.  IT-AAC communities are uniquely dedicated streamlining IT Architecture and Acquisition Processes, structured to establish standards of practices. ICH’s “clearinghouse” of proven methods and decision tools represent the CMMi of IT Acquisition. 3. INCENTIVES: Traditional SIs and FFRDCs are insulated from commercial IT innovations and vested in status quo. DoD needs an organic, conflict free mechanisms for tapping innovations of the market, commercial expertise, and real world lessons learned.  IT-AAC brings a world of innovation, expertise and knowledge that has proven to drive successful outcomes. IT-AAC membership are CONFLICT FREE & inclusive of innovative businesses, universities, SDOs, think tanks and research institutes. 4. PROCESS: Both CCA and Sec804 will require revamping of IT Requirements, Architecture, Tech Assessment and Decision Support Processes. Any new process should have both govt/industry buyin, conform to OMB A119 and reflect a proven vs new MilSpec.  IT-AAC partnership brings to market a collaborative structure for the IT Acquisition community. Its 2 year effort has already created agency proven methods based on commercial best practices. 5. PEOPLE: IT Acquisition Ecosystem lack IT training or experience needed to make timely decisions; Lack of clear metrics and incentives put focus on compliance vs outcomes  ICH’s structured to establish standardized IT performance metrics (MOEs) and Service Level Agreements (SLAs) across the acquisition lifecycle and validated by benchmarked best practices. Partnership with SDOs and large corporate users provide needed expertise to enable sound decision making.
  • 5. ICHnet.org Company Confidential OMB’s 25 Point IT Reform Plan IT Investments must Align the Acquisition Process with the Technology Cycle. Point 13. Design and develop a cadre of specialized IT acquisition professionals . Point 14. Identify IT acquisition best practices and adopt government-wide. Point 15. Issue contracting guidance and templates to support modular development Point 16. Reduce barriers to entry for small innovative technology companies “Too often spending on IT is still wasted on duplicative investments, missed opportunities to leverage economies of scale, rising operational costs that starve new development, and mismanaged projects that lead to cost overruns and schedule slippages,” OMB Memo to Agencies
  • 6. ICHnet.org Company Confidential DoD CIO’s Cloud Strategy First Step: Foster Adoption of Cloud Computing  Establish a joint governance structure to drive the transition to the DoD Enterprise Cloud Environment  Adopt an Enterprise First approach that will accomplish a cultural shift to facilitate the adoption and evolution of cloud computing  Reform DoD IT financial, acquisition, and contracting policy and practices that will improve agility and reduce costs  Implement a cloud computing outreach and awareness campaign to gather input from the major stakeholders, expand the base of consumers and providers, and increase visibility of available cloud services throughout the Federal Government “We can't solve problems by using the same kind of thinking we used when we created them.” Albert Einstein
  • 7. ICHnet.org Company Confidential Cloud Adoption Model Requires different approaches to IT governance  Portfolio Mgt: assess to what degree existing infrastructure services, technologies and platforms that can be reconfigured into a new Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and/or Software as a Service (SaaS). You can’t manage what you cannot measure  Acquisition Agility: Streamlined Acquisition Process (per CCA and NDAA Section 804), and maximize use of commercial innovations of the market. Reduce bureaucratic acquisition barriers and inefficiencies that drive up cost and harm competition. Buying a service eliminates many steps from traditional top down “design to spec” approaches.  Increase Innovation: Establish public/private information exchanges that enable greater access to non-traditional suppliers and innovations of the market. Leveraging existing sources of IT assessment evidence, testing and implementation results. Commercial innovation like Cloud, require reaching outside the Defense Industrial Base.  Information Assurance: address security needs at all stages of the acquisition lifecycle; requirements, architecture, tech assessment, and procurement, accompanied by well defined SLAs. DoD Architecture Models are not effective in modeling IA attributes at each layer of the ISO model.  Workforce readiness: PMs and IT Acquisition Professionals need IT specific training and mentoring that reflects commercial standards of practice. Current Acquisition Training Curriculums do not prepare the work force for the unique challenges of IT.  Continuous Stakeholder Participation: the acquisition process must align with the acquisition process to accommodate the fast paced market. IT-AAC provides a clearinghouse of innovative solutions and sources of past performance
