creative commons sustainable it architecture is rating tool course 2010, june beta version 1 1 / 166...

166
Creative Commons Sustainable IT Architectur e IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architectur ww.sustainableitarchitecture.com IS Rating Tool Training By Pierre Bonnet - 2010, June Creative Commons www.sustainableitarchitecture.com This material provides you with a course to learn the key concepts of the IS Rating Tool This material is freely available on http://www.sustainableitarchitecture.com You can use this document for your own needs and publications under the condition to quote the source “Sustainable IT Architecture” This document is protected by a Creative Commons

Upload: trevor-robertson

Post on 13-Dec-2015

215 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

Cre

ativ

e C

om

mo

ns

Sustainable IT Architecture

IS Rating Tool Course

2010, June

Beta Version 1

1 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

IS Rating ToolTraining

By Pierre Bonnet - 2010, JuneCreative Commons

www.sustainableitarchitecture.com

This material provides you witha course to learn the key conceptsof the IS Rating Tool

This material is freely available onhttp://www.sustainableitarchitecture.com

You can use this document for your own needs and publications under the condition to quote the source “Sustainable IT Architecture”

This document is protected by a Creative Commons

Page 2: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

2 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Agenda

1. Introduction in relation to IS/IT changes2. Terms and definitions3. The IS/IT foundation to enforce a progressive reshaping

4. Rules of thumb5. Data Assessment part6. Rules Assessment part7. Processes Assessment part

Note:You can download freely the IS Rating Tool (spreadsheets open office) via our web sitehttp://www.sustainableitarchitecture.com

Page 3: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

3 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

1. Introduction in relation to IS/IT changes

Page 4: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

4 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

At the inception of IT: 1960-2000

IS ITrelies on

supports

• No real overlap between IS and IT systems

• Systems were pretty easy to understand and manage• Systems were rigid because of the gap between IS and IT

Page 5: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

5 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Current position of IT: 2000-2010

ITWhattarget?

• A world where• no work without a PC• IT systems are everywhere

• Too many overlaps between IS and IT systems• IT systems are opaque, rigid and hard-coded which

generate significant difficulties to distinguish IS from its IT systems

• This situation is a blind alley

IS

Page 6: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

6 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Near future of IT: Today ->

• IT systems rely on a new foundation to carry out IS Assets based on Ref/Master Data (MDM), Business Rules (BRMS) and Processes (BPM)

• IS/IT alignment is achieved following a natural path as IT systems are no longer opaque and hard-coded but implemented within business repositories (MDM, BRMS, BPM)

IS + ITMDM

BRMSBPM

RealIS Governance

Page 7: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

7 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

In short

IS + ITMDMBRMSBPM

RealIS Governance

ISIS ITITrelies on

supports

ITWhattarget?IS

1960-2000

2000-2010

Today

Page 8: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

8 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

BOOM in the data management field

Black box

1960-2000 => under control

Don’t worry… be happy!

Page 9: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

9 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

BOOM in the data management field

Black box Black box Black box Black box

1960-2000 => under control 2000-2010 => a nightmare

What a mess!

Page 10: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

10 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

BOOM in the data management field

Black box Black box Black box Black box

Black box Black box Black boxBlack box

1960-2000 => under control 2000-2010 => a nightmare

After 2010 => BOOM in thedata management field

Internet of ObjectsCloud Computing

Rising of IS/IT growth

RFID object Collapse!

Page 11: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

11 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

A new IS/IT charter is necessary

Company’s stakeholdersShareholders

Executive ManagementAuditors

GovernmentsEmployees

ClientsSuppliersPartners

IT Internal zone

MDM

BRMS

BPMIS G

ov

ern

an

ce

IT black-boxIS Assets

• This is the sole approach to enforce traceability and auditability of Information (Data, Rules, Processes)

• The holistic use of MDM, BRMS and BPM provide stakeholders with a high level of confidence in their Information System

• Reporting• Risks management• Facing the boom in data management including the Internet of

objects (RFID, intelligent sensors, water meter…)

Page 12: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

12 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

2. Terms and definitions

Page 13: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

13 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Which terms do we use?

• IS Assets• Linking value• Enterprise Architecture• IS Value (use value, business value, intrinsic value)• Performance level and rating

Page 14: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

14 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

IS Assets: what we own, not what we do

Tangible assetsphysical existence

------machines

toolsreal estates

cashhardware

../..

Intangible assetsno physical existence

------brands

Intellectual propertiespatents

knowledge – working proceduresHR - Organizations

Customer relationships - PartnersSoftware (ERP, Legacy, SOA…)

Information System

Ref/Master DataBusiness RulesProcesses

IS Assets

Assets

Accounting,Chart of accounts

Innovative accounting approaches like IAS/IFRS and assets classifications such as Edvinsson & Malone, ARC IC reporting, The Danish Guidelines, Meritum, IC-

Rating, Wissensbilanz, the METI model, the IC-dVAL method, etc.

Page 15: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

15 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Value 1

Linking Value

• Creation of additional added-value stemming from a mix of several resources

Value 2

ExampleThe linking-value of Data + Rules

Data Data validation rules

Rules execution

Rules

Page 16: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

16 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Enterprise Architecture: state-of-art

• Wikipedia: “An enterprise architecture (EA) is a rigorous description of the structure of an enterprise, its decomposition into subsystems, the relationships between the subsystems, the relationships with the external environment, the terminology to use, and the guiding principles for the design and evolution of an enterprise. This description is comprehensive, including enterprise goals, business functions, business process, roles, organizational structures, business information, software applications and computer systems.”

Business

Information

Application

Technology

standard four layers in EA

To get more information see: Zachman (1987), Togaf, Dodaf, Modaf, Agate, FEA, NIH, the enterprise framework, etc.

strategy, business rules, business processes, organizations, functional decomposition, etc.

Information flow within organization, data models, etc.

applications software, interfaces, etc.

IT infrastructure, databases, programming languages, EAI, etc.

Page 17: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

17 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Enterprise Architecture: pitfalls

Pitfalls of Enterprise Architecture Frameworks when there is a misunderstanding

EA Frameworks don’t guarantee a good or bad final IS/IT Architecture

Zachman is just a taxonomy of concepts and modelsTOGAF is architecture agnostic

Therefore you need an IS/IT Architecture targetIt means A VISION TO RESHAPE YOUR IS/IT

To describe your vision you must take into account your real IS Assets

Page 18: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

18 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Enterprise Architecture: our contribution

Enterprise Architecture and IS Assets

Data

Rules

Processes

Intrinsic value

Businessvalue

Usevalue

Quality of: the

Knowledge, the

governance

functions and

the IT

Integration

Business

goals,

alignment

business/IT,

IS accounting

Working

procedures,

how people

work together

Regardless of any EA framework, every IS/IT relies on Data, Rules and Processes and their linking value

Regardless of any EA Framework, every IS/IT is measured through its intrinsic value (IS Assets), business value (alignment and ROI), and use value (working procedures)

FIRST TRUTH SECOND TRUTH

Business

Information

Application

Technology

standard four layers in EA

IS Assets value

Architecture viewpoint

IS Assets viewpoint

Page 19: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

19 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

IS Value

Intrinsic Value is the actual value of IS Assets regardless of its Use Value and its Business Value. In other words, when a rating is established to measure the Intrinsic Value, then the quality of working procedures, modeling procedures and financial considerations are ignored. IS Assets are based on Data (ref/master data), Business Rules and Processes

Intrinsic Value

IS Rating Tool

Page 20: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

20 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

IS Value

Intrinsic Value is the actual value of IS Assets regardless of its Use Value and its Business Value. In other words, when a rating is established to measure the Intrinsic Value, then the quality of working procedures, modeling procedures and financial considerations are ignored. IS Assets are based on Data (ref/master data), Business Rules and Processes

Intrinsic Value

The Use Value of IS deals with an assessment of company’s working procedures used by IS stakeholders to communicate, build, maintain and run their Information Systems. When Use Value is studied, specialists in charge of the assessment admit that the IS value is related mainly to its mode of use not to its intrinsic value

Use Value

ISO900x, CobiT, CMMI, PRINCE2, TOGAF, ITIL, etc.

IS Rating Tool

Page 21: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

21 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

IS Value

Intrinsic Value is the actual value of IS Assets regardless of its Use Value and its Business Value. In other words, when a rating is established to measure the Intrinsic Value, then the quality of working procedures, modeling procedures and financial considerations are ignored. IS Assets are based on Data (ref/master data), Business Rules and Processes

Intrinsic Value

The Use Value of IS deals with an assessment of company’s working procedures used by IS stakeholders to communicate, build, maintain and run their Information Systems. When Use Value is studied, specialists in charge of the assessment admit that the IS value is related mainly to its mode of use not to its intrinsic value

Use Value

Regardless of working procedures, the Business Value of IS tackles the Information Systems quality to align them with business strategy and operational requirements. One significant aspect is the responsiveness, in other words the IS ability to react quickly to change. The Business Value also encompasses the computation of market values, including financial measurement

Business Value

ISO900x, CobiT, CMMI, PRINCE2, TOGAF, ITIL, etc.

IAS-IFRS,financial method to compute ROI

IS Rating Tool

Page 22: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

22 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

IS Value: holistic point of view

Intrinsic Value

Use Value

Business Value

Analysis

Bad Bad Bad Worst situation => no real value within such a company

Good Bad Bad

Strange situation => where IS assets are good even though bad working procedures are used (use value). By the way, as the business value is bad either IS assets should be sold to another company, either the company should change its strategic business commitments

Good Good BadStrange situation => where IS assets and working procedures are good whereas business value is not important. This is a similar situation with the previous one

Good Bad Good

Strange situation => where IS assets are good even though bad working procedures are used (use value). Fortunately, the business value is good. The question raised should be: can these bad working procedures damage IS assets over time?

Bad Good GoodSuspect situation => because good outcomes in use value and business value hide a deeper weakness in IS assets (intrinsic value). This good situation in use and business values is unsustainable as the IS assets still remain bad

Bad Bad GoodStrange situation => where business value seems good even though bad working procedures are used (use value) and IS assets are weak (intrinsic value)

Bad Good Bad

Trap situation => where working procedures (use value) are good but IS assets (intrinsic value) and business value still remain bad. In reality, this company has a poor value and the bad quality of its IS assets will generate serious problems soon

Good Good Good Ideal situation => where all values are aligned

Page 23: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

23 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Performance level and rating

• Before establishing a financial assessment of IS Assets it is necessary to measure their performance level i.e. their quality

Data

Rules

Processes

Performance level

Performance level

Performance level

Rating

Rating

Rating

Financial assessment

Financial assessment

Financial assessment

Rating

Rating

Rating

IS/IT point of view Accounting point of view

Page 24: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

24 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

3. The IS/IT foundation to enforcea progressive reshaping

Page 25: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

25 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

What goals do we have?

