homeland security enterprise architecture

36
Homeland Security Enterprise Architecture December 5, 2003

Upload: aamir97

Post on 26-May-2015

2.610 views

Category:

Technology


5 download

TRANSCRIPT

Page 1: Homeland Security Enterprise Architecture

Homeland Security Enterprise Architecture

December 5, 2003

Page 2: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 2

Unprecedented ChallengesUnprecedented Challenges

Multiple stovepipes within stovepipes

Complex and diverse mission

Diverse set of merging cultures

Intense public scrutiny Real time, dynamic

situational awareness Need to leverage valuable

IT resources Large decentralized

resource footprint

$37BBudget

22 Disparate Agencies and Entities

Presence in 50 States

5 Directorates

177,000 Employees

Integration of Civilian, Intelligence, Law Enforcement and Military Agency

Components

Coordinationof DOE National LabsEngaging National

Research Capabilities of

University-Based Centers

Creation ofHSARPA

Intel and Law Enforcement Communities

State and Local Coordination

Detect

PrepareProtect

Respond

Recover

Unprecedented Scale, Complexity, Scope, and Oversight!

Page 3: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 3

DHS MissionDHS Mission

Secure America against terrorist attacks; Ensure an effective response in the event of crises and natural disasters; Administer our immigration system; Facilitate legitimate trade and travel; and Guard the safety of America’s water ways.

Identify threats to and vulnerabilities

of the Homeland

Identify threats to and vulnerabilities

of the Homeland

Manage TechnologyManage Technology

Manage Budget & FinancesManage Budget & Finances

Manage Grants, Procurements, and AcquisitionsManage Grants, Procurements, and Acquisitions

Manage Human ResourcesManage Human Resources

Develop PolicyDevelop Policy

Manage Knowledge and Intelligence InformationManage Knowledge and Intelligence Information

“Secure the Homeland, its

People, Assets, and Interests”

“Secure the Homeland, its

People, Assets, and Interests”

Manage Facilities and PropertyManage Facilities and Property

Respond to incident

Respond to incident

Recover from incident

Recover from incident

Perform Research and DevelopmentPerform Research and Development

Develop Plans and Performance MeasuresDevelop Plans and Performance Measures

Prepare for incidents

Prepare for incidents

Manage Legal ActivitiesManage Legal Activities

Prevent incidentsPrevent incidents

Disseminate Information

Disseminate Information

Facilitate the Flow of People and

Goods

Facilitate the Flow of People and

Goods

Page 4: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 4

EA OverviewEA Overview

Informed the FY05 budget formulation process Produced a conceptual-level Homeland Security EA

– Develop a business model for the newly formed Department Developed a realistic Transition Strategy

– Identify integration opportunities Incorporated State, Local, Tribal perspectives

Baseline inventory of technology resources and

business processes Technology

Application

Data

Business

“As-Is” “To-Be” Architecture“Transition Plan”

How to move the Enterprise toward

theevolving

“To-Be” state

Page 5: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 5

HLS Enterprise Architecture FeaturesHLS Enterprise Architecture Features

Framework Driven– Different views and perspectives– Disciplined architecture process

Model Driven– Separates the business from the technology– Applications and components are derived from the business

activities– Platform independent functional and service components

Component-Based– Isolates functionality– Contains multiple implementations to support many technology

platforms– Promotes customization and personalization

Solution Oriented– Focus on the Target description

Page 6: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 6

* Based on Zachman EA Framework

Framework Based EA*Framework Based EA*

StrategyScheduleOrganizationNetwork

Rule Specification

Timing Definition

Security Architecture

Network ArchitectureDescription

Rule DesignControl

StructurePresentation Architecture

Business Rule Model

Processing Structure

Human Interface

ArchitectureDistributed

System Architecture

FocusFocus

Per

spec

tive

Per

spec

tive

Technology Architecture

FunctionData

ProgramData

Definitions

System Design

Physical Data Model

Logical Applications Architecture

Logical Data Model

FunctioningEnterpriseFunctioningEnterprise

System Model(Logical)Designer

System Model(Logical)Designer

Technology Model (Physical)Builder

Technology Model (Physical)Builder

Detailed Representations (Out-of-context)Sub-contractor

Detailed Representations (Out-of-context)Sub-contractor

Performance Plans

(Reference Model)

Transition Strategy

Organization Chart

Workplace Environment& Location

ConceptualBusiness Functions

Conceptual Data Model

MotivationWhy

MotivationWhy

Laws, Strategic

Plans

TimeWhenTimeWhen

Business Mandates

PeopleWho

PeopleWho

Major Organization

Units

NetworkWhere

NetworkWhere

Location Types

FunctionHow

FunctionHow

Mission & Focus

DataWhatDataWhat

Scope (Contextual)Planner

Scope (Contextual)Planner

Enterprise Model (Conceptual)Owner

Enterprise Model (Conceptual)Owner

Subject Areas

Page 7: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 7

Mission A

reas

Technology

Application

Data

Business

Information Security

Readiness &

Recovery

InfrastructureEnterprise Solutions

Intelligence Information

TargetingRed

uce vu

lnerabilit

y of th

e

United Stat

es

Preven

t terro

rist a

ttack

s

Monitor il

legal

drug tr

affick

ing

and te

rroris

m

Ensure

economic

secu

rity i

s

not dim

inished

by pro

grams

Ensure

functions a

re not

diminish

ed or n

eglec

ted

Carry o

ut all d

epart

ment

functions

Minimize

damag

e and as

sist in

attac

k rec

overy

Focus A

reas

As-IS Baseline FrameworkAs-IS Baseline Framework

Page 8: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 8

Business ModelValue Chain and Business ModelBusiness ModelValue Chain and Business Model

