Difference between revisions of "GC Enterprise Architecture/Framework"
(Added suggestion on AIA.) |
m |
||
Line 36: | Line 36: | ||
* Identify capabilities that are common to the GC enterprise and can be shared and reused | * Identify capabilities that are common to the GC enterprise and can be shared and reused | ||
* Model business processes using Business Process Management Notation (BPMN) to identify common enterprise processes | * Model business processes using Business Process Management Notation (BPMN) to identify common enterprise processes | ||
− | * <u><I>Establish the business architecture early, focusing on business services and capabilities to eliminate technological constraints from transformation designs and roadmaps</u> | + | * <u><I>Establish the business architecture early, focusing on business services and capabilities to eliminate technological constraints from transformation designs and roadmaps</u></I> |
− | * <u><I>Translate the business strategy into business capability implications using the GC Business Capability Model. Use these to guide investments.</u> | + | * <u><I>Translate the business strategy into business capability implications using the GC Business Capability Model. Use these to guide investments.</u></I> |
<b>Design for Users First and Deliver with Multidisciplinary Teams</b> | <b>Design for Users First and Deliver with Multidisciplinary Teams</b> | ||
Line 45: | Line 45: | ||
* Work across the entire application lifecycle, from development and testing to deployment and operations | * Work across the entire application lifecycle, from development and testing to deployment and operations | ||
* Ensure quality <u><i>and security</i></u> is <u><i>underpinning</i></u> the Software Development Lifecycle | * Ensure quality <u><i>and security</i></u> is <u><i>underpinning</i></u> the Software Development Lifecycle | ||
− | * <I><u>Total Cost Of Ownership (TCO) should include the cost for design, construction, operation, and maintenance of a system. For example Training, Support, Disaster Recovery, and Retirement Cost</I> | + | * <I><u>Total Cost Of Ownership (TCO) should include the cost for design, construction, operation, and maintenance of a system. For example Training, Support, Disaster Recovery, and Retirement Cost</I></u> |
* Ensure accountability for privacy is clear | * Ensure accountability for privacy is clear | ||
* Encourage and adopt <u><i>a process (for example:</i></u> Test Driven Development (TDD)) to improve the trust between Business and IT | * Encourage and adopt <u><i>a process (for example:</i></u> Test Driven Development (TDD)) to improve the trust between Business and IT | ||
Line 57: | Line 57: | ||
* Establish business and IT metrics to enable business outcomes | * Establish business and IT metrics to enable business outcomes | ||
* Apply oversight and lifecycle management to digital investments through governance | * Apply oversight and lifecycle management to digital investments through governance | ||
− | * Complete an Algorithmic Impact Assessment (AIA) for systems automating decisions as per the [https://tbs-sct.gc.ca/pol/doc-eng.aspx?id=32592 Directive on Automated Decision-Making]. | + | * <u><I>Complete an Algorithmic Impact Assessment (AIA) for systems automating decisions as per the [https://tbs-sct.gc.ca/pol/doc-eng.aspx?id=32592 Directive on Automated Decision-Making].</u></I> |
|} | |} | ||
Line 69: | Line 69: | ||
* Ensure data is collected in a manner that maximizes use and availability of data | * Ensure data is collected in a manner that maximizes use and availability of data | ||
* Ensure data collected aligns to existing enterprise and international standards | * Ensure data collected aligns to existing enterprise and international standards | ||
− | * <I><u>Ensure that gender diversity and inclusion is considered according to the Policy Direction to Modernize the Government of Canada’s Sex and Gender Information Practices. The government is moving toward defaulting to gender, sex by exception, and adding a third gender option in a respectful and inclusive manner. This involves making changes in the front end (collection) and the back end (coding, display). For collecting information, the recommended approach is to offer the options “male”, “female” or the third option of “another gender”. If there is a need for more specificity and the capacity for analysis, add a write in option labelled “Please Specify”. </I> | + | * <I><u>Ensure that gender diversity and inclusion is considered according to the Policy Direction to Modernize the Government of Canada’s Sex and Gender Information Practices. The government is moving toward defaulting to gender, sex by exception, and adding a third gender option in a respectful and inclusive manner. This involves making changes in the front end (collection) and the back end (coding, display). For collecting information, the recommended approach is to offer the options “male”, “female” or the third option of “another gender”. If there is a need for more specificity and the capacity for analysis, add a write in option labelled “Please Specify”. </I></u> |
− | * Where enterprise or international standards don't exist, develop Standards in the open with key subject matter experts | + | * Where enterprise or international standards don't exist, develop Standards in the open with key subject matter experts <I><u>and consultation with Enterprise Data Community of Practice</u></I>. |
