prism docs made public

Upload: newsdunlap

Post on 03-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/28/2019 Prism Docs Made Public

    1/47

    Reference Architecture Track

    Terry Hagle, Office of DoD CIO/AS&I703-607-0235

    [email protected]

    2010 EA Conference

  • 7/28/2019 Prism Docs Made Public

    2/47

    Agenda

    Enterprise Reference Architecture Cell (ERAC) Overview

    Terry Hagle

    Reference Architecture (RA) Steve Ring

    Principles

    Technical Positions

    Patterns

    Enterprise-wide Access to Network and Collaboration

    Services (EANCS) RA Norm Minekime

    DoD Information Enterprise Architecture (IEA) Al Mazyck

    Purpose/Background Content

    Application of the DoD IEA

    Example EANCS RA

    Compliance with the DoD IEA

    Example EANCS RA 2

  • 7/28/2019 Prism Docs Made Public

    3/47

    ERAC OVERVIEW

    3

  • 7/28/2019 Prism Docs Made Public

    4/47

    Enterprise Reference Architecture Cell

    (ERAC)

    Components have expressed the need for more detailed guidance

    Enterprise patterns and processes

    Army CIO/G-6 Comment on DoD IEA v1.1: establish a separate DoD IEA

    Reference Architecture with sufficient granularity to enable interoperability

    across the DOD IE/GIG. To foster such interoperability, these reference

    architectures would need to include processes, process patterns and service

    patterns, as well as service interfaces and metrics. Purpose:

    Develop the reference architecture (artifacts)

    Assist IT Decision Makers/Components/Programs/Solution Architects as

    directed

    Work as an advisor to the functional architect

    Assist in the proper application of the DoD IEA, DoDAF and DARS Conduct architecture assessments as directed

    Assess architecture compliance w/DoD IEA

    Event Driven - Net Centric Reviews (ED-NCR)

    JCIDS/DAS Milestone Reviews

    Management:

    ERAC funded by and resources managed by EA&S Taskings and guidance from the EGB/ASRG

    4

  • 7/28/2019 Prism Docs Made Public

    5/47

    Enterprise Reference Architecture

    Mission Statement

    The intent of Reference Architecture is to:

    Normalize the institutional understanding of capabilities at

    the enterprise level and provide a common set ofprinciples, patterns, and technical positions for use

    within the DoD to guide development of Enterprise,

    Segment, or Solution architectures.

    Development of a Reference Architecture is aprocess that results in the required content

    5

  • 7/28/2019 Prism Docs Made Public

    6/47

    Reference Architecture

    Description

    Five components of a Reference Architecture:

    Strategic Purpose Describes the context, scope, goals, purpose, and intended

    use of the RA Principles

    High-level statements about the IT environment that tie backto business goals

    Incorporate values, organizational culture, and business goals Drive Technical Positions (and Patterns)

    Technical Positions Statements that provide technical guidance (standards,

    technologies, etc) for use with each major architectural

    component or service Patterns/Templates Diagrams that address the distribution of systems functions

    and how they relate topologically Models that show relationships between components specified

    by the Technical Positions Vocabulary

    Reference Architecture Description6

  • 7/28/2019 Prism Docs Made Public

    7/47

    ERAC Process for Developing RA

    The ERAC leverages the six step architecture

    development process of the DoDAF

    The process steps are: Clarify Purpose (Architects & Architecture Owner)

    Clarify Scope (Architects & Architecture Owner)

    Identify key questions (Architects & Architecture Owner)

    Determine required data/information (architects)

    Collect and Organize data/information (architects collect

    & organize, SMEs provide)

    Analyze architecture data/information (architects)

    Document the results (architects)

    Use or apply results (Architecture Owner) 7

  • 7/28/2019 Prism Docs Made Public

    8/47

    Proposed RA Product Structure

    DoDAF Models to Be Developed:AV-1, AV-2, OV-1,OV-5a, OV-6a/c, and StdV-1

    Overview and Summary Information (AV-1) Contract between Architecture Owner and Architect Guides development of the RA Executive level presentation of RA DM2: Vocabulary and Semantics

    Reference Architecture Document Introduction (Content from AV-1) Context and Relationships (Resulting Principles) Term Definitions Architectural Patterns

