Enterprise Performance Life Cycle Framework
Enterprise Performance Life Cycle Framework
Enterprise Performance Life Cycle Framework
Office of the Chief Information Officer Office of the Assistant Secretary for Resources and Technology
October 1, 2008
1 2 3 4 5 6 7 8 9
Revision Version Number Date 1.0 1.1 06/26/2008 1.2 10/1/2008
VERSION HISTORY
This document is the culmination of a collaborative effort by the Enterprise Performance Life Cycle Framework (EPLC) Workgroup. This group is composed of OPDIV and HHS representatives. This document will go through formal CIO review process and sign off prior to Agency wide distribution. This document is intended to be a living document and periodic review and updates will be under the control of the OCIO CPIC Office. Versions and descriptions of change will be recorded in the table below.
Approved By EPLC Workgroup Approval Description of Change Date 05/07/2008 Baseline Document Added EA Context Section 1.5 Consistency and clarity edits Edits in response to OPDIV Review
10
Page 2 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41
EXECUTIVE SUMMARY
The Office of Management and Budget (OMB) and the Congress have set ever higher standards for the management and performance of information technology investments within the Federal government. Those standards require a project management and accountability environment where IT projects achieve consistently successful outcomes that maximize alignment with business objectives and meet key cost, schedule and performance objectives. A key to successful IT management is a solid project management methodology that incorporates best government and commercial practices through a consistent and repeatable process, and provides a standard structure for planning, managing and overseeing IT projects over their entire life cycle. The HHS Enterprise Performance Life Cycle (EPLC) framework provides that methodology for HHS. The EPLC framework consists of ten life cycle phases. Within each phase, activities, responsibilities, reviews, and deliverables are defined. Exit criteria are established for each phase and Stage Gate reviews are conducted through the IT governance process to ensure that the projects management quality, soundness, and technical feasibility remain adequate and the project is ready to move forward to the next phase. The EPLC framework provides a guide to Project Managers, Business Owners, IT Governance Executives, other Stakeholders, and Critical Partners throughout the life of the project. The EPLC framework is designed to provide the flexibility needed to adequately manage risk while allowing for differences in project size, complexity, scope, duration, etc. Examples of flexibility include the ability (with IT governance approval) to tailor the framework where particular phases or deliverables may not apply, to aggregate phases and deliverables when appropriate, to provide for conditional stage gate approvals that allow progress to a subsequent phase in a manner that identifies and controls for risk. The EPLC framework also accommodates iterative development methodologies. Implementation of the EPLC framework will allow HHS to improve the quality of project planning and execution, reducing overall project risk. Reducing risk, in turn, increases HHS ability to move IT projects that best meet business needs into the production environment more quickly and with established cost constraints. The framework also provides an effective vehicle for adopting and propagating best practices in IT management. Finally, the framework provides a solid foundation for Project Manager training and certification and more effective IT capital planning. The EPLC framework implementation is likely to shift more time and resources to the planning phases for projects and require additional resources from Project Managers, Business Owners, and IT governance participants for review and approval activities. This increased investment in planning and oversight is expected to be more than offset by reduced resources spent in duplicative efforts and rework of avoidable errors. Industry and government experience demonstrates that the quality of IT investments is directly proportional to the quality of the management processes used to acquire and operate the IT products those investments produce. Implementing the EPLC framework will help ensure the quality of HHS IT products through improved project management processes.
Page 3 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
Table of Contents
4. INVESTMENTS COMPOSED OF MULTIPLE PROJECTS ................................ 60 APPENDIX A: ACRONYMS AND DEFINITIONS INDEX ...................................... 61 APPENDIX B: GLOSSARY............................................................................... 62 APPENDIX C: DELIVERABLES DESCRIPTIONS............................................... 68 APPENDIX D: REFERENCES........................................................................... 77 Page 4 of 79
Page 5 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35
1.2. Scope
The HHS EPLC framework applies to all HHS IT investments and projects, including but not limited to new investments, major enhancements to existing investments, steady state investments, high-priority, fast-track IT investments, and new Commercial Off-the-Shelf (COTS) product acquisitions. A large investment may consist of a single project, or of several logically related projects. For the purposes of this document, an investment will be assumed to consist of a single project. (Considerations for managing investments composed of multiple projects are provided in Section 4.) The EPLC framework is compatible with current Department policy. It applies to the Operating Divisions, all Staff Divisions (STAFFDIVs), and the Office of the Inspector General, (hereinafter referred to collectively as HHS OPDIVs). The EPLC framework has an initial focus on the life cycle of information technology (IT) projects. Eventually, the scope may be expanded to address non-IT projects.
1.3. Background
Information technology plays a critical role in helping HHS carry out its complex, wide-ranging and evolving mission and objectives. HHS uses IT investments to support more than 300 programs that protect the health of all Americans and provide essential human services. Those programs are administered by OPDIVs which have responsibilities throughout the country. Each year, HHS invests more than $2 billion to ensure that its OPDIVs have the technology to support their programs. 1 HHS IT investments include software and computer systems interconnected through nationwide networks. Many HHS systems are interconnected with partners in the federal, state, local, tribal and private sectors. As a result, HHS has a very complex, difficult task in ensuring that its diverse IT investments are properly aligned within a coherent Enterprise Architecture. HHS should approach the management of IT projects with an enterprise perspective that facilitates smooth interfaces among HHS IT investments and with HHS partners. These
An additional $3 billion in IT grants is distributed to the states and other entities for Medicaid, Child Support Enforcement, and health surveillance systems.
Page 6 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
investments and their interfaces must be adequately established through robust enterprise architecture. Adhering to recognized IT standards, as well as to Section 508, security and privacy requirements is essential to this goal. By managing and governing its projects from an enterprise perspective, HHS will also be in a better position to take advantage of economies of scale, as it purchases computers, related equipment and software on a large scale -- maximizing its bargaining and buying power. Furthermore, this enterprise perspective will enable improved compliance with the Clinger-Cohen Act and other legislative and regulatory requirements that require HHS to manage and govern its IT investments from an enterprise perspective. In addition to focusing on the planning, development, operation and management of individual IT projects, HHS must also ensure that the overall portfolio of IT investments achieves maximum alignment with HHS strategic goals and maximizes the return on the Departments IT investment. The HHS IT Capital Planning and Investment Control (CPIC) Program, in conjunction with the IT governance process, brings together the various critical partners required to ensure maximum IT portfolio performance. The EPLC framework is part of an ongoing effort by HHS to further strengthen its IT management and governance processes. With this new enterprise-wide approach to project management, there also will be a greater emphasis by the Department on demonstrating measurable results for each of its IT investments and to better justify actions taken as IT projects are being developed.
