Difference between revisions of "GC Enterprise Architecture/Framework"
(* Add OSS Items) |
m |
||
Line 45: | Line 45: | ||
* Work across the entire application lifecycle, from development and testing to deployment and operations | * Work across the entire application lifecycle, from development and testing to deployment and operations | ||
* Ensure quality <u><i>and security</i></u> is <u><i>underpinning</i></u> the Software Development Lifecycle | * Ensure quality <u><i>and security</i></u> is <u><i>underpinning</i></u> the Software Development Lifecycle | ||
− | * <I><u>Total Cost Of Ownership (TCO) should include the cost for design, construction, operation, and maintenance of a system. For example Training, Support, Disaster Recovery, and Retirement Cost</I> | + | * <I><u>Total Cost Of Ownership (TCO) should include the cost for design, construction, operation, and maintenance of a system. For example Training, Support, Disaster Recovery, and Retirement Cost</I></u> |
* Ensure accountability for privacy is clear | * Ensure accountability for privacy is clear | ||
* Encourage and adopt <u><i>a process (for example:</i></u> Test Driven Development (TDD)) to improve the trust between Business and IT | * Encourage and adopt <u><i>a process (for example:</i></u> Test Driven Development (TDD)) to improve the trust between Business and IT | ||
* <u><I> Ensure that gender diversity and inclusion is considered as part of an intersectional approach to designing for users. Consult the Policy Direction to Modernize the Government of Canada’s Sex and Gender Information Practices and best practices for gender inclusive language. (Would note here that there are likely other examples of best practices that could be included such as positive space exemplars, but nothing else is springing to mind at the moment!) </I></u> | * <u><I> Ensure that gender diversity and inclusion is considered as part of an intersectional approach to designing for users. Consult the Policy Direction to Modernize the Government of Canada’s Sex and Gender Information Practices and best practices for gender inclusive language. (Would note here that there are likely other examples of best practices that could be included such as positive space exemplars, but nothing else is springing to mind at the moment!) </I></u> | ||
− | * <u><I>Adopt a client-centric view of business delivery through customer journey maps and end-to-end service decomposition (internal (GC) and external (public)) </u> | + | * <u><I>Adopt a client-centric view of business delivery through customer journey maps and end-to-end service decomposition (internal (GC) and external (public)) </I></u> |
Line 68: | Line 68: | ||
* Ensure data is collected in a manner that maximizes use and availability of data | * Ensure data is collected in a manner that maximizes use and availability of data | ||
* Ensure data collected aligns to existing enterprise and international standards | * Ensure data collected aligns to existing enterprise and international standards | ||
− | * <I><u>Ensure that gender diversity and inclusion is considered according to the Policy Direction to Modernize the Government of Canada’s Sex and Gender Information Practices. The government is moving toward defaulting to gender, sex by exception, and adding a third gender option in a respectful and inclusive manner. This involves making changes in the front end (collection) and the back end (coding, display). For collecting information, the recommended approach is to offer the options “male”, “female” or the third option of “another gender”. If there is a need for more specificity and the capacity for analysis, add a write in option labelled “Please Specify”. </I> | + | * <I><u>Ensure that gender diversity and inclusion is considered according to the Policy Direction to Modernize the Government of Canada’s Sex and Gender Information Practices. The government is moving toward defaulting to gender, sex by exception, and adding a third gender option in a respectful and inclusive manner. This involves making changes in the front end (collection) and the back end (coding, display). For collecting information, the recommended approach is to offer the options “male”, “female” or the third option of “another gender”. If there is a need for more specificity and the capacity for analysis, add a write in option labelled “Please Specify”. </I></u> |
* Where enterprise or international standards don't exist, develop Standards in the open with key subject matter experts | * Where enterprise or international standards don't exist, develop Standards in the open with key subject matter experts | ||
* Ensure collection of data yields high quality data as per data quality guidelines | * Ensure collection of data yields high quality data as per data quality guidelines | ||
Line 77: | Line 77: | ||
<b>Data Management</b> | <b>Data Management</b> | ||
− | * Demonstrate alignment with enterprise and departmental data governance, strategies, <I><u>and reference models</I> | + | * Demonstrate alignment with enterprise and departmental data governance, strategies, <I><u>and reference models</I></u> |
* Ensure accountability for data roles and responsibilities | * Ensure accountability for data roles and responsibilities | ||
* Design to maximize data use and availability | * Design to maximize data use and availability | ||
Line 84: | Line 84: | ||
<b>Data Storage</b> | <b>Data Storage</b> | ||
− | * <i><u> Only handle data which is essential to your service. Do not store all data that you capture unless absolutely necessary</i> | + | * <i><u> Only handle data which is essential to your service. Do not store all data that you capture unless absolutely necessary</i></u> |
− | * Ensure data is stored in a secure manner in accordance with <I><u>CSE approved cryptographic algorithms and protocols | + | * Ensure data is stored in a secure manner in accordance with <I><u>CSE approved cryptographic algorithms and protocols and legislation such as</I></u> the Privacy Act |
* <I><u>Retain data for the minimum time necessary.</u></I> Follow existing retention and disposition schedules | * <I><u>Retain data for the minimum time necessary.</u></I> Follow existing retention and disposition schedules | ||