    Generic Standards and profiles policy Use Case/Use Case Analysiso Implementation Specificso Specific Technical Standards and Profileso Deployment and Performance Considerations

    8

  • 7/28/2019 Prism Docs Made Public

    9/47

    http://cio-nii.defense.gov/sites/diea/

    DoD IEA Website

    9

  • 7/28/2019 Prism Docs Made Public

    10/47

    REFERENCEARCHITECTURE

    10

  • 7/28/2019 Prism Docs Made Public

    11/47

    Purpose

    DoD CIO intends to use Reference Architecture as a means to provide

    Department-wide Guidance for architectures and solutions

    Reference Architecture, as currently used within DoD

    Is defined at different levels of detail and abstraction (from specific to

    generalized) with Has little agreement and much confusion

    Has multiple meanings relative to the context of the environment

    To support the DoD CIO intent, a common definition of Reference Architecture

    is needed that

    Provides policy and direction to the DoD enterprise (commands, services,agencies) that guides and constrains architectures and solutions

    Can be equally applied across the wide spectrum of DoD environments

    IT/ Business and Service (SOA) domains

    Warfighter domains

    11

  • 7/28/2019 Prism Docs Made Public

    12/47

    Objectives of a Reference

    Architecture

    To direct, guide and constrain

    architectures and solutions within a

    domain

    To serve as a reference foundation of

    concepts, components and their

    relationships

    May be used forcomparison andalignment purposes

    Reference ArchitectureReference Architecture

    Stakehold

    er

    Requireme

    nts

    Guides and

    constrains thedevelopment of

    ArchitecturesArchitectures

    andand

    SolutionsSolutions

    Diagram derived from: The Importance of Reference Architecture, Architecture and Change (A&C), 2007,http://www.architectureandchange.com/2007/12/29/the-importance-of-reference-architecture 12

    http://www.architectureandchange.com/2007/12/29/the-importance-of-reference-architecture/http://www.architectureandchange.com/2007/12/29/the-importance-of-reference-architecture/
  • 7/28/2019 Prism Docs Made Public

    13/47

    Reference Architecture

    is

    an authoritative source of unambiguous

    architecture information within a domain

    environment

    that guides and constrains multiple architectures

    and solutions

    by providing patterns of abstract architectural

    elements, based on a strategic purpose, principles,

    technical positions, together with a common

    vocabulary. 13

  • 7/28/2019 Prism Docs Made Public

    14/47

    DomainDomain

    Building a Reference Architecture

    (The Five Components)

    Reference Architecture Components

    PrinciplesPrinciples

    Patterns Vocabulary

    TechnicalTechnical

    PositionsPositions

    Strategic

    Purpose

    Architecture/Architecture/

    SolutionSolution

    A

    Guides ConstrainsAuthoritativeSource

    Architecture/Architecture/

    SolutionSolution

    B

    14

  • 7/28/2019 Prism Docs Made Public

    15/47

    DoDAF Models

    Utilized in RAAV-1 Overview & Summary Information

    CV-1: Vision overall strategic concept and high level scopeOV-1 High Level Operational Concept Graphic what solution architectures areintended to do and how they are supposed to do it

    OV-6a Operational Rules ModelSvcV-10a Services Rules Model

    SV-10a Systems Rules ModelOV-4 Organizational Relationships Chart architecturalstakeholders

    StdV-1Standards Profile

    Operational PatternsOV-2 Operational Resource FlowsOV-5 {a,b}Activity diagrams

    Service Patterns

    SvcV-1Service InterfacesSvcV-2 Service Resource FlowsSvcV-4 Service FunctionalitySvcV-10b Service State Transitions

    System PatternsSV-1 System InterfacesSV-2 System Resource FlowsSV-4 System FunctionalitySV-10b System State Transitions

    Event-Based Scenario Patterns of DynamicBehaviorOV-6c Event-Trace DescriptionSvcV-10c Services Event-Trace DescriptionSV-10c Systems Event-Trace Description

    AV-2 Integrated Dictionary- definitions of terms used throughout solution architectures

    Strategic Purpose

    Technical

    Positions

    PrinciplesPrinciples

    Patterns

    15

  • 7/28/2019 Prism Docs Made Public

    16/47

    Benefits

    Authoritative source of architecture information within a

    problem space that guides and constrains architectures and

    solutions

    Simplifies and standardizes solutions for complex problems byproviding common repeatable patterns