  • 8. ICHnet.org Company Confidential Lesson Learned from Early Adopters (A study from NGA)  Management/People: – Cloud requires transformation of both organization and leadership – Achieving benefits from the cloud requires an evolution of skills and expertise – Transformation of culture and intra-agency agreements required  Technology – Not all clouds are created equal – and not all applications behave the same in the cloud – Software products and versions must be standardized, integrated and deployed on standard infrastructure blocks – Cloud can leverage automation from both automatic and scripted sources  Process – Maintaining security and compliance when users have access to and control over the environment – Integrating the management of multiple resource pools, environments, and clients within change processes – Establishing an organizationally driven hierarchy and ensuring logical separation throughout the stack
  • 9. ICHnet.org Company Confidential Best Practices Clearinghouse leveraging innovations and benchmarked best practices IT-AAC Partnership brings forth wide range of IT expertise need to mentor PMs:  Governance and Oversight: how an enterprise supports, oversees and manages IT programs and on-going portfolio. SOA as defined in the commercial market is governance tool not technology. DoD5000 and BCL represent the current approaches.  Decision Analytics: enables effective Program Management and Value Stream Analysis execution. As most of these sub- processes are designed to improve decision making, a relative new discipline has evolved (since 86), that addresses the human and cultural challenges in decision making. Decision Analytics is the discipline of framing the essence and success criteria of each gate in the acquisition lifecycle. It brings focus to the high risk areas of a program, and reduces analysis/paralysis.  Capability Specification: Actionable requirements must be constrained by the realm of the possible. With pressures to do more with less, we must embrace mechanisms that force a relative valuation/impact of the gap/capability, with clearly defined outcomes  Solution Architecture: This is one of the most critical elements of the acquisition lifecycle, as it should represent all stake holder agreements. The market embrace of SOA is not about technology, but a refocusing of the EA on service level management and data. A good architecture is a lexicon that links requirements, technologies and acquisition strategy.  Technology Assessment: Understanding the limitation of technology early in the process is key. Without a clear view of the “realm of the possible” validated by real world results, we often find ourselves in high risk areas and over specification. Market research must be done early to help users constrain requirements and embrace the inherent business practices that codify. Recognizing that 70% make up of every IT application is vested in IT infrastructure (netcentric, cloud, SOA), it is critical to establish a common infrastructure/infrastructure standard by which all applications can share. The most prolific is ITIL to date.  Business Case Analysis: Demonstrating the business value of technology investments, based on evidenced based research and lifecycle cost. This is a core requirement of Clinger Cohen Act.  Procurement and Contracting: Software as a Service and SOA portent a new dynamic for acquisition of IT (health IT, cyber, business systems), that brings focus to Service Level Agreements (SLAs), Software as a Service (SaaS) and SL Management. If the previous activities do not directly feed the acquisition strategy or provide mechanisms for contractor accountability, all is lost.
  • 10. ICHnet.org Company Confidential AAM Aligns IT with Business Needs increasing stake holder value, reducing risks BRMTechnical Solution & Metrics (TV, TRM) Application Layer 1 Common Infrastructure Layer M BRMService Components & Metrics (SRM/SV) Appl Service Components Layer 1 Infrastructure Service Components Layer N BRMBusiness Drivers & Metrics (BRM/OV) Core Business Mission Objectives Business Processes & Infrastructure SAILSolutionFrameworks Alignswithbusinessneeds BusinessDrivenTopDown Associated MetricsReference Models Performance Metrics Effectiveness/Efficiency Interoperability, Fit, Finish AAM Service Component Security Profiles Common Criteria Secure Solutions Vendor Solution Templates User/Integrator Best Practices
  • 11. ICHnet.org Company Confidential Building on Patterns of Success Open IT Methods and Standards of Practice outside the reach of the Defense Industrial Complex! Navy: Assessment of AFLOAT Program – CANES SOA & Security Strategy Eliminated hi-risk Requirements by 23%, $100Ms in potential savings USAF: Streamlined COTS Acquisition Process. Applied to Server Virtualization. Established optimal arch with ROI of 450% & $458 million savings USAF: Procurement of E-FOIA System using AAM Completed AoA, BCA, AQ Selection in just 4 months. USMC: AoA and BusCase for Cross Domain, Thin Client Solutions Greatly Exceeded Forecasted Saving in both analysis and acquisition GSA: Financial Mgt System consolidation using AAM. Moved FMS from OMB “red” to “green”. Eliminated duplicative investments that saved $200M BTA: Assessment of External DoD Hosting Options using AAM $300 million in potential savings with minimal investment BTA: Apply AAM to complete AoA and BCA for DoD SOA Project Reduced pre-acquisition cycle time and cost of Analysis by 80% (4 months vs 18) GPO: Developed Acquisition Strategy for Future Digital System Led to successful acquisition and implementation on time, on budget and 80% cheaper than NARA RMS JFCOM: MNIS Evaluation of Alternatives for Cross Domain Solutions Evaluated 100’s of Options in 90 days, enabling stake holder buy in and source selection.
