Changes

Jump to navigation Jump to search
m
no edit summary
Line 3: Line 3:  
@en|
 
@en|
   −
The business capability concept is a top-down view of an organization.  It is a key element and often the first step in a Business Architecture discipline.   
+
The <b>business capability</b> concept is a top-down view of an organization.  It is a key element and often the first step in a Business Architecture discipline.   
 
It gives us a different way to look at the major components of our organizations using a shared framework that bridges Programs and Services.   
 
It gives us a different way to look at the major components of our organizations using a shared framework that bridges Programs and Services.   
 
This technique helps us in identifying where there are commonalities versus where there are very different or unique activities.  With this understanding, we can work towards a more cohesive enterprise.
 
This technique helps us in identifying where there are commonalities versus where there are very different or unique activities.  With this understanding, we can work towards a more cohesive enterprise.
   −
The tables below reflect the [https://gcconnex.gc.ca/file/view/50303099/gcbcm-gcmca-v2-visualmodel-20190617-en-pdf?language=en GC BCM 2.0 Model] with proposed updates (that are flagged and considered under construction). A request to GC EARB will be made to endorse the formal adoption of updates to the model.
+
The <b>GC BCM</b> is a view of the whole Government of Canada as one large organization. Thus, one department's specific capability may be part of the bigger core capabilities of the GC BCM (mostly Section 6).
 +
</br>
 +
[[File:GC BCM v2.0.jpg|center|thumb|GC BCM 2.0 Model|upright=3.5]]
 +
</br>
 +
Here are some <u>benefits</u> of business capabilities:
 +
* provide a way to communicate  between IT and business in a common language;
 +
* enable laser-like business investment focus;
 +
* serve as a baseline for strategic planning, change management, and impact analysis;
 +
* lead directly to business service specification and design; and
 +
* clarify/organize/structure modernization and transformation approaches for IT architectures.
 +
</br>
 +
Since the GC BCM is of higher level (Level 0 & Level 1), departments is expected to use the GC BCM as a baseline to build their departmental BCM by building deeper into Level 2, 3, and so on.
 +
</br></br>
 +
 
 +
The tables below reflect the [https://gcconnex.gc.ca/file/view/50303099/gcbcm-gcmca-v2-visualmodel-20190617-en-pdf?language=en GC BCM 2.0 Model] with proposed updates for the future version (that are flagged and considered under construction). A request to GC EARB will be made to endorse the formal adoption of updates to the model.
    
<!-- Table start -->
 
<!-- Table start -->
Line 351: Line 365:  
|8.2.4||Financial Analysis and Evaluation ||The ability to analyze financial data as well as to generate and evaluate financial reports.
 
|8.2.4||Financial Analysis and Evaluation ||The ability to analyze financial data as well as to generate and evaluate financial reports.
 
|-
 
|-
|8.3|| Human Resource Management||The ability to support prudent use and effective management of Human Resources within an organization, institution or legal entity.
+
|<span style="color: red">''8.3''</span>|| Human Resource Management||The ability to support prudent use and effective management of Human Resources within an organization, institution or legal entity.
 
|-
 
|-
 
|<span style="color: red">'' <b>** NOTE **</b> ''</span> || <span style="color: red">'' <b>All the sub-sections of 8.3 have been modified</b> ''</span>|| <span style="color: red">'' <b>SUBJECT TO FURTHER CHANGES</b> ''</span>
 
|<span style="color: red">'' <b>** NOTE **</b> ''</span> || <span style="color: red">'' <b>All the sub-sections of 8.3 have been modified</b> ''</span>|| <span style="color: red">'' <b>SUBJECT TO FURTHER CHANGES</b> ''</span>
Line 502: Line 516:  
|-
 
|-
 
|9.1.2||Identity and Access Management||The ability to recognize the identification of a person or system and ensure that only screened resources (people, external systems …) get access to the organization’s resources and assets. Access levels may also apply.
 