    Provides early, focused guidance at a sufficient level of

    abstraction and detail before concrete implementation

    decisions are known

    A tool to ensure interoperable architectures and solutions

    based on common guidance

    16

  • 7/28/2019 Prism Docs Made Public

    17/47

    First Usage:EANCS Reference Architecture

    Supports development of

    EANCS implementation

    guidance and solution

    architectures focuses on that portion of thecharacteristic dealing with global

    authentication, authorization and

    access control to globally

    accessible resources. It is intended

    to guide the development ofsolution architectures and support

    the development of specific

    implementation guidance for

    achieving this capability.

    Department of DefenseEnterprise-wide Access to Network and

    Collaboration Services (EANCS)

    Reference Architecture

    Version 3.0

    December 2009

    Prepared by the Office of the DoD CIO 17

  • 7/28/2019 Prism Docs Made Public

    18/47

    Enterprise-wide Access to

    Networks and CollaborationServices (EANCS) Reference

    Architecture (RA)

    18

  • 7/28/2019 Prism Docs Made Public

    19/47

    EANCS RABackground

    Operational Requirements GIG 2.0 Operational Reference Architecture (ORA) describes requirement for

    Global Authentication, Access Control, and Directory Services

    Vice Chairman Joint Chiefs of Staff (VCJCS) directed ability to go anywhere [in

    DoD], login, and be productive

    EANCS RA to address these requirements by:

    Providing basis for implementation guidance/roadmap for Enterprise Services

    Security Foundation (ESSF)

    Describing Authentication and Authorization and Access Control to networks

    (NIPRNet and SIPRNet) and designated Enterprise Services (e.g., Enterprise

    Directory Service, Enterprise e-mail, DCO, Intelink)

    Supporting implementation of an initial authentication and access control

    capability in 6 to 9 months for Enterprise User Initiative

    Leveraging:

    Common credentials for authentication (PKI/CAC for NIPR, PKI/hard-token for SIPR)

    Authoritative identity attributes for authorization and access control (Attribute-BasedAccess Control)

    19

  • 7/28/2019 Prism Docs Made Public

    20/47

    EANCS RAPurpose and Scope

    Purpose

    Gain Department-wide consensus on requirements for authenticating users and

    authorizing user access to DoD Information Enterprise (IE) and, more

    specifically, to representative collaborative services, to include portals and

    enterprise e-mail

    Describe architectural patterns to guide, standardize, and enable the most rapid

    and cost-effective implementations of an authentication and authorization

    capability in support of secure information sharing across DoD

    Scope

    To

    Be Architectural Description Document requirements, activities, and information for authentication and

    authorization and access control

    Document standard/common authentication and authorization and access

    control processes

    20

  • 7/28/2019 Prism Docs Made Public

    21/47

    EANCS RADevelopment Approach

    Architecture Owner organized Working Group (WG) Composed of SMEs from ASD (NII)/CIO, Military Services, Joint Staff/J6,

    Defense Manpower Data Center (DMDC), Defense Information Systems Agency

    (DISA), and National Security Agency (NSA)

    Team members represented their stakeholder organizations

    Architecture Owner worked with ERAC to establish RA purpose,perspective, and scope

    WG developed Concept of Operations (CONOPS) for context

    WG provided necessary architecture data/information

    Existing documents served as knowledge baseline SME knowledge and experience provided rest of information

    ERAC organized collected data into DoDAF-compliant RA description

    WG approved RA content (Dec 2009)

    Submitted to Architecture and Standards Review Group (ASRG) for

    approval and federation into DoD EA 21

  • 7/28/2019 Prism Docs Made Public

    22/47

    EANCS RASources

    FederalFederal

    ICAMICAM

    ESSFESSF

    GIG 2.0GIG 2.0

    ORAORA

    EANCSEANCS

    RARA

    EANCSEANCS

    CONOPSCONOPS

    USEUSE

    CASESCASES

    ESMESM

    IMPIMP

    PLANPLANIMPIMP

    PLANPLANIMPIMP

    PLANPLAN

    Process &

    Function

    Operational

    Requirements

    - Patterns

    - Rules

    - Technical

    Positions

    - Operational

    Requirements

    - Implementation

    Considerations

    Provide

    Analysis

    - NIPRnet- SIPRnet

    - Deployed User- Unanticipated

    User- Maritime User- VPN- ???

