Line 29: |
Line 29: |
| | | |
| <span style="font-size: 1.5em;">1. Business Architecture</span> | | <span style="font-size: 1.5em;">1. Business Architecture</span> |
− | * [[ITIL (Information Technology Infrastructure Library)]] | + | <b>Align to the GC Business Capability model</b> |
− | * [[GC IM/IT Strategic Action Plan]] | + | * Define program services as business capabilities to establish a common vocabulary between business, development, and operation |
− | * [[GC BCM v1.5 (GC Business Capability Model)]] | + | * Identify capabilities that are common to the GC enterprise and can be shared and reused |
− | * [[Digital Workspace Reference Architecture]] | + | * Model business processes using Business Process Management Notation (BPMN) to identify common enterprise processes |
| + | |
| + | <b>Design for Users First and Deliver with Multidisciplinary Teams</b> |
| + | * Focus on the needs of users, using agile, iterative, and user-centred methods |
| + | * Conform to both accessibility and official languages requirements |
| + | * Include all skillsets required for delivery, including for requirements, design, development, and operations |
| + | * Work across the entire application lifecycle, from development and testing to deployment and operations |
| + | * Ensure quality is considered throughout the Software Development Lifecycle |
| + | * Ensure accountability for privacy is clear |
| + | * Encourage and adopt Test Driven Development (TDD) to improve the trust between Business and IT |
| + | |
| + | <b>Design Systems to be Measurable and Accountable</b> |
| + | * Publish performance expectations for each IT service |
| + | * Make an audit trail available for all transactions to ensure accountability and non-repudiation |
| + | * Establish business and IT metrics to enable business outcomes |
| + | * Apply oversight and lifecycle management to digital investments through governance |
| |} | | |} |
| | | |
Line 41: |
Line 56: |
| | | |
| <span style="font-size: 1.5em;">2. Information Architecture</span> | | <span style="font-size: 1.5em;">2. Information Architecture</span> |
− | * [[GC Interoperability Reference Platform]] | + | <b>Data Collection</b> |
− | * [[GC API for Interoperability]] | + | * Ensure data is collected in a manner that maximizes use and availability of data |
− | * [[GC Interoperability Reference Architecture]] | + | * Ensure data collected aligns to existing enterprise and international standards |
− | * [[GC Data Architecture]] | + | * Where enterprise or international standards don't exist, develop Standards in the open with key subject matter experts |
| + | * Ensure collection of data yields high quality data as per data quality guidelines |
| + | * Ensure data is collected through ethical practices supporting appropriate citizen and business-centric use |
| + | * Data should only be purchased once and should align with international standards |
| + | * Where necessary, ensure collaboration with department/agency data stewards/custodians, other levels of government and indigenous people |
| + | |
| + | <b>Data Management</b> |
| + | * Demonstrate alignment with enterprise and departmental data governance and strategies |
| + | * Ensure accountability for data roles and responsibilities |
| + | * Design to maximize data use and availability |
| + | * Design data resiliency in accordance with GC policies and standards |
| + | * Use Master Data Management to provide a single point of reference for appropriate stakeholders |
| + | |
| + | <b>Data Storage</b> |
| + | * Ensure data is stored in a secure manner in accordance with the National Cyber Security Strategy and the Privacy Act |
| + | * Follow existing retention and disposition schedules |
| + | * Ensure data is stored in a way to facilitate easy data discoverability, accessibility and interoperability |
| + | |
| + | <b>Data Sharing</b> |
| + | * Data should be shared openly by default as per the Directive on Open Government |
| + | * Ensure government-held data can be combined with data from other sources enabling interoperability and interpretability through for internal and external use |
| + | * Reduce the collection of redundant data |
| + | * Reduce existing data where possible |
| + | * Encourage data sharing and collaboration |
| |} | | |} |
| | | |
Line 53: |
Line 91: |
| | | |