Identify threats to and

vulnerabilities of the

Homeland

Identify threats to and

vulnerabilities of the

Homeland

Manage TechnologyManage Technology

Manage Budget & FinancesManage Budget & Finances

Manage Grants, Procurements, and AcquisitionsManage Grants, Procurements, and Acquisitions

Manage Human ResourcesManage Human Resources

Develop PolicyDevelop Policy

Manage Knowledge and Intelligence InformationManage Knowledge and Intelligence Information

“Secure the Homeland, its

People, Assets, and Interests”

“Secure the Homeland, its

People, Assets, and Interests”

Manage Facilities and PropertyManage Facilities and Property

Respond to incident

Respond to incident

Recover from incident

Recover from incident

Perform Research and DevelopmentPerform Research and Development

Develop Plans and Performance MeasuresDevelop Plans and Performance Measures

Prepare for incidents

Prepare for incidents

Manage Legal ActivitiesManage Legal Activities

Prevent incidentsPrevent

incidents

Disseminate Information

Disseminate Information

Facilitate the Flow of People

and Goods

Facilitate the Flow of People

and Goods

Value Chain Business Model

Value Stream

Establish Credentials (HLS094)

Establish Credentials (HLS094)

Categorize People and Things (HLS093)

Categorize People and Things (HLS093)

Examine People and Things (HLS010)

Examine People and Things (HLS010)

Notification of ReleaseNotification of Release Post Liquidated Entry List

Post Liquidated Entry List Trade

InspectionTrade

InspectionReceive Non-appropriated Funds

(HLS078)

Receive Non-appropriated Funds

(HLS078)

Facilitate the Flow of People and Goods

HLS010 Examine People and Things

Facilitate the Flow of People and Goods

HLS011 Manage Requests for Government Benefits

Facilitate the Flow of People and Goods

HLS012 Monitor Non-US Citizens

Facilitate the Flow of People and Goods

HLS093 Categorize People and Things

Facilitate the Flow of People and Goods

HLS094 Establish Credentials

Facilitate the Flow of People and Goods

HLS095 Verify Credentials

Facilitate the Flow of People and Goods

HLS113 Establish Identity

Facilitate the Flow of People and Goods

HLS119 Verify Identity

Page 9: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 9

Data ArchitectureConceptual Data Model Data ObjectsData ArchitectureConceptual Data Model Data Objects

Communication Correspondence Outreach Content Warning

Benefit Commercial Benefit Immigration Benefit Medical Benefit Relief Benefit

Asset Capital Asset Critical Infrastructure Custodial Property Emergency Response Stockpile Incident Response Materials and Equipment Key Asset Law Enforcement Asset (Weapon) Operational Materials and Equipment Record

Case Case

Conveyances Conveyance

Employment Employment Entitlement Position Skill

Event Incident Occurrence

Financial Resource Account Appropriated Fund Budget Non-Appropriated Fund

Goods Cargo Governance

Credential Mandate

Location Physical Location Virtual Location

Party Organization Person

Plan Goal/Objective Performance Measure Plan

Risk Threat Vulnerability Weapon

Technology Applied Technology Information Technology

Training Resource Training Exercise Training Material

Agreement Contract Grant MOU

Page 10: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 10

CURE MatrixExampleCURE MatrixExample

CURE = “Create”, “Update”, “Reference”, or “Eliminate” Relates the Business to the Data

Business activities are independent

of the supporting

organization to enhance flexibility of

the architecture

Business activities are independent

of the supporting

organization to enhance flexibility of

the architecture

Activ

ities

Org

aniz

atio

n

Appl

icat

ion

Com

pone

nt

Com

pone

nt

Com

pone

nt

Com

pone

nt

Page 11: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 11

Analysis Synthesis Target Architecture

Business Model

Conceptual Data Model

NotionalApplication Architecture

Business Model

ConceptualData Model

CURE

First CutApplicationArchitecture

Service ComponentArchitecture

NotionalComponents

Map TechnicalPatterns to

Components

ApplicationOperational

Characteristics

EnhancedTRM

TechnologyPatterns

Geo-TechnicalGraphic

TechnicalArchitecture

Target EA WorkflowTarget EA Workflow

Page 12: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 12

Application / Component Architecture Application / Component Architecture

Domain Independent Components

Domain Specific Components

ID Application Description

B1 Bus. App. 1

B2 Bus. App. 2

B3 Bus. App. 3

B4 Bus. App. 4

B5 Bus. App. 5

B6 Bus. App. 6

B7 Bus. App. 7

B8 Bus. App. 8

B9 Bus. App. 9

D1 DS Comp. 1

D2 DS Comp. 2

D3 DS Comp. 3

D4 DS Comp. 4

D5 DS Comp. 5

D6 DS Comp. 6

D7 DS Comp. 7

D8 DS Comp. 8

D9 DS Comp. 9

O1 DI Comp. 1

O2 DI Comp. 2

O3 DI Comp. 3

O4 DI Comp. 4

O5 DI Comp. 5

O6 DI Comp. 6

O7 DI Comp. 7

O8 DI Comp. 8

O9 DI Comp. 9

Application List

Domain Specific Components

Business Applications

Domain Independent Components

User Classes

Page 13: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 13

Application and Component Architecture Component ArchitectureApplication and Component Architecture Component Architecture

