homeland security enterprise architecture
TRANSCRIPT
Homeland Security Enterprise Architecture
December 5, 2003
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 2
Unprecedented ChallengesUnprecedented Challenges
Multiple stovepipes within stovepipes
Complex and diverse mission
Diverse set of merging cultures
Intense public scrutiny Real time, dynamic
situational awareness Need to leverage valuable
IT resources Large decentralized
resource footprint
$37BBudget
22 Disparate Agencies and Entities
Presence in 50 States
5 Directorates
177,000 Employees
Integration of Civilian, Intelligence, Law Enforcement and Military Agency
Components
Coordinationof DOE National LabsEngaging National
Research Capabilities of
University-Based Centers
Creation ofHSARPA
Intel and Law Enforcement Communities
State and Local Coordination
Detect
PrepareProtect
Respond
Recover
Unprecedented Scale, Complexity, Scope, and Oversight!
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 3
DHS MissionDHS Mission
Secure America against terrorist attacks; Ensure an effective response in the event of crises and natural disasters; Administer our immigration system; Facilitate legitimate trade and travel; and Guard the safety of America’s water ways.
Identify threats to and vulnerabilities
of the Homeland
Identify threats to and vulnerabilities
of the Homeland
Manage TechnologyManage Technology
Manage Budget & FinancesManage Budget & Finances
Manage Grants, Procurements, and AcquisitionsManage Grants, Procurements, and Acquisitions
Manage Human ResourcesManage Human Resources
Develop PolicyDevelop Policy
Manage Knowledge and Intelligence InformationManage Knowledge and Intelligence Information
“Secure the Homeland, its
People, Assets, and Interests”
“Secure the Homeland, its
People, Assets, and Interests”
Manage Facilities and PropertyManage Facilities and Property
Respond to incident
Respond to incident
Recover from incident
Recover from incident
Perform Research and DevelopmentPerform Research and Development
Develop Plans and Performance MeasuresDevelop Plans and Performance Measures
Prepare for incidents
Prepare for incidents
Manage Legal ActivitiesManage Legal Activities
Prevent incidentsPrevent incidents
Disseminate Information
Disseminate Information
Facilitate the Flow of People and
Goods
Facilitate the Flow of People and
Goods
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 4
EA OverviewEA Overview
Informed the FY05 budget formulation process Produced a conceptual-level Homeland Security EA
– Develop a business model for the newly formed Department Developed a realistic Transition Strategy
– Identify integration opportunities Incorporated State, Local, Tribal perspectives
Baseline inventory of technology resources and
business processes Technology
Application
Data
Business
“As-Is” “To-Be” Architecture“Transition Plan”
How to move the Enterprise toward
theevolving
“To-Be” state
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 5
HLS Enterprise Architecture FeaturesHLS Enterprise Architecture Features
Framework Driven– Different views and perspectives– Disciplined architecture process
Model Driven– Separates the business from the technology– Applications and components are derived from the business
activities– Platform independent functional and service components
Component-Based– Isolates functionality– Contains multiple implementations to support many technology
platforms– Promotes customization and personalization
Solution Oriented– Focus on the Target description
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 6
* Based on Zachman EA Framework
Framework Based EA*Framework Based EA*
StrategyScheduleOrganizationNetwork
Rule Specification
Timing Definition
Security Architecture
Network ArchitectureDescription
Rule DesignControl
StructurePresentation Architecture
Business Rule Model
Processing Structure
Human Interface
ArchitectureDistributed
System Architecture
FocusFocus
Per
spec
tive
Per
spec
tive
Technology Architecture
FunctionData
ProgramData
Definitions
System Design
Physical Data Model
Logical Applications Architecture
Logical Data Model
FunctioningEnterpriseFunctioningEnterprise
System Model(Logical)Designer
System Model(Logical)Designer
Technology Model (Physical)Builder
Technology Model (Physical)Builder
Detailed Representations (Out-of-context)Sub-contractor
Detailed Representations (Out-of-context)Sub-contractor
Performance Plans
(Reference Model)
Transition Strategy
Organization Chart
Workplace Environment& Location
ConceptualBusiness Functions
Conceptual Data Model
MotivationWhy
MotivationWhy
Laws, Strategic
Plans
TimeWhenTimeWhen
Business Mandates
PeopleWho
PeopleWho
Major Organization
Units
NetworkWhere
NetworkWhere
Location Types
FunctionHow
FunctionHow
Mission & Focus
DataWhatDataWhat
Scope (Contextual)Planner
Scope (Contextual)Planner
Enterprise Model (Conceptual)Owner
Enterprise Model (Conceptual)Owner
Subject Areas
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 7
Mission A
reas
Technology
Application
Data
Business
Information Security
Readiness &
Recovery
InfrastructureEnterprise Solutions
Intelligence Information
TargetingRed
uce vu
lnerabilit
y of th
e
United Stat
es
Preven
t terro
rist a
ttack
s
Monitor il
legal
drug tr
affick
ing
and te
rroris
m
Ensure
economic
secu
rity i
s
not dim
inished
by pro
grams
Ensure
functions a
re not
diminish
ed or n
eglec
ted
Carry o
ut all d
epart
ment
functions