|9.1.2||Identity and Access Management||The ability to recognize the identification of a person or system and ensure that only screened resources (people, external systems …) get access to the organization’s resources and assets. Access levels may also apply.
 +
|-
 +
|<span style="color: red">'''9.1.2.1'''</span>||Credential Management <span style="color: red">'''*NEW*'''</span>||The ability manage (issue, update and revoke/deactivate) digital credentials and the associated token/authenticator.
 
|-
 
|-
 
|9.1.3|| Security Monitoring and Management||The ability to monitor the security of buildings, assets, networks, information and people.  This includes operational monitoring as well as planning for the approach to monitoring and assessing actual results.  It also includes reporting on threats and vulnerabilities, identifying exploitable weaknesses, detecting intrusions, recovering from attacks and preventing future attacks.
 
|9.1.3|| Security Monitoring and Management||The ability to monitor the security of buildings, assets, networks, information and people.  This includes operational monitoring as well as planning for the approach to monitoring and assessing actual results.  It also includes reporting on threats and vulnerabilities, identifying exploitable weaknesses, detecting intrusions, recovering from attacks and preventing future attacks.
Line 567: Line 583:     
Les tableaux ci-dessous reflètent le [https://gcconnex.gc.ca/file/view/50303101/gcbcm-gcmca-v2-visualmodel-20190617-fr-pdf?language=en GC BCM v2.0 Model] avec les mises à jour proposées (qui sont signalées et considérées en cours de construction). Une demande au CEAI GC sera faite pour approuver l'adoption formelle des mises à jour du modèle.
 
Les tableaux ci-dessous reflètent le [https://gcconnex.gc.ca/file/view/50303101/gcbcm-gcmca-v2-visualmodel-20190617-fr-pdf?language=en GC BCM v2.0 Model] avec les mises à jour proposées (qui sont signalées et considérées en cours de construction). Une demande au CEAI GC sera faite pour approuver l'adoption formelle des mises à jour du modèle.
 +
 +
[[File:GC BCM v2.0.jpg|center|thumb|GC BCM 2.0 Model|upright=3.5]]
 +
 
<!-- Table start -->
 
<!-- Table start -->
 
{|
 
{|
Line 1,063: Line 1,082:  
|-
 
|-
 
|9.1.2|| Gestion des identités et des accès ||Capacité à assurer un accès sécurisé au sein du gouvernement. Cela permet de veiller à ce que seules les ressources ayant fait l’objet d’une enquête de sécurité aient accès aux immeubles, aux renseignements, aux ressources humaines, à la technologie, etc.
 
|9.1.2|| Gestion des identités et des accès ||Capacité à assurer un accès sécurisé au sein du gouvernement. Cela permet de veiller à ce que seules les ressources ayant fait l’objet d’une enquête de sécurité aient accès aux immeubles, aux renseignements, aux ressources humaines, à la technologie, etc.
 +
|-
 +
|<span style="color: red">'''9.1.2.1'''</span>||Gestion de l'authentification <span style="color: red">'''*nouveau*'''</span>||La capacité de gérer (émettre, mettre à jour et révoquer/désactiver) les identifiants numériques et le jeton/authentificateur associé.
 
|-
 
|-
 
|9.1.3|| Surveillance de la sécurité et protection||Capacité à surveiller la sécurité des immeubles, des actifs, des réseaux, des renseignements et des ressources humaines. Cela comprend la surveillance opérationnelle ainsi que la planification de la solution de surveillance et d’évaluation des résultats réels.   
 
|9.1.3|| Surveillance de la sécurité et protection||Capacité à surveiller la sécurité des immeubles, des actifs, des réseaux, des renseignements et des ressources humaines. Cela comprend la surveillance opérationnelle ainsi que la planification de la solution de surveillance et d’évaluation des résultats réels.   
513

edits

Navigation menu

GCwiki