1.4. Vision
The EPLC framework will help establish a project management and accountability environment where HHS IT projects achieve consistently successful outcomes that maximize alignment with Department-wide and individual OPDIV goals and objectives. Figure 1 illustrates the context of the EPLC. This overview document will be supplemented with support materials, such as process guides and templates, which will be created by the EPLC Working Group over the next several months. The EPLC framework will be modified as experience dictates. For example, if a particular deliverable is frequently added as part of the tailoring process, this deliverable will be considered for addition to the EPLC.
Page 7 of 79
Security Planning
C&A Maintenance
Control
Evaluate
Preliminary
Acquisition Development
Maintenance
The EPLC will evolve to include Other Critical Partner / Stakeholder Functions
EPLC
Initiation Concept
Planning
Requirements Analysis
Design
Development
Test
Implementation
1 Stage Gates
Selection Review
2
Baseline Review
3
Preliminary Design Review
IT Governance Organization Led Can be delegated
4
Operational Readiness Review
2 3 4 5 6 7 8 9 10 11 12
13 14 15 16
Figure 2: Performance Improvement Lifecycle
Figure 3 below highlights the HHS Performance Improvement Lifecycle which extends this integrated process model to include other key HHS management processes.
Page 8 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
The Strategize Phase establishes the strategic HHS business and technology direction. HHS enterprise needs are, in part, derived from external drivers such as legislative mandates or other capabilities to be pursued as a mechanism to improve mission performance. In many cases the need to be satisfied will correspond to a gap between the current state of HHS organizational capabilities and an intended future state. A primary function of the Architect Phase is the identification and analysis of capability gaps between that current and future state. HHS organizes architecture work primarily through segments of functionality within a common business area. Analysis of segments of business functionality reveals the need for an investment to fill a particular capability gap. Analysis of segments of functionality results in a common framework of compatibility and interoperability within which related investments can be made. The HHS Architecture Development Methodology describes how this analysis of segments is accomplished. The Invest Phase ensures the alignment of sound business investments in support of strategic, and sometimes tactical, goals and objectives. The Implementation phase ensures that projects and investments are executed according to agreed upon project or investment management plans. This phase also measures performance to determine how well the implementation solutions achieve the desired results and mission outcomes. Leveraging the HHS Performance Improvement Lifecycle and monitoring the effective management of investments throughout the EPLC provides validation and assurances that a project or investment is addressing specified capability gaps and providing the intended performance improvements.
Page 9 of 79
IT Portfolio
The combination of all IT assets, resources, and investments owned or planned by an organization in order to achieve its strategic goals, objectives, and mission. An organizational investment employing or producing IT or IT-related assets. Each investment has or will incur costs for the investment, has expected or realized benefits arising from the investment, has a schedule of project activities and deadlines, and has or will incur risks associated with engaging in the investment. A project is a temporary planned endeavor funded by an approved information technology investment; thus achieving a specific goal and creating a unique product, service, or result. A project has a defined start and end point with specific objectives that, when attained signify completion.
IT Investment
IT Project
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
1.7. Benefits
The following outcomes and benefits are expected to accrue from implementation of the EPLC framework: Ability to leverage EPLC-type frameworks long established in the private sector as best practices to yield substantial benefits to HHS. Establish a foundation and supporting structure designed to aid in the successful planning, engineering, implementation, maintenance, management, and governance of HHS IT investments. Improved project planning and execution by project managers, and faster propagation of best practices in the project management community. Improved management response for individual IT projects and the broader IT investment portfolio to budgetary and other strategic changes through deliberate and approved baseline changes that fully consider Enterprise Architecture (EA), security and other impacts. Movement of IT projects into the production environment more quickly and with higher quality. Better operational support for production systems. Better measurement of IT performance (both at the individual project and at the portfolio level). More timely identification and resolution of project issues, reducing the risk of cost overruns, schedule delays, scope creep, and other typical pitfalls. Improved competitiveness of IT investments in the budget process through improved performance management and linkage of IT investments to program mission.
Page 10 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36
Enhancement of the CPIC Select, Control and Evaluate processes for IT investment portfolio management. Integration of the IT Investment Management (ITIM) and software development life cycles into one HHS IT enterprise performance life cycle. Greater re-use of activities and deliverables by Integrated Project Team members when moving among different projects.
1.8. Impact
The EPLC framework implementation is likely to shift more time and resources to the planning phases for projects and require additional resources from Project Managers, Critical partners and IT governance organization participants for review and approval activities. This increased investment in planning and oversight is expected to return dividends in reduced program risk and less effort expended in rework or fixing foreseeable problems.
Page 11 of 79
1 2 3 4 5 6 7 8 9 10
Goal 2: Better integrate IT investment planning and execution with IT governance, including more effective multi-disciplinary reviews of IT investments by CPIC critical partners. Objectives: Facilitate alignment of IT investments with the HHS Strategic Plan. Streamline the IT governance process. Provide a more effective process for integrating multi-disciplinary Critical Partner reviews into the IT governance process. Establish clear, reasonable expectations and practical standards/guidelines. Ensure compliance with HHS Enterprise Architecture (EA) and prescribed design standards.
Page 12 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35
IT governance boards may delegate some Stage Gate Reviews to the Investment Managers as appropriate.
Page 13 of 79
1 2 3 4
1
Project Selection Review
2
Project Baseline Review
3
Preliminary Design Review
4
Operational Readiness Review
Validation Readiness Review Independent Verification & Validation Assessment Test Plan Business Product FD O&M Manual FD Systems Security Plan FD Security Risk Assessment FD Training Plan FD Training Materials FD User Manual
F FD
PROJECT REVIEWS
Architecture Review
Requirements Review
System ReCertification System ReAccreditation Disposition Review Annual Operational Assessment Disposition Plan Continued Authority to Operate Privacy Impact Assessment Project Archives
DELIVERABLES
Requirements Document
Design Document F Computer Match Agreement FD Test Plan FD Contingency/ Disaster Recovery Plan FD System of Record Notice
F
F F
PostImplementation Review
F F F
F F F F F
May be delegated
FD F
Business Product Project Completion Report SLAs/MOUs Contingency/ Disaster Recovery Plan O&M Manual Systems Security Plan Security Risk Assessment Training Plan Training Materials User Manual
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
Page 15 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
Disposition Retires the asset when operational analysis indicates that it is no longer cost-effective to operate the asset. The outcome of the Disposition Phase is the deliberate and systematic decommissioning of the Business Product with appropriate consideration of data archiving and security, migration of data or functionality to new assets, and incorporation of lessons learned over the investment life cycle.
A more detailed description of each phase and the various tasks required to be performed during each phase are provided in Section 3.