Transparency• Allowing a better understanding of IS Assets by all

company’s stakeholders

Auditability• Guaranteeing a full and detailed auditability of IS

Assets used in the past, present and future (version management)

Mastering the complexity• Keeping a stable level of IS/IT complexity

regardless of the business changes and growth

Agility• Allowing rapid and secure changes in data,

business rules and processes

TAMA

ransparency

uditability

gility

astering the complexity

Page 26: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

26 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Key principles to achieve the goals

The more the IS/IT is hard-coded the more the transparency is bad

• Duplication of data in rigid and scattered databases• Spreadsheets effects• Programming languages used by IT specialists (Cobol, Java…)• Lack of up-to-date documentation

Page 27: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

27 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Key principles to achieve the goals

The more the IS/IT is opaque the more the auditability is bad

The more the IS/IT is hard-coded the more the transparency is bad

• Duplication of data in rigid and scattered databases• Spreadsheets effects• Programming languages used by IT specialists (Cobol, Java…)• Lack of up-to-date documentation

• IT audit trails available to IT specialists mainly• Tunnel effect when using IT programming languages (Cobol, Java…)• Lack of traceability between data, business rules and processes

Page 28: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

28 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Key principles to achieve the goals

The more the IS/IT is opaque the more the auditability is bad

The more the IS/IT is hard-coded the more the transparency is bad

• Duplication of data in rigid and scattered databases• Spreadsheets effects• Programming languages used by IT specialists (Cobol, Java…)• Lack of up-to-date documentation

• IT audit trails available to IT specialists mainly• Tunnel effect when using IT programming languages (Cobol, Java…)• Lack of traceability between data, business rules and processes

Reshaping the whole existing IS/IT in one step is impossible

• A natural path to reshape IS/IT must be enforced with an iterative lifecycle implementation: first ref/master data, second business rules and then business processes

Page 29: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

29 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Step 1 – Regaining the data control

R/M

Functional silo

R/M

Functional silo

R/M

Functional silo

MDM

Ref/Master data

Unified data model

Step 1. MDM is synchronized with existing

databases

Data governance

Referential/Master data

R/M

Transactionaldata

Referential/Master data

R/M

Transactionaldata

The MDM approach is deployed with no impact on what already exists, without modifying the data repositories which are already in place in any historical databases

Page 30: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

30 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Step 2 – Regaining the rules control

R/M

Functional silo

R/M

Functional silo

R/M

Functional silo

MDM

Ref/Master data

Unified data model BRMS

Business Rules

Step 2. BRMS is used for extracting business

rules locked in silos

Data and Rules governance

Referential/Master data

R/M

Transactionaldata

Referential/Master data

R/M

Transactionaldata

Business Rules Management System (BRMS) approach is established to get certain business logics out of the existing hard-coded software and have them translated into a rules language before being placed in the rules repository

Page 31: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

31 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Step 3 – Regaining the processes control

New system

Functional silo

R/M

Functional silo

MDM BRMS BPM

Business Rules ProcessesMaster Data

R/M

IS governance (Data, Rules, Processes)

Referential/Master data

R/M

Transactionaldata

Referential/Master data

R/M

Transactionaldata

New developments benefit from the ref/master data and business rules that have already been capitalized. At this stage, Business Process Management (BPM) enters into play

The circle is thus closed: the processes, the business rules and the ref/master data are under control. A new IT system is born: an open IT system for business, more open to evolution and more sustainable

Page 32: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

32 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Applied to software packages

MDM BRMS BPM

Business Rules ProcessesRef/Master Data

SOFTWARE PACKAGE

Transactional data

IT Integration of MDM, BRMS and BPM

IS Assets

If the MDM were locked within the Software Package scope, then it would mean risks of maintaining or reinforcing the silo effect

This is the same concern with BRMS and BPM

Page 33: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

33 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Business triggers to start and lifecycle

which ref/master data? MDM

BRMS

Re

qu

ire

me

nts

Imp

lem

en

tatio

n

1

which business rules?

2

3

Case 1Business Trigger: ref/master data rationalization

which data validation rules?

• In this project lifecycle, the company needs to regain the control of its ref/master data first

• When needed, data validation rules are implemented within the BRMS to guarantee a full transparency and auditability of the data management

Page 34: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

34 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Business triggers to start and lifecycle

which processes?

which business rules?

which ref/master data? MDM

BRMS

BPM

Re

qu

ire

me

nts

Imp

lem

en

tatio

n1

2

3

4

5

which ref/master data? MDM

BRMS

Re

qu

ire

me

nts

Imp

lem

en

tatio

n

1

which business rules?

2

3

Case 1Business Trigger: ref/master data rationalization

Case 2Business Trigger: processes/rules rationalization

which data validation rules?

• In this project lifecycle, the company needs to regain the control of its ref/master data first

• When needed, data validation rules are implemented within the BRMS to guarantee a full transparency and auditability of the data management

• In this project lifecycle, the company needs to regain the control of its processes

• To achieve this goal, business rules used by these processes are identified and then ref/master data which are consumed (data scope)

• The implementation lifecycle starts with the MDM applied to the required data scope, following by the BRMS and then the BPM

Page 35: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

35 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Lifecycle: top down + bottom up

which ref/master data? MDM

BRMS

Re

qu

irem

ents

Imp

lem

enta

tion

1

which business rules?

2

3

which data validation rules?

which processes?

which business rules?

which ref/master data? MDM

BRMS

BPM

Req

uir

emen

ts

Imp

lemen

tation1

2

3

4

5

which processes?

which business rules?

which ref/master data? MDM

BRMS

BPM

Req

uir

emen

ts

Imp

lemen

tation1

2

3

4

5

Enterprise Data Architecture

Business Objects

Domains of business objects

Data Category

Enterprise Rules Architecture

Rules classification

Rules naming

Enterprise Processes Architecture

Processes classification

Processes naming

which processes?

which business rules?

which ref/master data? MDM

BRMS

BPM

Req

uir

emen

ts

Imp

lemen

tation1

2

3

4

5

which processes?

which business rules?

which ref/master data? MDM

BRMS

BPM

Req

uir

emen

ts

Imp

lemen

tation1

2

3

4

5

En

terp

ris

e A

rch

ite

ctu

re

Top Down

Bottom Up

Page 36: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

36 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

4. Rules of thumb

Page 37: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

37 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Rules of thumb

• We want to measure the Intrinsic Value of IS• It is based on real IS Assets, it means data, rules and processes

Data• Ref/master (shared data)• Transaction• Decisional• Flow

Rules• business rules• organization rules• security policies

Processes• workflows• uses cases

Applications Services portfolio IT infrastructure

Software packages Networks ../..

Out of the scope of IS Assets because they all rely on Data, Rules and Processes

Page 38: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

38 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Rules of thumb

Data

• Ref/master (shared data)• Transaction• Decisional• Flow

Rules

• business rules• organization rules• security policies

Processes

• workflows• uses cases

Linking value Linking value

• We take into account the linking value between MDM+BRMS+BPM

Page 39: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

39 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Rules of thumb

Data

• Ref/master (shared data)• Transaction• Decisional• Flow

Rules

• business rules• organization rules• security policies

Processes

• workflows• uses cases

Linking value Linking value

• We take into account the linking value between MDM+BRMS+BPM

• We focus on the IS Intrinsic Value only

IS Intrinsic Value

What we own

IS Use Value

What we do

IS Business Value

What we win

IS Rating Tool CobiT, ITILISOxxxx, etc.

Financial assessment,IAS-IFRS, etc.

Page 40: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

40 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

3 domains of assessment

• How data, rules and processes are documented?• What are the modeling procedures used?

Knowledge management

“You own a data model… but is it a low-level description or a semantic model?”

Quick illustrations

Quick example in the next slides

Page 41: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

41 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

This is not a semantic data model

• Lack of referential integrity constraints

• No business lifecycle, i.e. no state attribute whereas this is an important ref/master data attribute

• Very poor expressivity as this data model is a flat point of view (data flows)

Figure from OASIS

Page 42: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

42 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Address

Object

SiteCoordinate System Code

Location coordinate

::MAG::Business::Utilities::Period

0..1

language

location nature

longitude minutes measure : real

latitude degrees measure : real

latitude minutes measure : real

latitude direction code : real

longitude degrees measure : real

longitude direction code : string

identification code : string

description : string

* *locates

* resides

1

short name : string

full name : string

other details : Text

*

building number (address line 1) : integer

number for the nature (address line 2) : integer

name for the nature (address line 2) : string

additional name (address line 3) : string

post box : string

floor : string

room : string

other details [*] : Text

building name (address line 1) : string

Semantic modeling –

Address stage 1

Page 43: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

43 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Address

Object

Country

Currency Code

SiteCoordinate System Code

Location coordinate

City

Territory

Territory Type

Territory Office

Address Nature

Address Code

Postal Code Pattern

Type Territory Office

::MAG::Business::Utilities::Period

*order

manages0..1

language

location nature

1

longitude minutes measure : real

latitude degrees measure : real

latitude minutes measure : real

latitude direction code : real

longitude degrees measure : real

longitude direction code : string

identification code : string

description : string

* *locates

* resides

*

serves

name : string

code : string

special code : string

1

0..1 *

1..*

divides in

nom : string* 1

defines

short name : string

full name : string

other details : Text

*

building number (address line 1) : integer

number for the nature (address line 2) : integer

name for the nature (address line 2) : string

additional name (address line 3) : string

archive()

locates

name : string

name : string

name : string0..1

1

post box : string

floor : string

room : string

other details [*] : Text

building name (address line 1) : string

check()

start()

*

locates

*

description : string

pattern : string

remove()

complete()

1

territory name : stringincludes

regional phone prefix : string

international phone prefix : string

territory code used : boolean

mail office

manages

city name : string

city code : string

/postal code : string

1

* *

locates

0..1

0..1

/relates to

*

1

*

*

/locates

manages through

time zone offset : string

territory code : string

1

*locates

name : string

time zone offset : string

uses

1 *

* 1

structures by

*

defines

0..1

1

1

Semantic modeling –

Address stage 2

Page 44: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

44 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Return To Sender (RTS)

To be checked Valid

To be completed

Archive

Undeliverable as Addressed

Insufficient Address

No such numberstart/start()

check/check() [ok]

[undeliverable]

[insufficient]

[no such number]

[not complete]

complete/complete()

archive/archive()

archive/archive()

remove/remove()check/check()

Semantic modeling –

Address stage 3

Business lifecycle (state machine)

Page 45: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

45 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Decision table applied to Address

BUSINESS STATES

ADDRESS Valid Archive

building number yes no yes no no no no no

number for the nature yes no yes no no no no no

name for the nature yes no yes no no no no no

additional name yes no yes no no no no no

building name yes no yes no no no no no

post box yes no yes no no no no no

floor yes no yes no no no no no

room yes no yes no no no no no

other details[*] yes yes yes yes yes yes yes no

yes = modif ication possible / no = modif ication impossible

To be checked

To be completed

Return to Sender (RTS)

Undeliv erable as Addressed

Insuf f icient Address

No such number

Carried out by the MDM automatically when checking data modifications of Address. It means less approach of hard-coding software and more auditability and traceability of integrity constraints applied to ref/master data

MDM

Stored into the MDM

Page 46: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

46 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

3 domains of assessment

• How data, rules and processes are documented?• What are the modeling procedures used?

Knowledge management

• What are governance features available to usersto manage their IS Assets (data, rules, processes)?

Governance features

This part doesn’t deal with the quality of the organization but the quality of the governance features like: version management, permission management, authoring, etc.

“Do you manage you ref/master data with spreadsheets or with a more robust

solution bringing real governance features?”

Quick illustrations

“You own a data model… but is it a low-level description or a semantic model?”

Page 47: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

47 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

3 domains of assessment

• How data, rules and processes are documented?• What are the modeling procedures used?

Knowledge management

• What are governance features available to usersto manage their IS Assets (data, rules, processes)?

Governance features

This part doesn’t deal with the quality of the organization but the quality of the governance features like: version management, permission management, authoring, etc.

• How data, rules and processes are implemented? Are they based on MDM, BRMS and BPM?

IT management

“Do you manage you ref/master data with spreadsheets or with a more robust

solution bringing real governance features?”

“Are your IS Assets hard-coded or managed through business repositories

such as MDM, BRMS and BPM?”

Quick illustrations

“You own a data model… but is it a low-level description or a semantic model?”

Page 48: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

48 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

3 domains x 3 types of IS Assets

• This is the IS “Rating Tool matrix”

• It provides nine points of assessments

• Every case of this matrix holds a set of questions to conduct the rating

• Enterprise Architecture is employed at the level of the knowledge management• MDM, BRMS and BPM tools are employed at the level of the IT infrastructure

Page 49: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

49 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Set of questions for every case

• About 100 questions to cover the whole matrix

• Each answer is ranked with help from 5 levels

• low• basic• medium• advanced• optimized

• Therefore about 500 points of measure

Page 50: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

50 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

A: >=90% B: >=50% and <90% C: >=10% and <50% D: <10%

Letter #1 Letter #2 Letter #3

At the highest level of the consolidation

• Each letter gives a consolidated rank (performance level) for Data, Business Rules and Processes

Page 51: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

51 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

IS Rating example – 1/4

This company has a huge risk in Data management (C) and Rules management (C). Its ability to well manage its Processes (B) doesn’t prevent this company from facing a serious IS crisis because of a data and/or business rules loss of control. More precisely, according to its detailed IS rating outcomes, we have to study why its data knowledge is so poor (only 5% = D)? From this first rating, the company’s stakeholders should demand detailed information describing the IS plan to manage data and rules risks.