  • 12. ICHnet.org Company Confidential Experience + Innovation = IT- AAC empowered by Evidenced Base Research PMs will need access to proven IT expertise and commercial innovations to achieve OMB and OSD Efficiency and IT Reform objectives: Speed -- achieve 6-12 month cycle times vice 7-8 years (early pilots prove this is possible) Incremental development, testing, and fielding -- vice one "big bang" Actionable Requirements -- Sacrifice or defer customization for speed and COTS/OS utilization - Leverage established standards of practice and open modular platforms Meet DoD's wide-range IT needs -- from modernizing C2 to updating word processing software Focused on Outcomes and Operational Effectiveness - Health IT, InfoSharing, Cyber Security, Consolidated IT Infrastructure, Business Systems To provide the PMs and Decision Makers with an alternative resources and expertise needed to maximizes innovations of the market and mitigate risk.
  • 13. ICHnet.org Company Confidential 13 Fortune 100 SOA/Cloud Benchmarked Best Practices and Lessons Learned OSD HA SOA Implementation Best Practices
  • 14. ICHnet.org Company Confidential 14 SOA is about the Business: An architectures style and enterprise governance structure for communicating business needs and measurable service agreements associated with shared enterprise technology services. SOA is not about Technology, Cloud is the Implementation Side of SOA! SOA concepts can be operationalized with almost any technology; Web Services, COBAL, ISB, JAVA, RDB, WSDL, UDDI, etc… But focusing on technology & Standards is a common failure/anti-pattern What is SOA/Cloud A Fortune 100 User Perspective
  • 15. ICHnet.org Company Confidential 15 Six CSFs for SOA/Cloud Transformation that ICH can Assist you in achieving Success To establish an SOA/Cloud Leadership must address six critical success factors; 1. Establish common requirements and capability development methods that remove ambiguity and over specification. Consider adoption of Capability Assessment Method refinement. 2. Revamp current Architecture Governance and Solution Engineering processes that drive a technology neutral SOA paradigm in automating Business Process and Infrastructure Capabilities. This requires access to commercial expertise and best practices. 3. Adopt SOA enabled methods that drive Reusable & Standardized Solution Architectures, Performance Metrics and Assessment Results. Reuse can significantly reduce cost, risk and cycle times. 4. Adopt a standardized data interoperability framework the establishes a common vocabulary and standards of practice established within a true public/private partnership. 5. Leverage public/private partnership structure and Solution Architecture Working Group approach that will establish standards of practice for community adoption and criteria for assessing the business fit of COTS, GOTS and Open Source Solutions. 6. Establish collaborative mechanisms by which practitioners, non-traditional suppliers, innovators, standards bodies and communities of practice can participate. Weapons Systems Style Processes doesn’t work for IT or SOA Weapons Systems Style Processes doesn’t work for IT or SOA
  • 16. ICHnet.org Company Confidential 16 – Governance: Most Critical, Senior Mgt have Iron Fist on Common Data Model and Infrastructure services. Funding control is paramount. – Enterprise Architecture (EA): DODAF lacks Business Outcomes, COTS/Open Source Assessments and Performance Metrics. EHR EA efforts must be complimented with Bottom up Solution Architecture Views and Service Level Agreement (SLA) linkages. Using OMB’s FEA PMO would better enable VA architecture alignment – Document and assess your current portfolio of IT Capabilities in a Services/Value Context. Leverage your current investments and licences. – Shift Requirements focus to Capability & Service Component outcomes and measures. – Evaluating IT (COTS) in a Services and Capability context: View IT for what business and infrastructure services are provided vs technology/standards focus. – Assessments (TA, AoA, Market Research, JCIDS, DODAF): Must have a bottom/service view of COTS/Open Source that drives decisions – Key SOA Standards (process and technology), BPM, BPEL, AAM, FEA PMO Reference Models. – Key Technology and Approaches: Focus on Measures of Effectiveness (MOE) and SLAs – Security and ID Mgt Decisions also must be addressed early on at each level of architecture decomposition. – Certification and Accreditation (C&A) and Testing considerations must be incorporated into the Acquisition Lifecycle. Cloud Key Impact Areas Each must be re-oriented towards Services/Outcomes
  • 17. ICHnet.org Company Confidential 17 The Desired Outcome – Agility Through Design- Time & Real-Time SOA with Active Policy Enforcement Real Time and Non- Real Time Services Presentation Services Security Services Discovery Services Management Services Mediation Services Messaging Services Runtime Infrastructure Components Model of the CANES SOA ReferenceArchitecture Machine-Machine enforcement
  • 18. ICHnet.org Company Confidential 18 SOA/Cloud Success is Predicated on Common Service Infrastructure
  • 19. ICHnet.org Company Confidential 19 A 10 Company Distillation of Best Practices Best Practice Number 1: To succeed at SOA: align with your organization’s leadership by building services that are tightly coupled with the organization’s most important goals. Best Practice Number 2: Services must be easy to find and understand. Those who do use them must be rewarded. Best Practice Number 3: Ensure that services are well documented and widely publicized. Best Practice Number 4: The SOA must allow data to flow from one end of the enterprise to the other with its meaning intact and in a secure fashion. Best Practice Number 5: Don’t build SOA. Solve a business problem …. Agility and cost saving will follow. This ancillary to Best Practice 1. Build from within.