Components – A self contained business process or service with predetermined

functionality that may be exposed through a business or technology interface

– are independently deployable software units that integrate easily to compose larger systems-applications

– may contain multiple implementations to support many technology platforms

Each Component is characterized by:– Support of business activities

– Encapsulation of data objects and business rules

– Consistency of services they offer

– Ability to replace implementations

– Extensibility of functionality

Page 14: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 14

Domain Independent ComponentsDomain Independent Components

Address

Alert Management

Application Processing

Background Checking

Case Management

Correspondence Management

Decision Support

Event Management

Geospatial Location

Global Positioning

Location Management

Organization

Outreach Management

Party Management

Pattern Matching

Person Identification

Person Information

Physical Location

Risk Management

Scheduling

Page 15: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 15

Domain Specific ComponentsDomain Specific Components

Account Management Asset Inventory Background Checking Budget Tracking Compliance Management Contract Administration Credentialing Custodial Property

Administration Domestic Licensing Employee Benefits Employee Management Evidence Management Facilities Management Financial Accounting Funds Receipt Management

Import Declarations Import Export Documentation Import Export Licensing Incident Tracking Investment Management Logistics Management Mandate Administration Payment Processing Payroll Physical Property Management Proposal Management Records Management Seized Property Tracking Travel Document Management

Page 16: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 16

Technology ComponentsTechnology Components

Audio Conferencing Computer-Aided Design Data Integration Digital Rights Management E-mail Enterprise Application Integration Information Mapping/Taxonomy Instant Messaging Legacy Integration Real Time/Chat Record Linking Association Shared Calendaring Software Development Threaded Discussion Video Conferencing

Page 17: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 17

Application and Component Architecture Applications ArchitectureApplication and Component Architecture Applications Architecture

Applications – are enablers of business workflows within the enterprise– are structured of smaller independent functional parts called

components– components are assembled to achieve overall application

functionality

Each Application is characterized by:– Workflow that it supports– User Classes– Components comprising the applications

Page 18: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 18

ApplicationsApplications

Command and Control Center Communications Management Contract and Acquisition

Management Detainee Management Financial Management Geographic Information Systems Grants Management Homeland Security Collaboration

Zone Immigration Request

Management Incident Response Management Intelligence Analysis Toolset International Trade Management Investigation Management

Legal Activities Management Non-US Citizen Stay Status

Management Personnel and Payroll

Management Physical Security Management Planning and Performance

Management Port of Entry/Exit Management Property Management Public Relations Management Removals Management Research and Development

Administration Technology Management Water Navigation Management

Page 19: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 19

Homeland Security Collaboration ZoneHomeland Security Collaboration Zone

Homeland Security Collaboration Zone Application

Collaborate/Coordinate w/

Federal, State, LocalGovernments, and

Private Sector

Goal/Objective

OutreachContentPlan

OccurenceCorrespondenceOrganizationPerformance

Measure

Person

Incident Tracking

Party Management

MandateAdministration

ComplianceManagement

OutreachManagement

Alert Management

Page 20: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 20

Technical Architecture What are Patterns? Technical Architecture What are Patterns?

Reusable generalization (or abstraction) that can be used as a solution to a repeating problem in a specific context

Encapsulation of particular knowledge collected from experience in a domain

Architectural-level patterns that define best practices in architectural design to address specific technology issues or objectives

Page 21: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 21

Technical Architecture Application PatternsTechnical Architecture Application Patterns

ApplicationControl Interface

Service Component

Service Component

Service Component

Portal

Personalization

Pervasive Device Support

Content Management

Broker

Decomposition

Router

Agent

Workflow/BPM

Rules Engine

Integration/Interoperability

Business Intelligence/

Data Warehouse

Data Access

Application Configuration Pattern:

N-Tier, Dynamic Web

Primary Patterns

Web Services

Message-Oriented

Middleware

Secondary Patterns

Pattern Matching

Security

Performance and Reliability

Cross-Cutting Patterns

Collaboration

Asynchronous Access

Page 22: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 22

Technical Architecture Patterns/Technical Reference Model/Standards ProfilesTechnical Architecture Patterns/Technical Reference Model/Standards Profiles

Enterprise Reporting Tools Metadata Services Data Access Services DBMSData Transformation Services Structured

Telephony Computer HardwareNOS Enterprise StorageShared Special Purpose Hardware Operating SystemEnd User Special Purpose Hardware