    Service

    Descriptions

    - 6 to 9 months

    - Longer Period

    - Impacts

    - Metrics

    - Guidance

    What To Do How To Do It 22

    LegendESSF Enterprise Security

    Services FrameworkESM Enterprise Security

    ManagementICAM Identity, Credential, and

    Access ManagementORA -Operational Reference

    Architecture

  • 7/28/2019 Prism Docs Made Public

    23/47

    EANCS RA

    Architecture Artifacts

    23

    OV-1 (Concept

    Consumer & Provider)

    OV-5a (Activity

    Decomposition)

    OV-6a (Operational

    Rules Model)

    OV-6c (Event-Trace

    Description)

    EANCSRADocument

    Department of DefenseEnterprise-wide Access to Network and

    Collaboration Services (EANCS)

    Reference Architecture

    Version 3.0

    December2009

    Prepared by the Officeof theDoD CIO

    GROUP TYPE NAME DESCRIPTIO N

    OMB Policy M-04-04 Thisguidance requires agencies to reviewnew

    andexistingelectronictransactionstoensure

    thatauthentication processesprovide the

    appropriatelevelof assurance.Itestablishesanddescribesfour levelsof identityassurance for

    electronic transactionsrequiring authentication.

    Assurancelevelsalsoprovide abasisfor

    assessingCredential Service Providers(CSPs)

    onb ehalf of Federal agencies. This documentwill assist agenciesin determiningtheir e-

    government needs. Agencybusiness-process

    ownersbearthe primaryresponsibilityto

    identify assurancelevels andstrategies for

    providing them.This responsibilityextends toelectronic authenticationsystems.

    OMB Policy M-05-05 Thismemo requires theuse of ashared serviceprovider tomitigate therisk of commercial

    managedservices for publickey infrastructure

    (PKI) and electronicsignatures.

    OMB Policy M-05-24 Thismemorandum providesimplementing

    instructionsfor HSPD-12and FIPS-201.

    OMB Policy M-06-18 Thismemorandum providesupda teddirection

    fortheacquisitionof productsand servicesfor

    theimplementation of HomelandSecurity

    Presidential Directive-12 (HSPD-12) Policy for

    aCommon Identification Standardfor Federal

    EmployeesandContractorsandalsoprovidesstatusof implementation efforts.

    PresidentialDirective

    Policy HSPD-12 HSPD-12calls fora mandatory,gov ernment-widestandardforsecureand reliableformsof

    ID issued bythe federalgo vernment to its

    employeesand employeesof federal contractors

    foraccess to federally-controlledfacilities and

    networks.

    NIST Guidance SP80 0-87 Thisdocument provides theorganizational codes

    forfederal agencies to establishthe FederalAgency Smart CredentialNumber (FASC-N)

    thatis requiredto beincluded intheFIPS 201

    CardHolder UniqueIdentifier.SP 800-87 isa

    companiondocument toFIPS 201.

    StdV-1 (Standards

    Profile)Provides Department-

    level guidance for

    implementation of

    common access

    control elements

    ArchitectureFederation

    Enterprise-wide Access toNetworkand Collaboration Services

    ReferenceArchitecture

    Overviewand SummaryInformation (AV-1)

    1Architecture Product Identification

    1.1 Name: Enterprise-wide Access toNetwork andCollaborat ion Services (EANCS)

    1.2 Lead Organization: Department of Defense DeputyChiefInformationOfficer. The

    Enterprise Services ReviewGroup(ESRG), as the architectureowner, isresponsible for

    architecturecontentandwill provide overall coordination to ensure appropriate

    stakeholders and subject-matterexperts are available; theEnterpriseReference

    ArchitectureCell (ERAC),with oversight fromtheArchitectureandStandardsReview

    Group( ASRG), will support thedevelopment of appropriate architecture artifacts.