Minimize
damag
e and as
sist in
attac
k rec
overy
Focus A
reas
As-IS Baseline FrameworkAs-IS Baseline Framework
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 8
Business ModelValue Chain and Business ModelBusiness ModelValue Chain and Business Model
Identify threats to and
vulnerabilities of the
Homeland
Identify threats to and
vulnerabilities of the
Homeland
Manage TechnologyManage Technology
Manage Budget & FinancesManage Budget & Finances
Manage Grants, Procurements, and AcquisitionsManage Grants, Procurements, and Acquisitions
Manage Human ResourcesManage Human Resources
Develop PolicyDevelop Policy
Manage Knowledge and Intelligence InformationManage Knowledge and Intelligence Information
“Secure the Homeland, its
People, Assets, and Interests”
“Secure the Homeland, its
People, Assets, and Interests”
Manage Facilities and PropertyManage Facilities and Property
Respond to incident
Respond to incident
Recover from incident
Recover from incident
Perform Research and DevelopmentPerform Research and Development
Develop Plans and Performance MeasuresDevelop Plans and Performance Measures
Prepare for incidents
Prepare for incidents
Manage Legal ActivitiesManage Legal Activities
Prevent incidentsPrevent
incidents
Disseminate Information
Disseminate Information
Facilitate the Flow of People
and Goods
Facilitate the Flow of People
and Goods
Value Chain Business Model
Value Stream
Establish Credentials (HLS094)
Establish Credentials (HLS094)
Categorize People and Things (HLS093)
Categorize People and Things (HLS093)
Examine People and Things (HLS010)
Examine People and Things (HLS010)
Notification of ReleaseNotification of Release Post Liquidated Entry List
Post Liquidated Entry List Trade
InspectionTrade
InspectionReceive Non-appropriated Funds
(HLS078)
Receive Non-appropriated Funds
(HLS078)
Facilitate the Flow of People and Goods
HLS010 Examine People and Things
Facilitate the Flow of People and Goods
HLS011 Manage Requests for Government Benefits
Facilitate the Flow of People and Goods
HLS012 Monitor Non-US Citizens
Facilitate the Flow of People and Goods
HLS093 Categorize People and Things
Facilitate the Flow of People and Goods
HLS094 Establish Credentials
Facilitate the Flow of People and Goods
HLS095 Verify Credentials
Facilitate the Flow of People and Goods
HLS113 Establish Identity
Facilitate the Flow of People and Goods
HLS119 Verify Identity
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 9
Data ArchitectureConceptual Data Model Data ObjectsData ArchitectureConceptual Data Model Data Objects
Communication Correspondence Outreach Content Warning
Benefit Commercial Benefit Immigration Benefit Medical Benefit Relief Benefit
Asset Capital Asset Critical Infrastructure Custodial Property Emergency Response Stockpile Incident Response Materials and Equipment Key Asset Law Enforcement Asset (Weapon) Operational Materials and Equipment Record
Case Case
Conveyances Conveyance
Employment Employment Entitlement Position Skill
Event Incident Occurrence
Financial Resource Account Appropriated Fund Budget Non-Appropriated Fund
Goods Cargo Governance
Credential Mandate
Location Physical Location Virtual Location
Party Organization Person
Plan Goal/Objective Performance Measure Plan
Risk Threat Vulnerability Weapon
Technology Applied Technology Information Technology
Training Resource Training Exercise Training Material
Agreement Contract Grant MOU
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 10
CURE MatrixExampleCURE MatrixExample
CURE = “Create”, “Update”, “Reference”, or “Eliminate” Relates the Business to the Data
Business activities are independent
of the supporting
organization to enhance flexibility of
the architecture
Business activities are independent
of the supporting
organization to enhance flexibility of
the architecture
Activ
ities
Org
aniz
atio
n
Appl
icat
ion
Com
pone
nt
Com
pone
nt
Com
pone
nt
Com
pone
nt
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 11
Analysis Synthesis Target Architecture
Business Model
Conceptual Data Model
NotionalApplication Architecture
Business Model
ConceptualData Model
CURE
First CutApplicationArchitecture
Service ComponentArchitecture
NotionalComponents
Map TechnicalPatterns to
Components
ApplicationOperational
Characteristics
EnhancedTRM
TechnologyPatterns
Geo-TechnicalGraphic
TechnicalArchitecture
Target EA WorkflowTarget EA Workflow
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 12
Application / Component Architecture Application / Component Architecture
Domain Independent Components
Domain Specific Components
ID Application Description
B1 Bus. App. 1
B2 Bus. App. 2
B3 Bus. App. 3
B4 Bus. App. 4
B5 Bus. App. 5
B6 Bus. App. 6
B7 Bus. App. 7
B8 Bus. App. 8
B9 Bus. App. 9
D1 DS Comp. 1
D2 DS Comp. 2
D3 DS Comp. 3
D4 DS Comp. 4
D5 DS Comp. 5
D6 DS Comp. 6
D7 DS Comp. 7
D8 DS Comp. 8
D9 DS Comp. 9
O1 DI Comp. 1
O2 DI Comp. 2
O3 DI Comp. 3
O4 DI Comp. 4
O5 DI Comp. 5
O6 DI Comp. 6
O7 DI Comp. 7
O8 DI Comp. 8
O9 DI Comp. 9
Application List
Domain Specific Components
Business Applications
Domain Independent Components
User Classes
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 13
Application and Component Architecture Component ArchitectureApplication and Component Architecture Component Architecture
Components – A self contained business process or service with predetermined
functionality that may be exposed through a business or technology interface