  • 20. ICHnet.org Company Confidential 20 Best Practice Number 1: To succeed at SOA/Cloud: align with your organization’s leadership by building services that are tightly coupled with the organization’s most important goals  Positive Pattern - FEDEX’S fourth SOA implementation has been successful because it was aligned to a business crisis that had to be solved. Fedex’s IT costs were out of control and they could not make changes fast enough. They believed that they could reduce technology costs by eliminating point-to-point solutions. They succeeded at that. They believed that they could get to market faster with new business capabilities by reusing services. They have not yet fully succeeded and have determined that the results they want must build agility across the IT organization.  Anti- Pattern - CITI’s SOA is a set of technology fiefdoms, rather than a set of shared services. They are unable to further the bank’s inter- and intra-operability but instead squabble with each other over the crumbs of a ruined enterprise. Conceivably, this enterprise might not have been ruined if an alignment of technology and business goals could have been achieved.  Anti- Pattern - Kaiser still views themselves as set of uncommented service domains that has severely impeded the success in created agility or cost reductions. It proves that SOA when applied to a system has limited results ad SOA value is in reuse across significant parts of the organization (enterprise model).  Emerging- Pattern - BTA (Business Transformation Agency)- it is too soon to tell although their planning has already shown the management commitment, a key success criteria.
  • 21. ICHnet.org Company Confidential 21 Best Practice Number 2: Services must be easy to find and understand. Those who do use them must be rewarded. This means control and management (governance of the metadata).  Positive Pattern - FEDEX defined the organization into service component business managers; moving from a vertical structure that created stove pipe applications to a horizontal organization that produced common business services. They went from an organization where cost of application here rising at rate that they endangered the health of their business model. They went from a back office that delayed time to market (aka services to the warfighter) that had near zero time to deliver. Now the organization is SOA’ing their front-end application and then will “SOA” their testing going from three releases a year to real-time offering s (needed in CANES). A common object broker controls the metadata and enforced through LEGAL SOA Document on how to build their 12 service components (note: corporate SOA have yielded large service domains that are differentiated within the service). FEEX uses SAML fro real-time control for machine to machine policy enforcement ( another CANES requirement).  Anti-Pattern - Kaiser, Oracle managers still maintain large discretionary controls and with self-contained budgets and rewards. These organizations have large numbers of levels of management underneath them. In these circumstances, there exists a strong disincentive to reuse services which has lead to weak results in their internal SOA efforts.  Anti-Pattern – Citi reinforced its design discipline with bonuses. The new services had to replace an existing system. Building a service wasn’t enough; bonuses were paid only when an old system’s hardware was decommissioned and signed- off.  Emerging Pattern - BTA is in the early stage of this effort, they are establishing they have begun searching for reuse service, setting up a repository, defining a common way for describing services. It is still too early to see how the organization will be able to migrate their 27 business systems into common services. Like many government organization budgets are on systems/applications the government acquisition model has yet to allow service component funding equivalent to the Fedex enterprise model.