Web Portal GIS Server Web Servers and Plug-ins CRM/Helpdesk ServerSearch Engines Application ServerTransaction Processing Server Mail Server Collaboration ServerEnterprise Application IntegrationInter-application Messaging Services Web Services

Directory Services Narrowband WirelessRemote Access LANBroadband Wireless WAN

Desktop Interface GIS Client Software Terminal Emulators Web Clients Pervasive Device interfaces Collaboration Client Narrow Band Wireless Access Office SuiteCRM/Helpdesk Client Document Management

Access Control

Cryptography

SecurityOperation

NetworkSecurity

Applicationsand System

Security

PhysicalSecurity

ProgramManagement

Tools

DevelopmentTools

SA Tools

NetworkAdmin Tools

OperationsManagement

Tools

ReleaseManagement

Tools

ContentManagement

Office Suite CRM AgentBusiness Intelligence Components Workflow ServerMission Specific Application Components Rules Engine

N-Tier Dynamic Web Application Architecture

Pervasive Device Support

Portal - Personalization - Content Management

Workflow / Business Process Management

Broker- Decomposition- Router- Agent

Business Rules Engine

Integration and Interoperability

- Web Services- Message Oriented Middleware

Business Intelligence /Data Warehouse

- Pattern Matching

Data Access- Asynchronous Access

Collaboration

Security

Performance and Reliability

PresentationPresentationLayerLayer

Business LogicBusiness Logic

ApplicationApplicationInfrastructureInfrastructure

Integration ServicesIntegration Services

DataDataManagementManagement

Computing Computing PlatformPlatform

Network Network CommunicationsCommunications

Ma

inte

na

nce

an

d O

pe

rati

on

sM

ain

ten

an

ce a

nd

Op

era

tio

ns

Se

curi

tyS

ecu

rity

Page 23: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 23

Transition StrategyProposed SequenceTransition StrategyProposed Sequence

Conceptual projects and their associated capabilities are enabled over time

Each conceptual project aligns to objectives

Each conceptual project is sequenced based on its alignment to objectives

The detailed sequence strategy displays all sub-projects required by the conceptual project

Conceptual projects provide target capabilities and include other non-technology projects focused on business process and organizational improvements

Chart Displays, at a High-level, the Sequence of the types of Conceptual Projects As Shown

on the Detailed Sequence Diagram

Optimize(Deliver New Capabilities)

Stabilize

Rationalize

UnifyInfrastructure

AddressImmediate /

CriticalMissionNeeds

AddressLegislatively

RequiredProjectDates

Rationalize/OptimizeCorporateSolutions

ProvideNew/

ImprovedMission

Capabilities

Conceptual Projects

Sequencing DiagramGlobal View

2+ years

<2years

<1year

<6 months

Page 24: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 24

Transition Sequence Diagram Transition Sequence Diagram

Conceptual Projects Enable Specific Components And Applications (Positioned In Swim Lanes)

The Phases Are On The Vertical Axis. The Color Of Each Project Visually Relates The Project Back To The Objective It Addresses

Optimize(Deliver New Capabilities)

Stabilize

RationalizeIntelligenceAnalysisToolset

Application(Release 1)

PersonIdentification

ComplianceManagement

HomelandSecurity

CollaborationZone Application

AlertManagement

Physical SecurityApplication

OutreachManagement

Port of Entry/ExitApplication(Release 1)

RemovalManagementApplication

ImmigrationRequest

ManagementApplication

WaterwayNavigation

ManagementApplication

Public RelationsManagementApplication

IncidentTracking

AccountManagement

GlobalPositioning

Port of Entry/ExitApplication(Release 3)

Non-U.S. CitizenStay Status

ManagementApplication

Asset Inventory

LogisticsManagement

CorrespondenceManagement

RecordsManagement

Planning andPerformanceManagementApplication

Budget TrackingResearch andDevelopment

AdministrationApplication

Legal ActivitiesManagementApplication

Contract andAcquisition

ManagementApplication

GrantsManagementApplication

E-mail

InstantMessaging

ThreadedDiscussions

SharedCalendaring

VideoConferencing

Real Time/Chat

Command andControl Center

Application(ManagedServices)

Digital RightsManagement

TechnologyManagementApplication

EnterpriseApplicationIntegration

Data Integration

InformationMapping/Taxonomy

LegacyIntegration

Record Linking/Association

ThreatIdentification

andManagement

Port of Entry/Exit

Management

Trade Benefitsand RevenueManagement

LawEnforcementEnvironment

WaterwayManagement

Warning andAlert

CommunicationManagement

OutreachContent

Management

IncidentResponse

Management

Research andDevelopmentManagement

CollaborationManagement

PerformanceMonitoringProtocol

Standardization

HumanResource

Management

EmployeeTraining

Management

InfrastructureConsolidation

InformationSharing

Technology

DHS GrantsManagement

Commons

EnterpriseProcurement/Acquisition

Environment

Legal ServicesManagement

FinanceManagement

BudgetManagement

AssetManagement

CorrespondenceManagement

EnterpriseGovernance

GeographicInformation

SystemsApplication

International TradeManagementApplication

ProposalManagement

PropertyManagementApplication

PhysicalPropertyManagement

SoftwareDevelopment

Virtual Location

GeospatialLocation

Address

PhysicalLocation

LocationManagement

Organization

PartyManagement

EventManagement

IntelligenceAnalysisToolset

Application(Release 2)