2.1.2. Stakeholders
This subsection lists the typical stakeholders for an IT project over its life cycle. Each stakeholder plays an essential role in execution of the EPLC framework and the success of HHS IT projects. The role of each stakeholder varies throughout the life cycle. Stakeholder roles are discussed in more detail later in this document. IT Governance: responsible for ensuring that the investment is technically sound; follows established IT investment management practices; and meets the Business Owners needs. Components of the IT governance organization are: Information Technology Investment Review Board (ITIRB). CIO Council/Technical Review Board. Chief Information Officer (CIO).
Similar IT governance organizations will be established at both the Department and OPDIV levels. Capital Planning and Investment Control (CPIC): CPIC is responsible for coordination of the Critical Partners for Stage Gate Reviews. Critical Partners: Critical Partners are functional managers in the areas of: EA, Security, Acquisition Management, Finance, Budget, Human Resources, Section 508, CPIC, and Performance. The Critical Partners are considered expert participation roles in the IT project reviews and governance decisions to ensure compliance with policies in their respective areas and to make timely tradeoff decisions where conflicts arise during the planning and execution of an investment. Because organizational structures vary in HHS and the OPDIVs, the expertise for these Critical Partner roles may be fulfilled from a mixture of organizations, as appropriate. The CPIC Critical Partner Role is responsible for reviewing the Project documentation and cost and schedule as key measures of Project Management performance. Because the Performance Critical Partner is responsible for evaluating whether the investment meets the business objectives, this review would logically be done by the Business Owner. Project Management Project Manager (PM): The Project Manager is responsible for project performance in relation to approved cost, schedule and performance baselines. The PM maintains information project status, control, performance, risk, corrective action and outlook. This person is accountable to the Business Owner for meeting business requirements and to IT governance for meeting IT project management requirements.
Page 16 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34
Integrated Project Team (IPT): The IPT is chaired by the PM with Critical Partner and Business Owner representatives to assist the PM with planning and execution of the investment.
Business Owner: The executive in charge of the organization, who serves as the primary customer and advocate for an IT project. The Business Owner is responsible for identifying the business needs and performance measures to be satisfied by an IT project; providing funding for the IT project; establishing and approving changes to cost, schedule and performance goals; and validating that the IT project initially meets business requirements and continues to meet business requirements. In-House Development and Operations Teams: technical personnel that execute projects are expected to follow the EPLC framework and be integral partners in the HHS investment management process. Contractors: much of HHS IT development and operations are outsourced to contractor support. Contractors must follow the EPLC framework and be integral partners in the HHS investment management process. Users: Individuals who physically use the final product for data input, reports, etc. Infrastructure Support Staff: staff providing common infrastructure equipment and services that both impact on and are impacted by IT project development and operations must be an integral part of the EPLC process.
Page 17 of 79
Requirements Analysis
Phase
Implementation
Development
Deliverable
Business Needs Statement Business Case Project Charter Project Management Plan Privacy Impact Assessment Project Process Agreement Requirements Document Design Document Computer Match Agreement Test Plan Contingency/Disaster Recovery Plan System of Records Notice Operations & Maintenance Manual Systems Security Plan Training Plan Training Materials User Manual Security Risk Assessment Business Product Test Reports Implementation Plan Authority to Operate Project Completion Report SLAs/MOUs Annual Operational Assessment Disposition Plan Project Archives
Legend:
F F F P
F F F F F F FD F FD FD FD FD FD FD FD FD FD F F F F F F
F F F F F F F F F
2 3 4 5 6 7 8 9
Page 18 of 79
Disposition F
Planning
Concept
Initiation
Design
Test
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Generic Exit criteria are set to monitor the overall status of the project and any necessary corrective actions taken to bring the project into alignment with original goals.
Stage Gate Reviews also address the availability of resources to execute the subsequent life cycle phases. The results of the review by the Critical Partners are provided with recommended action to the IT governance organization for decision. The Stage Gate Review process is illustrated in Figure 6.
Figure 6 - Stage Gate Review Process
Critical Partners PM
Issues
Review
Recommendations
Unresolved Issues
Prepare/ Revise
Next Phase
Approve
IT Governance
Discontinue Project Reject
Approve w/Conditions
Conditions
25 26 27 28 29 The IT governance organization may choose to approve the projects continuation to the next phase with or without conditions. Approval with conditions requires the IT governance organization to establish a process for maintaining oversight of the project to ensure conditions are met. The IT governance organization may require issue resolution by the PM before
Page 19 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39
approving continuation, and is responsible for discontinuing any project which fails to resolve serious issues. With the exception of four Stage Gate Reviews that must be conducted by the IT governance organization (as shown in Figure 6 above), the IT governance organization may delegate conduct of Stage Gate Reviews to the PM if appropriate due to such factors as size of investment, level of technical risk, complexity, and essentiality to the HHS mission. For example, most complex and long-term investments (e.g., on the scale of UFMS) would likely require Stage Gate Reviews by the IT governance organization after every phase and multiple periodic reviews during a phase, while many investments with shorter life cycles would require less extensive review that could, in many cases, be delegated to the Project Manager. Any Stage Gate Review not conducted by the IT governance organization will be delegated to the PM, who will apply the same standards and will complete the same review documentation as the IT governance organization would have. If the PM conducting any Stage Gate Review determines that a change in investment cost, schedule or performance baselines is required, the PM must elevate the Stage Gate Review to the IT governance organization. The Stage Gate Reviews requiring IT governance organization review are: Investment Selection Review (at the conclusion of the Concept Phase). Project Baseline Review (at the conclusion of the Planning Phase). Preliminary Design Review (during the Design Phase). Operational Readiness Review (during the Implementation Phase).
More information about these reviews is included in Section 3, in the phases where they occur.
2.2. Approach
This subsection describes the basic approach used in the EPLC framework. All framework activities fall into three categories: create, review and approve.
Page 20 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38
for advancement to the next phase. These stakeholders will provide recommendations and any issues identified to the IT governance organization and the Business Owner based on their review. The CPIC Program facilitates the review by the several CPIC partners, and ensures that crossfunctional issues are either resolved at the staff level or articulated to the IT governance organization for resolution. The CPIC Program also consolidates Critical Partner recommendations for presentation to the IT governance organization.
Page 21 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38
Ongoing Earned Value Management (EVM) and status reporting to measure compliance with baselines and take timely corrective action, as appropriate. Ongoing management of scope and change requests. Ongoing communications to ensure all stakeholders are apprised appropriately. Integrated Baseline Documentation. Independent Verification & Validation (IV&V) Reports Contractor Performance Report (CPR) (or acceptable equivalent, if full EVM standards compliance is not required). Contract Fund Status Report (CFSR) (or acceptable equivalent, if full EVM standards compliance is not required). Updated Project Schedule. Periodic Investment Status Reports. Meeting Minutes.