Once this plan will be delivered, a further IS rating will be done to gauge the IS improvement. May be, this company could decide to raise its data consolidated mark to the "B" level within a year and then attain a "BCB" rating which would be reassuring for its stakeholders.

Then, after a full year of work on data knowledge improvement, the company’s rating goes up to "BCB” (see the next rating card).

Page 52: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

52 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

IS Rating example – 2/4

On the basis of this new rating, the company has a huge interest in improving its business rules management to reach a ‘B’ level rather than a poor ‘C’. The key factor to succeed seems to deploy a stronger approach in rules governance, as shown in its detailed IS rating outcomes (21% = C).

After delivering works on rules management, this company achieves this objective and attains a new rating "BBB" (see the next rating card).

Page 53: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

53 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

IS Rating example – 3/4

"BBB" is an excellent rating, very reassuring for all IS stakeholders. By analyzing its detailed percentage levels per IS assets (see its detailed IS rating outcomes) additional improvements can be identified to target the "AAA" level.

Don't forget, the rating can be established both at the scale of the whole IS but also within a smaller scope such as a subsystem, a software package, a subsidiary, a web application, etc.

Page 54: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

54 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

IS Rating example – 4/4

A progressive path to leverage yourIS Intrinsic Value and drive your Enterprise Architecture

Page 55: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

55 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

When using the IS Rating Tool

• Within the IT Department to support and encourage an innovative reshaping of IS/IT based on a holistic use of MDM, BRMS and BPM

• Applied to a subset of the whole IS/IT system such as a business line, an application, a software package, etc.

• When selecting a new software package to gauge its ability to manage data, rules and processes as real IS Assets

• To complement with accounting operations and financial assessments such as IAS-IFRS

Audit

Page 56: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

56 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

When using the IS Rating Tool

• Within the IT Department to support and encourage an innovative reshaping of IS/IT based on a holistic use of MDM, BRMS and BPM

• Applied to a subset of the whole IS/IT system such as a business line, an application, a software package, etc.

• When selecting a new software package to gauge its ability to manage data, rules and processes as real IS Assets

• To complement with accounting operations and financial assessments such as IAS-IFRS

Audit

• Between IT Department and IS stakeholders• To contribute to an annual IS assessment

Communication

Page 57: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

57 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

When using the IS Rating Tool

• Within the IT Department to support and encourage an innovative reshaping of IS/IT based on a holistic use of MDM, BRMS and BPM

• Applied to a subset of the whole IS/IT system such as a business line, an application, a software package, etc.

• When selecting a new software package to gauge its ability to manage data, rules and processes as real IS Assets

• To complement with accounting operations and financial assessments such as IAS-IFRS

Audit

• Between IT Department and IS stakeholders• To contribute to an annual IS assessment

Communication

• Bench-learning between teams, partners, companies, etc.• As a requirement appended to RFP/RFQ to help selecting contractors

Management

Page 58: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

58 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

5. Data Assessment part

Page 59: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

59 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Knowledge

Check-list

Page 60: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

60 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Knowledge

DT-KN-01 Enterprise Data Architecture

• Enterprise Data Architecture enforces a politics encouraging a unified data modeling and data knowledge management at the whole scale of the system rather than siloed data modeling and implementations only

• It means that Enterprise Data Architecture is aimed at deploying knowledge management applied to data, at least towards main business objects reused within business rules and processes

• Working procedures and organizational issues are out of the scope of the IS Rating Tool. Indeed, this tool is focus on Intrinsic Value of IS. Other organizational issues should be tackled through frameworks and methods such as CobiT, CMMI, etc.

Page 61: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

61 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Knowledge

DT-KN-01 Enterprise Data Architecture

Ref/MasterData

Transaction Data

Data flowDecisional

data

DT-KN-01-1. Ref/Master dataCan be established without being intrusive to existing data models and databases. Quick ROI thanks to MDM and Data Governance

DT-KN-01-2. Transactional dataThis level of data architecture is more complicated to attain than ref/master data. Indeed, spending time to redesign existing transactional data models to reduce their duplications and defects could be difficult to justify without IS restructuring

DT-KN-01-3. Decisional dataMost of the time, this data level relies on an Operational Data Store (ODS). The ODS uses a data model stemming from a consolidated view of transactional data and ref/master data models

DT-KN-01-4. Data flowThe purpose of EA applied to data flow is to reuse ref/master, transactional and decisional data models within ETL/EAI/ESB directly

DT-KN-01-5 Unified Data ArchitectureAll types of data (ref/master, transactional, decisional and data flow) share a unified Enterprise Data Architecture relying on common concepts such as Business Objects gathered through Domains of Business Objects

Page 62: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

62 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Knowledge

DT-KN-01 Enterprise Data Architecture

DT-KN-01-1. Ref/Master data DT-KN-01-2. Transactional data

Page 63: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

63 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Knowledge

DT-KN-01 Enterprise Data Architecture

DT-KN-01-3. Decisional data DT-KN-01-4. Data flow

Page 64: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

64 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Knowledge

DT-KN-01 Enterprise Data Architecture

DT-KN-01-5. Unified data architecture

All types of data complement each other, which means that ref/master, transactional, decisional and data flow live together and share the same business objects. For example, the Business Object "Product" holds both ref/master data (its description) and transactional data (e.g. its quantity). It is also reused when conveying data product at the level of the integration layer and reused when statistics are computed by the datawarehouse. To succeed in deploying a Unified Data Architecture, dedicated and suitable modeling procedures must be used. These procedures are aimed at defining and sharing key concepts such as Business Objects, Domains of Business Objects and Data Category (as described in UML by Grady Booch to define business topics). To get further information about these modeling procedures we invite you to visit the MDM Alliance Group (MAG). The MAG delivers modeling procedures supporting a complete Unified Data Architecture foundation (www.mdmalliancegroup.com)

Page 65: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

65 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Knowledge

How to assess unstructured data?

• Even thought the IS Rating Tool is focus on structured data first, you can take into consideration unstructured data as supplemental information added to business objects. It means that no information should exist outside business objects boundaries

How to assess meta data?

• Meta-data are gauged when assessing ref/master data. Let's take an example in the field of Service Oriented Architecture. A repository describing relationships between providers and consumers must be established. There are a lot of meta-data defining services and stakeholders, including service level agreements and security policies. With help from a good data model, all meta-data structures are well-defined and then implemented to the MDM. Therefore, meta-data values are managed as usual ref/master data. It means that if you attain a good mark about the 'DT-KN-01-1 Reference and Master Data' then you should be able to manage all meta-data in a right way

Page 66: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

66 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Knowledge

DT-KN-02 Basic data modeling

DT-KN-02-1. Business DictionaryOne or several business dictionaries are used to gather key business concepts with definitions of terms, taxonomy, synonyms, etc.

The business dictionary should be connected with data models. In other words, documentation of data models (class, attributes...) should be retrieved from the business dictionary directly. Then, if you have a shared business dictionary without linking it to data models then your mark should be 'medium' or 'advanced' only because of the lack of connection with data models. Conversely, the more your business dictionary is shared at the whole scale of the company and reused within your data models the more your mark is raised and should be 'optimized'.

Page 67: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

67 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Knowledge

DT-KN-02 Basic data modeling

DT-KN-02-2. Business point of viewBusiness data models are available and maintained regardless of physical implementations and databases schemas

Business data models describe information regardless of IT issues. All business objects should be fully described including all their relationships. Indeed, the more relationships between business objects are described the more valuable data models are. To enforce a sustainable data knowledge, a formal and shared notation should be used such as UML or other DSL depending on the company's culture. The more these business models are shared, known and readable by all IS stakeholders the more your mark should be raised.

Page 68: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

68 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Knowledge

DT-KN-02 Basic data modeling

DT-KN-02-3. Logical point of viewLogical data models are derived from business data models. They establish the logical point of view of the data architecture

Logical data models rely on IT database architecture styles such as relational oriented approach, object oriented object, hierarchical oriented approach or a mix of the three. These data models are independent of physical databases schemas. Logical data models are established by using derivation rules from business data models. In other words, these models should be the result of a translation of business data models into logical terms. They are represented with help from a formal notation, such as UML or other DSL. They rely on formal and shared logical naming rules. These data models are not meaningful for business users.

Page 69: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

69 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Knowledge

DT-KN-03 Semantic data modeling

DT-KN-03-1. Business Objects’ lifecyclesThe real semantic of data is revealed through business objects' lifecycles. Indeed, modeling behaviors of business objects allows for establishing rich, reliable and sustainable data models. Without this approach, data models remain static and cannot express the richness of information.Beyond the data modeling procedures, this question copes with the mechanism used to really manage business objects' lifecycles as a real IS Asset, which means using the MDM to manage business objects' states values as master data.

Your mark about the Basic Data Modeling should be 'medium' at least before starting the Semantic Data Modeling

Return To Sender (RTS)

To be checked Valid

To be completed

Archive

Undeliverable as Addressed

Insufficient Address

No such numberstart/start()

check/check() [ok]

[undeliverable]

[insufficient]

[no such number]

[not complete]

complete/complete()

archive/archive()

archive/archive()

remove/remove()check/check()

Example: Address’ lifecycle

Page 70: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

70 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Knowledge

DT-KN-03 Semantic data modeling

DT-KN-03-2. Relationships between Business ObjectsThe semantic of a data is revealed through relationships between business objects. These relationships must be managed as a real IS asset rather than poor cardinalities frozen when establishing data models. These cardinalities become real assets when managing them as master data.Beyond the data modeling procedures, this question copes with the mechanism used to really manage cardinalities as a real IS asset, which means using the MDM to manage data cardinality as master data.

Cardinality links (minOccurs, maxOccurs) are managed as master data to ensure a better agility of data models depending on use contexts (head office, subsidiary, partner, country, language, classification, etc.)

../..

11Partner

51Subsidiary

10Head Office

Cardinality (p)Cardinality (n)Use context

../..

11Partner

51Subsidiary

10Head Office

Cardinality (p)Cardinality (n)Use context

MDM

Produit Usine

* on use context (n,p)Product FactoryProduit Usine

* on use context (n,p)

Produit Usine

* on use context (n,p)Product Factory

Page 71: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

71 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Knowledge

DT-KN-03 Semantic data modeling

DT-KN-03-3. Business rules applied to dataWhen a data element is updated a rules set can be executed to check its integrity. These rules are a part of the Semantic Data Modeling. It is important to keep in mind that this question copes with business rules applied to data elements only, not other business rules spanning a large data scope or organizational rules required to conduct processes.

Business rules applied to data should be gathered through a repository of rules, such as a BRMS (see also Rules Assessment part). With help from this repository, business IS Stakeholders are able to author rules or at least consult them. It is easier to manage their versions and execute them to test the system. Moreover, a link between data models and the rules repository is then established.Business rules applied to data should be collected as follows: rules independent of business objects' states, rules having pre- or post-conditions relying on business objects' states, rules updating business objects' states. This approach means that designing business rules within Enterprise Data Architecture is achieved by taking into consideration business objects' lifecycles.

Page 72: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

72 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Knowledge

DT-KN-04 Ability to act

• This part is aimed at assessing the ability to establish a sustainable funding for Enterprise Data Architecture and the ability to estimate the replacement value of data models

• The ability to act doesn't cope with the maturity of organizations to deliver an effective Enterprise Data Architecture. Indeed, the IS Rating Tool tackles the IS Intrinsic Value only which means that organization issues are not measured here. Therefore, you should use complementary tools such as CobiT and CMMi to assess maturity levels of organizations

Page 73: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

73 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Knowledge

DT-KN-04 Ability to act

DT-KN-04-1. FundingA budget is established to support the Enterprise Data Architecture.

The decision to raise a funding is dependent on the ROI. Spending time to rebuild data models and improve data documentations is not sufficient to guarantee a real ROI. This is the reason why data models should be reused to set up added-value data governance features to IS Stakeholders.Using a MDM is valuable to transform data models into ROI since real data governance features are brought by the MDM (see DT-GV section.However, this approach is dedicated to ref/master data only. Regarding transactional data, it is less easy to raise funds as the question is: what will we do with new transactional data models if we cannot restructure existing transactional systems? Here, MDM is not usable and data governance features are not really required. This is the reason why the marks 'Medium' and 'Advanced' are reached whereas ref/master data funding is enforced only.