    1.3 Approval Authority: DoDCIOEnterpriseGuidanceBoard (EGB)

    2Purpose and Perspective

    2.1 Purpose. A Reference Architecture (RA) abstracts and normalizesthe institutional

    understandingofcapabilitiesat theenterpriselevel, andprovidesa common setof

    principles, technical positions, andpatterns forusewithin theDoD to guide development

    of Enterprise, Segment, or Solution architectures.

    AV-1 (Overview and

    Summary)

    Strategic

    PurposePrinciples

    Patterns Technical

    Positions

    AV-2 (Integrated

    Dictionary)Vocabulary

  • 7/28/2019 Prism Docs Made Public

    24/47

    Compliance

    with DoD IEA

    Development of RA guided by

    Departments Net-centric vision to

    function as one unified DoD

    Enterprise, creating an informationadvantage for DoD, its people, and

    its mission partners, as described in

    DoD IEA

    Alignment with DoD IEA built-in

    during RA development IAW DoD

    IEA Appendix D Compliance with DoD IEA

    documented in IAW DoD IEA

    Appendix E

    24

  • 7/28/2019 Prism Docs Made Public

    25/47

    DoD Information EnterpriseArchitecture (IEA)

    25

  • 7/28/2019 Prism Docs Made Public

    26/47

    Purpose

    Unify the concepts embedded in the DoDs net-centric strategies into a common vision

    Drive common solutions and promote consistency

    Describe the integrated Defense Information

    Enterprise and the rules for information assets andresources that enable it

    Foster alignment of DoD architectures with the

    enterprise net-centric vision

    DoD Net-centric Vision

    To function as one unified DoD Enterprise, creating an information advantage

    for our people and mission partners by providing:A rich information sharing environment in which data and services are visible,

    accessible, understandable, and trusted across the enterprise.

    An available and protected network infrastructure (the GIG) that enables

    responsive information-centric operations using dynamic and interoperable

    communications and computing capabilities. 26

  • 7/28/2019 Prism Docs Made Public

    27/47

    Background

    Major Net-Centric Strategies

    DoD IEA v1.0 (Approved 11 April 2008)

    Established five priority areas for realizing net-centric goals

    Provided key principles, rules, and activities for priority areas

    Positioned as a tool to guide the net-centric transformation of the

    Information Enterprise (IE)

    DoD IEA v1.1 (Approved 27 May 2009)

    Describes a process for applying the DoD IEA content (App D)

    Describes compliance areas and criteria (App E)

    Provides activity mapping between the DoD IEA and the NCOW RM(App F)

    27

    Data (9 May 2003) Spectrum Management (3 Aug 2006)

    Services (4 May 2007) NetOps (February 2008)

    Information Assurance (26 April 2006) Communications/Transport

    Computing Infrastructure (September 2007) Information Sharing (4 May 2007)

  • 7/28/2019 Prism Docs Made Public

    28/47

    Audience &

    Intended Use

    IT Architects

    Align architecture with the DoD IEA

    Apply DoD IEA content (rules, activities, etc) to guide and

    constrain information enterprise solutions

    Managers of IT Programs (PM, PEO, etc.)

    Use the DoD IEA to support program design, development, and

    implementation

    Through solution architectures properly aligned with the DoD IEA

    IT Decision-Makers (CPM, IRB, CIO, etc.)

    Use the DoD IEA to support investment decisions

    Through enterprise and solution architectures properly aligned

    with the DoD IEA28

  • 7/28/2019 Prism Docs Made Public

    29/47

    Adds DoD EA Compliance Requirements (Appendix G)

    Compliance with DoD IEA

    Compliance with Capability and Component EAs

    Compliance with the DISR

    Compliance with Mandatory Core and Shared Designated DoD

    Enterprise Services (ES)

    Architecture Registration Requirements

    Provides a table of Mandatory Core and Shared Designated DoD

    ES

    Adds content to the Rules, App D, and App E to maintain

    consistency with App G

    DoD IEA v1.2

    (Draft)

    29

  • 7/28/2019 Prism Docs Made Public

    30/47

    Applying the DoD IEA

    (Appendix D)