Independent Verification & Validation (IV&V) is a rigorous independent process that evaluates the correctness and quality of the Business Product to ensure that it is developed in accordance with customer requirements and is well-engineered. IV&V partnerships provide high value to many projects and may be introduced at any Phase of a project as determined by OPDIV project and governance requirements. Depending on project size, risk and other factors, the IT Governance organization may approve tailoring the IV&V requirement to match the project requirement.
2.5. Tailoring
An essential element of the EPLC framework is the ability to tailor framework requirements to the specific circumstances of each investment. By doing so, HHS will be able to preserve a consistent and repeatable investment management methodology while recognizing in a deliberate manner when certain elements of the framework are not applicable or not costeffective for a particular investment. The EPLC framework does not preclude OPDIVs from requiring more rigor.
2.5.1. Concept
The EPLC framework provides a complete list of activities, deliverables and reviews that are necessary to properly manage and control a large-scale, mission-critical, high-risk system. However, not all HHS projects fall into this category. While all projects require adequate documentation and deliverables to ensure that they are progressing appropriately and to provide management with enough information to make informed decisions concerning the future of the system, lower risk investments do not need as much documentation to maintain appropriate oversight and control. To meet the needs of non-major systems, the EPLC framework will provide criteria to assist Project Managers, Critical Partners, and IT Governance personnel in assessing appropriate tailoring of the EPLC framework.
Page 22 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39
Tailoring consists of waiving particular life cycle phases, activities, deliverables or reviews. The tailoring strategy will provide the justification for the tailoring as well as identify the specific elements of the framework to be tailored. The tailoring strategy for the investment is described in the Project Process Agreement, which is formally approved at the Project Baseline Review. Any subsequent change to the Project Process Agreement must be approved by the IT governance organization.
Otherwise, Project Managers, Critical Partners and the IT governance organization should include consideration of the following factors in determining the tailoring strategy for an investment: Cost: As cost decreases, framework elements that mitigate cost risk or that are relatively expensive are candidates for tailoring. Risk: Framework elements that mitigate low-level risks are candidates for tailoring. Schedule: Framework elements that provide for corporate knowledge or continuity over time or during team turnover are candidates for tailoring if the schedule is short enough to lower those risks. Acquisition Strategy: Contracts awarded for contractor developed or operated investments should require investment management methodologies equivalent to the EPLC framework for tasks and deliverables. Tasks and deliverables provided under performance-based contracts are candidates for tailoring if they mitigate risk. Note also that, while COTS investments may be candidates for tailoring of some EPLC Development Phase activities, , COTS investments must accomplish most activities in other Phases to ensure proper investment selection, EA compliance, security, implementation, Operations and Maintenance support, etc. Development Methodology: Choice of development methodology is likely to affect the iterative nature of the framework elements, but is unlikely to offer significant tailoring opportunities solely on the basis of development methodology.
Page 23 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
EPLC be applied to fast track projects. The Project Process Agreement deliverable for each project defines how the EPLC is to be tailored. Options for tailoring include: Acceleration: For example, the initiation phase of the EPLC is designed in part to answer the question are we doing the right thing? In the case of some projects, such as a legislatively-mandated program, the answer to this question is largely predetermined. Acceleration does not relieve the project manager of the need to demonstrate that the proposed project will meet the requirements stated in the mandate and do so in the optimal manner. Consolidation: It is possible to tailor the EPLC framework so that phases are consolidated. Deferral: At Stage Gate Reviews, the IT governance organization has the option to approve with conditions. If all exit criteria are not met, the IT governance organization may accept the risk of moving forward with the condition that those criteria will be met at a later date.
2.8.1. Department/OPDIV
The EPLC framework will apply to all levels of HHS and is compatible with current Department CPIC policy. As used in this document, HHS refers to both Department-wide and OPDIV levels unless otherwise noted. For those investments that are designated for OPDIV review, Project Managers and the OPDIV governance process will apply the EPLC framework. For those investments meeting threshold criteria for Department-level review, Project Managers and the Department-level governance process will apply the EPLC framework. The OPDIVs will establish IT governance processes that are consistent with HHS CPIC policy and procedures, including the EPLC framework. The Department will generally focus on ensuring OPDIV processes are compliant rather than conducting direct reviews of OPDIV-level investments as a matter of course. However, the Department reserves the right to conduct investment reviews of OPDIV-level investments when necessary to review process compliance or to otherwise fulfill its HHS IT investment and portfolio management responsibilities.
Page 24 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36
2.8.2. Investment/Project/System
There is significant variation in designation of IT portfolios, investments, projects and systems. The EPLC framework should be considered a nested framework for purposes of this hierarchy. For example, a large investment may consist of several logically related projects. Project Managers are responsible to the Investment Manager for project compliance with the framework, and the Investment Manager is responsible to the IT governance organization for overall investment compliance with the framework.
Page 25 of 79
1 2 3 4 5 6 7 8 9 10 11
2.10.5. Templates
Templates are standardized documents with a preset format. They are used as a starting point for framework deliverables to ensure quality and consistency. Templates are designed to be customized for the use of each project and include instructions and boiler plate text.
2.10.6. Checklists
Checklists are brief documents listing the items to be noted, checked, remembered and delivered when completing the accompanying template.
Page 26 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
3.1.2. Responsibilities
Business Owner: The Business Owner is the principal authority on matters regarding the expression of business needs, the interpretation of functional requirements language, and the mediation of issues regarding the priority, scope and domain of business requirements. The Business Owner must understand what constitutes a requirement and must take ownership of the requirements and input and output. The Business Owner champions the proposed investment to the IT governance body to gain approval. Critical Partners: The Critical Partners participate in the Architecture Review and review the Business Needs Statement. Enterprise Architecture: Validate alignment of the Business Needs statement with the Enterprise Architecture. Determine if the preliminary enterprise architecture review reveals any duplication or interferes, contradicts, or can leverage another existing or proposed investment, if the project addresses compliance with PMA and HHS goals, and if there is any impact on the Enterprise Architecture or the infrastructure. Security: Determine if the Business Needs Statement contains any potential security concerns. Budget: Determine if the Business Needs Statement ensures that adequate financial resources are available. CPIC: Verify that the initial scope of the project will adequately address requirements specified in the Business Needs Statement.
Page 27 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37
3.1.3. Activities
Activities during the Initiation Phase are designed to determine whether or not the proposed investment aligns with the mission of the organization, supports the achievement of a short term and/or long term goal(s), and justifies development of a full Business Case and preliminary Project Management Plan.
Page 28 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
In the Concept Phase, sufficient requirements detail is developed to support the detailed cost and schedule estimates, alternatives analyses, and other elements of the Business Case and preliminary Project Management Plan. The primary outcome of the Concept Phase is the proposal and approval of the cost, schedule, and performance baselines.