Page 74: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

74 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Knowledge

DT-KN-04 Ability to act

DT-KN-04-2. Replacement valueAbility of your organization to (re)design data models from scratch (blank page).

The replacement value must be gauged regardless of any financial issue. You must estimate it without any limitation as this is a theoretical assessment only. However when answering this question you have to provide detailed information explaining your score. When data documentations are up-to-date and teams have a good command of data modeling procedures then your score is high. Conversely, when it is difficult to gather data knowledge because of poor documentations and/or lack of specialists in data modeling, then your score should be decreased.

Page 75: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

75 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Governance features

Page 76: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

76 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Governance features

• Data governance features are the business functions used by IS Stakeholders to manage ref/master data. This is a list of business features brought by the MDM, such as data version management, authoring of data, querying, etc.

• The way of these functions are used through processes and organizations are not measured here. Indeed, the IS Rating Tool copes with the IS Intrinsic value which means the list of data governance features, not the quality or maturity levels of organizations to use them

• Amongst these features, a detailed assessment is required to measure the ref/master data version management function. A focus on data quality is also integrated to measure how data governance should improve data quality processes

Page 77: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

77 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Governance features

Check-list

Page 78: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

78 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Governance features

DT-GV-01 Reference and Master Data

DT-GV-01-1. Unified ref/master data governance featuresRef/master data benefit from unified and shared governance functions used by all IS Stakeholders, not only by IT specialists

All reference and master data are managed through unified and shared governance functions such as: collaborative authoring data, version management, traceability of data, right management, query, data approval workflow, etc. These functions are applied to any type of ref/master from simple enumerations data to complex data structures such as product configuration, chart of accounts, structure and organization, pricing configuration, customer information, parameters of business regulations, etc.From an IT point of view, data governance functions are brought by a MDM tool which is generic enough to manage all types of data. This is a Model-driven MDM (see also the part 'Mastering IT Approach to manage data')

Page 79: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

79 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Governance features

DT-GV-01 Reference and Master Data

DT-GV-01-2. Ref/master data version managementAmongst data governance functions, the version management is a significant feature requiring a specific assessment

The version management of ref/master data is vitally important to enforce a real data governance. It should be possible to create versions applied to any scope of data. A scope can be a data element or a set of business objects linked each other through their relationships. Every version is located to a branch. This mechanism allows for living together several versions of a same data scope located to different branches.For example, a first branch could exist for a production environment and a second branch could be applied to a data matching process. Therefore, a same data scope is both used in production and managed by a data quality process. After executing this process, the data governance allows to compare and merge data scope between its version within the production environment and its version within the data matching environment.

Page 80: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

80 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Governance features

DT-GV-01 Reference and Master Data

DT-GV-01-3. Active data qualityRef/master data quality is an acute issue because of heterogeneous existing databases and data duplications. However, when having real data governance functions as seen in DT-GV-01-1 and -2, it becomes easier to tackle this problem in an efficient way.

ProductProduct

Database No.1

FactoryFactory

Database No.2

OrganizationOrganization

Database No.3

AgreementAgreement

Database No.4

PartnerPartner

Database No.5

MDM

Package

Produit Usine

Organisation

Accord de production

fabrique

* *

gère*

1

rôle 1

rôle 2

*

A product (Database No. 1) is only created if the factory code (Database No. 2) which it is

affiliated with is under the management of an organization (Database No. 3) that has an

ongoing production agreement (Database No. 4) with the company or one of its partners

(Database No. 5), that has been active for the past twelve months, at its disposal

Mas

ter

Dat

a In

teg

rati

on

(E

AI/E

SB

/ET

L)

Rich and shared master data model

Product Factory

Organization

Agreement

affiliated

managed

role 2

role 1

Data Steward

Data Quality Tool

1/2

Page 81: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

81 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Governance features

DT-GV-01 Reference and Master Data

DT-GV-01-3. Active data quality (next)

The data cleansing process is established by benefiting from the data governance functions brought by the MDM. It means that rather than clean data within data databases with poor data structures, an active data quality process is achieved by using the MDM data model.For example, when adding a new address to the system, its validity is checked by the MDM holding the shared data model about Geography business concepts. This address is validated both in terms of its data structure, its integrity rules and potential duplications. Once the data quality is checked through the data model and its integrity rules, then the address can be transformed if needed and pushed to target databases.During this active data quality process, the new address is stored within a dedicated version and branch avoiding conflicts with current version. The compare and merge data governance functions brought by the MDM allow for deciding which version is the right one. If needed, the MDM can use some data quality functions brought by specialized data quality tools such as: relocation addresses, postal address check, product compliance, etc.

2/2

Page 82: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

82 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Governance features

DT-GV-02 Transactional data

DT-GV-02-1. Data governance applied to applications oriented dataData governance functions established for ref/master data can be reused to enforce an unified management of transactional data within applications oriented data.

A lot of applications oriented data exist within information systems. These are either spreadsheets handling transactional data such as funding allocations, inventory measures... or light applications designed with help from Rapid Application Development tools (RAD) whose the foundation is the data model itself (e.g. Access). To enforce a full governance of these data without slowing down the delivery of light applications, it is helpful to use the Model-driven MDM and its data governance features rather than spreadsheets and RAD tools. Indeed, these data governance features are not provided by spreadsheets and RAD tools: collaborative data authoring, permission management, version management, querying data, tracking data, complete traceability and auditability, data approval workflows, etc.

Page 83: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

83 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Governance features

DT-GV-03 Decisional data

DT-GV-03-1. Data governance applied to datawarehousesDatawarehouses use ref/master data coming from operational systems but also defined within their own scopes. These latter should be managed by benefiting from data governance functions brought by the MDM.

Datawrehouses should get ref/master data from the MDM repository gathering ref/master data synchronized with operational systems. Other ref/master data established within the scope of datawarehouses directly should be managed with help from data governance functions brought by the Model-driven MDM.

Page 84: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

84 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Governance features

DT-GV-04 Data flow

DT-GV-04-1. Data governance applied to data flowTo give to business users an autonomy in their daily data flow management, data governance functions must be applied to data flow as well.

Data flow are both internal data conveyed between systems and external data exchanged with third parties (B2B). Most of the time, these data flows gather a lot of data elements coming from scattered databases within the whole scale of the system. This means that controlling integrity rules between data is very complicated. To fix this problem, data flows should be stored within a Model-driven MDM holding a Common Information Model encompassing all integrity rules and bringing all data governance features useful to track and audit data flows.

Page 85: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

85 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Governance features

DT-GV-05 Security information

DT-GV-05-1. Data governance applied to security policiesEvery information system needs a lot of data defining security policies. The management of these data should also benefit from data governance functions

All data defining security policies applied to data, rules and processes should be designed through semantic data models and enforced with help from a Model-driven MDM. In other words, these data should be considered as meta-data and then benefit from the data governance features brought by the Model-driven MDM. Following this approach, it is easier to set up shared and unified functions to manage security policies such as: permission management applied to security policies, collaborative data authoring, querying, data version management, etc.

Page 86: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

86 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Governance features

DT-GV-06 Managing data as a real asset

DT-GV-06-1. Data asset measurementKey indicators should be defined to follow data assets over time

A lot of key indicators could be defined to follow data assets. You should distinguish key indicators applied to data models and those applied to data values. These indicators should be useful to all IS Stakeholders, not only within IT department. Depending on the company's culture, key indicators related to data assets can enrich an IT scorecard and/or contribute to establish a more global scorecard at the whole scale of the system.Defining key indicators is not easy to achieve as it requires a good level of maturity in the management of systems. However, the accuracy of key indicators are less important than their variations over time. It means that you should be interested in trends rather than occasional performances only.Examples of key indicators:- all marks computed with help from the IS Rating Tool could provide a good first level of key indicators- other key indicators applied to data models: rate of data structures duplications, number of business objects, number of business objects' lifecycles, etc.- other key indicators applied to data values: rate of ref/master data misaligned with business regulations, number of version for every business object, rate of data modification by data domains, etc.

Page 87: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

87 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Governance features

DT-GV-06 Managing data as a real asset

DT-GV-06-2. Data asset overseeingBeyond key indicators applied to Data Assets (see DT-GV-05-1), Business Rules used to oversee some key data values should be established

Overseeing ref/master data and data flow is targeted first as other transactional data should benefit from the supervision enforces by business transactions within applications.When ref/master data repository and data flow are managed with help from a Model-driven MDM, it is easier to set up business rules over the data repository to oversee data values in real time (see DT-GV-01-1 and DT-GV-03-1).For example, overseeing a customer's address could be very complicated when this address is duplicated within several databases without a real master repository. Conversely, when using a Model-driven MDM to manage customers' addresses in complement with existing databases, it is easier to set up business rules over the MDM repository, such as: when the customer's address is updated more than three times within a month then send a real-time alert to the sales department. Applied to a financial classification, such a rule could be: financial classification codes mustn't be updated more than X times within a certain period of time. If this rule is not fully enforced then a real-time alert is thrown to executive managers.To implement these rules as real IS Assets, it is recommended to use a BRMS (Business Rules Management System) and/or a CEP (Complex Event Processing) (see also Rules Assessment part of this IS Rating Tool).

Page 88: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

88 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Data Governance features

DT-GV-06 Managing data as a real asset

DT-GV-06-3. Data asset trackingAll data access should be tracked in order to enforce IS traceability.

Ensuring the tracking of all access to ref/master data and data flow is targeted first as other transactional data should benefit from traceability mechanisms established within applications. When ref/master data repository and data flow are managed with help from a Model-driven MDM, a unified business audit trail should be available directly. This audit trail is used to keep track all data access stemming from actors and systems. Query features of the Model-driven MDM allow all IS Stakeholders for seeking and consulting the audit trail, depending on their permissions.

Page 89: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

89 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering IT approach to manage data

Page 90: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

90 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering IT approach to manage data

Check-list

Page 91: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

91 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering IT approach to manage data

DT-IT-01 Reference and Master Data repository

DT-IT-01-1. Model-driven MDMTo enforce agility and scalability of ref/master data repository, it is recommended to use a Model-driven MDM rather than a vertical MDM.A Model-driven MDM is able to manage any type of data, from basic enumerations data and parameters to complex data structures (Product configuration, Structure and Organization, Chart of Accounts, Customer Information, etc.). These data models take benefit from a rich representation of knowledge, which means they enforce all capabilities brought by the semantic data modeling, as described in DT-KN-03.

Using a Model-driven MDM tool allows to generate user interface and services (CRUD) automatically. To achieve this goal, the MDM must combine relational oriented approach with object oriented and hierarchical approaches. It means that the MDM shouldn't rely on a relational approach only (RDBMS/OLTP with poor SQL data description language) but it should take benefit from relational, object and hierarchical data management approaches at the same time. In other words, it should bring ORM (Object Relational Mapping) features over usual RDBMS like Oracle, DB2, SQL-Server... with a rich data description language taking benefit from XML Schema.

Rich data model (Semantic)

OLTP(On-Line Transaction Processing)

CLASSIC MODEL DRIVEN

Model-driven MDMSemantic approach associated with a model driven software development = data governance functions

automatically aligned with data models=> OPEN FOR BUSINESS USERS

CDILack of real

data governance

PIM- PLMWeak data governance

at the whole scaleof the IS

Model Driven Architecture (MDA)Software development based on models

=> FOR IT SPECIALISTS

Object Oriented DatabaseSemantic approach based on a classic

software development=> NOT OPEN FOR BUSINESS USERS

Software development lifecycle

Page 92: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

92 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering IT approach to manage data

DT-IT-02 Rules integration

DT-IT-02-1. MDM with rules repository (BRMS)Rules used to enforce data integrity should be implemented through a business rules repository (BRMS) rather than an approach of hard-coding only. It means that all data governance features brought by the Model-driven MDM should be also available to manage business rules.To achieve this architecture, a generic IT interface should be established from the MDM to the BRMS. When rules are triggered by the MDM, it should send a data flow describing the context of execution without any information about rules to execute. It means that the connection from MDM to BRMS enforced the loose coupling architecture pattern. Therefore, when rules are updated there are no impacts to the MDM repository. Furthermore, it is easy to configure a new context of execution within the MDM and author new rules for this context with the BRMS. Thanks to the loose coupling pattern, this configuration can be enforced without any hard-coded software.