DecisionSupport

CaseManagement

RiskManagement

IntelligenceAnalysisToolset

Application(Release 3)

PatternMatching

MandateAdministration

Tracking

Funds ReceiptManagement

Port of Entry/ExitApplication(Release 2)

ImportDeclaration

Import ExportDocumentation

PersonInformation

Credentialing(Release 1)

DomesticLicensing

TravelDocumentManagement

Import/ExportLicensing

Credentialing(Release 2)

BackgroundChecking

InvestigationManagementApplication

EvidenceManagement

Seized Property

DetaineeManagementApplication

CustodialProperty

Scheduling

Incident ResponseManagementApplication(Release 1)

Incident ResponseManagementApplication(Release 2)

FacilitiesManagement

Instrumentationand Testing

Computer AidedDesign

Personnel andPayroll

ManagementApplication(Release 1)

Payroll

ApplicationProcessing

Personnel andPayroll

ManagementApplication(Release 3)

EmployeeBenefits

ContractAdministration

FinancialManagementApplication

PaymentProcessing

FinancialAccounting

InvestmentManagement

Personnel andPayroll

ManagementApplication(Release 2)

AudioConferencing

CommunicationsManagementApplication

EmployeeManagement

SEQUENCING DIAGRAMConceptual Project Details

Watch ListE-Grants

E-training

Enterprise UserIdentity

Management

NetworkIntegration

EA 1.5

Develop ExternalInformation

Sharing Strategy

SurveyInformation Usage

to Develop anInformation

Sharing Strategy

Integrate withE-Rulemaking

Reconcile ICS andDMIS

Standards &Techniques

IdentifyStandardized

Investigation CaseManagementEnvironment

Integrate POEInspectionWorkforce

Feasibility Studyon Integrating

Immigration andCustoms CashManagement

Systems

EstablishStandard Person

IdentificationData Set

Barriers toInformation

Sharing Study

EstablishInformation

SharingClearinghouse

Establish HLSInformation

Sharing Board

State, Local,Industry Needs

Survey

2+ years

<2years

<1year

<6 months

Rationalize/ Optimize Corporate Solutions Provide New/ Improved Mission CapabilitiesAddress Legislatively Required Project DatesUnify Infrastructure

Legend

IdentifyThreats to andVulnerabilities

of theHomeland

ImmigrationBenefits and

RevenueManagement

Facilitate the Flow of People and Goods

Prevent Incidents

Disseminate Information

Prepare,Respond, andRecover from

Incidents

PlanDevelopment

ProtocolStandardization

Develop Plans and PerformanceMeasures

Manage Knowledge andIntelligence Information

DataStandardization

PerformResearch andDevelopment

DevelopPolicy

Manage Human Resources

Manage Policyand Homeland

SecurityStandards

Manage Technology

Manage Grants, Procurements,and Acquisitions

Manage LegalServices

Manage Facilities and Property

TravelManagement

Manage Budget & Finances

Applicable300s

Targeting (IntegratedTargeting Analysis)

CAPPS II U.S. VISIT Global Enrollment

System SEVIS Automated Targeting

System Watch List Integr Maritime

Information Enforce IDENT Consolidated Intelligence

System Numerical Integer Intel

Syst Cyber Warning

Information Network National Warning System

NAWAS Advance Passenger

Information System Homeland Secure Data

Network License Plate Reader Risk Assessment

Systems - HAZUS Department of Homeland

Security CombinedCredentialing Investment

Consolidated DHSIntelligence System

Electronic SurveillanceSystem

CAPPS II U.S. VISIT Automated Targeting

System (ATS) Watch List Fingerprint Processing

System Identity and Address

Management Enforce IDENT TWIC International Trade Data

System (ITDS) Automated CBP IT

Infrastructure/AutomatedCommercial System(ACS) Life Support

Advance PassengerInformation System

License Plate Reader Automated Export

System (AES) Customs Automated

Operations System Automated Targeting

System/Land Border Container Security

Initiative

Global EnrollmentSystem

SEVIS Integrated Card

Production System(ICPS)

Identity and AddressManagement (IAM)

E-Grants Immigration Services

Modernization Computer Linked

Application InformationManagement System V3

Computer LinkedApplication InformationManagement System V4

Integrated DeepwaterSystem

HC-130J Long RangeMaritime Patrol Aircraft

Great Lakes IcebreakerReplacement

Marine Information forSafety and LawEnforcement

Automated Mutual-Assistance VesselRescue System

Integrated Aids toNavigation InformationSystem

USCGX128: Ports andWaterways SafetySystem (PAWSS)

Cyber WarningInformation Network(CWIN)

CAPPS II U.S. VISIT National Warning System

NAWAS

National EmergencyManagement System(NEMIS)

Atlas

National EmergencyManagement System(NEMIS)

Cyber WarningInformation Network(CWIN)

CAPPS II Automated Mutual-

Assistance VesselRescue System

Enforce Disaster Management National Flood Insurance

Program InformationExchange

National Flood InsuranceProgram Modernization/Business ProcessImprovement (NEXTGenNFIP)