3.2.2. Responsibilities
Business Owner: The Business Owner is responsible for ensuring that adequate financial and business process resources are made available to support the investment once approved and selecting the Project Manager. Project Manager: The Project Manager develops the Business Case and preliminary Project Management Plan. Critical Partners: Critical Partners review and comment on the Business Case and participate in the Project Selection Review. Enterprise Architecture: Establish that the outcomes or results of executing the project are included in the Target Enterprise Architecture and that they are aligned to the HHS IT Strategic Plan. Ascertain that the Alternatives Analysis considers the use of existing systems and/or GOTS/COTS products. Verify that the business processes are modeled in sufficient detail. Security: Conclude that all applicable security and privacy standards have been considered in sufficient detail as part of the Business Case. Verify that a high level security analysis and a preliminary risk assessment are complete and justify proceeding to the Planning Phase. Verify that the investment has been appropriately categorized according to FIPS-199 and that an initial accreditation boundary has been established. Acquisition: Ascertain if a preliminary Acquisition Strategy that is appropriate to the level of the requirements definition is part of the Business Case, and includes performance-based acquisitions. Verify that the overall acquisition strategy includes consideration of internal versus external acquisition, re-use, the use of commercial offthe-shelf technologies, and, if Requests for Information are necessary, how contracting work will be divided, and expected contract types. Budget: Establish that the Business Case includes a financing and budgeting plan and that there is sufficient requirements detail to support the detailed cost and schedule estimates needed during the Planning and Requirements Analysis Phases. HR: Determine the probability and/or impact of any anticipated workforce disruptions has been reviewed and make certain the need for staffing classifications such as new PDs, grade levels, etc., and potential workforce planning such as employee training or A-76 activities have been evaluated. Section 508: Make sure that plans are in place to incorporate Section 508 requirements in the contract(s). CPIC: Review the Initial Project Plan and Sub-plan/s to ensure that they are adequately developed. Conclude that the required authority and project structural foundation is in place.
Page 29 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39
Performance: Ensure that the approval of the performance baselines is completed. Determine that appropriate potential performance goals are established as part of the Business Case. Conclude that the required authority and project structural foundation is in place.
IT Governance Organization: The IT governance organization conducts the Project Selection Review.
3.2.3. Activities
The following activities are performed as part of the Concept Phase: Establish project sponsorship/ownership. Identify and establish the Business Case for the proposed project. Document the analysis and planning activities. Determine IPT staffing requirements for the project. Review and approve advancement to the next phase.
Every project must have a responsible organization to execute the project. During the Concept Phase, organizational roles and responsibilities, including designation of the proposed Integrated Project Team (IPT) to move the project forward, are documented in a Project Charter. The Business Case should identify why a business capability is necessary and what business benefits can be expected by implementing this project. It is important to state the needs or opportunities in business terms. Avoid identifying a specific product or vendor as the solution. The background information provided should be at a level of detail sufficient to familiarize senior managers with the history, issues and customer service opportunities that can be realized through improvements to business processes with the potential support of IT. This background information must not offer or predetermine any specific automated solution, tool, or product. The Concept Phase involves the appointment of a Project Manager who carries both the responsibility and accountability for project planning and execution. For smaller efforts, this may only involve assigning a project to a manager within an existing organization that already has an inherent support structure. For new projects entailing a significant impact on the organization, a completely new organizational element may be formed - requiring the hiring and reassignment of technical and business specialists. The Project Manager will apply the EPLC framework and other processes and procedures for project activities. These include developing a preliminary Project Management Plan (PMP) that addresses project planning, requirements management, project tracking, contractor management, verification and validation, quality assurance, change management, and risk management. During the Concept Phase, high-level analysis and preliminary risk assessment are performed on the proposed project to establish the business case for proceeding forward in the life cycle. The business process is modeled and possible business and technical alternatives are identified. High-level system requirements, high-level technical design concept/alternatives and cost estimates are prepared. The overall strategy for acquisition is developed, including
Page 30 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
consideration of internal versus external acquisition, whether Requests for Information are necessary, how work will be divided, and expected contract types. The Concept Phase ends with a decision by the IT governance organization of whether or not to approve commitment of the necessary resources to solve the business need.
Page 31 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
3.3.2. Responsibilities
Business Owner: The Business Owner is responsible for authorizing and ensuring that the funding and resources are in place to support the project. Project Manager: The Project Manager is responsible and accountable for the successful execution of the Planning Phase. The Project Manager is responsible for leading the Integrated Project Team that accomplishes the Phase activities and deliverables. Integrated Project Team: The Integrated Project Team members (regardless of the organization of permanent assignment) are responsible for accomplishing assigned tasks as directed by the Project Manager. Critical Partners: Critical Partners assess completeness of Planning Phase activities, robustness of the plans for the next life cycle phase, availability of resources to execute the next phase, and acceptability of the acquisition risk of entering the next phase. For applicable projects, this assessment also includes the readiness to award any major contracting efforts needed to execute the next phase. Enterprise Architecture: Conclude that compliance with Enterprise Architecture has been maintained. Security: Review the PMP Risk Management Plan accurately establishes that the security and privacy requirements have been identified and planned for. Acquisition: Make certain that acquisition activities to obtain contractor support have been completed in compliance with the Project Management Plan. Confirm that detailed activities and timelines for preparing acquisition documents, selecting vendors, and awarding contracts are developed. Budget: Determine if there is a realistic budget to accomplish all planned work and that the Total Cost of Ownership has been evaluated. Finance: Ensure that planning for financial management issues has been properly addressed and that interactions with financial systems are planned in compliance with financial standards and regulations. HR: Find out if required staff development has been documented and planned. Section 508: Verify that Applicable Section 508 standards are identified and planned for and that the vulnerability and impact of being non compliant with Section 508 has been included in the overall risk management planning. CPIC: Determine if the project has been tailored and approvals for any alteration of deliverables and reviews have been obtained and the Project Management Plan SubPlans (including the Risk Management Plan) are fully developed. Performance: Ensure that expected performance benefits are fully defined, that business product deliverables are well-planned, and that funding and resources are allocated.
IT governance organization: During the Project Baseline Review, the IT governance organization examines whether scope, cost and schedule that have been established for the project are adequately documented and that the project management strategy is appropriate for moving the project forward in the life cycle.