– are independently deployable software units that integrate easily to compose larger systems-applications
– may contain multiple implementations to support many technology platforms
Each Component is characterized by:– Support of business activities
– Encapsulation of data objects and business rules
– Consistency of services they offer
– Ability to replace implementations
– Extensibility of functionality
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 14
Domain Independent ComponentsDomain Independent Components
Address
Alert Management
Application Processing
Background Checking
Case Management
Correspondence Management
Decision Support
Event Management
Geospatial Location
Global Positioning
Location Management
Organization
Outreach Management
Party Management
Pattern Matching
Person Identification
Person Information
Physical Location
Risk Management
Scheduling
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 15
Domain Specific ComponentsDomain Specific Components
Account Management Asset Inventory Background Checking Budget Tracking Compliance Management Contract Administration Credentialing Custodial Property
Administration Domestic Licensing Employee Benefits Employee Management Evidence Management Facilities Management Financial Accounting Funds Receipt Management
Import Declarations Import Export Documentation Import Export Licensing Incident Tracking Investment Management Logistics Management Mandate Administration Payment Processing Payroll Physical Property Management Proposal Management Records Management Seized Property Tracking Travel Document Management
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 16
Technology ComponentsTechnology Components
Audio Conferencing Computer-Aided Design Data Integration Digital Rights Management E-mail Enterprise Application Integration Information Mapping/Taxonomy Instant Messaging Legacy Integration Real Time/Chat Record Linking Association Shared Calendaring Software Development Threaded Discussion Video Conferencing
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 17
Application and Component Architecture Applications ArchitectureApplication and Component Architecture Applications Architecture
Applications – are enablers of business workflows within the enterprise– are structured of smaller independent functional parts called
components– components are assembled to achieve overall application
functionality
Each Application is characterized by:– Workflow that it supports– User Classes– Components comprising the applications
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 18
ApplicationsApplications
Command and Control Center Communications Management Contract and Acquisition
Management Detainee Management Financial Management Geographic Information Systems Grants Management Homeland Security Collaboration
Zone Immigration Request
Management Incident Response Management Intelligence Analysis Toolset International Trade Management Investigation Management
Legal Activities Management Non-US Citizen Stay Status
Management Personnel and Payroll
Management Physical Security Management Planning and Performance
Management Port of Entry/Exit Management Property Management Public Relations Management Removals Management Research and Development
Administration Technology Management Water Navigation Management
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 19
Homeland Security Collaboration ZoneHomeland Security Collaboration Zone
Homeland Security Collaboration Zone Application
Collaborate/Coordinate w/
Federal, State, LocalGovernments, and
Private Sector
Goal/Objective
OutreachContentPlan
OccurenceCorrespondenceOrganizationPerformance
Measure
Person
Incident Tracking
Party Management
MandateAdministration
ComplianceManagement
OutreachManagement
Alert Management
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 20
Technical Architecture What are Patterns? Technical Architecture What are Patterns?
Reusable generalization (or abstraction) that can be used as a solution to a repeating problem in a specific context
Encapsulation of particular knowledge collected from experience in a domain
Architectural-level patterns that define best practices in architectural design to address specific technology issues or objectives
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 21
Technical Architecture Application PatternsTechnical Architecture Application Patterns
ApplicationControl Interface
Service Component
Service Component
Service Component
Portal
Personalization
Pervasive Device Support
Content Management
Broker
Decomposition
Router
Agent
Workflow/BPM
Rules Engine
Integration/Interoperability
Business Intelligence/
Data Warehouse
Data Access
Application Configuration Pattern:
N-Tier, Dynamic Web
Primary Patterns
Web Services
Message-Oriented
Middleware
Secondary Patterns
Pattern Matching
Security
Performance and Reliability
Cross-Cutting Patterns
Collaboration
Asynchronous Access
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 22
Technical Architecture Patterns/Technical Reference Model/Standards ProfilesTechnical Architecture Patterns/Technical Reference Model/Standards Profiles
Enterprise Reporting Tools Metadata Services Data Access Services DBMSData Transformation Services Structured
Telephony Computer HardwareNOS Enterprise StorageShared Special Purpose Hardware Operating SystemEnd User Special Purpose Hardware