    30

    Applying the DoD IEA

  • 7/28/2019 Prism Docs Made Public

    31/47

    Applying the DoD IEAEstablish Net Centric

    Context for EANCS RA

    31

    Consumer/

    User

    Perspective Identify DoD IE Perspective for

    Architecture

    Develop Net-Centric OperationalConcept

    Provider/

    Producer

    Perspective

    Understand Net-Centric Concepts

    Align with Net-Centric Vision

    Identify Net-Centric Assumptions

    Align with JCA Taxonomy

    Net-Centric Assumptions

    Portable identity credentials will be used to

    support user authentication

    Authorization attributes have already been

    defined, collected, regularly updated, andmade available through standard interfaces

    from reliable attribute sources

    Relevant DoD IEA Priority Areas

    Secured Availability (SA)

    Data and Services Deployment

    (DSD)

    Relevant JCAs

    Net-Centric/Enterprise

    Services/Core EnterpriseServices/User Access

    -

    OV-1 (Operational

    Concept Graphic)

    Applying the DoD IEA

  • 7/28/2019 Prism Docs Made Public

    32/47

    Applying the DoD IEAAlign EANCS RA

    Description with DoD IEA

    32

    Align Operational Activities and

    Processes with related DoD IEA

    Activities

    Incorporate applicable DoD

    IEA Principles

    Apply DoD IEA Rules

    Use net-centric

    terminology in

    architecture

    description

    Guiding Principles and Rules for RA

    Data assets, services, and applications on the GIG shall be visible, accessible, understandable, and

    trusted to authorized (including unanticipated) users. (DoD IEA, GP 03)

    Global missions and globally dispersed users require global network reach. Information Assurance

    mechanisms and processes must be designed, implemented, and operated so as to enable a seamless

    Defense Information Enterprise. (DoD IEA, SAP 03)

    Authoritative data assets, services, and applications shall be accessible to all authorized users in the

    Department of Defense, and accessible except where limited by law, policy, security classification, or

    operational necessity. (DoD IEA, DSDR 01)

    All DoD information services and applications must uniquely and persistently digitally identify and

    authenticate users and devices. These services, applications, and networks shall enforce authorizedaccess to information and other services or devices according to specified access control rules and

    quality of protection requirements for all individuals, organizations, COIs, automated services, and

    devices. (DoD IEA, SAR 07)

    OV-6c (Event-Trace

    Description)

    Oversee

    Authentication

    Initiatives

    Manage

    Authentication

    Processes

    A2.8.4

    A2.8.4.1

    Oversee

    Privilege Mgmt

    Initiatives

    A2.8.5

    Constrain

    DoD IEA Terminology

    DoD Net-Centric Vision

    DoD IE Perspective

    User/Consumer

    Producer/Provider

    Priority Areas

    Data and Services Deployment Secured Availability

  • 7/28/2019 Prism Docs Made Public

    33/47

    Compliance with the DoD IEA

    (Appendix E)

    Compliance is about conveying the application of DoD IEA

    Principles, Rules, and Activities

    Use the process described in App D and provided in App E, Tab

    A

    Questions that expose the compliance process and application

    of DoD IEA content are captured in the Enhanced ISP tool

    Assessment of compliance is based on: Completed Compliance table

    ISP and Architecture

    EISP Report

    33

  • 7/28/2019 Prism Docs Made Public

    34/47

    Compliance w/the DoD IEA

    34

    Tab A to Appendix E: DoD IEA Compliance Assessment TableB. Align Architecture Description with the DoD IEA

    B1. Use Net-

    Centric

    Terminology

    2.3.2.1.1 Use key terms

    contained in

    the DoD IEA

    Glossary

    across

    architecture

    descriptions.

    2.1.1.2.1 Describe

    applicable

    DoD IEA

    key terms.

    Describe in

    the:

    - AV-2

    Integrated

    Dictionary.

    - Related

    taxonomies.

    - ISP

    descriptions

    of the IE.

    Q12 - Identify key

    terminology from the

    DoD IEA used in your

    architecture/program

    documents.

    B2.

    Incorporate

    Applicable

    DoD IEA

    Principles

    2.3.2.2.1 - Identify

    applicable

    DoD IEA

    Principles and

    use in

    architecturedescriptions to

    place

    restrictions or

    limitations on

    operations.

    - Use

    applicable

    Principles

    2.1.1.2.2 Describe

    DoD IEA

    Principles.

    Describe in

    the:

    - OV-1

    Operational

    Concept.

    - OV-5Operational

    Activity

    Model.