BRMSBRMS

Full data flow of the business

object

ON|OFF : BRMS launched | not launched

Business object Product

Pre-condition UpdateProduct()

Configuration

Pre-condition UpdateProduct() : ON|OFF

MDM

access to the configuration database to drive the BRMS

invocation

Proxy

Result

Data governance

Business rules governance

Page 93: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

93 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering IT approach to manage data

DT-IT-02 Rules integration

DT-IT-02-2. MDM with events management (CEP)CEP (Complex Event Processing) is complementary to BRMS. It allows to enforce an active overseeing of data in real time. The BRMS waits for an invocation coming from the MDM, whereas the CEP listens to the MDM repository and executes rules depending on data behaviors. The added-value of this mechanism has been measured in DT-GV-05-02. From an IT point of view, the integration of CEP with MDM depends on the ability of the MDM to publish in real-time a full data log containing a detailed description of modifications applied to the repository.

Page 94: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

94 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering IT approach to manage data

DT-IT-03 Data Integration

DT-IT-03-1. MDM integration with the rest of the systemTo streamline the MDM integration with the rest of the system, business objects' lifecycles should be used when throwing synchronization events through the integration layer (ETL, EAI, ESB). It means that when a data is updated within the MDM its synchronization with the rest of the system can depend on business objects' states. Then rather than throwing atomic events for every modification occurring within the MDM repository, higher events are used depending on business objects' states. This architecture helps to streamline and secure data integration. To succeed in business objects' lifecycles modeling, you should take into consideration the semantic modeling (DT-KN-03).

ESB

SystemSystem SystemSystem SystemSystem SystemSystem

Data approvalprocess

CUCU CUCU

CUCU

CUCU CUCU

Business object’s lifecycle Return To Sender (RTS)

To be checked Valid

To be completed

Archive

Undeliverable as Addressed

Insufficient Address

No such numberstart/start()

check/check() [ok]

[undeliverable]

[insufficient]

[no such number]

[not complete]

complete/complete()

archive/archive()

archive/archive()

remove/remove()check/check()

MDM

BUSINESS EVENTBUSINESS EVENT

ESB Configuration

ORGANIZATIONAL EVENT

APPLICATIVE EVENTAPPLICATIVE EVENT

CUCU

Use case

Page 95: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

95 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering IT approach to manage data

DT-IT-03 Data Integration

DT-IT-03-2. Data mappingTo streamline the data mapping required when conveying data flow between systems, a pivot format should be established. If this pivot format is IT oriented only then it cannot be used as a real shared and common data model usable at the whole scale of the integration scope. In this situation, a lot of hard-coded developments are required to enrich the pivot format, which means an heavy IT development for every data mapping and troubles when updating existing ones. To fix this problem, semantic data models should be used as pivot formats to conduct data mapping. In other words, this is a model-driven approach applied to the data mapping.When deploying a semantic data modeling (see DT-KN-03) it is valuable to reuse data models as pivot formats. From an IT point of view, it is needed to use a semantic data integration tool able to manage rich data models designed with the semantic data modeling. Semantic data integration tool brings all mapping features needed but also a version management of mapping configurations and tests/debugs functions.

MDMMDM

Semantic integration

Shared ref/master data model

ESB

SystemSystem SystemSystem SystemSystem SystemSystem

Transactional data model

Enterprise Data ArchitectureShared data foundation

Domains of business objects, data categories, business objects, business objects’ lifecycles

Ref/master data model

Data governance

Governance of data mapping rules

Enterprise Architect

Page 96: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

96 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

6. Rules Assessment part

Page 97: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

97 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Knowledge

Check-list

Page 98: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

98 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Knowledge

BR-KN-01 Enterprise Rules Architecture

• Enterprise Rules Architecture should be seen as a part of the Enterprise Architecture. Indeed, it tackles rules and complements with Data Enterprise Architecture (see the Data Assessment part) and with Process Enterprise Architecture (see the Processes Assessment part)

• The goals targeted by the Enterprise Rules Architecture are similar to ones established for Enterprise Data Architecture but applied to rules:

• full knowledge management of rules• enforcing a politics encouraging a unified rules modeling at the whole scale of

the system rather than siloed rules modeling and implementations only within opaque IT languages

• About the strategy formulation• The rules management is a key topic as it allows to write down the company's

business and organizational strategy. To achieve this goal in a right way, the strategy should be described by benefiting from Enterprise Data Architecture (Business objects and their lifecycles) and Enterprise Processes Architecture (Processes and uses cases). This is a key point to enforce a real alignment of the company's strategy with its data and processes definitions

Page 99: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

99 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Knowledge

BR-KN-01 Enterprise Rules Architecture

CoreBusiness Rules

OrganizationalRules

SecurityRules

applied to applied to

BR-KN-01-2 Business strategy formulationThe business strategy deals with all rules defining the core business of the company regardless of any organizational issues. Organizations rules can change frequently over time whereas business rules are more stable and represent the company's raison d‘être

BR-KN-01-3 Organizational strategy formulationThe organizational strategy deals with all rules defining how actors must/should act to deliver the business strategy in a cost-effective and optimum way

BR-KN-01-4 Security policies formulationThe securities policies gather all rules defining the permissions management applied to enforce the business strategy and the organizational strategy

Enterprise Data Architecture – Business Objects

Enterprise Processes Architecture – Processes, uses cases

linked to

linked to

BR-KN-01-1 Rules ClassificationThe IS Rating Tool provides a first level of classification that should be seen as the minimum to ensure

Page 100: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

100 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Knowledge

BR-KN-01 Enterprise Rules Architecture

BR-KN-01-1. Rules ClassificationAt least you should have a classification relying on these three types of rules:• Core business rules. These rules are independent of any organizational issue. Whatever working procedures or workflows enforced within the

system, core business rules are identical,• Organizational rules. These rules depend on organizational choices such as working procedures and workflows. When organizations change

then organizational rules must be updated and/or extended,• Security rules. These rules are dedicated to security issues. They can enforce security policies both at the core business level and the

organizational level.

Even though this classification could be enriched differently from one company to another, it should be the basis to enforce.Other types could be added such as: functional, calculation, IT, internal rules versus those related to business regulations, etc.

Page 101: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

101 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Knowledge

BR-KN-01 Enterprise Rules Architecture

BR-KN-01-2. Business strategy formulationBusiness rules should be established by benefiting from the business objects modeling as described in the Enterprise Data Architecture (see Data Assessment part). It means that every business rule should be attached to a well-identified business object or a specific domain of business objects. The business objects' lifecycles allow to establish business rules updating states of business objects (see Data Assessment part).

State machine (business object’s lifecycle) to discover business rules

Business Object

BRBR

BR

BRBR

BR

BR

BRBusiness

Object

BRBR

BR

BRBR

BR

BR

BR

Classification scheme to manage business rules

Business Object

Return To Sender (RTS)

To be checked Valid

To be completed

Archive

Undeliverable as Addressed

Insufficient Address

No such numberstart/start()

check/check() [ok]

[undeliverable]

[insufficient]

[no such number]

[not complete]

complete/complete()

archive/archive()

archive/archive()

remove/remove()check/check()

BR: Business Rules

Page 102: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

102 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Knowledge

BR-KN-01 Enterprise Rules Architecture

BR-KN-01-3. Organizational strategy formulationOrganizational rules should be established by benefiting from the modeling of processes and working procedures as described in the Enterprise Processes Architecture (see Processes Assessment part). It means that every organizational rules should be attached to well-identified processes or working procedures (uses cases).

Step Step Step

Step

Step

Actor 1, Tps1 Actor 2, Tps2 Actor 2, Tps3 Actor 5, Tps5

Actor 4, Tps3

Activity Activity Activity

Activity

Activity

Actor 1, Tps1

process(long-runningtransaction)

use case(atomic transaction)

Page 103: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

103 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Knowledge

BR-KN-01 Enterprise Rules Architecture

BR-KN-01-4. Security policies formulationSecurity policies should be distinguished from other types of rules such as business and organizational rules. By isolating these rules it becomes easier to oversee them and ensure specific control. Even though they are isolated, they should rely on the same description process as one used to establish business and organizational rules. It means that security policies should be attached to either business objects stemming from the Enterprise Data Architecture or processes and uses cases stemming from the Enterprise Processes Architecture.

Page 104: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

104 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Knowledge

BR-KN-02 Rules modeling

BR-KN-02-1. Rules grammarA rules grammar should be used to author all types of rules as described in BR-KN-01-1: core business rules, organizational rules, security policies. Many languages can be used depending on the company's culture. It could be a specific grammar such as a functional pseudo-code, a standard approach such as SBVR (Semantics of Business Vocabulary and Rules) from OMG, but also a rules grammar stemming from a rules engine also known as a BRMS (Business Rules Management System).

In any case, this grammar should be meaningful for all IS Stakeholders (not only IT specialists) and should be either IT runnable directly or translatable into runnable IT components.

Example of business rules from OMG SBVR specification (January 2008)

Page 105: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

105 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Knowledge

BR-KN-02 Rules modeling

BR-KN-02-2. Rules namingA unified rules naming should be enforced to support the knowledge sharing. It should follow the rules classification as defined in BR-KN-01-1 by enforcing code such as: COR (core business rules), ORG (organizational rules) and SEC (security policies). Moreover, this naming rules should not include any specific code stemming from projects as reuse must be encouraged. It means that the rules naming should be aligned with Enterprise Architecture's concepts such as domains of business objects, processes... as defined through the Enterprise Data Architecture and the Enterprise Processes Architecture.

Page 106: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

106 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Knowledge

BR-KN-02 Rules modeling

BR-KN-02-3. Rules set and dependenciesRules can be linked to each other to meet business requirements. Therefore, it becomes necessary to define sets of rules and links between rules.In order to encourage readability and reusability of rules, it should be possible to define sets of rules. Moreover, links between rules and sets of rules should be available to establish complete executions flows of rules meeting requirements.

Example of rules flow (Ilog) – Quote from “Sustainable IT Architecture” book, Wiley

Page 107: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

107 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Knowledge

BR-KN-02 Rules modeling

BR-KN-02-4. Rules templateRules can be linked to each other to meet business requirements. Therefore, it becomes necessary to define sets of rules and links between rules.In order to encourage readability and reusability of rules, it should be possible to define sets of rules. Moreover, links between rules and sets of rules should be available to establish complete executions flows of rules meeting requirements.

Business Object

Business Object

Business Object

Business Object

Business Object

Business Object

Business Object

Rule Template

• predefined operators• predefined values

Rule authoring

Rule authoring

Rule authoring

Rule authoring

• Subset of data

Page 108: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

108 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Knowledge

BR-KN-02 Rules modeling

BR-KN-02-5. Reference and Master Data values applied to rules definitionsWhen authoring rules, many reference and master data values are used. For example: types of clients, products hierarchy codes, marketing codes, pricing configurations, discounts values depending on countries, structures and organizations codes, functional and IT parameters, etc.

All reference and master data values should be retrieved from a unified data repository ensuring a high quality of data. It means that the rules definitions are aligned with ref/master data values stemming from the MDM (Master Data management). To get more details about the MDM see the Data Assessment part.

Rulesrepository

Ref/masterdata

repository

Authoring rules uses data definedin the ref/master data repository

(BRMS) (MDM)

Page 109: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

109 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Knowledge

BR-KN-02 Rules modeling

BR-KN-02-6. Transactional data subsets Applied to rulesModeling procedures should exist to establish the default transactional data set on which a rule can be defined and executed. These data sets should be established with help from the Enterprise Data Architecture and the Enterprise Processes Architecture.

For example, a rule applied to the business object Customer can use all data related to this business object's data structure. It means that rather than designing a specific data set for each rule, it is recommended to reuse data structures stemming from the Enterprise Architecture. In doing so, readability and maintainability of rules and data knowledge are reinforced.

Enterprise Data ArchitectureVocabulary, Information Architecture

Enterprise Rules Architecture

reuse

Page 110: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

110 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Knowledge

BR-KN-03 Rules enforcement

BR-KN-03-1 Explicit demand versus event activationMost of the time, rules are executed through explicit demands submitted by human actors and IT systems.

