Line 30: |
Line 30: |
| |style="border-left: 10px solid #c5d5af; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | | | |style="border-left: 10px solid #c5d5af; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | |
| | | |
− | <span style="font-size: 1.5em;">1. Business Architecture</span> | + | <span style="font-size: 1.5em;">1. Business Architecture</span> </br></br> |
| <b>Align to the GC Business Capability model</b> | | <b>Align to the GC Business Capability model</b> |
| * Define program services as business capabilities to establish a common vocabulary between business, development, and operation | | * Define program services as business capabilities to establish a common vocabulary between business, development, and operation |
Line 57: |
Line 57: |
| |style="border-left: 10px solid #f4d177; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | | | |style="border-left: 10px solid #f4d177; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | |
| | | |
− | <span style="font-size: 1.5em;">2. Information Architecture</span> | + | <span style="font-size: 1.5em;">2. Information Architecture</span> </br></br> |
| + | |
| <b>Data Collection</b> | | <b>Data Collection</b> |
| * Ensure data is collected in a manner that maximizes use and availability of data | | * Ensure data is collected in a manner that maximizes use and availability of data |
Line 92: |
Line 93: |
| |style="border-left: 10px solid #f5844e; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | | | |style="border-left: 10px solid #f5844e; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | |
| | | |
− | <span style="font-size: 1.5em;">3. Application Architecture</span> | + | <span style="font-size: 1.5em;">3. Application Architecture</span> </br></br> |
| + | |
| <b>Use Open Standards and Solutions by Default</b> | | <b>Use Open Standards and Solutions by Default</b> |
| * Where possible, use open source standards, and open source software first | | * Where possible, use open source standards, and open source software first |
Line 120: |
Line 122: |
| |style="border-left: 10px solid #cb6d49; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | | | |style="border-left: 10px solid #cb6d49; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | |
| | | |
− | <span style="font-size: 1.5em;">4. Technology Architecture</span> | + | <span style="font-size: 1.5em;">4. Technology Architecture</span> </br></br> |
| + | |
| <b>Use Cloud first</b> | | <b>Use Cloud first</b> |
| * Enforce this order of preference: Software as a Service (SaaS) first, then Platform as a Service (PaaS), and lastly Infrastructure as a Service (IaaS) | | * Enforce this order of preference: Software as a Service (SaaS) first, then Platform as a Service (PaaS), and lastly Infrastructure as a Service (IaaS) |
Line 138: |
Line 141: |
| |style="border-left: 10px solid #996782; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | | | |style="border-left: 10px solid #996782; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | |
| | | |
− | <span style="font-size: 1.5em;">5. Security Architecture and Privacy</span> | + | <span style="font-size: 1.5em;">5. Security Architecture and Privacy</span> </br></br> |
| + | |
| <b>Design for Security and Privacy</b> | | <b>Design for Security and Privacy</b> |
| * Implement security across all architectural layers | | * Implement security across all architectural layers |