    - Process

    Models

    Q13 - Which DoD IEA

    Principles apply to your

    Program?

    Q14 - How do the

    Principles apply to your

    Program?Q15 - How are the

    applicable Principles

    addressed in your

    architecture/program

    documents?

  • 7/28/2019 Prism Docs Made Public

    35/47

    Compliance with the DoD IEAEANCS RA Example

    35

    Incorporated description of key alignment aspects into RA

    document

    Added section describing RA alignment with JCAs and DoD IEA

    Priority Areas

    Added text descriptions of how process patterns align with DoD IEA

    activities into pattern discussions

    Filled out Tab A Compliance Matrix for RA

    Developed eISP excerpt for RA

    Used Guidance for DoD Information Enterprise Architecture in

    EISP 2.0 to identify and locate DoD IEA questions to be answered

    Incorporated information and text from RA document

    Generated compliance matrix using Xml2PDF 2007 application and

    ISP_DoD_IEA_Compliance_Table style sheet

  • 7/28/2019 Prism Docs Made Public

    36/47

    Initiatives and Projects

    Reference Architecture Description

    Comment Adjudication for ASRG Approval

    DoD IEA

    Comment Adjudication (v1.2) for DCIO Approval

    Work on future versions of the DoD IEA

    EANCS RA

    Delivered to owner; now in FAC/ASRG approval process

    Document Process for Developing RA

    Describe the process used to develop the EANCS RA

    FEA BRM Extension

    Extend DoD LOBs for the FEA BRM

    Recommended changes provided to OMB FEA for action 36

  • 7/28/2019 Prism Docs Made Public

    37/47

    DoD IEA Site:

    http://cio-nii.defense.gov/sites/diea/

    Questions?

    37

  • 7/28/2019 Prism Docs Made Public

    38/47

    BACKUP SLIDES

    38

  • 7/28/2019 Prism Docs Made Public

    39/47

    Information Enterprise

    Services and Infrastructure

    Architecture

    June 12, 2013

    IE Service/Infrastructure Context Diagram

    DRAFT

  • 7/28/2019 Prism Docs Made Public

    40/47

    Human Computer InteractionWarfighterWarfighter

    DefenseIntel

    DefenseIntel

    NetOpsNetOpsMissionPartnersMissionPartners

    BusinessBusinessBusinessBusiness

    IA InfrastructureDynamic Policy Management

    Assured Resource Allocation Mgmt of IA Assets and Mechanisms

    NetOps Infrastructure Enterprise Management

    Content Management Net Assurance

    Functional Capability Enterprise Services

    Mandatory Core & Shared Enterprise Services (ES)

    Computing & Communications Infrastructure

    Enterprise Services Security Foundation

    Information SharingMessaging Portal

    Collaboration Mediation

    Content Delivery

    Enterprise ManagementServices Management

    Resource Management

    Content Handling

    IE Service/Infrastructure Context Diagram

    40

    DiscoveryPeople/Service Discovery

    Content Discovery

    Metadata DiscoveryGeospatial Visualization

    Mission

    &Business

    IT

    Enterprise

    Services

    &

    Infrastructure

    Digital Identity PrivilegeManagement

    Credentialing Authentication Authorization& Access

    Auditing &

    Reporting

    Cryptography Configuration

    Management

    Computer

    Network Defense

    COOP/CIP

    Force

    Application

    Portfolio

    Building

    Partnerships

    Portfolio

    Battlespace

    Awareness

    Portfolio

    Protection

    Portfolio

    Corporate Mgmt

    & Support

    Portfolio

    Force Support

    Portfolio

    Command &

    Control Portfolio

    Logistics

    Portfolio

  • 7/28/2019 Prism Docs Made Public

    41/47

    Use Enterprise Services Framework to

    Organize and Focus ES Efforts

    Enterprise Services Security Foundation (ESSF)41

  • 7/28/2019 Prism Docs Made Public

    42/47

    Use ESSF Segment Architecture to Organize and

    Focus Security Efforts

    42

  • 7/28/2019 Prism Docs Made Public

    43/47

    Development Approach

    Describe the components of the context diagram

    Build use cases based on GIG 2.0 Attributes to establish relationships

    between its functional components (Mandatory Core & Shared Enterprise

    Services)