* Ensure collection of data yields high quality data as per data quality guidelines | * Ensure collection of data yields high quality data as per data quality guidelines | ||
* Ensure data is collected through ethical practices supporting appropriate citizen and business-centric use | * Ensure data is collected through ethical practices supporting appropriate citizen and business-centric use | ||
Line 76: | Line 76: | ||
* Where necessary, ensure collaboration with department/agency data stewards/custodians, other levels <u><i>and jurisdiction</i></u> of government and indigenous people | * Where necessary, ensure collaboration with department/agency data stewards/custodians, other levels <u><i>and jurisdiction</i></u> of government and indigenous people | ||
* Reduce the collection of redundant data | * Reduce the collection of redundant data | ||
− | * | + | * <I><u>Ensure provisions are in place for Data access when using third-party contracting services. '''(may revise section to Business Arch?)'''</u></I> |
<b>Data Management</b> | <b>Data Management</b> | ||
− | * Demonstrate alignment with enterprise and departmental data governance, | + | * Demonstrate alignment with enterprise and departmental data governance, <I><u>architecture</u></I>, strategies, <I><u>and reference models</I></u> |
− | * | + | * <I><u>Where appropriate align data to existing common vocabulary</u></I> |
− | * <u> | + | * <u><I>Ensure metadata is captured and defined to maximize discovery and availability</I></u> |
* Ensure accountability for data roles and responsibilities | * Ensure accountability for data roles and responsibilities | ||
* Design to maximize data use and availability | * Design to maximize data use and availability | ||
Line 88: | Line 88: | ||
<b>Data Storage</b> | <b>Data Storage</b> | ||
− | * <i><u> Only handle data which is essential to your service. Do not store all data that you capture unless absolutely necessary</i> | + | * <i><u> Only handle data which is essential to your service. Do not store all data that you capture unless absolutely necessary</i></u> |
− | * Ensure data is stored in a secure manner in accordance with <I><u>CSE approved cryptographic algorithms and protocols and legislation such as</I> the Privacy Act | + | * Ensure data is stored in a secure manner in accordance with <I><u>CSE approved cryptographic algorithms and protocols and legislation such as</I></u> the Privacy Act |
* <I><u>Retain data for the minimum time necessary.</u></I> Follow existing retention and disposition schedules | * <I><u>Retain data for the minimum time necessary.</u></I> Follow existing retention and disposition schedules | ||
* Ensure data is stored in a way to facilitate easy data discoverability, accessibility and interoperability | * Ensure data is stored in a way to facilitate easy data discoverability, accessibility and interoperability | ||
− | <b>Data Use</b> | + | <I><u><b>Data Use</b> |
− | * | + | * Ensure that data is used in an Ethical and Secure manner |
− | * | + | * Maximize re-usability where appropriate |
− | * | + | * Ensure that combined data does not risk identification or re-identification of sensitive or personal information |
− | * | + | * Ensure the data is fit for the use it is employed for in accordance with data quality guidelines </I></u> |
+ | |||
<b>Data Sharing</b> | <b>Data Sharing</b> | ||
− | * Data should be shared openly by default as per the Directive on Open Government <I><u>while taking into consideration existing laws and regulations related to the safeguarding of data, while permitting free and open access</I> | + | * Data should be shared openly by default as per the Directive on Open Government <I><u>while taking into consideration existing laws and regulations related to the safeguarding of data, while permitting free and open access</I></u> |
* Ensure government-held data can be combined with data from other sources enabling interoperability and interpretability through for internal and external use | * Ensure government-held data can be combined with data from other sources enabling interoperability and interpretability through for internal and external use | ||
* Reduce existing data where possible | * Reduce existing data where possible | ||
* Encourage data sharing and collaboration | * Encourage data sharing and collaboration | ||
− | * <I><u>Validate or transform all external input before processing</I> | + | * <I><u>Validate or transform all external input before processing</I></u> |
|} | |} | ||
Revision as of 15:49, 20 August 2019
Home | EA standards | EARB Endorsements | EA Artifacts | Working Groups | GC EARB | Other References |
This is a draft copy of the proposed updates to the GC EA standards
The GC Enterprise Architecture standard is part of the Directive on Management of Information Technology. It is listed as Appendix C - Mandatory Procedures for Enterprise Architecture Assessment in the Directive.
1. Business Architecture
Design for Users First and Deliver with Multidisciplinary Teams
|
Data Collection
Data Management
Data Storage
Data Use
Data Sharing
|
Use Open Standards and Solutions by Default
Maximize Reuse
Enable Interoperability
Develop with Security in mind
|
Use Cloud first
Design for Performance, Availability, and Scalability
|
5. Security Architecture and Privacy Design for Security and Privacy
Ensure Secure Access to Systems and Services
Maintain Secure Operations
Privacy by Design
|
Need help? Contact us.
|