Difference between revisions of "GC Enterprise Architecture/Standards"
Jump to navigation
Jump to search
Jana.jessome (talk | contribs) |
|||
Line 30: | Line 30: | ||
|style="border-left: 10px solid #c5d5af; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | | |style="border-left: 10px solid #c5d5af; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | | ||
− | <span style="font-size: 1.5em;">1. Business Architecture</span> | + | <span style="font-size: 1.5em;">1. Business Architecture</span> </br></br> |
<b>Align to the GC Business Capability model</b> | <b>Align to the GC Business Capability model</b> | ||
* Define program services as business capabilities to establish a common vocabulary between business, development, and operation | * Define program services as business capabilities to establish a common vocabulary between business, development, and operation | ||
Line 57: | Line 57: | ||
|style="border-left: 10px solid #f4d177; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | | |style="border-left: 10px solid #f4d177; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | | ||
− | <span style="font-size: 1.5em;">2. Information Architecture</span> | + | <span style="font-size: 1.5em;">2. Information Architecture</span> </br></br> |
+ | |||
<b>Data Collection</b> | <b>Data Collection</b> | ||
* Ensure data is collected in a manner that maximizes use and availability of data | * Ensure data is collected in a manner that maximizes use and availability of data | ||
Line 92: | Line 93: | ||
|style="border-left: 10px solid #f5844e; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | | |style="border-left: 10px solid #f5844e; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | | ||
− | <span style="font-size: 1.5em;">3. Application Architecture</span> | + | <span style="font-size: 1.5em;">3. Application Architecture</span> </br></br> |
+ | |||
<b>Use Open Standards and Solutions by Default</b> | <b>Use Open Standards and Solutions by Default</b> | ||
* Where possible, use open source standards, and open source software first | * Where possible, use open source standards, and open source software first | ||
Line 120: | Line 122: | ||
|style="border-left: 10px solid #cb6d49; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | | |style="border-left: 10px solid #cb6d49; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | | ||
− | <span style="font-size: 1.5em;">4. Technology Architecture</span> | + | <span style="font-size: 1.5em;">4. Technology Architecture</span> </br></br> |
+ | |||
<b>Use Cloud first</b> | <b>Use Cloud first</b> | ||
* Enforce this order of preference: Software as a Service (SaaS) first, then Platform as a Service (PaaS), and lastly Infrastructure as a Service (IaaS) | * Enforce this order of preference: Software as a Service (SaaS) first, then Platform as a Service (PaaS), and lastly Infrastructure as a Service (IaaS) | ||
Line 138: | Line 141: | ||
|style="border-left: 10px solid #996782; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | | |style="border-left: 10px solid #996782; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" | | ||
− | <span style="font-size: 1.5em;">5. Security Architecture and Privacy</span> | + | <span style="font-size: 1.5em;">5. Security Architecture and Privacy</span> </br></br> |
+ | |||
<b>Design for Security and Privacy</b> | <b>Design for Security and Privacy</b> | ||
* Implement security across all architectural layers | * Implement security across all architectural layers |
Revision as of 15:13, 20 February 2019
Home | EA standards | Past EA Decisions | EA Artifacts | EA Discussions | When to come to GC EARB | Monitoring Architectural Implementation |
This page is a work in progress. We welcome your feedback. Please use the discussion page for suggestions and comments. When the page is approved and finalized, we will send it for translation. |
1. Business Architecture
Design for Users First and Deliver with Multidisciplinary Teams
Design Systems to be Measurable and Accountable
|
2. Information Architecture Data Collection
Data Management
Data Storage
Data Sharing
|
3. Application Architecture Use Open Standards and Solutions by Default
Maximize Reuse
Enable Interoperability
|
4. Technology Architecture Use Cloud first
Design for Performance, Availability, and Scalability
|
5. Security Architecture and Privacy Design for Security and Privacy
|
Need help? Contact us.
|