Page 32 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37
3.3.3. Activities
The following activities are performed as part of the Planning Phase. The results of these activities are captured in the Project Management Plan. The Project Management Plan (PMP) is the primary managerial document in the life cycle of a project. The components of this document can be tailored to the particular projects circumstances and typically include new or updated plans for: Risk Management Acquisition Change Management Configuration Management Project Categorization Requirements Management Communications Work Breakdown Structure/Project Schedule Independent Verification & Validation Quality Assurance Records Management Staff Development Security Approach
The Project Manager (PM) works with the CIO and Business Owner to verify the scope of the proposed program, participation of the key organizations, and potential individuals who can participate in the formal reviews of the project. This decision addresses both programmatic and information management-oriented participation as well as technical interests in the project that are known at this time. The PM plans the subsequent phases to allow development of the project schedule and budget requirements, and to define the expected performance benefits. The PM also prepares a Project Process Agreement that specifies project deliverables and their expected levels of detail, and documents the justification for tailoring EPLC elements, if any. Detailed activities and timelines for preparing acquisition documents, selecting vendors, and awarding contracts are developed. The Integrated Project Team identifies all alternatives that may address the need and any programmatic or technical risks. The risks associated with further development are also studied. (The results of these assessments are summarized in the Business Case and the Project Management Plan). To ensure that Privacy Act considerations are addressed early in the project lifecycle, the PM also prepares a Privacy Impact Assessment.
Page 33 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43
Phase Specific Exit Criteria: The full scope of the project has been adequately described in the Business Case and the high level requirements meet the business need. The Project Management Plan is fully scaled and details all the appropriate components that address the needs of the project. This includes the definition of appropriately scaled reviews and deliverables. All Deliverables have been defined. The Acquisition Strategy has been approved by the Contracting Officer and there is obligated money for contract awards. All applicable contract clauses have been considered. The risk limits of the Business Owner have been defined and risks of highest impact have been sufficiently addressed with either mitigation or contingency plans. Variances from baselines have been identified and mitigated. [Cost and schedule variances and scope changes are identified, significant variances are explained, and Corrective Action Plans (CAPs) or rebaseline requests are in place as appropriate.] Investment baselines have been reviewed and revised as appropriate. [Should this investment continue as-is, be modified, or be terminated based on current knowledge?] The Project Management Plan and component plans have been reviewed and appropriately updated. [This includes Risk Management, Acquisition Strategy, Change Management, Configuration Management, Project Categorization, Requirements Management, Communication Plan, WBS/Schedule, IV&V Planning, Quality Assurance, Records Management, Staff Development Plan and Security Approach.]
Page 34 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
3.4.2. Responsibilities
Project Manager: The Project Manager is responsible and accountable for the successful planning and execution of the Requirements Analysis Phase. The Project Manager is responsible for leading the Integrated Project Team that accomplishes the Phase tasks and deliverables. Integrated Project Team: The Integrated Project Team members (regardless of the organization of permanent assignment) are responsible for accomplishing assigned tasks as directed by the Project Manager. Contracting Officer: The Contracting Officer is responsible and accountable for preparing solicitation documents under the guidance of the Project Manager. Critical Partners: The Critical Partners provide oversight, advice and counsel to the Project Manager to ensure that the Requirements Document addresses relevant standards. Additionally, Critical Partners provide information, judgments, and recommendations during the Requirements Review. Enterprise Architecture: Find out if requirements provide a suitable basis for subsequent design activities and all service components have been appropriately identified. Determine if technologies and other requirements are consistent with the Enterprise Architecture. Identify relevant technical and/or service standards that will apply to or constrain solution design and development activities. Security: Ensure that an assessment of the required security controls has been completed and determine if requirements reflect alignment with established security standards including the FIPS-199 Categorization and Accreditation Boundary. Acquisition: Review acquisition strategy to ensure it includes necessary requirements analysis, alternatives analysis, and procurement and contract award plans. Ensure that
Page 35 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37
there is sufficient information to make management decisions and evaluate vendor proposals. Budget: Ascertain if requirements are in accord with investment-level cost baselines established at the end of the Planning Phase or a formal change to the Investment Baselines has been requested. Finance: Determine if financial management requirements are in accordance with requirements established at the end of the Planning Phase or a formal change to the Investment Baselines has been requested. HR: By reviewing an update of the Project Management Plan, ascertain if staffing and organizational requirements have been fully documented. Section 508: Make certain that the requirements for applicable Section 508 standards have been identified. CPIC: Determine if the Requirements document contains a traceability matrix that is complete and plans are complete to track technical changes. Establish that the Business Process Models and Logical Data Models are documented at the proper level. Performance: Determine if the requirements are in accordance with investment-level performance baselines established at the end of the Planning Phase or a formal change to the Investment Baselines has been requested.
3.4.3. Activities
The tasks described below are performed during the Requirements Analysis Phase: Requirements elicitation is done during sessions with the users. Business needs are consolidated and affirmed. The functional requirements and the data requirements are then consolidated. The functional requirements are connected to the data requirements. The Requirements Document (RD) is a record of the above requirements. This can be established as a matrix and tracked for satisfaction of every module of the system as development progresses. Documentation from prior phases may need to be revised or updated. The following activities are performed as part of the Requirements Analysis Phase. The results of these activities are captured in the Acquisition Strategy, which also requires additional items not covered by this list: Requirements Analysis Analysis of Alternatives Procurement of Government Human Resources and Services Acquisition Plan Acquisition of Contractor Services if required Solicitation of Services
Page 36 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37
Technical Evaluation Report Source Selection Recommendation Contract Award Adjustment of Funds Contract Performance The Acquisition Strategy should provide adequate information to enable the following actions: Making management decisions concerning procurement of government human resources and services Memorandum of Understanding (MOU) and Service Level Agreement (SLAs) and contractor services procurement, including ensuring the availability of funding. Performing a technical analysis and evaluation of vendor proposals. Vendors bid preparation. The Source Selection Official to base a selection.
The Acquisition Strategy becomes critical after the Requirements Document has been approved. Several acquisitions may be needed to procure an entire system and are a continuous part of the life cycle. The Acquisition Strategy is continuously updated with the active involvement of the Investment Manager and Contracting Officer.
Page 37 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39
3.5.2. Responsibilities
Business Owner: The Business Owner may participate in the Preliminary Design Review. Project Manager: The Project Manager is responsible and accountable for the successful execution of the Design Phase. The Project Manager is responsible for leading the team that accomplishes the phase activities and deliverables. Integrated Project Team: The Integrated Project Team members (regardless of the organization of permanent assignment) are responsible for accomplishing assigned tasks as directed by the Project Manager.