Web Portal GIS Server Web Servers and Plug-ins CRM/Helpdesk ServerSearch Engines Application ServerTransaction Processing Server Mail Server Collaboration ServerEnterprise Application IntegrationInter-application Messaging Services Web Services
Directory Services Narrowband WirelessRemote Access LANBroadband Wireless WAN
Desktop Interface GIS Client Software Terminal Emulators Web Clients Pervasive Device interfaces Collaboration Client Narrow Band Wireless Access Office SuiteCRM/Helpdesk Client Document Management
Access Control
Cryptography
SecurityOperation
NetworkSecurity
Applicationsand System
Security
PhysicalSecurity
ProgramManagement
Tools
DevelopmentTools
SA Tools
NetworkAdmin Tools
OperationsManagement
Tools
ReleaseManagement
Tools
ContentManagement
Office Suite CRM AgentBusiness Intelligence Components Workflow ServerMission Specific Application Components Rules Engine
N-Tier Dynamic Web Application Architecture
Pervasive Device Support
Portal - Personalization - Content Management
Workflow / Business Process Management
Broker- Decomposition- Router- Agent
Business Rules Engine
Integration and Interoperability
- Web Services- Message Oriented Middleware
Business Intelligence /Data Warehouse
- Pattern Matching
Data Access- Asynchronous Access
Collaboration
Security
Performance and Reliability
PresentationPresentationLayerLayer
Business LogicBusiness Logic
ApplicationApplicationInfrastructureInfrastructure
Integration ServicesIntegration Services
DataDataManagementManagement
Computing Computing PlatformPlatform
Network Network CommunicationsCommunications
Ma
inte
na
nce
an
d O
pe
rati
on
sM
ain
ten
an
ce a
nd
Op
era
tio
ns
Se
curi
tyS
ecu
rity
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 23
Transition StrategyProposed SequenceTransition StrategyProposed Sequence
Conceptual projects and their associated capabilities are enabled over time
Each conceptual project aligns to objectives
Each conceptual project is sequenced based on its alignment to objectives
The detailed sequence strategy displays all sub-projects required by the conceptual project
Conceptual projects provide target capabilities and include other non-technology projects focused on business process and organizational improvements
Chart Displays, at a High-level, the Sequence of the types of Conceptual Projects As Shown
on the Detailed Sequence Diagram
Optimize(Deliver New Capabilities)
Stabilize
Rationalize
UnifyInfrastructure
AddressImmediate /
CriticalMissionNeeds
AddressLegislatively
RequiredProjectDates
Rationalize/OptimizeCorporateSolutions
ProvideNew/
ImprovedMission
Capabilities
Conceptual Projects
Sequencing DiagramGlobal View
2+ years
<2years
<1year
<6 months
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 24
Transition Sequence Diagram Transition Sequence Diagram
Conceptual Projects Enable Specific Components And Applications (Positioned In Swim Lanes)
The Phases Are On The Vertical Axis. The Color Of Each Project Visually Relates The Project Back To The Objective It Addresses
Optimize(Deliver New Capabilities)
Stabilize
RationalizeIntelligenceAnalysisToolset
Application(Release 1)
PersonIdentification
ComplianceManagement
HomelandSecurity
CollaborationZone Application
AlertManagement
Physical SecurityApplication
OutreachManagement
Port of Entry/ExitApplication(Release 1)
RemovalManagementApplication
ImmigrationRequest
ManagementApplication
WaterwayNavigation
ManagementApplication
Public RelationsManagementApplication
IncidentTracking
AccountManagement
GlobalPositioning
Port of Entry/ExitApplication(Release 3)
Non-U.S. CitizenStay Status
ManagementApplication
Asset Inventory
LogisticsManagement
CorrespondenceManagement
RecordsManagement
Planning andPerformanceManagementApplication
Budget TrackingResearch andDevelopment
AdministrationApplication
Legal ActivitiesManagementApplication
Contract andAcquisition
ManagementApplication
GrantsManagementApplication
InstantMessaging
ThreadedDiscussions
SharedCalendaring
VideoConferencing
Real Time/Chat
Command andControl Center
Application(ManagedServices)
Digital RightsManagement
TechnologyManagementApplication
EnterpriseApplicationIntegration
Data Integration
InformationMapping/Taxonomy
LegacyIntegration
Record Linking/Association
ThreatIdentification
andManagement
Port of Entry/Exit
Management
Trade Benefitsand RevenueManagement
LawEnforcementEnvironment
WaterwayManagement
Warning andAlert
CommunicationManagement
OutreachContent
Management
IncidentResponse
Management
Research andDevelopmentManagement
CollaborationManagement
PerformanceMonitoringProtocol
Standardization
HumanResource
Management
EmployeeTraining
Management
InfrastructureConsolidation
InformationSharing
Technology
DHS GrantsManagement
Commons
EnterpriseProcurement/Acquisition
Environment
Legal ServicesManagement
FinanceManagement
BudgetManagement
AssetManagement
CorrespondenceManagement
EnterpriseGovernance
GeographicInformation
SystemsApplication
International TradeManagementApplication
ProposalManagement
PropertyManagementApplication
PhysicalPropertyManagement
SoftwareDevelopment
Virtual Location
GeospatialLocation
Address
PhysicalLocation
LocationManagement
Organization
PartyManagement
EventManagement
IntelligenceAnalysisToolset
Application(Release 2)
DecisionSupport
CaseManagement
RiskManagement
IntelligenceAnalysisToolset
Application(Release 3)
PatternMatching
MandateAdministration
Tracking
Funds ReceiptManagement