* Ensure data is stored in a way to facilitate easy data discoverability, accessibility and interoperability | * Ensure data is stored in a way to facilitate easy data discoverability, accessibility and interoperability | ||
<b>Data Sharing</b> | <b>Data Sharing</b> | ||
− | * Data should be shared openly by default as per the Directive on Open Government <I><u>while taking into consideration existing laws and regulations related to the safeguarding of data, while permitting free and open access</I> | + | * Data should be shared openly by default as per the Directive on Open Government <I><u>while taking into consideration existing laws and regulations related to the safeguarding of data, while permitting free and open access</I></u> |
* Ensure government-held data can be combined with data from other sources enabling interoperability and interpretability through for internal and external use | * Ensure government-held data can be combined with data from other sources enabling interoperability and interpretability through for internal and external use | ||
* Reduce existing data where possible | * Reduce existing data where possible | ||
* Encourage data sharing and collaboration | * Encourage data sharing and collaboration | ||
− | * <I><u>Validate or transform all external input before processing</I> | + | * <I><u>Validate or transform all external input before processing</I></u> |
|} | |} | ||
Line 105: | Line 105: | ||
<b>Use Open Standards and Solutions by Default</b> | <b>Use Open Standards and Solutions by Default</b> | ||
* Where possible, use open source standards, and open source software first | * Where possible, use open source standards, and open source software first | ||
− | * | + | * <I><u>When using Open Source remain at the latest and greatest version</u></I> |
− | * | + | * <I><u>Ensure any extension or change to the Open Source item is contributed back to the community</u></I> |
* If an open source option is not available or does not meet user needs, favour platform-agnostic COTS over proprietary COTS, avoiding technology dependency, allowing for substitutability and interoperability | * If an open source option is not available or does not meet user needs, favour platform-agnostic COTS over proprietary COTS, avoiding technology dependency, allowing for substitutability and interoperability | ||
* If a custom-built application is the appropriate option, by default any source code written by the government must be released in an open format via Government of Canada website and services designated by the Treasury Board of Canada Secretariat | * If a custom-built application is the appropriate option, by default any source code written by the government must be released in an open format via Government of Canada website and services designated by the Treasury Board of Canada Secretariat | ||
* All open source code must be released under an appropriate open source software license | * All open source code must be released under an appropriate open source software license | ||
− | * | + | * <I><u>Ensure valid license and legal requirements are met for use of Open Source items</u></I> |
* Expose public data to implement Open Data and Open Information initiatives | * Expose public data to implement Open Data and Open Information initiatives | ||
<b>Maximize Reuse</b> | <b>Maximize Reuse</b> | ||
− | * <I><u> Reduce integration Complexity - design systems to be highly modular and loosely coupled to be able to reuse components. </I> | + | * <I><u> Reduce integration Complexity - design systems to be highly modular and loosely coupled to be able to reuse components. </I></u> |
* Leverage and reuse existing solutions, components, and processes | * Leverage and reuse existing solutions, components, and processes | ||
* Select enterprise and cluster solutions over department-specific solutions | * Select enterprise and cluster solutions over department-specific solutions | ||
Line 143: | Line 143: | ||
<b>Use Cloud first</b> | <b>Use Cloud first</b> | ||
− | * | + | * <I><u>Adopt the Use of the GC Accelerators to ensure proper Security and Access Controls - [https://github.com/canada-ca/accelerators_accelerateurs-azure Azure], [https://github.com/canada-ca/accelerators_accelerateurs-aws AWS]</u></I> |
* Enforce this order of preference: Software as a Service (SaaS) first, then Platform as a Service (PaaS), and lastly Infrastructure as a Service (IaaS) | * Enforce this order of preference: Software as a Service (SaaS) first, then Platform as a Service (PaaS), and lastly Infrastructure as a Service (IaaS) | ||
* Enforce this order of preference: Public cloud first, then Hybrid cloud, then Private cloud, and lastly non-cloud (on-premises) solutions | * Enforce this order of preference: Public cloud first, then Hybrid cloud, then Private cloud, and lastly non-cloud (on-premises) solutions | ||
Line 196: | Line 196: | ||
* Implement security measures to assure the protection of personal information | * Implement security measures to assure the protection of personal information | ||
* Take into consideration the 7 foundational privacy design principles when designing services. | * Take into consideration the 7 foundational privacy design principles when designing services. | ||
− | </I> | + | </I></u> |
|} | |} | ||
Revision as of 13:29, 12 August 2019
Home | EA standards | EARB Endorsements | EA Artifacts | Working Groups | GC EARB | Other References |
This is a draft copy of the proposed updates to the GC EA standards
The GC Enterprise Architecture standard is part of the Directive on Management of Information Technology. It is listed as Appendix C - Mandatory Procedures for Enterprise Architecture Assessment in the Directive.
1. Business Architecture
Design for Users First and Deliver with Multidisciplinary Teams
|
Data Collection
Data Management
Data Storage
Data Sharing
|
Use Open Standards and Solutions by Default
Maximize Reuse
Enable Interoperability
Develop with Security in mind
|
Use Cloud first
Design for Performance, Availability, and Scalability
|
5. Security Architecture and Privacy Design for Security and Privacy
Ensure Secure Access to Systems and Services
Maintain Secure Operations
Privacy by Design
|
Need help? Contact us.
|