  • 22. ICHnet.org Company Confidential 22 Best Practice Number 3: Ensure that services are well documented and widely publicized.  Positive Pattern – FEDEX has become a service- based enterprise. Their business expansion is dominated by acquisition of new types of delivery companies. Each is being effectively integrated by the built service components keeping them competitive in their market.  Positive Pattern – The Hartford accomplished a profound alignment between the business and the IT department by creating transparency in what is usually very opaque, the registry. It has built business- significant capabilities such as address verification, a Department of Motor Vehicles driver's license check etc. and it has retired the many solutions stuck in silos doing these functions. In fact, according to web reports, the Harford’s SOA is moving into the mainstream and being asked to handle mission-critical functions. But their unyielding demand to establish, first and foremost, the transparent public awareness of their services through their registry, is core to their success.  Anti-Pattern – Kaiser - In too many SOA implementations, the registry is a second thought. Kaiser Permanente (where one of our authors was the head of technology architecture) is the sterling anti-pattern here. In a multi-year, multimillion dollar program to create a SOA infrastructure, they chose not only to not choose an enterprise repository, but, in fact, retired the license for a registry they had purchased some time ago, rather than pay a maintenance bill. Kaiser has a number of non-integrated registries of data. They are implementing a complete metadata project for their business intelligence efforts. They are defining the enterprise’s business services in relation to their data. They are not capturing the firm’s XML schemas or bind to any other governance or metadata program. Service Discovery is by word of mouth alone. The result of this is that in 2009 the organization has a proliferation of web services and no reusable services to speak of. The web services are used to contribute to the point-to-point legacy rather than pulling the organization to a more business-aligned organization that uses technology to serve its business goals.
  • 23. ICHnet.org Company Confidential 23 Best Practice Number 4: The SOA/Cloud must allow data to flow from one end of the enterprise to the other with its meaning intact and in a secure fashion. Being late lets inferior information products in decreasing business mission effectiveness. WarFighters need the best from the get-go.  Positive Pattern – BT’s architecture has been conceived of and built which solves data integration problem in a coherent and solid way. This is exciting because this particular pattern and architecture solves at least 90% of the problems presented by the business case we see before the OSD HA. In other words, just as in the OSD HA, information is produced in the field in a set of native applications. This information must flow though the organization coherently and, in some cases, in semi-real time. This business unit does not have the particular problem of needing to transform data on the fly to redact it sufficiently to make it capable of crossing security boundaries. However, the solution employed includes an ESB, which can easily accommodate the insertion of a semantic engine into the architecture which could do this work. When the data is so sensitive that human approval would be necessary to have it cross borders, an approval process could be inserted in the data flow just shown in this pattern solution.  Anti-Pattern - Kaiser - The health care industry lacks clear data policy. Institutions like the Cleveland Clinic end up with complex projects to reconcile these vocabularies in real time, with experimental reasoners and intense de-normalized data warehouses that are all but impossible to maintain. In medicine, there are multiple conflicting vocabularies mandated by various regulatory agencies. SNOMED, a tool to record clinical facts is somewhat in conflict with LOINC, which is in conflict with X.12, an insurance standard which describes some of the same observations, procedures and lab tests. Within particular specialties, there might be one way to describe something, and within another it might be described in another way.
  • 24. ICHnet.org Company Confidential 24 Best Practice Number 5: Don’t build a Cloud before you first solve a business problem with a key user …. Agility and cost saving will follow. This is ancillary to Problem 1. Build from within. Positive Pattern – FEDEX built from within turning application parts in to a shared service and managed them as services. New shipping products were a combination of their shipping service domain and their pricing service domain. They trusted their legacy systems. This was not a start from scratch. Anti-Pattern – CITI had a service processing SWIFT transactions that was so powerful it processed over 20% of all SWIFT transactions in the world. When the SWIFT teams asked their SOA team how to do SOA, the SOA team’s response was, “We can help you move to a better technology, but you should be teaching us how to do SOA”. The SWIFT team, their management and the SOA team’s management in corporate technology did not accept this answer. They did not trust their legacy systems.
  • 25. ICHnet.org Company Confidential 25 Recommendations to the FEDS IT-AAC is organized to help implement these CSFs 1. Focus on a major problem and let a SOA approach evolve from that problem. 2. Determine what is a good service and enforce it 3. Don’t start till your metadata is defined … you will never recover 4. Use strongly enforced data policy and active governance policy enforcement to create machine-machine mechanism for a real-time SOA needed in the Afloat program 5. Reuse as much as possible from legacy (do not start from scratch) 6. Determine how services are to built for the OSD HA, you cannot assume separate funding will achieve enterprise SOA service components and pay for themselves during the life-cycle 7. Create and fund service component owners who’s customers will be the function al application owners 8. Build service domain that cover large major functions and not an array of small service components (subroutine-like; remember FEDEX has only 12) 9. Learn how to accredit a reusable service component, possibly from enclave testing policy.
  • 26. ICHnet.org Company Confidential 26 SOA GOVERNANCE IMPLICATIONS the management/policy that enables effective Cloud Utilization
  • 27. ICHnet.org Company Confidential 27 Fortune 100 companies view SOA as a business driven, capability based architecture style . It provides a governance model for enabling an Agile Enterprise and reducing cost through elimination of redundant functions and integration cost. Its about the business, not about the technology. SOA is Business and Management-Centric SOA = Business & Services Driven Lifecycle
  • 28. ICHnet.org Company Confidential 28 SOA/Cloud Acquisition Approach Using the Acquisition Assurance Method Many of our Case Studies tried a SOA centric approach many times and FAILED. However Real Business issues Common Application Services and Infrastructure services followed.