However, beyond this usual approach, rules should be also executed when events are thrown within the system, regardless of explicit demands. Using events to enforce rules is very powerful and complements with usual explicit execution mode. From an IT point of view, this approach requires a CEP tool (Complex Event Processing) which complements with the BRMS (Business Rules Management System).

On each stock variation greater than 100within the last 20 seconds then execute <<RULE>>

Example of a rule executed only if well-identified events are validated

(BRMS extended to CEP – Complex Events Processing)

Page 111: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

111 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Knowledge

BR-KN-04 Ability to act

BR-KN-04-1 FundingThe decision to raise a funding is dependent on the ROI. Spending time to establish a unified and shared rules classification and grammar is expensive. Therefore, the drivers to engage such a funding should be well-argued. At the very least, they include these four benefits:- better readability of rules which is a significant gain to ensure business-IT alignment and audit operations,- better reusability of rules which can be a real gain to streamline design and maintenance costs,- ability to set up a translation of rules into runnable IT components which is a right way to decrease IT costs and enforce the business-IT alignment,- reinforce the knowledge management applied to rules. It means a better command of the strategy formulation benefiting from a full and unified description, aligned with the Enterprise Data Architecture and the Enterprise Processes Architecture.

When these benefits are not well-understood within the organization it becomes difficult to engage sustainable funds supporting the Enterprise Rules Architecture. It means that the knowledge management of rules is not viewed as a key factor to support the business and its formulation.

Page 112: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

112 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Knowledge

BR-KN-04 Ability to act

BR-KN-04-2 Replacement ValueAbility of your organization to (re)author rules from scratch (blank page).

The replacement value must be gauged regardless of any financial issue. You must estimate it without any limitation as this is a theoretical assessment only. However when answering this question you have to provide detailed information explaining your score. When rules documentations are up-to-date and teams have a good command of rules modeling procedures then your score is high. Conversely, when it is difficult to gather the knowledge of rules because of poor documentations and/or lack of specialists in rules authoring, then your score should be decreased.

Page 113: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

113 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Governance features

Page 114: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

114 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Governance features

Check-list

Page 115: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

115 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Governance features

• Rules governance features are the business functions used by IS Stakeholders to manage rules. This is a list of business features brought by the BRMS, such as rules authoring, version management, auditability, etc.

• The way of these functions are used through processes execution and organizations are not measured here. Indeed, the IS Rating Tool copes with the IS Intrinsic value which means the list of rules governance features, not the quality or maturity levels of organizations to use them

• Amongst these features, a detailed assessment is required to measure the rules lifecycles and version management function

Page 116: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

116 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Governance features

BR-GV-01 Rules governance

BR-GV-01-1 Unified rules governanceAll rules are managed through unified and shared governance functions such as: authoring rules, version management, traceability of rules executions, rules history, rules tests, rights management, etc. These functions are applied to every type of rules: core business rules, organizational rules and security policies (see BR-KN-01-1).

From an IT point of view, these business governance functions are brought by a BRMS (Business Rules Management System).

Page 117: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

117 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Governance features

BR-GV-01 Rules governance

BR-GV-01-2 Rules lifecycles and version managementThe lifecycle and version management of rules is vitally important to enforce a real rules governance. Two types of features are needed:- It should be possible to create versions of rules and compare versions,- it should be possible to manage stages of rules from their inceptions to their retirements.

It means that at any time, it should be possible to reverse rules changes by benefiting from a full version history of rules authoring.

Rules used data which should benefit from the version management brought by the MDM applied to ref/master data structures and values (see Data Assessment part). It means that every rule should have a context identifier defining in which version of data its execution is issued. In doing so, when the BRMS looks up the MDM to retrieve ref/master data values, it provides the context in which this request is issued, then the version.

Rulesrepository

Ref/masterdata

repository

Get data in a specified version and context

(BRMS) (MDM)

• context: headquarter, subsidiary, territory, language, etc.• version: working, production, training, regulatory, etc.

Page 118: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

118 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Governance features

BR-GV-01 Rules governance

BR-GV-01-3 Rules authoringA unified rules authoring function should be available for all IS Stakeholders and managed through a secured authentication. It means that authoring rules should not be dedicated to IT specialists only. According to the company's culture, key business users can be involved in authoring rules directly or prefer to delegate this work to IT teams. In any case, rules should rely on a business oriented grammar ensuring a full business understanding and formulation of rules (see also BR-KN-02-1 Rules grammar).

Page 119: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

119 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Governance features

BR-GV-02 Managing Rules as a real Asset

• Rules are a real IS Asset changing over time. They allow to formalize the business strategy, the organization strategy and the security policies (see BR-KN-01-2, 3 and 4). It is significant valuable to measure trends rather than occasional performances only. It means that key indicators should be defined and measured over time

• Moreover, it is valuable to set up rules overseeing rules. This approach allows to throw alerts in real time when needed

• As a real IS Asset, all rules executions should be tracked through a unified business audit trail

Page 120: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

120 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Governance features

BR-GV-02 Managing Rules as a real Asset

BR-GV-02-1 Rules Asset measurementKey indicators should be defined to follow rules assets over time.A lot of key indicators could be defined to follow rules assets. You should distinguish key indicators applied to rules executions and those applied to rules definitions. These indicators should be useful to all IS Stakeholders, not only within IT department. Depending on the company's culture, key indicators related to rules assets can enrich an IT scorecard and/or contribute to establish a more global scorecard at the whole scale of the system. Defining key indicators is not easy to achieve as it requires a good level of maturity in the management of systems. However the accuracy of key indicators are less important than their variations over time. It means that you should be interested in trends rather than occasional performances only. Example of key indicators:- number of rules related to a business regulation, number of rules modifications within a period of time, number of rules executions within a period of time, rules not used within a period of time, rules used the greatest number of time during a period, ratio of business rules compared to organizational rules per business unit within the company, all measures brought by the IS Rating Tool, etc.

Rules repository

Definition Execution IS/IT Scorecard

Enterprise Scorecard

Other assets/indicators

Page 121: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

121 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Governance features

BR-GV-02 Managing Rules as a real Asset

BR-GV-02-2 Rules Asset overseeingBeyond key indicators applied to rules assets (see BR-GV-02-1), rules overseeing some key business and organizational rules and security policies should be also established.

When rules are managed through a rules repository such as a BRMS, it becomes easier to add alerts to oversee them. These alerts can check the outcomes of rules executions but also can react depending on thresholds applied to key performance indicators (see BR-GV-02-1). Alerts are defined as rules and benefit from the rules management system. For example:- outcomes of a rule must be conformed to min/max values constraints. It means that all post-conditions applied to rules could be considered as rules overseeing,- maximum number of a rule execution within a period of time,- etc.

Rules repository

Definition Execution

Rules overseeing

Alerts/Indicators

Page 122: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

122 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Rules Governance features

BR-GV-02 Managing Rules as a real Asset

BR-GV-02-3 Rules Asset trackingAll rules executions should be tracked in order to enforce IS traceability.

When a rules repository is enforced by a BRMS, then a unified business audit trail should be available directly. This audit trail is used to keep track all rules executions. Query functions allow all IS Stakeholders for seeking and consulting the audit trail, depending on their permissions.

Page 123: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

123 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering IT approach to manage rules

Page 124: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

124 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering IT approach to manage rules

Check-list

Page 125: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

125 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering IT approach to manage rules

• All rules descriptions ensured with help from the Enterprise Rules Architecture (see BR-KN) and managed through rules governance functions (see BR-GV) shouldn't be diluted through an heavy and rigid hard-coded development only

• It means that to ensure a good Business-IT alignment, a rules engine should be used. When it is enriched with rules governance features, as discussed in BR-GV, it becomes a Business Rules Management System (BRMS)

Page 126: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

126 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering IT approach to manage rules

BR-IT-01 Rules engine versus hard-coding

BR-IT-01-1 BRMS applied to existing systemsTo leverage existing systems without overhauling them, it is recommended to extract key hard-coded rules to rewrite them with help from the BRMS.Modeling and implementation procedures should exist to enforce a progressive extracting of existing hard-coded rules for the benefit of the rules engine. In doing so, the readability, agility and ability to audit the system is really improved. When combining this approach with an efficient Enterprise Rules Architecture (see BR-KN), your company can attain a better Business-IT alignment.

Example of rules extraction – Quote from “Sustainable IT Architecture” book, Wiley

Page 127: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

127 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering IT approach to manage rules

BR-IT-01 Rules engine versus hard-coding

BR-IT-01-2 BRMS applied to new developmentEvery new development and software package customization should benefit from the BRMS in order to improve transparency, agility and ability to audit systems. A strategic long-term plan should be defined to endorse the BRMS use at a large scale of the system.

Modeling and implementation procedures should exist to support the BRMS use rather than an approach of hard-coding only. It means that the number of rules grows when developing and acquiring new systems, including software packages such as ERP. Indeed, customizations of software packages should be put to the BRMS to ensure a better rules traceability and a better way of managing software packages upgrades.

Page 128: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

128 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering IT approach to manage rules

BR-IT-01 Rules engine versus hard-coding

BR-IT-01-3 Level of hard-coded rulesRegardless of your mark about the BRMS applied to existing systems and new developments (BR-IT-01-1, 2), you should be able to measure the level of hard-coding of rules within the system.

You should be able to estimate the level of hard-coded rules within the system. Without any rule engine, your mark is bad. When using a rule engine, your mark depends on how it is deploy within the system.

Page 129: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

129 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering IT approach to manage rules

BR-IT-02 Rules execution and test

BR-IT-02-1 BRMS applied to batch operationsThe BRMS shouldn't be limited to real-time operations only. Most of the time, a significant part of the system works in a batch mode and rules can be shared with ones used in real-time system. Moreover, it could be helpful to restructure batch treatments with a rules engine for restructuring them into more real-time executions.

Most of the time the BRMS is applied to real-time operations first. However, to really improve the agility and traceability of the whole system, it is necessary to tackle rules within batch operations also. Then modeling and implementation procedures should exist to enforce the BRMS use when designing batch operations.

Today's new BRMS technologies remove many IT barriers in term of rules execution performance. For example, some BRMS tools allow for automatically translating business rules into Cobol language and then compile it to run on mainframes directly.

Beyond this IT ability to execute large set of rules, modeling procedures should be also well-established to redesign usual heavy batch operations in more real-time ones. As business is becoming more agile and real-time then the level of batch operations should decrease for the benefit of real-time operations.

Page 130: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

130 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering IT approach to manage rules

BR-IT-02 Rules execution and test

BR-IT-02-2 BRMS with MDMIn order to deploy the BRMS at a large scale of the system, it is necessary to streamline data quality first. It means that reference and master data values used by rules should be retrieved through a unified data repository providing the “one version of the truth”, in other words a MDM must be enforced.

When a rule is executed, it consumes two natures of data. First transactional data stemming from the system issuing the rule execution request. Second, reference and master data. For those data their origin is more complicated as they are often duplicated and scattered across the whole IS. Then when adding a new rule within the BRMS, this question is raised: where must we retrieve reference and master data values for this rule? Are they provided by the system issuing the rule execution request? Are they provided by other siloed systems? Are they provided by the integration layer? In short, adding a new rule within the BRMS could become a nightmare when ref and master data values are not well-managed. To fix this problem, it is necessary to establish a reference and master data repository first, in other words a Master Data Management solution (MDM).

Moreover, to succeed in this approach, modeling and implementation procedures should exist to ensure that the unified data model designed for the MDM is well-established to support rules integration as described here.To get more information about those modeling procedures we invite you to visit the MDM Alliance Group community (www.mdmalliancegroup.com).

Page 131: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

131 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering IT approach to manage rules

BR-IT-02 Rules execution and test

BR-IT-02-3 Test rules against requirementsWhen using a BRMS, rules are both readable by business users and IT runnable directly. It avoids heavy waterfall lifecycle development where rules are testable after having implemented them only. Even though all tests cases are not runnable before some IT integration and development, the ability to test rules when using a BRMS is significant improved. Furthermore, it is highly recommended to set up non regression user acceptance tests of rules.

