Important: The GCConnex decommission will not affect GCCollab or GCWiki. Thank you and happy collaborating!
Difference between revisions of "GC Enterprise Architecture/Standards"
		
		
		
		
		
		Jump to navigation
		Jump to search
		
				
		
		
	
| Jana.jessome (talk | contribs) | |||
| Line 30: | Line 30: | ||
| |style="border-left: 10px solid #c5d5af; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |   | |style="border-left: 10px solid #c5d5af; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |   | ||
| − | <span style="font-size: 1.5em;">1. Business Architecture</span> | + | <span style="font-size: 1.5em;">1. Business Architecture</span> </br></br> | 
| <b>Align to the GC Business Capability model</b> | <b>Align to the GC Business Capability model</b> | ||
| * Define program services as business capabilities to establish a common vocabulary between business, development, and operation | * Define program services as business capabilities to establish a common vocabulary between business, development, and operation | ||
| Line 57: | Line 57: | ||
| |style="border-left: 10px solid #f4d177; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |   | |style="border-left: 10px solid #f4d177; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |   | ||
| − | <span style="font-size: 1.5em;">2. Information Architecture</span> | + | <span style="font-size: 1.5em;">2. Information Architecture</span> </br></br> | 
| + | |||
| <b>Data Collection</b> | <b>Data Collection</b> | ||
| * Ensure data is collected in a manner that maximizes use and availability of data | * Ensure data is collected in a manner that maximizes use and availability of data | ||
| Line 92: | Line 93: | ||
| |style="border-left: 10px solid #f5844e; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |   | |style="border-left: 10px solid #f5844e; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |   | ||
| − | <span style="font-size: 1.5em;">3. Application Architecture</span> | + | <span style="font-size: 1.5em;">3. Application Architecture</span> </br></br> | 
| + | |||
| <b>Use Open Standards and Solutions by Default</b> | <b>Use Open Standards and Solutions by Default</b> | ||
| * Where possible, use open source standards, and open source software first | * Where possible, use open source standards, and open source software first | ||
| Line 120: | Line 122: | ||
| |style="border-left: 10px solid #cb6d49; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |   | |style="border-left: 10px solid #cb6d49; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |   | ||
| − | <span style="font-size: 1.5em;">4. Technology Architecture</span> | + | <span style="font-size: 1.5em;">4. Technology Architecture</span> </br></br> | 
| + | |||
| <b>Use Cloud first</b> | <b>Use Cloud first</b> | ||
| * Enforce this order of preference: Software as a Service (SaaS) first, then Platform as a Service (PaaS), and lastly Infrastructure as a Service (IaaS) | * Enforce this order of preference: Software as a Service (SaaS) first, then Platform as a Service (PaaS), and lastly Infrastructure as a Service (IaaS) | ||
| Line 138: | Line 141: | ||
| |style="border-left: 10px solid #996782; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |   | |style="border-left: 10px solid #996782; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |   | ||
| − | <span style="font-size: 1.5em;">5. Security Architecture and Privacy</span> | + | <span style="font-size: 1.5em;">5. Security Architecture and Privacy</span> </br></br> | 
| + | |||
| <b>Design for Security and Privacy</b> | <b>Design for Security and Privacy</b> | ||
| * Implement security across all architectural layers | * Implement security across all architectural layers | ||
Revision as of 16:13, 20 February 2019
| Home | EA standards | Past EA Decisions | EA Artifacts | EA Discussions | When to come to GC EARB | Monitoring Architectural Implementation | 
| This page is a work in progress. We welcome your feedback. Please use the discussion page for suggestions and comments. When the page is approved and finalized, we will send it for translation. | 
| 1. Business Architecture  
 Design for Users First and Deliver with Multidisciplinary Teams 
 Design Systems to be Measurable and Accountable 
 | 
| 2. Information Architecture  Data Collection 
 Data Management 
 Data Storage 
 Data Sharing 
 | 
| 3. Application Architecture  Use Open Standards and Solutions by Default 
 Maximize Reuse 
 Enable Interoperability 
 | 
| 4. Technology Architecture  Use Cloud first 
 Design for Performance, Availability, and Scalability 
 | 
| 5. Security Architecture and Privacy  Design for Security and Privacy 
 | 
| Need help? Contact us. 
 
 | 