  • 29. ICHnet.org Company Confidential 29 Pre- SOA/Cloud Separate System, Separate Funding, Little Enterprise Governance Application Structure Data Policy 1 Data Policy 3Data Policy 2 Data Policy 4 System 1 Owned by Funding Line and PM System 2 Owned by Funding Line and PM System 3 Owned by Funding Line and PM System 4 Owned by Funding Line and PM Application Structure 1 Application Structure 3Application Structure 2 Application Structure 4 Stovepipe are Inevitable
  • 30. ICHnet.org Company Confidential 30 SOA/Cloud in Government Shared Infrastructure Services (IaaS, PaaS, SaaS) Governed by Strict Policies to Achieve Reuse, Still System-Centric Enterprise MetaData Model Service Component Specifications Discoverable Orchestratable Based on Manual Governance
  • 31. ICHnet.org Company Confidential 31 Enterprise Data Policy System 1 Owned by Funding Line and PM System 2 Owned by Funding Line and PM System 3 Owned by Funding Line and PM System 4 Owned by Funding Line and PM Service 2 Service 3 Service 1 Service 4 SVC PM SVC PM SVC PM SVC PM SVC PM New Pattern of Planning for Reuse – Collaboration between System Owner and Service Owners and not ad hoc integration Re-Use Enterprise (SOA Services Modules) Multiple systems Planned to use the Same Services. Must Fund Service Components and assign Service PMs
  • 32. ICHnet.org Company Confidential Agile Acquisition Process Case Study How Acquisition Assurance Method (AAM) Aligns Cloud/IT Infrastructure Lifecycle with the Federal Acquisition Process AAM is the only known Agile Acquisition Framework to fully conform to OMB A119, CCA and NDAA Section 804
  • 33. ICHnet.org Company Confidential IT-AAC Capabilities Accelerate Success leveraging what works 1. Non-profit free think tank composed of the worlds most respected public service institutes and domain experts not available through traditional contracting mechanisms 2. Innovation Clearinghouse and Knowledge Exchange that captures proven market innovations in an acquisition ready context (canonical form) 3. Benchmarked Best Practices and Lessons Learned (SOA, Cloud, IaaS, PaaS, SaaS, Web Services) provided by customers who share business value from real world implementation and testing results 4. Acquisition Decision Framework that pools and normalizes infrastructure requirements, architectures, tech assessments, performance metrics (SLAs) business case analysis, and evaluation criteria. 5. Leadership Roundtables and Educational Forums that provides a hype free interchange with government and industry leaders 6. Virtual Solution Architecture Integration Lab (SAIL) and Solution Architecture Working Groups (SAWG), that detail realm of the possible and pre-validate fit and finish of commercial solutions. 7. Acquisition Advisory Contract Vehicles that reduce time to market and accelerate acquisition outcomes "It is not a great mystery what needs to change, what it takes is the political will and willingness, as Eisenhower possessed, to make hard choices -- choices that will displease powerful people both inside the Pentagon and out” Defense Secretary Robert Gates
  • 34. ICHnet.org Company Confidential 34  Determine Sponsor and Stake Holder representatives  Codify Business Problem statement  Validate Project Scope, Timeline, Outcomes  Collect and evaluate existing data from RFI responses and other sources  Establish Stake Holder Agreement and Success Criteria  Establish Measures of Effectiveness  Clear Problem Statement, Capability Gaps  RFI Assessment  Realm of the Possible  Measures of Effectiveness  Other data as Price lists Project Strategy Project Strategy Capability Analysis Capability Analysis Capability Prioritization Capability Prioritization Capability Determination Capability Determination AAM Decision Analytics Activities Artifacts/Deliverables Critical Success Factors Entry Criteria  Initial Data collection  Initial identification of Capabilities  Business Needs & Gaps Feasibility Assessment Feasibility Assessment Economic Analysis Economic Analysis Exit Criteria - Outcomes  Approval of Project Plan  Approval of Business Problem and Outcome  Criteria: Adequacy of Capabilities or Plan for correction 1 month 2 months 3 months 4 months0 months