Port of Entry/ExitApplication(Release 2)
ImportDeclaration
Import ExportDocumentation
PersonInformation
Credentialing(Release 1)
DomesticLicensing
TravelDocumentManagement
Import/ExportLicensing
Credentialing(Release 2)
BackgroundChecking
InvestigationManagementApplication
EvidenceManagement
Seized Property
DetaineeManagementApplication
CustodialProperty
Scheduling
Incident ResponseManagementApplication(Release 1)
Incident ResponseManagementApplication(Release 2)
FacilitiesManagement
Instrumentationand Testing
Computer AidedDesign
Personnel andPayroll
ManagementApplication(Release 1)
Payroll
ApplicationProcessing
Personnel andPayroll
ManagementApplication(Release 3)
EmployeeBenefits
ContractAdministration
FinancialManagementApplication
PaymentProcessing
FinancialAccounting
InvestmentManagement
Personnel andPayroll
ManagementApplication(Release 2)
AudioConferencing
CommunicationsManagementApplication
EmployeeManagement
SEQUENCING DIAGRAMConceptual Project Details
Watch ListE-Grants
E-training
Enterprise UserIdentity
Management
NetworkIntegration
EA 1.5
Develop ExternalInformation
Sharing Strategy
SurveyInformation Usage
to Develop anInformation
Sharing Strategy
Integrate withE-Rulemaking
Reconcile ICS andDMIS
Standards &Techniques
IdentifyStandardized
Investigation CaseManagementEnvironment
Integrate POEInspectionWorkforce
Feasibility Studyon Integrating
Immigration andCustoms CashManagement
Systems
EstablishStandard Person
IdentificationData Set
Barriers toInformation
Sharing Study
EstablishInformation
SharingClearinghouse
Establish HLSInformation
Sharing Board
State, Local,Industry Needs
Survey
2+ years
<2years
<1year
<6 months
Rationalize/ Optimize Corporate Solutions Provide New/ Improved Mission CapabilitiesAddress Legislatively Required Project DatesUnify Infrastructure
Legend
IdentifyThreats to andVulnerabilities
of theHomeland
ImmigrationBenefits and
RevenueManagement
Facilitate the Flow of People and Goods
Prevent Incidents
Disseminate Information
Prepare,Respond, andRecover from
Incidents
PlanDevelopment
ProtocolStandardization
Develop Plans and PerformanceMeasures
Manage Knowledge andIntelligence Information
DataStandardization
PerformResearch andDevelopment
DevelopPolicy
Manage Human Resources
Manage Policyand Homeland
SecurityStandards
Manage Technology
Manage Grants, Procurements,and Acquisitions
Manage LegalServices
Manage Facilities and Property
TravelManagement
Manage Budget & Finances
Applicable300s
Targeting (IntegratedTargeting Analysis)
CAPPS II U.S. VISIT Global Enrollment
System SEVIS Automated Targeting
System Watch List Integr Maritime
Information Enforce IDENT Consolidated Intelligence
System Numerical Integer Intel
Syst Cyber Warning
Information Network National Warning System
NAWAS Advance Passenger
Information System Homeland Secure Data
Network License Plate Reader Risk Assessment
Systems - HAZUS Department of Homeland
Security CombinedCredentialing Investment
Consolidated DHSIntelligence System
Electronic SurveillanceSystem
CAPPS II U.S. VISIT Automated Targeting
System (ATS) Watch List Fingerprint Processing
System Identity and Address
Management Enforce IDENT TWIC International Trade Data
System (ITDS) Automated CBP IT
Infrastructure/AutomatedCommercial System(ACS) Life Support
Advance PassengerInformation System
License Plate Reader Automated Export
System (AES) Customs Automated
Operations System Automated Targeting
System/Land Border Container Security
Initiative
Global EnrollmentSystem
SEVIS Integrated Card
Production System(ICPS)
Identity and AddressManagement (IAM)
E-Grants Immigration Services
Modernization Computer Linked
Application InformationManagement System V3
Computer LinkedApplication InformationManagement System V4
Integrated DeepwaterSystem
HC-130J Long RangeMaritime Patrol Aircraft
Great Lakes IcebreakerReplacement
Marine Information forSafety and LawEnforcement
Automated Mutual-Assistance VesselRescue System
Integrated Aids toNavigation InformationSystem
USCGX128: Ports andWaterways SafetySystem (PAWSS)
Cyber WarningInformation Network(CWIN)
CAPPS II U.S. VISIT National Warning System
NAWAS
National EmergencyManagement System(NEMIS)
Atlas
National EmergencyManagement System(NEMIS)
Cyber WarningInformation Network(CWIN)
CAPPS II Automated Mutual-
Assistance VesselRescue System
Enforce Disaster Management National Flood Insurance
Program InformationExchange
National Flood InsuranceProgram Modernization/Business ProcessImprovement (NEXTGenNFIP)
Watch List Integr Maritime
Information (IMIS) Readiness & Recovery MERS Mobile
Emergence ResponseCenter
Safecom FEMA Switched Network Mobile Operations IT Air to Ground Comm Land Mobile Radio (LMR) Geospatial (E-GIS) Map Modernization DHS Enterprise Portal Disaster
Communications Commercial Recovery
Facility (CRF)
U.S. VISIT U.S. VISIT Consolidated DHSIntelligence System
Enterprise ArchitectureRealignment forPreparedness Directorate
Information TechnologyManaged Services
Redesign of TSIS Atlas Information Technology
Managed Services
U.S. VISIT License Plate Reader Numerical Integer Intel
Syst (NIIS)
DHS Enterprise Portal DHS Information
Security Program
Human Resources Electronic Official
Personnel FolderSystem
HR Services HR Decision Supp
Information Processing(DSIP)
Admin/HRReimbursables
Time Attendance andSchedule (TAS)
Work Force Planning,Analysis and Reporting(WPARS)
Office of InformationTechnology - CFO/Administration/HumanResourcesReimbursables