Watch List Integr Maritime

Information (IMIS) Readiness & Recovery MERS Mobile

Emergence ResponseCenter

Safecom FEMA Switched Network Mobile Operations IT Air to Ground Comm Land Mobile Radio (LMR) Geospatial (E-GIS) Map Modernization DHS Enterprise Portal Disaster

Communications Commercial Recovery

Facility (CRF)

U.S. VISIT U.S. VISIT Consolidated DHSIntelligence System

Enterprise ArchitectureRealignment forPreparedness Directorate

Information TechnologyManaged Services

Redesign of TSIS Atlas Information Technology

Managed Services

U.S. VISIT License Plate Reader Numerical Integer Intel

Syst (NIIS)

DHS Enterprise Portal DHS Information

Security Program

Human Resources Electronic Official

Personnel FolderSystem

HR Services HR Decision Supp

Information Processing(DSIP)

Admin/HRReimbursables

Time Attendance andSchedule (TAS)

Work Force Planning,Analysis and Reporting(WPARS)

Office of InformationTechnology - CFO/Administration/HumanResourcesReimbursables

Human ResourcesServices - Section 2

Office of InformationTechnology - CFO/Administration/HumanResources - Migration

Sabre and Scheduling

DHS Enterprise Portal E-Learning Web Based Training

(WBT) Harpers Ferry, West

Virginia TrainingCenter

U.S. VISIT National Emergency

Management System(NEMIS)

Cyber WarningInformation Network(CWIN)

IT Managed Services Atlas Consolidated

EnforcementEnvironment (CEE)

ConsolidatedIntelligence System

Investment NetworkEnterprise Technology(INET)

HQ IT Infrastructure(LAN/WAN, Desktops,Telephone, DataCenter Consolidationand IT DisasterRecovery)

Dynacom TerminalEmulationReplacement (DTER)

Standard WorkstationInfrastructureRecapitalization &Sustainment (SWIRS)

Supply CenterComputerReplacement (SCCR)

Homeland Secure DataNetwork (HSDN)

Automated CommercialEnvironment (ACE)

Desktop Services

PKI & Smartcard Communications

Recovery Facility(CRF)

ORACLE EnterpriseLicenses and Support

Continuity ofOperations Program(COOP)

Information TechnologyManaged Services -Office Automation

U.S. VISIT Disaster

Communications National Emergency

Management System(NEMIS)

Cyber WarningInformation Network(CWIN)

Disaster Management Readiness & Recovery FEMA Switched

Network Air to Ground Comm Border Security

Deployment Project SEVIS Automated CBP IT

Infrastructure/Automated CommercialSystem (ACS) LifeSupport

Alerts & Warning Voice Communications Classified Connectivity

DHS Enterprise Portal Enterprise-Wide

Security OperationsApplications

Enterprise SecurityOperationsApplications

National EmergencyManagement System(NEMIS)

Atlas HQ IT Infrastructure

(LAN/WAN, Desktops,Telephone, DataCenter Consolidationand IT DisasterRecovery)

Standard WorkstationInfrastructureRecapitalization &Sustainment (SWIRS)

DisasterCommunications

Disaster Management Mobile Operations IT Commercial Recovery

Facility (CRF) Container Security

Initiative

Cyber WarningInformation Network(CWIN)

Central Index System

Federal FinancialManagement System

Federal FinancialManagement System

Financial ManagementInformation System

Enterprise FinancialManagement System

Financial andProcurement Desktop

Coast Guard OracleFinancials

Enterprise financialManagement System(EFMS)

Non-Appropriated

CashManagement

Federal FinancialManagement System

Enterprise FinancialManagement System

Financial andProcurement Desktop

Coast Guard OracleFinancials

Enterprise financialManagement System(EFMS)

Federal FinancialManagement System

Enterprise FinancialManagement System

Financial andProcurement Desktop

Coast Guard OracleFinancials

Enterprise financialManagement System(EFMS)

Value ChainAlignment

International Trade DataSystem (ITDS)

Automated ExportSystem (AES)

Consistent with the guiding principles of the TransitionStrategy, conceptual projects may include existing projects

and investments

E-grants Grant Business

Management System

Financial andProcurement Desktop

TechnologyPatterns

WirelessConnectivity

DHSInformationBackbone

AddressImmediate /

CriticalMissionNeeds

(Quick Hits)Applications are depicted with shadowed boxes Components are depicted with bullets

Enforce Advance Passenger

Information System License Plate Reader Container Security

Initiative Cyber Warning

Information Network(CWIN)

ConsolidatedEnforcementEnvironment CEE)

SurveillanceDetection System(SDS)

Border SecurityDeployment Project

Integrated TargetingAnalysis

Construction &Engineering

Consolidated DHSIntelligence System

ElectronicSurveillance System

Enterprise-WideSecurity OperationsApplications

Page 25: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 25

Transition StrategyEnterprise Architecture RoadmapTransition StrategyEnterprise Architecture Roadmap