Page 38 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
Contracting Officer: The Contracting Officer is responsible and accountable for preparing solicitation documents under the guidance of the Project Manager. Critical Partners: The Critical Partners participate in a Design Review to ensure compliance with policies in their respective areas and to make any necessary tradeoff decisions if conflicting goals have arisen during the Design. Enterprise Architecture: Conduct a formal review of the high-level architectural design to achieve confidence that the design satisfies the system requirements, is in conformance with the Enterprise Architecture and prescribed design standards. Security: Establish that Security documents (C&A, Privacy Impact Assessment, System of Record Notice, and Computer Match Agreement) are reviewed for completeness and accuracy and that Contingency/Disaster Recovery Plan includes complete procedures, arrangements and responsibilities. Verify that project security risks are identified and mitigation plans are made. Acquisition: Verify that contracts are being fulfilled according to award or approved changes. Budget: Guarantee that the budget is sufficient to meet the needs of the project. Determine if project business risks are identified and mitigation plans are made. Finance: Guarantee that estimates of project expenses have been updated to reflect actual costs and estimates for future phases. Determine if project business risks are identified and mitigation plans are made. HR: Confirm that issues related to staffing, workforce, or other HR areas have been addressed. Section 508: Establish that any new or further requirements that have been discovered that are necessary to accommodate individuals with disabilities have been added to the Requirements Document and the Design documents. Confirm that there are test cases which incorporate Section 508 standards. CPIC: Make sure that the Design is fully documented. Performance: Determine if project technical risks are identified and mitigation plans are made. Verify that performance goals are agreed upon.
IT Governance Organization: The IT governance organization conducts the Preliminary Design Review to achieve agreement and confidence that the design satisfies the functional and non-functional requirements and is in conformance with the enterprise architecture.
3.5.3. Activities
The following tasks are performed during the Design Phase. The Design Document is developed by the Project Manager and Integrated Project Team, identifying the steps used in the design of the application/system. The prerequisites for this phase are the Business Case, Project Management Plan, and Requirements Document. The Project Manager and Integrated Project Team identify/specify the target environment, the development environment and the design environment. The business organization, roles and procedures for designing this system/application are articulated. The Design Document is a
Page 39 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41
deliverable of the Design Phase. Documents from the previous phases are revised as necessary during the Design Phase. In the system design, first the general system characteristics are defined. The data storage and access for the database layer are designed. The user interface at the desktop layer is designed. The business rules layer or the application logic is designed. The interfaces from application to application and application to database also are designed and documented. Based on the Privacy Impact Assessment, developed during the Planning Phase, a System of Record Notice (SORN) is prepared, if required, to inform the public of any information collection by the Business Product about citizens. A Computer Match Agreement (CMA) is also prepared, if needed, to establish the conditions, safeguards, and procedures under which HHS agrees to disclose data where there is a computerized comparison of two or more automated System of Records (SORs). A Contingency/Disaster Recovery Plan is developed containing emergency response procedures; backup arrangements, procedures and responsibilities; and post-disaster recovery procedures and responsibilities. It is included in this phase because many of these factors will affect the design of the system. During the Design Phase, a final draft Test Plan is also prepared. The Test Plan describes the test cases and test environment specifications, and includes a Requirements Traceability Matrix that maps requirements to the specific tests to be conducted in the Test Phase. This final draft Test Plan will be used in the Development Phase to test components as they are built and integrated. The system user community is included in Design Phase actions as needed. New or further requirements might be discovered that are necessary to accommodate individuals with disabilities. If so, these requirements are added to the RD and the design documents.
Page 40 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
Management, Communication Plan, WBS/Schedule, IV&V Planning, Quality Assurance, Records Management, Staff Development Plan and Security Approach.]
Page 41 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38
developed. The Development Phase ends with a Stage Gate Review to determine readiness to proceed to the Test Phase.
3.6.2. Responsibilities
Project Manager: The Project Manager is responsible and accountable for the successful execution of the Development Phase. The Project Manager is responsible for leading the Integrated Project Team that accomplishes the Development Phase activities and deliverables. Integrated Project Team: The Integrated Project Team members (regardless of the organization of permanent assignment) are responsible for accomplishing assigned tasks as directed by the Project Manager. Development Team: Technical personnel that execute projects are expected to follow the EPLC framework and be integral partners in the HHS investment management process. Critical Partners: The Critical Partners provide oversight, advice and counsel to the Project Manager on the conduct and requirements of the Development Phase. Enterprise Architecture: Determine if approved change requests are compliant with the EA Technical Reference Model and do not negatively impact any dependencies on other systems. Security: Make sure that all development plans address safety, security, and privacy concerns. Validate that the test plan includes explicit testing of security controls and functional capabilities. Confirm that the Systems Security Plan and the Security Risk Assessment address all required topics and that an IV&V Assessment has been conducted. Acquisition: Conclude that contracts are being fulfilled according to award or approved changes and required assets (e.g., system hardware, COTS/GOTS software) have been acquired according to regulations. Budget: Verify that the budget is sufficient to meet the needs of the project and project business risks are identified and mitigation plans are made. Finance: Verify that actual expenses are in accordance with the budget plan. HR: Ensure that issues related to staffing, workforce, or other HR areas have been addressed. Section 508: Establish that requirements identified for Section 508 compliance are incorporated into the system. CPIC: Ensure that EVM is being reported accurately and is within acceptable limits or CAP is in place for remediation. Performance: Make sure the Business Product covering the requirements is ready for integration and formal testing. Confirm that Test Plans are complete.
3.6.3. Activities
The Development Phase includes several activities that are the responsibility of the developer. The developer places the outputs under configuration control and performs change control.
Page 42 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41
The developer also documents and resolves problems and non-conformances found in the software products and tasks. The developer selects, tailors, and uses those standards, methods, tools, and computer programming languages that are documented, appropriate, and established by the organization for performing the activities in the Development Phase. Plans for conducting the activities of the Development Phase are developed, documented and executed. The plans include specific standards, methods, tools, actions, and responsibility associated with the development and qualification of all requirements including safety and security. Separate plans may be developed. Verify that the software product covering the documented and baselined requirements in is a sufficient state of readiness for integration and formal testing by an assigned test group (i.e. other than development personnel.) During the Development Phase, the final Test Plan is prepared. In addition, final drafts of the following project deliverables are developed: Business Product Operations and Maintenance (O&M) Manual, describing the Business Product, operating environment, production processing requirements, ongoing maintenance activities, and problem tracking and change management procedures. Systems Security Plan, addressing system managerial, technical, and operational security controls Security Risk Assessment, documenting the analysis of security functional requirements, threat impacts, and system protection requirements Training Plan, describing overall goals and learning objectives; activities to develop, conduct, control, and evaluate training; and staff resource requirements. Training Materials, comprising all artifacts used to train system users, such as instructor and student guides, audio and visual aids, computer-based and other media User Manual, explaining how a business user operates the system
Page 43 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39
Investment baselines have been reviewed and revised as appropriate. [Should this investment continue as-is, be modified, or be terminated based on current knowledge?] The Project Management Plan and component plans have been reviewed and appropriately updated. [This includes Risk Management, Acquisition Strategy, Change Management, Configuration Management, Project Categorization, Requirements Management, Communication Plan, WBS/Schedule, IV&V Planning, Quality Assurance, Records Management, Staff Development Plan and Security Approach.]