Human ResourcesServices - Section 2
Office of InformationTechnology - CFO/Administration/HumanResources - Migration
Sabre and Scheduling
DHS Enterprise Portal E-Learning Web Based Training
(WBT) Harpers Ferry, West
Virginia TrainingCenter
U.S. VISIT National Emergency
Management System(NEMIS)
Cyber WarningInformation Network(CWIN)
IT Managed Services Atlas Consolidated
EnforcementEnvironment (CEE)
ConsolidatedIntelligence System
Investment NetworkEnterprise Technology(INET)
HQ IT Infrastructure(LAN/WAN, Desktops,Telephone, DataCenter Consolidationand IT DisasterRecovery)
Dynacom TerminalEmulationReplacement (DTER)
Standard WorkstationInfrastructureRecapitalization &Sustainment (SWIRS)
Supply CenterComputerReplacement (SCCR)
Homeland Secure DataNetwork (HSDN)
Automated CommercialEnvironment (ACE)
Desktop Services
PKI & Smartcard Communications
Recovery Facility(CRF)
ORACLE EnterpriseLicenses and Support
Continuity ofOperations Program(COOP)
Information TechnologyManaged Services -Office Automation
U.S. VISIT Disaster
Communications National Emergency
Management System(NEMIS)
Cyber WarningInformation Network(CWIN)
Disaster Management Readiness & Recovery FEMA Switched
Network Air to Ground Comm Border Security
Deployment Project SEVIS Automated CBP IT
Infrastructure/Automated CommercialSystem (ACS) LifeSupport
Alerts & Warning Voice Communications Classified Connectivity
DHS Enterprise Portal Enterprise-Wide
Security OperationsApplications
Enterprise SecurityOperationsApplications
National EmergencyManagement System(NEMIS)
Atlas HQ IT Infrastructure
(LAN/WAN, Desktops,Telephone, DataCenter Consolidationand IT DisasterRecovery)
Standard WorkstationInfrastructureRecapitalization &Sustainment (SWIRS)
DisasterCommunications
Disaster Management Mobile Operations IT Commercial Recovery
Facility (CRF) Container Security
Initiative
Cyber WarningInformation Network(CWIN)
Central Index System
Federal FinancialManagement System
Federal FinancialManagement System
Financial ManagementInformation System
Enterprise FinancialManagement System
Financial andProcurement Desktop
Coast Guard OracleFinancials
Enterprise financialManagement System(EFMS)
Non-Appropriated
CashManagement
Federal FinancialManagement System
Enterprise FinancialManagement System
Financial andProcurement Desktop
Coast Guard OracleFinancials
Enterprise financialManagement System(EFMS)
Federal FinancialManagement System
Enterprise FinancialManagement System
Financial andProcurement Desktop
Coast Guard OracleFinancials
Enterprise financialManagement System(EFMS)
Value ChainAlignment
International Trade DataSystem (ITDS)
Automated ExportSystem (AES)
Consistent with the guiding principles of the TransitionStrategy, conceptual projects may include existing projects
and investments
E-grants Grant Business
Management System
Financial andProcurement Desktop
TechnologyPatterns
WirelessConnectivity
DHSInformationBackbone
AddressImmediate /
CriticalMissionNeeds
(Quick Hits)Applications are depicted with shadowed boxes Components are depicted with bullets
Enforce Advance Passenger
Information System License Plate Reader Container Security
Initiative Cyber Warning
Information Network(CWIN)
ConsolidatedEnforcementEnvironment CEE)
SurveillanceDetection System(SDS)
Border SecurityDeployment Project
Integrated TargetingAnalysis
Construction &Engineering
Consolidated DHSIntelligence System
ElectronicSurveillance System
Enterprise-WideSecurity OperationsApplications
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 25
Transition StrategyEnterprise Architecture RoadmapTransition StrategyEnterprise Architecture Roadmap
Current "As-Is"Legacy Position
OneDHSNetwork
One Border
Network ofNetworks
Linked DataCenters
Initial DesktopRefreshment
IntegratedNetworkConsolidated
Data CentersStandardized
DesktopEnvironment
Disparate: Networks Data Centers Desktops
As-Is
Architected,Integrated and
Business DrivenDHS
Infrastructure
RationalizeWireless
Connectivity(Safecom)
HLS IT informationsharing technology
Port of Entry/ExitManagement (U.S.Visit, CAPPS II)
InfrastructureConsolidation(OneDHS network)
Secure networkEnterprise identity
(user ) management
Quick HitsNetwork
IntegrationExternal
informationsharingstrategy
Watch List
StabilizeIntegrated threat
managementIntegrated case
managementIntegrated incident
managementConsolidated funds
managementInfrastructure
Consolidation(Managed Services)
Unified state andlocal government
planning andcommunication
Mission andLegislatively
Required Projects
InformationSharing
Infrastructure
Optimize (Develop NewCapabilities)
Consolidated and sharedcorporate solutions
Common Immigration benefitmanagement
Integrated information backboneStandard desktop environment
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 26
EA as an Enabler of the National Strategy for Homeland SecurityEA as an Enabler of the National Strategy for Homeland Security
Business Architecture– Identify common activities that facilitate the collaboration and exchange of
homeland security information
– Implement policy related to the homeland security community Data Architecture
– Identify and adopt common “meta-data” standards for electronic information relevant to homeland security
Intergovernmental Coordination - … the Department of Homeland
Security will simplify the process which governors, mayors, and county leaders interact with the federal government.