Current "As-Is"Legacy Position

OneDHSNetwork

One Border

Network ofNetworks

Linked DataCenters

Initial DesktopRefreshment

IntegratedNetworkConsolidated

Data CentersStandardized

DesktopEnvironment

Disparate: Networks Data Centers Desktops

As-Is

Architected,Integrated and

Business DrivenDHS

Infrastructure

RationalizeWireless

Connectivity(Safecom)

HLS IT informationsharing technology

Port of Entry/ExitManagement (U.S.Visit, CAPPS II)

InfrastructureConsolidation(OneDHS network)

Secure networkEnterprise identity

(user ) management

Quick HitsNetwork

IntegrationExternal

informationsharingstrategy

Watch List

StabilizeIntegrated threat

managementIntegrated case

managementIntegrated incident

managementConsolidated funds

managementInfrastructure

Consolidation(Managed Services)

Unified state andlocal government

planning andcommunication

Mission andLegislatively

Required Projects

InformationSharing

Infrastructure

Optimize (Develop NewCapabilities)

Consolidated and sharedcorporate solutions

Common Immigration benefitmanagement

Integrated information backboneStandard desktop environment

Page 26: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 26

EA as an Enabler of the National Strategy for Homeland SecurityEA as an Enabler of the National Strategy for Homeland Security

Business Architecture– Identify common activities that facilitate the collaboration and exchange of

homeland security information

– Implement policy related to the homeland security community Data Architecture

– Identify and adopt common “meta-data” standards for electronic information relevant to homeland security

Intergovernmental Coordination - … the Department of Homeland

Security will simplify the process which governors, mayors, and county leaders interact with the federal government.

Technology Architecture

Application Architecture

Data Architecture

Business

Page 27: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 27

Information Sharing ArchitectureInformation Sharing Architecture

Organizational Shared

Applications

Organizational Shared Data

FFIIRREEWWAALLLL

Common Applications

StorageStorage

Full Service Directory

Webmail

Collaboration

LA

N

FFIIRREEWWAALLLL

Local Directory

Servers

Workstations

Private

Data Conversion

DHS Internal SpaceDHS Internal Space DHS Shared SpaceDHS Shared Space

Community SpaceCommunity Space

Page 28: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 28

Application Solution FrameworkApplication Solution Framework

InfrastructureInfrastructureInfrastructureInfrastructure

TCP/IP

Web Service Environment

Internet

Extranet

Web Server Application Server

ApplicationDatabase

Personal-izationData

ContentManagement

Portal -Presentation

Server

WorkflowDatabase

Collaboration

Security

Messaging

Database Servers

IntegrationServer

Workflow

Message-Oriented

Middleware

Collabor-ation

Database Search andIndexing

Directory andSecurity (ActiveDirectory, LDAP)

PersonalizationServer

HTTP FirewallDomain Firewall

HTTPServer

WebServicesGateway

StaticContent

Load

Dis

tribu

tion

and

Prox

y ca

chin

g

DataAbstraction

BusinessServices

Page 29: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 29

Baseline (“As Is”) (Legacy)

DHS Technical Reference Model Patterns, Standards and Products

Target (“To Be”) (Modernization)

Clin

ger

-Co

hen

Act

, PR

A, G

PR

A, C

hie

f F

inan

cial

Off

icer

s A

ct, O

MB

Cir

cula

r A

-130

Fed

eral

Re

fere

nce

Mo

del

sF

eder

al R

efe

ren

ce M

od

els

PRM

BRM

TRM

Des

ired

O

utc

om

esB

us

ine

ss

Ne

ed

s

SRM

Department of Homeland Security Strategic Plan

Business Results ProcessCustomer People Technology

President’s National Strategy for Homeland Security

Services To Citizens Support Delivery of ServicesManagement of

Government Resources

Department of Homeland Security Mission and Support AreasFacilitate Flow

of People & Goods

PreventIncidents

Disseminate Information

Prepare for

Incidents

Respond to

Incidents

Recover from

Incidents

Identify Threats &

Vulnerabilities

DHS EA Mapping to Federal GuidanceDHS EA Mapping to Federal Guidance

Homeland Security Target Architecture

Target Applications Service and Component Architecture

Homeland Security Conceptual Data ModelDRM

Page 30: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 30

FEA BRM (FBRM) AlignmentFEA BRM (FBRM) Alignment

Each activity in the DHS Business Model maps to at least one sub-function of the FBRM

Technology Architecture

Application Architecture

Data Architecture

Business

DHS Business Activities

FBRM Sub-Functions

Applying the FBRM

• Identified relationships to 23 Lines of Business in the FBRM

• Identified relationships to 71 FBRM sub-functions

• Identified budget requests that support duplicative business functions

• Work with other Federal Agencies, State and Local Governments to improve the Homeland Security & Disaster Management Business Lines

Page 31: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 31

Aligning HLS Data to the DRMAligning HLS Data to the DRM

Used Zachman’s approach to stage development of HLS Data Architecture– Subject Areas (17)

