Changes

Jump to navigation Jump to search
no edit summary
Line 30: Line 30:  
|style="border-left: 10px solid #c5d5af; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |  
 
|style="border-left: 10px solid #c5d5af; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |  
   −
<span style="font-size: 1.5em;">1. Business Architecture</span>
+
<span style="font-size: 1.5em;">1. Business Architecture</span> </br></br>
 
<b>Align to the GC Business Capability model</b>
 
<b>Align to the GC Business Capability model</b>
 
* Define program services as business capabilities to establish a common vocabulary between business, development, and operation
 
* Define program services as business capabilities to establish a common vocabulary between business, development, and operation
Line 57: Line 57:  
|style="border-left: 10px solid #f4d177; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |  
 
|style="border-left: 10px solid #f4d177; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |  
   −
<span style="font-size: 1.5em;">2. Information Architecture</span>
+
<span style="font-size: 1.5em;">2. Information Architecture</span> </br></br>
 +
 
 
<b>Data Collection</b>
 
<b>Data Collection</b>
 
* Ensure data is collected in a manner that maximizes use and availability of data
 
* Ensure data is collected in a manner that maximizes use and availability of data
Line 92: Line 93:  
|style="border-left: 10px solid #f5844e; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |  
 
|style="border-left: 10px solid #f5844e; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |  
   −
<span style="font-size: 1.5em;">3. Application Architecture</span>
+
<span style="font-size: 1.5em;">3. Application Architecture</span> </br></br>
 +
 
 
<b>Use Open Standards and Solutions by Default</b>
 
<b>Use Open Standards and Solutions by Default</b>
 
* Where possible, use open source standards, and open source software first
 
* Where possible, use open source standards, and open source software first
Line 120: Line 122:  
|style="border-left: 10px solid #cb6d49; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |  
 
|style="border-left: 10px solid #cb6d49; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |  
   −
<span style="font-size: 1.5em;">4. Technology Architecture</span>
+
<span style="font-size: 1.5em;">4. Technology Architecture</span> </br></br>
 +
 
 
<b>Use Cloud first</b>
 
<b>Use Cloud first</b>
 
* Enforce this order of preference: Software as a Service (SaaS) first, then Platform as a Service (PaaS), and lastly Infrastructure as a Service (IaaS)
 
* Enforce this order of preference: Software as a Service (SaaS) first, then Platform as a Service (PaaS), and lastly Infrastructure as a Service (IaaS)
Line 138: Line 141:  
|style="border-left: 10px solid #996782; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |  
 
|style="border-left: 10px solid #996782; box-shadow: 0 4px 8px 0 rgba(0, 0, 0, 0.2), 0 6px 20px 0 rgba(0, 0, 0, 0.19); color: black; background-color: white; font-size:1.2em;" |  
   −
<span style="font-size: 1.5em;">5. Security Architecture and Privacy</span>
+
<span style="font-size: 1.5em;">5. Security Architecture and Privacy</span> </br></br>
 +
 
 
<b>Design for Security and Privacy</b>
 
<b>Design for Security and Privacy</b>
 
* Implement security across all architectural layers
 
* Implement security across all architectural layers
514

edits

Navigation menu

GCwiki