Rulesrepository

non regression user acceptance tests

Ref/masterdata

repository

(BRMS)

(MDM)

data tests cases and outcomes

get data

Page 132: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

132 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering IT approach to manage rules

BR-IT-02 Rules execution and test

BR-IT-02-4 BRMS loose-coupling architecture (1/2)To enforce a real agile rules management, it is recommended to follow the loose-coupling architecture. Then, three patterns should be used:-agnostic request: when a system issued a rule execution request, it mustn't know which rules could be run. It means that the requester is agnostic towards rules. It provides to the BRMS a context only. With this context, the BRMS must be able to compute which rules are the right ones to execute,-data context: the context provided by the requester to the BRMS must be comprised of a header and a body. The header brings the call context including the caller's identifier and from where its requests is issued such as its pre-condition or post-condition. The header should integrate other information such as a version label. The body is comprised of all data related to business objects handled by the caller. It means that rather than conveyed a specific data flow, it is more agile to send a large data flow. Thanks to this approach, when adding a new rule requiring new data values, it is more likely that these values are already conveyed by the caller, which avoids a useless software maintenance,- variation points: within the logical architecture of the system, it is highly recommended to set up some patterns establishing systematic calls to the BRMS, even if no rules are required when designing the first version of the system. For example, every pre- and post-condition of services (SOA) should integrate a call to the BRMS when implementing the software. Afterwards, when it is time to configure the system, it is easy to add new rules to customize pre- and post-conditions of services without any software maintenance.

Example of BRMS loose-coupling architecture – Quote from “Sustainable IT Architecture” book, Wiley

Page 133: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

133 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering IT approach to manage rules

BR-IT-02 Rules execution and test (2/2)

BR-IT-02-4 BRMS loose-coupling architecture (2/2)

Page 134: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

134 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

7. Processes Assessment part

Page 135: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

135 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Processes Knowledge

Check-list

Page 136: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

136 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Processes Knowledge

PR-KN-01 Enterprise Process Architecture

• Enterprise Process Architecture should be seen as a part of the Enterprise Architecture. It complements with the Enterprise Data Architecture and the Enterprise Rules Architecture

• Most of the time, companies hold a good command of their processes map, by using disciplines such as City IT Planning or (in French term) “IS Urbanization”

• However, processes are too often documented and managed without taking care of underlying rules and data

• This missing link with data and rules is a significant problem because the true value of processes depends on the quality of data and rules

• To tackle this issue, the Enterprise Process Architecture must take into account the outcomes stemming from the Enterprise Data Architecture (Business Objects and their lifecycles) and the Enterprise Rules Architecture (organizational rules)

• By suggesting a classification of processes, the IS Rating Tool highlights how to align every type of process with data and rules

Page 137: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

137 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Processes Knowledge

PR-KN-01 Enterprise Process Architecture

Business Line Business Line Third party

Core Process

Process

Micro-Process(use case)

Core Process

Process

Micro-Process(use case)

PR-KN-01-3 Business line organization formulationThis is an intermediate description of the organization. It allows for describing internal goals for every company's business line

PR-KN-01-2 Transversal organization formulationThis is the highest description of the organization, most of the time it allows for describing strategic goals related to the company's value chain

PR-KN-01-4 Activity formulationThis is the more detailed description of the organization. It allows for describing concrete interactions between one actor and the system through uses cases (micro-processes)

PR-KN-01-1 Processes ClassificationThe IS Rating Tool provides a first level of classification that should be seen as the minimum to ensure

Enterprise Rules Architecture – Organization rules

linked to

Enterprise Data Architecture – Business Object

linked to

linked to

linked to

Page 138: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

138 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Processes Knowledge

PR-KN-01 Enterprise Process Architecture

PR-KN-01-1. Processes ClassificationAt the very least you should have a classification relying on these three types of processes:

• Core process: this is transversal process, spanning several business lines within the organization, and/or through external systems under the control of third parties. A core process is composed with steps orchestrating mainly processes. In certain context, a core process can also orchestrate micro-processes directly (see below). The core processes form the company's value chain

• Process: this is internal process, the execution of which is limited to the scope of one business line only. A process is composed with steps corresponding to micro-processes, also called uses cases

• Micro-process or use case: this is a working procedure defining an inseparable set of interactions between one actor and the system. A micro-process is always embedded within a process or a core process.

Micro-process (use case) is an atomic process. It means that its execution leaves the system in a stable organizational state. It involves one actor only.

Core process and process are long-running processes. Their execution involves several actors, the coordination of which is ensure through a workflow mechanism (push / pull of users tasks)

Even though this classification could be enriched differently from one company to another, it should be the basis to enforce. Other types could be added such as: value-chain, functional, calculation, IT, internal versus those related to business regulations, etc.

Page 139: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

139 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Processes Knowledge

PR-KN-01 Enterprise Process Architecture

PR-KN-01-2. Transversal organization formulation (value chain)This is the highest description of the organization, most of the time it allows for describing strategic goals related to the company's value chain. Be cautious to not confuse this with the “company's raison d'être” which is defined in the Enterprise Data Architecture part:

- “company's raison d'être” is related to the business strategy formulation. It means rules defining the core business without any organizational issues (see BR-KN-01-2)

- company's value chain describes what are the goals of the company applied over its core business: customer effectiveness, cost reduction, HR incentives, stakeholders communication, etc.

The transversal organizational formulation relies on the core processes description. These processes handle organization rules that should be managed as described in the Enterprise Rules Architecture (see BR-KN-01-3 Organizational strategy formulation)

Page 140: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

140 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Processes Knowledge

PR-KN-01 Enterprise Process Architecture

PR-KN-01-1. Business line organization formulationThis is an intermediate description of the organization. It allows for describing internal goals for every company's business lineThe business line organization formulation relies on the processes description. These processes handle organizational rules that should be managed as described in the Enterprise Data Architecture (see BR-KN-01-3 Organizational strategy formulation).

Most of the time, a process handles one main business object, the description of which is available through its lifecycle (DT-KN-03-1 Business Objects' lifecycles). To obtain a first conceptual version of the process, it is possible to upside down the business object's lifecycle. The outcome is a set of conceptual steps describing how the business object must be handled over time, regardless of any organizational choice.

With the UML notation, the state machine which describes the business object's lifecycle is translated into an activity diagram with one swimlane. This swimlane represents a conceptual organization, it means an organization which would have one actor only.

In doing so, it is easier to measure the discrepancies between the core business (defining by business objects and their lifecycles = “company's raison d'être”) and the organization establishes with the business line organization formulation.

Page 141: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

141 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Processes Knowledge

PR-KN-01 Enterprise Process Architecture

PR-KN-01-4. Activity formulationThis is the more detailed description of the organization. It allows for describing concrete interactions between one actor and the system through uses cases (micro-processes).

The activity formulation relies on the micro-processes description (a.k.a. uses cases). Every use case orchestrates a set of activities, it means an action between one actor and the system. These micro-processes must be aligned with business objects described in the Enterprise Data Architecture (see DT-KN-01-5 Unified Data Architecture). Indeed, every activity must interact with one and only one business object. Examples of activities within an insurance company: cancel an Accident, search for a Contract, select a Client, visualize the insured Guarantees, etc. It means that activities are streamlined and don't admit data duplications.

The sequencing of a set of activities describes a micro-process or use case. Organization rules applied at this level are related to the piloting of the interaction between one actor and the system. They are not strategic as ones described at the level of the transversal and business line formulations. They are more operational

Page 142: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

142 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Processes Knowledge

PR-KN-02 Process modeling

PR-KN-02-1. Processes notationRather than a pure informal description of processes, using a well-recognized notation brings many benefits: encourages knowledge sharing, improve auditability, allows for automatically translating processes into runnable IT components

A unified and recognized notation should be used to define processes as described in PR-KN-01-1 Processes classification. Core processes and processes can be defined with help from a process flow diagram (activity diagram in UML or with other DSL such as BPMN - Business Process Modeling Notation). Micro-processes (uses cases) are better designed with help from state machine, as each use case represents a set of interactions between one actor and the system; indeed only one “swimlane” is required as only one actor is involved in the process. A “swimlane” is a visual element used in process design to show the behavior of one actor.Last but not least, as processes handle business objects, it is more relevant to use a notation compliant with one used for the Enterprise Data Architecture. Most of the time, only the UML notation can support this unified view between Enterprise Processes Architecture and Enterprise Data Architecture

In any case, this notation should be meaningful for all IS Stakeholders (not only IT specialists) and should be either IT runnable directly or easily translatable into runnable IT components

Page 143: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

143 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Processes Knowledge

PR-KN-02 Process modeling

PR-KN-02-2. Processes namingEvery process must have a unique naming allowing its identification in an easy way.

A unified processes naming should be enforced to support the knowledge sharing. It should follow the processes classification as defined in PR-KN-01-1 by enforcing code such as: COR (core processes), PRO (processes) and USE (micro-processes also called uses cases). Moreover, this naming should not include any specific code stemming from projects as reuse must be encouraged.

Page 144: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

144 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Processes Knowledge

PR-KN-02 Process modeling

PR-KN-02-3. Organization and security rules applied to processes definitionsProcesses execute a lot of rules to deliver their added-values. These rules should be authored with help from the grammar and naming stemming from the Enterprise Rules Architecture

Beyond rules, all data defining organization behaviors and security policies over your processes are unified and managed through the master data referential (MDM) so as to benefit from all business data governance features (see also data assessment)

Page 145: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

145 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Processes Knowledge

PR-KN-03 Ability to act

PR-KN-03-1. FundingA budget is established to support the Enterprise Process Architecture.

The decision to raise a funding is dependent on the ROI. Most of the time, companies are more willing to spend money on describing their core processes rather than their data and rules used across the whole system. It means that the knowledge of processes still remains rough as data and rules handled by processes are not sufficiently described. Therefore, the budget raised for the Enterprise Process Architecture should be aligned with budgets dedicated to the Enterprise Data Architecture and Enterprise Rules Architecture. It means that executive managers should have a better understanding of the benefits targeted through the Enterprise Data Architecture and Enterprise Rules Architecture.

When budget applied to Enterprise Process Architecture is not aligned with rules and data management, it means that the processes knowledge is rough and not aligned with the reality of IT systems that run data and rules.

Page 146: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

146 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Processes Knowledge

PR-KN-03 Ability to act

PR-KN-03-2. Replacement valueAbility of your organization to (re)author processes from scratch (blank page).

The replacement value must be gauged regardless of any financial issue. You must estimate it without any limitation as this is a theoretical assessment only. However when answering this question you have to provide detailed information explaining your score. When processes documentations are up-to-date and teams have a good command of processes modeling procedures then your score is high. Conversely, when it is difficult to gather the knowledge of processes because of poor documentations and/or lack of specialists in processes authoring, then your score should be decreased.

Page 147: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

147 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering Processes governance features

Page 148: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

148 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Check-list

Mastering Processes governance features

Page 149: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

149 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

PR-GV1-01 Processes governance

• Processes governance features are the business functions used by IS Stakeholders to manage processes. This is a list of business features brought by the BPM (for core process and process) and the BRMS (for micro-process also called use case), such as authoring, version management, auditability, etc.

• The way of these functions are used through the processes execution and across organizations are not measured here. Indeed, the IS Rating Tool copes with the IS Intrinsic value which means the list of processes governance features, not the quality or maturity levels of organizations to use them

• Amongst these features, a detailed assessment is required to measure the processes lifecycles and version management function

• A distinction between core-process, process and micro-process must be ensured, following the processes classification already established in PR-KN-01-1

Mastering Processes governance features

Page 150: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

150 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

PR-GV-01-1. Unified processes governance applied to core processes and processesThis question deals with core processes and processes only. Micro-processes are managed through other governance functions (see PR-GV-01-2). In this question, the generic term “process” is used to describe both core processes and processes.