  • 35. ICHnet.org Company Confidential 35  Capture Problem Statement w/Sponsor  Assess current Portfolio of Capabilities  Establish Performance Measurements  Document Agency Services Baseline  Determine industry capabilities and metrics  Capture Function Capabilities  Determine level of granularity needed  Hold Requirements WGs w/Sponsor's Key Stakeholders  Publish Capability Analysis Report (CAR) (Requirements and their Justification)  Work papers on: – Justification of Requirements, & Capabilities – Problem Statement Validation Project Strategy Project Strategy Capability Analysis Capability Analysis Capability Prioritization Capability Prioritization Capability Determination Capability Determination Activities Artifacts/Deliverables Critical Success Factors Entry Criteria  Approved Project Plan and POAM Feasibility Assessment Feasibility Assessment Economic Analysis Economic Analysis Exit Criteria  Approval of the CAR by the Functional Sponsor Criteria: Adequacy of Capabilities or Plan for correction 1 month 2 months 3 months 4 months0 months AAM Decision Analytics
  • 36. ICHnet.org Company Confidential 36  Refine Capabilities into Service Component solution models (per OMB FEA-PMO)  Conduct Market Survey  Establish Service Component & Groupings  Review RFQ for adequacy of detail  If RFI responses lack depth or breadth, ICH will conduct Industry Outreach and Benchmarking  Construct Service Component Analysis Groups  PMO review  Analysis Group; Service Components reference model mapping to capabilities/requirements  Work papers on: – Results of the Market Survey – Standards of Practice – Industry Benchmarking Data – Standardized Vocabulary for describing service components and basis for establishing SLAs (not in scope) Project Strategy Project Strategy Capability Analysis Capability Analysis Capability Prioritization Capability Prioritization Capability Determination Capability Determination Activities Artifacts/Deliverables Critical Success Factors Entry Criteria  Approved CAR (Validated Capabilities) Feasibility Assessment Feasibility Assessment Economic Analysis Economic Analysis Exit Criteria  Approval of Service Component by the PM Criteria: Adequate industry metrics or plan for correction 1 month 2 months 3 months 4 months0 months AAM Decision Analytics
  • 37. ICHnet.org Company Confidential 37  Hold Functional WG w/Sponsor's Key Stakeholders  Develop Prioritization Weighting Scale  Team Normalized weighting of the Service Components  Document each weights rationale  Capability Prioritization Matrix  Work papers on: – Service Component Prioritization Scale – Rationale for each weight given (traceability) Project Strategy Project Strategy Capability Analysis Capability Analysis Capability Prioritization Capability Prioritization Capability Determination Capability Determination Activities Artifacts/Deliverables Critical Success Factors Entry Criteria  Approved Analysis Groups, Service Components and Standards of Practice Feasibility Assessment Feasibility Assessment Economic Analysis Economic Analysis Exit Criteria  Approved Capability Prioritization Matrix Criteria: Functional Sponsor Approval 1 month 2 months 3 months 4 months0 months AAM Decision Analytics
  • 38. ICHnet.org Company Confidential 38  Evaluate RFI Responses  Establish alternatives for the assessment  Establish Scoring WG team  Develop Scoring Plan  Score Alternatives + +  Perform Sensitivity Analysis on Scoring Results  Analyze results  Review AoA date points  Present Results to Functional Sponsor - May included Functional WG team  Analysis of Alternative (Compare New/Existing Solutions against Prioritized Capability)  Work papers on: – Scoring Plan – Scoring Rationale – Sensitivity analyses performed – Technology Maturity Assessment Project Strategy Project Strategy Capability Analysis Capability Analysis Capability Prioritization Capability Prioritization Capability Determination Capability Determination Activities Artifacts/Deliverables Critical Success Factors Entry Criteria  Approved Capability Prioritization Matrix Feasibility Assessment Feasibility Assessment Economic Analysis Economic Analysis Exit Criteria  Approval of Feasibility Assessment Report by DBSAE/ PMO Criteria: (1) Assessment Team agreement on the scores. (2) Reference material justifying scores 1 month 2 months 3 months 4 months0 months AAM Decision Analytics
  • 39. ICHnet.org Company Confidential  Setup Main Cost Model  Determine the quantities and time frame to be Evaluate  "Setup Sub-Models for direct, indirect & migration cost + savings"  Determine Model's elements related to ROI  Determine the models for each alternative  Collect Data industry data and assumptions  Conduct TCO  Review of Economic Analysis Results Present Results to Functional Sponsor - May included Functional WG team  Develop Economic Analysis Report  Economic Analysis Report  Solution Architecture  Documented CCA compliance  Work papers on: – Model Documentation – Documentation of each Alternative – Documentation on costs developed for the Mode; – Documentation of Industry Metric determined Project Strategy Project Strategy Capability Analysis Capability Analysis Capability Prioritization Capability Prioritization Capability Determination Capability Determination Activities Artifacts/Deliverables Critical Success Factors Entry Criteria  Approved Feasibility Assessment, AoA 3 Feasibility Assessment Feasibility Assessment Economic Analysis Economic Analysis Exit Criteria  Approval of Economic Analysis Report by Functional Sponsor Criteria: (1) Functional Sponsor Agreement (2) Reference material justifying cost models 1 month 2 months 3 months 4 months0 months DBSAE Assessment AAM Decision Analytics