| <span style="font-size: 1.5em;">3. Application Architecture</span> | | <span style="font-size: 1.5em;">3. Application Architecture</span> |
− | * [[Qualiware - Enterprise Architecture software / tool (CIOB Publishing Strategy)]] | + | <b>Use Open Standards and Solutions by Default</b> |
− | * [[Financial Management Transformation (Endorsement of SAP software for OCG)]] | + | * Where possible, use open source standards, and open source software first |
− | * [[OneGC]] | + | * If an open source option is not available or does not meet user needs, favour platform-agnostic COTS over proprietary COTS, avoiding technology dependency, allowing for substitutability and interoperability |
− | * [[SAP Hana licenses (initially for AAFC)]] | + | * If a custom-built application is the appropriate option, by default any source code written by the government must be released in an open format via Government of Canada website and services designated by the Treasury Board of Canada Secretariat |
− | * [[CBSA SAP HANA]] | + | * All open source code must be released under an appropriate open source software license |
− | * [[GCcase (formerly known as SCMS)]] | + | * Expose public data to implement Open Data and Open Information initiatives |
− | * [[GC PPM (Project Portfolio Management)]] | + | |
− | * [[GCshare]] | + | <b>Maximize Reuse</b> |
− | * [[GCdocs and GCdocs Managed Service]] | + | * Leverage and reuse existing solutions, components, and processes |
− | * [[GCcase]] | + | * Select enterprise and cluster solutions over department-specific solutions |
− | * [[GCcase (formerly known as SCMS) as Case Management Standard]] | + | * Achieve simplification by minimizing duplication of components and adhering to relevant standards |
| + | * Inform the GC EARB about departmental investments and innovations |
| + | * Share code publicly when appropriate, and when not, share within the Government of Canada |
| + | |
| + | <b>Enable Interoperability</b> |
| + | * Expose all functionality as services |
| + | * Use microservices built around business capabilities. Scope each service to a single purpose |
| + | * Run each IT service in its own process and have it communicate with other services through a well-defined interface, such as a HTTPS-based application programming interface (API) |
| + | * Run applications in containers |
| + | * Leverage the GC Digital Exchange Platform for components such as the API Store, Messaging, and the GC Service Bus |
| |} | | |} |
| | | |
Line 72: |
Line 119: |
| | | |
| <span style="font-size: 1.5em;">4. Technology Architecture</span> | | <span style="font-size: 1.5em;">4. Technology Architecture</span> |
− | * [[GC Cloud Taxonomy]]
| + | <b>Use Cloud first</b> |
− | * [[SSC On-premise Managed Infrastructure as a Service]] | + | * Enforce this order of preference: Software as a Service (SaaS) first, then Platform as a Service (PaaS), and lastly Infrastructure as a Service (IaaS) |
− | * [[Windows 10 Basic Configuration]] | + | * Enforce this order of preference: Public cloud first, then Hybrid cloud, then Private cloud, and lastly non-cloud (on-premises) solutions |
− | * [[ITPIN - Disposition of Windows Server 2008]] | + | * Design for cloud mobility and develop an exit strategy to avoid vendor lock-in |
| + | |
| + | <b>Design for Performance, Availability, and Scalability</b> |
| + | * Design for resiliency |
| + | * Ensure response times meet user needs, and critical services are highly available |
| + | * Support zero-downtime deployments for planned and unplanned maintenance |
| + | * Use distributed architectures, assume failure will happen, handle errors gracefully, and monitor actively |
| |} | | |} |
| | | |
Line 84: |
Line 137: |
| | | |
| <span style="font-size: 1.5em;">5. Security Architecture and Privacy</span> | | <span style="font-size: 1.5em;">5. Security Architecture and Privacy</span> |
− | * [[GCPass – Identity Management]]
| + | <b>Design for Security and Privacy</b> |
− | * [[GC Digital Identity Strategy (Transition Digital Identity Architecture)]] | + | * Implement security across all architectural layers |
− | * [[HTTPS Everywhere]] | + | * Categorize data properly to determine appropriate safeguards |
− | * [[Cyber Security Review (Transition Digital Identity Architecture)]] | + | * Perform a privacy impact assessment (PIA) when personal information is involved |
| + | * Balance user and business needs with proportionate security measures |
| |} | | |} |
| | | |