Technology Architecture
Application Architecture
Data Architecture
Business
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 27
Information Sharing ArchitectureInformation Sharing Architecture
Organizational Shared
Applications
Organizational Shared Data
FFIIRREEWWAALLLL
Common Applications
StorageStorage
Full Service Directory
Webmail
Collaboration
LA
N
FFIIRREEWWAALLLL
Local Directory
Servers
Workstations
Private
Data Conversion
DHS Internal SpaceDHS Internal Space DHS Shared SpaceDHS Shared Space
Community SpaceCommunity Space
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 28
Application Solution FrameworkApplication Solution Framework
InfrastructureInfrastructureInfrastructureInfrastructure
TCP/IP
Web Service Environment
Internet
Extranet
Web Server Application Server
ApplicationDatabase
Personal-izationData
ContentManagement
Portal -Presentation
Server
WorkflowDatabase
Collaboration
Security
Messaging
Database Servers
IntegrationServer
Workflow
Message-Oriented
Middleware
Collabor-ation
Database Search andIndexing
Directory andSecurity (ActiveDirectory, LDAP)
PersonalizationServer
HTTP FirewallDomain Firewall
HTTPServer
WebServicesGateway
StaticContent
Load
Dis
tribu
tion
and
Prox
y ca
chin
g
DataAbstraction
BusinessServices
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 29
Baseline (“As Is”) (Legacy)
DHS Technical Reference Model Patterns, Standards and Products
Target (“To Be”) (Modernization)
Clin
ger
-Co
hen
Act
, PR
A, G
PR
A, C
hie
f F
inan
cial
Off
icer
s A
ct, O
MB
Cir
cula
r A
-130
Fed
eral
Re
fere
nce
Mo
del
sF
eder
al R
efe
ren
ce M
od
els
PRM
BRM
TRM
Des
ired
O
utc
om
esB
us
ine
ss
Ne
ed
s
SRM
Department of Homeland Security Strategic Plan
Business Results ProcessCustomer People Technology
President’s National Strategy for Homeland Security
Services To Citizens Support Delivery of ServicesManagement of
Government Resources
Department of Homeland Security Mission and Support AreasFacilitate Flow
of People & Goods
PreventIncidents
Disseminate Information
Prepare for
Incidents
Respond to
Incidents
Recover from
Incidents
Identify Threats &
Vulnerabilities
DHS EA Mapping to Federal GuidanceDHS EA Mapping to Federal Guidance
Homeland Security Target Architecture
Target Applications Service and Component Architecture
Homeland Security Conceptual Data ModelDRM
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 30
FEA BRM (FBRM) AlignmentFEA BRM (FBRM) Alignment
Each activity in the DHS Business Model maps to at least one sub-function of the FBRM
Technology Architecture
Application Architecture
Data Architecture
Business
DHS Business Activities
FBRM Sub-Functions
Applying the FBRM
• Identified relationships to 23 Lines of Business in the FBRM
• Identified relationships to 71 FBRM sub-functions
• Identified budget requests that support duplicative business functions
• Work with other Federal Agencies, State and Local Governments to improve the Homeland Security & Disaster Management Business Lines
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 31
Aligning HLS Data to the DRMAligning HLS Data to the DRM
Used Zachman’s approach to stage development of HLS Data Architecture– Subject Areas (17)
– Data Objects (48)Technology Architecture
Application Architecture
Data Architecture
Business
Data
Data Definitions
Physical Data Model
Logical Data Model
Per
spec
tive
Per
spec
tive
FunctioningEnterpriseFunctioningEnterprise
DesignerDesigner
BuilderBuilder
Sub-contractorSub-contractor
Conceptual Data Model
DataWhatDataWhat
OwnerOwner
Subject Areas
PlannerPlanner Business Objects
XML Specs
Entity-Relationships
Enterprise Data Dictionary
Data Flow Diagrams
ConceptualBusiness Area, Line, Function
Collection of supporting data object components that contribute to the
definition of the Business Line Function or Sub-Function
One or more common components / schemas that describe a specific
process or object
Level of Granularity / R
e-Use
The most elemental block of data that is descriptive of a business process or object
FEA Data Reference Model
The physical property of the Data
ConceptualBusiness Area, Line, Function
Collection of supporting data object components that contribute to the
definition of the Business Line Function or Sub-Function
One or more common components / schemas that describe a specific
process or object
Level of Granularity / R
e-Use
The most elemental block of data that is descriptive of a business process or object
FEA Data Reference Model
The physical property of the Data
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 32