Reminder: processes are classified following these three types: core process, process (limited to the scope of one business line) and micro-process (use case). See PR-KN-01-1 Processes classification

All core processes (over business lines) and processes (limited to the scope of one business line) are managed through unified and shared governance functions such as: authoring, version management, traceability and monitoring of processes, process history, process simulation and test, rights management, etc.From an IT point of view, these business governance functions are brought by a BPM tool (Business Process Management) also called workflow engine

PR-GV1-01 Processes governance

Mastering Processes governance features

Page 151: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

151 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

PR-GV-01-2. Unified processes governance applied to micro-processesThis question deals with micro-processes (uses cases) only. The governance functions applied to other types of processes (core process and process) are described in PR-GV-01-1

Reminder: processes are classified following these three types: core process, process (limited to the scope of one business line) and micro-process (use case). See PR-KN-01-1 Processes classification

All micro-processes should benefit from a unified and shared governance approach: authoring, version management, traceability and monitoring of micro-processes, micro-process history, micro-process simulation and test, rights management, etc.However, using a process management tool such as a BPM to govern micro-processes is not always relevant. Indeed, every micro-process (or use case) describes an inseparable set of interaction between one actor an the system. Therefore pushing tasks between actors (tasks list) is not needed. Furthermore, governing these micro-processes through a formal representation (flows diagram) would be too rigid and complex due to their fine-grained dynamic and their variability.

BPM is more relevant when processes are stable enough to be modeled in a formal notation and then executed. This is the case when modeling core processes and processes. But to govern the fine-grained level of processes, in other words, micro-processes (uses cases), it is more efficient to author rules (BRMS). Even if the design relies on a state machine (see PR-KN-02-1 Processes notation) the governance is carried out with the rules management rather than a BPM. In doing so, it is easier to manage variants of uses cases depending on uses contexts, thus the formal representation brought by the BPM is not required.

Your company should have guidelines to conduct the choice of using BRMS rather than BPM to govern uses cases

PR-GV1-01 Processes governance

Mastering Processes governance features

Page 152: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

152 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

PR-GV-01-3. Processes lifecycles and version managementAmongst processes governance functions, the lifecycle and version management is a significant feature requiring a specific assessment

The lifecycle and version management of processes is vitally important to enforce a real processes governance. Two types of features are needed:- It should be possible to create versions of processes and compare versions,- it should be possible to manage stages of processes from their inceptions to their retirements.

It means that at any time, it should be possible to reverse processes changes by benefiting from a full version history of processes authoring.

Depending on the type of process, either BPM (core process and process) or BRMS (micro-process) is used to provide unified governance functions (see also PR-GV-01-1 and PR-GV-01-2).

Processes used data which should benefit from the version management brought by the MDM applied to ref/master data structures and values (see Data Assessment part). It means that every process should have a context identifier defining in which version of data its execution is issued. In doing so, when the BPM/BRMS looks up the MDM to retrieve ref/master data values, it provides the context in which this request is issued, i.e. the version.

Important note: the value linking with the rules version management is not valuable as a loose-coupling IT integration should be enforced between the BPM and the BRMS. It means that the BPM knows the version/context (data) in which it executes processes, but not the rules versions that the BRMS must enforce. The BRMS is autonomous to compute the right version of set of rules to apply depending on contexts and versions information stemming from the BPM (see also PR-IT-02 BPM with BRMS)

PR-GV1-01 Processes governance

Mastering Processes governance features

Page 153: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

153 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

PR-GV-01-4. Processes authoringProcesses authoring should be possible for all IS Stakeholders, not for IT specialists only

A unified processes authoring function should be available for all IS Stakeholders and managed through a secured authentication. It means that authoring processes should not be dedicated to IT specialists only. According to the company's culture, key business users can be involved in authoring processes directly or prefer to delegate this work to IT teams. In any case, processes should rely on a notation ensuring a full business understanding and formulation of processes (PR-KN-02-1 Processes notation).

PR-GV1-01 Processes governance

Mastering Processes governance features

Page 154: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

154 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

PR-GV-02-1. Processes Asset measurementKey indicators should be defined to follow processes assets over time.

A lot of key indicators could be defined to follow processes assets. You should distinguish key indicators applied to processes executions and those applied to processes definitions. These indicators should be useful to all IS Stakeholders, not only within IT department. Depending on the company's culture, key indicators related to processes assets can enrich an IT scorecard and/or contribute to establish a more global scorecard at the whole scale of the system. Defining key indicators is not easy to achieve as it requires a good level of maturity in the management of systems. However the accuracy of key indicators are less important than their variations over time. It means that you should be interested in trends rather than occasional performances only.Example of key indicators:- number of processes in failure during a period of time,- number of processes related to a business regulation,- number of processes modifications within a period of time,- number of processes executions within a period of time,- processes not used within a period of time,- processes used the greatest number of time during a period,- ratio of core processes compared to processes per business unit within the company,- all measures brought by the IS Rating Tool,- etc.

PR-GV-02 Managing Processes as a real Asset

Mastering Processes governance features

Page 155: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

155 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

PR-GV-02-2. Processes Asset overseeingBeyond key indicators applied to processes assets (see PR-GV-02-1), rules overseeing some key processes executions should be also established.

When processes are managed through a processes repository such as a BPM and/or BRMS, it becomes easier to add alerts to oversee them. These alerts can check the outcomes of processes executions but also can react depending on thresholds applied to key performance indicators (see PR-GV-02-1). Alerts are defined as rules and benefit from the rules management system. For example:- outcomes of a process must be conformed to min/max values constraints. It means that all post-conditions applied to processes could be considered as rules overseeing,- maximum number of a process execution within a period of time,- etc.

To implement these rules as real IS Assets (open to the business, not with an approach of hard-coding), it is recommended to use a BRMS (Business Rules Management System) and/or a CEP (Complex Event Processing) (see also Rules Assessment part of this IS Rating Tool).

PR-GV-02 Managing Processes as a real Asset

Mastering Processes governance features

Page 156: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

156 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

PR-GV-02-3. Processes Asset trackingAll processes executions should be tracked in order to enforce IS traceability

When a processes repository is enforced by a BPM and/or BRMS, then a unified business audit trail should be available directly. This audit trail is used to keep track all processes executions. Query functions allow all IS Stakeholders for seeking and consulting the audit trail, depending on their permissions.

PR-GV-02 Managing Processes as a real Asset

Mastering Processes governance features

Page 157: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

157 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Mastering IT approach to manage processes

Page 158: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

158 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Check-list

Mastering IT approach to manage processes

Page 159: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

159 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

PR-IT-01-1. Processes engine applied to existing systemsModeling and implementation procedures should exist to enforce a progressive extracting of existing hard-coded core processes and processes for the benefit of the processes engine (BPM). In doing so, the readability, agility and ability to audit the system can be improved. When combining this approach with an efficient Enterprise Process Architecture (see PR-KN), your company can attain a better Business-IT alignment. However, this restructuring of processes is valuable only if data and rules are also extracted from hard-coded systems. The process value depends on the quality of rules and data that are used. It means that the marks applied to this question takes into account the linking value of the chain composed of MDM+BRMS+BPMNote: extracting micro-process (use case) from hard-coded software entails an in-depth overhauling of existing system, which is targeted with the next question (PR-IT-01-2)

PR-IT-01 Processes engine versus hard-coding

Mastering IT approach to manage processes

Page 160: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

160 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

PR-IT-01-2. Processes engine applied to new development

Every new development and software package customization should benefit from the BPM (core process, process) and BRMS (micro-process) in order to improve transparency, agility and ability to audit systems. A strategic long-term plan should be defined to endorse the BPM and BRMS use at a large scale of the system.

Modeling and implementation procedures should exist to support the BPM (core process, process) and BRMS (micro-process) use rather than an approach of hard-coding only. It means that the number of processes grows when developing and acquiring new systems, including software packages such as ERP. Indeed, customizations of software packages should be put to the BPM and BRMS to ensure a better processes traceability and a better way of managing software packages upgrades.As already stated in PR-IT-01-1, this restructuring of processes is valuable only if data and rules are not implemented with an approach of hard-coding. The process value depends on the quality of rules and data that are used. It means that the marks applied to this question takes into account the linking value of the chain composed of MDM+BRMS+BPM

PR-IT-01 Processes engine versus hard-coding

Mastering IT approach to manage processes

Page 161: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

161 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

PR-IT-01-3. Level of hard-coded processesRegardless of your mark about the BPM and BRMS applied to existing systems and new developments (PR-IT-01-1, 2), you should be able to measure the level of hard-coding of processes within the system.

Reminder: BPM is used to govern and run core process and process. BRMS is more relevant to govern and run micro-process (also called use case). See the processes classification in PR-KN-01.

You should be able to estimate the level of hard-coded processes (core process, process, micro-process) within the system. Without any processes repository (BPM, BRMS), your mark is bad. When using a BPM (core process, process) and BRMS (micro-process), your mark depends on how it is deploy within the system.

PR-IT-01 Processes engine versus hard-coding

Mastering IT approach to manage processes

Page 162: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

162 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

PR-IT-02-1. BPM with BRMS (loose-coupling)Rules used to drive the process flows should be authored and governed through the Business Rules Management System (BRMS), and then should enforce a better auditability and traceability of processes executions.

The value of the BPM is dependent on the value of the BRMS: linking value BPM+BRMS.

From an IT point of view, the integration of the BPM with BRMS should be enforced in a loose-coupling architecture.

Two level of integration should be distinguished:• when using a BPM, the formal representation of the process flow must

be able to launch rules managed by the BRMS in order to compute the flow execution: which step is the right one depending on the current context of execution? It is important to enforce a loose-coupling integration, therefore the BPM shouldn't be aware of rules really executed by the BRMS. It sends a data flow associated with its context execution (version, context) to the BRMS, and receives a result from the BRMS allowing to decide the next step of the process execution. This loose-coupling IT integration allows for modifying the set of rules used to compute the process flow depending on version, context (head-office, subsidiary, country, legislation, etc.) without modifying the formal process flow model carried out within the BPM,

• when using the BRMS directly to carry out a process, this means using the IT integration principles already defined in the Enterprise Rules Architecture. This approach is advised when carrying out micro-processes, in other words the more detailed level of processes (see PR-KN-01-1 Processes classification).

PR-IT-02 Processes execution and test

Mastering IT approach to manage processes

Page 163: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

163 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

PR-IT-02-2. BPM with MDMData used to conduct the processes executions shouldn't be hard-coded in opaque databases. Conversely, it is recommended to use the Master Data Management (MDM) repository to author and govern this data.

The value of the BPM is dependent on the value of the MDM: linking value BPM+MDM.

The process execution shouldn't need to retrieve directly data from the MDM directly. Indeed, this execution interacts with rules (BRMS), and these rules interact with data stemming from the MDM. However, if the need of a direct access to reference and master data is raised, then it must be carry out through the MDM (see Enterprise Data Architecture).Beyond this first mechanism, many reference and master data are used to configure the processes flows, such as the definition of contexts execution and versions. As already stated in the previous question (see PR-IT-01-1), rules executed to compute the flow execution can be different depending on the contexts execution (head-office, subsidiary, country, etc.) and versions. This configuration should be authored and governed with help from the MDM, in order to avoid a hard-coded approach, which is harmful to auditability, traceability and agility of processes

PR-IT-02 Processes execution and test

Mastering IT approach to manage processes

Page 164: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

164 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

PR-IT-02-3. Test processes against requirementsWhen using a BPM, it is valuable and cost-effective to establish tests procedures of processes

When using a BPM, processes are both readable by business users and IT runnable directly. It avoids heavy waterfall lifecycle development where processes are testable after having implemented them only. Even though all tests cases are not runnable before some IT integration and development, the ability to test processes when using a BPM is significant improved.Furthermore, it is highly recommended to set up non regression user acceptance tests of processes.Note: regarding micro-processes, when they are implemented through BRMS as recommended, this means using the BRMS procedures tests (see BR-IT-02-3 Test rules against requirements, Data Assessment part)

PR-IT-02 Processes execution and test

Mastering IT approach to manage processes

Page 165: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

165 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

Any remarks and suggestions?Do not hesitate to contact the author

[email protected]

And join us in our Linked grouphttp://www.linkedin.com/groups?gid=1879652&trk=hb_side_g

Page 166: Creative Commons Sustainable IT Architecture IS Rating Tool Course 2010, June Beta Version 1 1 / 166 Sustainable IT Architecture

166 / 166

Sustainable IT Architecture

www.sustainableitarchitecture.com

Su

sta

ina

ble

IT

Arc

hit

ec

ture

– I

S R

ati

ng

To

ol

Co

urs

e –

Be

ta V

1

You can use this document for your own needs and publications under the condition to quote the source “Sustainable IT Architecture”

This document is protected by a Creative Commons (see opposite figure)

You can reuse this material

This material is freely available onhttp://www.sustainableitarchitecture.com