  • 40. ICHnet.org Company Confidential Sample Cloud Reference Architecture NT 4.0 WS Application Libs (C, DLL, MFC) Security Service (PKI X.509) IDL StubRMI Runtime Win 32 Subsystem | NT Device Drivers J2EE Web Services EJB Comms (TCP/IP) SSL IDE Runtime (Javascript, PB, C++, JDK) Java JITC Directory Svrs. X.500, or DNS, DHCP J2EE /Web Services Systems Management Server (Patrol) Certificate Validation Win 32 Subsystem - NT Device Drivers Comms (TCP/IP)/ SSL CDS Service Backup Network Mgt. (Open View) Apha or Pentium- Pro NT 4.0 Server Application Client Systems Server Alpha, Pentium Pro NT 4.0 Server Application & System Runtime Modules Security Service (PKI Certificate) Directory Svrs. X.500, DNS, DHCP, LDAP (v1.22) CDS EJB Server (or CORBA Server) TP Mntr. (Encina++) Win 32 Subsystem - NT Device Drivers Comms (TCP/IP) SSL Time Servicer JDBC API Client (Connection Client) Compilers (Java JITC) Application Server or A P I EJB Module RDBMS Server SQL Proxy Server (Connection Server) HP, Sun, or IBM Unix or Alpha NT 40 Server Posix Subsystem (Native or NT), Drivers Comms (TCP/IP) SSL ebXML Server Database Server JDBC Driver OCI/INET XA Lib. (Encina) RDBMS API (ODBC or JDBC) ebXML API HP, Sun, or IBM Unix or Alpha NT 40 Server Posix Subsystem (Native or NT), Drivers Comms (TCP/IP) SSL Web Services WEB Server ODBC Driver (Intersolve) OCI/INET RMI/ IIOP MFI/ Gateway Browser, Native GUI
  • 41. ICHnet.org Company Confidential S.A.I.L. Acceleration RiskLevel Acquisition Lifecycle Stages (cost & time line) High Low Risk Delta Cost/time Delta IT-AAC: Accelerating Innovation through Collaboration reduces time, cost and risk of redundant IT research and validation efforts Acceptable Risk Level Redundant Market Research and Testing SAIL Collaborative Research and Validation Project A Project B Project C Strategy Architecture Research Validation Acquisition Execution Inconclusive findings

Notes de l'éditeur

  1. Capability Analysis (CA) ─ the initial process of the AAM identifies the requirements/ capabilities for the program and further defines the problem statement and scope of the effort. Capabilities are defined at the Program level as a basis of the business case. This analysis ensures that there is sufficient data to understand the viability of technology and sufficient data to develop the Total cost of ownership (TCO) for the material solution.
  2. Capability Determination (CD) – The Capability Determination process defines “what” capability gaps are to be evaluated, and by “what” technologies. This is a process that creates groupings (tables) of capabilities and technologies/ solutions that satisfy the capability gaps. This is an important step, which establishes the plan for how the assessment will be conducted.
  3. Capability Prioritization (CP) – A Capability Prioritization process is used to assess the comparative value of the capabilities under review to the various activities/roles (use case) of the organization. This activity of elimination of low priority business case requirements increase the viability of a COTS solution, reduce time/cost of implementation and decrease the risk of failure. Some military programs have seen a 20% decrease in capability requirements in using the ICH’s AAM approach.
  4. Feasibility Assessment (FA) ─ Feasibility Assessment is a process for analysis of emerging/ innovative technology products regarding the degree to which they will satisfy the capabilities or gaps identified. Architecture Assessment (AA) ─ Just like the FA, the AA process analyzes emerging/ innovative technologies and identifies the degree to which they would satisfy the capabilities or gaps identified. However, the AA process supports ACAT programs for a more detailed analysis of the alternative technology/solutions being considered for the program’s architecture, where these capabilities are further decomposed into more details than the FA process.
  5. Economic Analysis (EA) ─ a minimal decision support process that identifies alternatives and provides business and technical arguments for selection and implementation to achieve stated organizational objectives. The Economic Analysis is a simplified Business Case Analysis, which provides an analytical and uniform foundation upon which sound decisions are made.