– Data Objects (48)Technology Architecture

Application Architecture

Data Architecture

Business

Data

Data Definitions

Physical Data Model

Logical Data Model

Per

spec

tive

Per

spec

tive

FunctioningEnterpriseFunctioningEnterprise

DesignerDesigner

BuilderBuilder

Sub-contractorSub-contractor

Conceptual Data Model

DataWhatDataWhat

OwnerOwner

Subject Areas

PlannerPlanner Business Objects

XML Specs

Entity-Relationships

Enterprise Data Dictionary

Data Flow Diagrams

ConceptualBusiness Area, Line, Function

Collection of supporting data object components that contribute to the

definition of the Business Line Function or Sub-Function

One or more common components / schemas that describe a specific

process or object

Level of Granularity / R

e-Use

The most elemental block of data that is descriptive of a business process or object

FEA Data Reference Model

The physical property of the Data

ConceptualBusiness Area, Line, Function

Collection of supporting data object components that contribute to the

definition of the Business Line Function or Sub-Function

One or more common components / schemas that describe a specific

process or object

Level of Granularity / R

e-Use

The most elemental block of data that is descriptive of a business process or object

FEA Data Reference Model

The physical property of the Data

Page 32: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 32

Aligning HLS Applications to the SRMAligning HLS Applications to the SRM

Technology Architecture

Application Architecture

Data Architecture

Business

The HLS Application Architecture is constructed to leverage reusable components

DHS Business and Technology Components

SRM Service Types and Components

Applying the SRM

• Identified 5 component architecture layers

• Business components defined by HLS activities, data, and user classes

• Structured EA Application Architecture as a set of internetworking components that tie back to the SRM

• Applied a technology patterns approach that is derived from the technology aspects of the SRM

*Number of HLS Applications and Components to the FEA Service Types

Page 33: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 33

Aligning the HLS TRM to the FEA TRMAligning the HLS TRM to the FEA TRM

Technology Architecture

Application Architecture

Data Architecture

Business

DHS TRM Tier 3

FEA TRM

Applying the TRM

• Incorporates the taxonomy, technical services, protocols and interfaces

• Extended and refined to reflect additional functional and technical requirements

• Adjusted technology categories

Page 34: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:54 -- Pg. 34

Performance Reference ModelPerformance Reference Model

Application of PRM accomplished by those in the best position– Specific and established

programs

– Supports line of sight from business through technology

EA has best appreciation of how line of sight aligns with OMB, HLS, and DHS goals and objectives

EA provides guidance that can be used by programs to develop (tailor) specific performance measures

TechnologyTechnology

Strategic Outcomes

Value

Customer Results

•Customer Satisfaction•Service Coverage•Timeliness & Responsiveness•Service Quality•Service Accessibility

Customer Results

•Customer Satisfaction•Service Coverage•Timeliness & Responsiveness•Service Quality•Service Accessibility

Processes and Activities•Financial•Productivity and Efficiency•Cycle and Resource Time

Processes and Activities•Financial•Productivity and Efficiency•Cycle and Resource Time

•Quality•Management & Innovation

Technology•Financial•Quality & Efficiency•Information & Data•Reliability & Availability•User Satisfaction

Technology•Financial•Quality & Efficiency•Information & Data•Reliability & Availability•User Satisfaction

Other Fixed Assets

•Financial•Quality, Maintenance, & Efficiency•Security & Safety•Utilization

Other Fixed Assets

•Financial•Quality, Maintenance, & Efficiency•Security & Safety•Utilization

People•Employee Satisfaction & Quality of Worklife•Recruitment & Retention•Employee Development•Employee Ratios

People•Employee Satisfaction & Quality of Worklife•Recruitment & Retention•Employee Development•Employee Ratios

Mission and Business Results

•Services for Citizens•Support Delivery of Services•Management of Government Resources•Financial

Mission and Business Results

•Services for Citizens•Support Delivery of Services•Management of Government Resources•Financial

Page 35: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:54 -- Pg. 35

Version 1.0 StatisticsVersion 1.0 Statistics

Length: 4 Months – May 2003 through Sept 2003

People/Groups involved:– CIO’s office

• Applied Technology Board; EA Team

– DHS Architecture Working Group

• Directorates Represented: S&T, IAIP, CBP, ICE, EP&R, TSA, FLETC

• Organizational Elements Represented: USSS, USCG; CIS

• Mitre– Financial / Resource

Management

Business Model– Activities: 80– Workplace Types: 15– Work Zones: 4

Target Enterprise Architecture– Data

• Subject Areas: 17• Data Objects: 47

– Application• Applications: 25• Reusable Components: 66

– Technology• Technology Patterns: 12• Technical Reference Model

Technology Categories: 60 Transition Strategy

– Conceptual Projects: 28

Page 36: Homeland Security Enterprise Architecture

Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:54 -- Pg. 36

FY04 PlansFY04 Plans

Outreach– Raise awareness of the EA and its products within DHS– Provide EA consulting to on-going efforts

• US-VISIT and other priority mission investments• Financial/Resource Management• FY04 conceptual projects identified in the transition strategy

Engage Business Units (DHS and external partners)– Vet the Transition Strategy– Develop more granular business and data architectures

Mature the EA– Add greater detail to all EA models– Develop a Transition PLAN

Define and establish EA Governance – Integrate with existing and evolving DHS processes (e.g., strategic

planning, capital planning, budgeting)– Integrate with CIO disciplines (e.g., infrastructure, systems development)