    Global Authentication, Access Control, and Directory Services

    Information and Services From The Edge Joint Infrastructure

    Common Policies and Standards

    Unity of Command

    Analyze use cases through identification, sequencing, and prioritization of

    functional components to develop key or foundational Services first Apply analysis to prioritize and manage:

    Reference Architecture Development (Principles, Technical Positions,

    Patterns)

    Sequence and Monitor Initiatives, Projects, and Programs

    Identify Issues, Gaps, and Shortfalls

    43

    Apply Enterprise Services &

  • 7/28/2019 Prism Docs Made Public

    44/47

    Apply Enterprise Services &

    Infrastructure to GIG 2.0

    Requirements through Use Cases

    44

    Enterprise

    Security

    ServicesFoundation

    Computing & Communications Infrastructure

    C S

  • 7/28/2019 Prism Docs Made Public

    45/47

    User

    45

    Local Access

    Request

    (Logon)

    End User

    Device (EUD)

    Authorization

    Decision

    Request

    ESSF

    Authentication

    ESSF Digital

    IdentityESSFCredentialing

    Credential

    Validation

    Response

    Identity

    Informatio

    n

    Secondary

    Authenticati

    on (if

    required) ESSF

    Authorization

    & AccessControl

    Mission

    Manager

    Environmental

    Data

    ResponseUser

    Attribute

    Response

    ResourceAccess

    Policy

    Response

    Policy

    Management

    Portable

    Identity

    Credential

    Identity

    U dates

    + Authentication

    Factors

    Authentication

    Decision

    Response

    Resource

    Metadata

    Response

    Policy

    Constraine

    d

    Access

    Printer

    Capability

    StoragStorag

    ee

    Office Automation

    Applicationse-Mail

    Collaboration

    Document

    Sharing

    Portal

    Enterprise

    Directory Desktop/

    Browser

    Indicates Dependency

    Collaboration Services

    Use Case Example(EANCS)

    http://extensions.services.openoffice.org/taxonomy/term/5http://extensions.services.openoffice.org/taxonomy/term/3http://extensions.services.openoffice.org/taxonomy/term/2http://extensions.services.openoffice.org/taxonomy/term/1
  • 7/28/2019 Prism Docs Made Public

    46/47

    Sample Use Case (Content Request)

    User

    Porta

    l

    Information Sharing

    Enterprise Services Security Framework

    Authenticatio

    n

    1

    2

    Discovery

    Enterprise

    Management

    Content

    Discover

    y3

    Content

    Mgmt

    Mediation

    ContentDelivery

    4

    Authorization &

    Access Control

    5

    6

    78

    9

    1

    0

    Infrastructure

    46

    IE Service/Infrastructure Context Diagram

    DRAFT

  • 7/28/2019 Prism Docs Made Public

    47/47

    Human Computer InteractionWarfighterWarfighter

    DefenseIntel

    DefenseIntel

    NetOpsNetOpsMissionPartnersMissionPartners

    BusinessBusinessBusinessBusiness

    IA InfrastructureDynamic Policy Management

    NetOps Infrastructure Enterprise Management

    Functional Capability Enterprise Services

    Mandatory Core & Shared Enterprise Services (ES)

    Computing & Communications Infrastructure

    Force

    Application

    Portfolio

    Building

    Partnerships

    Portfolio

    Battlespace

    Awareness

    Portfolio

    Protection

    Portfolio

    Corporate Mgmt

    & Support

    Portfolio

    Force Support

    Portfolio

    Command &

    Control Portfolio

    Logistics

    Portfolio

    Enterprise Services Security Foundation

    Information SharingMessaging Portal

    Collaboration Mediation

    Content Delivery

    Enterprise ManagementServices Management

    Resource Management

    Content Handling

    g

    DiscoveryPeople/Service Discovery

    Content Discovery

    Metadata DiscoveryGeospatial Visualization

    Mission

    &Business

    IT

    Enterprise

    Services

    &

    Infrastructure

    Digital Identity PrivilegeManagement

    Credentialing Authentication Authorization& Access

    Auditing &

    Reporting

    Cryptography Configuration

    Management

    Computer

    Network Defense

    COOP/CIP

    EANC

    S RA

    EU

    ITI Opt

    Arch

    AD Opt

    Arch

    SAR SA