Aligning HLS Applications to the SRMAligning HLS Applications to the SRM
Technology Architecture
Application Architecture
Data Architecture
Business
The HLS Application Architecture is constructed to leverage reusable components
DHS Business and Technology Components
SRM Service Types and Components
Applying the SRM
• Identified 5 component architecture layers
• Business components defined by HLS activities, data, and user classes
• Structured EA Application Architecture as a set of internetworking components that tie back to the SRM
• Applied a technology patterns approach that is derived from the technology aspects of the SRM
*Number of HLS Applications and Components to the FEA Service Types
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:53 -- Pg. 33
Aligning the HLS TRM to the FEA TRMAligning the HLS TRM to the FEA TRM
Technology Architecture
Application Architecture
Data Architecture
Business
DHS TRM Tier 3
FEA TRM
Applying the TRM
• Incorporates the taxonomy, technical services, protocols and interfaces
• Extended and refined to reflect additional functional and technical requirements
• Adjusted technology categories
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:54 -- Pg. 34
Performance Reference ModelPerformance Reference Model
Application of PRM accomplished by those in the best position– Specific and established
programs
– Supports line of sight from business through technology
EA has best appreciation of how line of sight aligns with OMB, HLS, and DHS goals and objectives
EA provides guidance that can be used by programs to develop (tailor) specific performance measures
TechnologyTechnology
Strategic Outcomes
Value
Customer Results
•Customer Satisfaction•Service Coverage•Timeliness & Responsiveness•Service Quality•Service Accessibility
Customer Results
•Customer Satisfaction•Service Coverage•Timeliness & Responsiveness•Service Quality•Service Accessibility
Processes and Activities•Financial•Productivity and Efficiency•Cycle and Resource Time
Processes and Activities•Financial•Productivity and Efficiency•Cycle and Resource Time
•Quality•Management & Innovation
Technology•Financial•Quality & Efficiency•Information & Data•Reliability & Availability•User Satisfaction
Technology•Financial•Quality & Efficiency•Information & Data•Reliability & Availability•User Satisfaction
Other Fixed Assets
•Financial•Quality, Maintenance, & Efficiency•Security & Safety•Utilization
Other Fixed Assets
•Financial•Quality, Maintenance, & Efficiency•Security & Safety•Utilization
People•Employee Satisfaction & Quality of Worklife•Recruitment & Retention•Employee Development•Employee Ratios
People•Employee Satisfaction & Quality of Worklife•Recruitment & Retention•Employee Development•Employee Ratios
Mission and Business Results
•Services for Citizens•Support Delivery of Services•Management of Government Resources•Financial
Mission and Business Results
•Services for Citizens•Support Delivery of Services•Management of Government Resources•Financial
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:54 -- Pg. 35
Version 1.0 StatisticsVersion 1.0 Statistics
Length: 4 Months – May 2003 through Sept 2003
People/Groups involved:– CIO’s office
• Applied Technology Board; EA Team
– DHS Architecture Working Group
• Directorates Represented: S&T, IAIP, CBP, ICE, EP&R, TSA, FLETC
• Organizational Elements Represented: USSS, USCG; CIS
• Mitre– Financial / Resource
Management
Business Model– Activities: 80– Workplace Types: 15– Work Zones: 4
Target Enterprise Architecture– Data
• Subject Areas: 17• Data Objects: 47
– Application• Applications: 25• Reusable Components: 66
– Technology• Technology Patterns: 12• Technical Reference Model
Technology Categories: 60 Transition Strategy
– Conceptual Projects: 28
Department of Homeland Security – Office of the Chief Information Officer 04/12/23 08:54 -- Pg. 36
FY04 PlansFY04 Plans
Outreach– Raise awareness of the EA and its products within DHS– Provide EA consulting to on-going efforts
• US-VISIT and other priority mission investments• Financial/Resource Management• FY04 conceptual projects identified in the transition strategy
Engage Business Units (DHS and external partners)– Vet the Transition Strategy– Develop more granular business and data architectures
Mature the EA– Add greater detail to all EA models– Develop a Transition PLAN
Define and establish EA Governance – Integrate with existing and evolving DHS processes (e.g., strategic
planning, capital planning, budgeting)– Integrate with CIO disciplines (e.g., infrastructure, systems development)