Page 44 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38
3.7.2. Responsibilities
Project Manager: The Project Manager is responsible and accountable for the successful execution of the Test Phase. The Project Manager is responsible for leading the Integrated Project Team that accomplishes the Test Phase activities and deliverables. Test and Evaluation Team: The Test and Evaluation Team is responsible for Business Product testing and documentation of test results. Users: Selected users may be required to participate in testing. Critical Partners: The Critical Partners review test procedures and outcomes in their areas. Security: Check that the validation tests confirm the security of the Business Product. Penetration tests and vulnerability scans are executed, documented, and any failed components are reworked. Acquisition: Determine if changes are reviewed to determine if any contract modifications are necessary. Finance: Conclude that Changes are reviewed to determine the financial impact. Section 508: Verify that test plan results for Section 508 testing are satisfactory. CPIC: Determine if the Implementation Plan has a reasonable schedule. Performance: Determine if Measurement indicators support the performance measures agreed upon and validation tests confirm the performance measures. Ensure that system functionality is performing as stated and is able to achieve performance goals.
3.7.3. Activities
The following tasks are completed during the Test Phase: The Project Manager, in conjunction with the Business Owner and CIO, is responsible for establishing the test team and creating the Test Files/Data. The test and evaluation team is responsible for creating/loading the test database(s) and executing the system test(s). All results are documented in the Test Reports. Any failed components are migrated back to the Development Phase for rework, and the passed components migrated ahead for security testing. The test and evaluation team create or load the test database(s) and execute security (penetration) test(s). All tests are documented, similar to those above. Failed components are migrated back to the Development Phase for rework, and passed components will be migrated ahead for acceptance testing. The test and evaluation team create/load the test database(s) and execute the acceptance test(s). All tests are documented similar to those above. Failed components are migrated back to the Development Phase for rework, and passed components migrate ahead for implementation. During this phase, the documentation from all previous phases is finalized to align it with the delivered system. The Project Manager coordinates these update activities.
Page 45 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
During the Test Phase, the project team also develops the final version of the Implementation Plan that describes how the business product will be installed, deployed, and transitioned to the operational environment.
Page 46 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38
phased implementation, and training for using, operating, and maintaining the system are accomplished during the Implementation Phase. From a system security perspective, the final system must be certified and accredited for use in the production environment during the Implementation Phase. The Implementation Phase ends with a formal decision to release the final IT solution into the Operations and Maintenance Phase.
3.8.2. Responsibilities
Project Manager: The Project Manager is responsible and accountable for the successful execution of the Implementation Phase. The Project Manager is responsible for leading the Integrated Project Team that accomplishes the Implementation Phase activities and deliverables. Integrated Project Team: The Integrated Project Team members (regardless of the organization of permanent assignment) are responsible for accomplishing assigned tasks as directed by the Project Manager. Critical Partners: The Critical Partners provide oversight, advice and counsel to the Project Manager on the conduct and requirements of the Implementation Phase. Additionally, they provide information, judgments, and recommendations to the Business Owner and IT governance organization during investment reviews and in support of Investment Baselines. Enterprise Architecture: Confirm that approved change requests are compliant with the Enterprise Architecture. Security: Determine if the Authority to Operate, including the System Certification and Accreditation, is complete and System of Record Notice is published. Acquisition: Guarantee that the contracts are being fulfilled according to award or approved changes and completed contracts are closed appropriately. Budget: Ascertain if change requests are reviewed to determine if a new financial analysis is required. Finance: Ascertain if actual expenses are in accordance with the budget plan. HR: Find if issues related to staffing, workforce, or other HR areas have been addressed. Section 508: Establish is implementation has maintained the integrity of Section 508 compliance. CPIC: Confirm that the project is still within the original scope and that current Implementation Plan is reasonable. Performance: Confirm that the completed Business Product is operating as expected and is positioned to meet performance targets.
IT Governance Organization: The IT governance organization conducts the Operational Readiness Review.
3.8.3. Activities
The following activities are performed as part of the Implementation Phase. All affected users and organizations affected are notified of the implementation. Additionally, it is good policy to make internal organizations not directly affected by the implementation
Page 47 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39
aware of the schedule so that allowances can be made for a disruption in the normal activities of that section. The notification should include: The schedule of the implementation A brief synopsis of the benefits of the new system The difference between the old and new system Responsibilities of end user affected by the implementation during this phase The process to obtain system support, including contact names and phone numbers
Typically, implementation includes converting existing data for use in the new system. The tasks for this effort are two-fold: data input and data verification. When replacing a manual system, hard copy data is entered into the automated system. Some sort of verification that the data is being entered correctly should be conducted throughout this process. This is also the case in data transfer, where data fields in the old system may have been entered inconsistently and therefore affect the integrity of the new database. Verification of the old data becomes imperative to a useful computer system. One of the ways verification of both system operation and data integrity can be accomplished is through parallel operations. Parallel operations consist of running the old process or system and the new system simultaneously until the new system is certified. In this way if the new system fails in any way, the operation can proceed on the old system while the bugs are worked out. To ensure that the system is fully operational, install the system in a production environment. During this phase, the documentation from all previous phases is finalized to align it with the delivered system. The Project Manager coordinates these update activities. Prior to the Operational Readiness Review, the Authority to Operate must be obtained and a System of Record Notice published. Final versions of the following documents are prepared during the Implementation Phase, and are required before the project proceeds to the Operations and Maintenance Phase: Business Product Project Completion Report Service Level Agreements (SLAs) and Memoranda of Understanding (MOU) Contingency/Disaster Recovery Plan Operations and Maintenance (O&M) Manual Systems Security Plan Security Risk Assessment Training Plan Training Materials User Manual
Page 48 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44
Business Product ready for production service and notification of the new solution is provided to all users and staff who are affected. No outstanding concerns among stakeholders regarding implementation. Security and authorization to operate documents are complete and the system is considered Certified and Accredited Variances from baselines have been identified and mitigated. [Cost and schedule variances and scope changes are identified, significant variances are explained, and Corrective Action Plans (CAPs) or rebaseline requests are in place as appropriate.] Investment baselines have been reviewed and revised as appropriate. [Should this investment continue as-is, be modified, or be terminated based on current knowledge?] The Project Management Plan and component plans have been reviewed and appropriately updated. [This includes Risk Management, Acquisition Strategy, Change Management, Configuration Management, Project Categorization, Requirements Management, Communication Plan, WBS/Schedule, IV&V Planning, Quality Assurance, Records Management, Staff Development Plan and Security Approach.]
Page 49 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
strike a firm balance between authorizing the operation of information systems necessary to support completion of the business mission, while ensuring that an adequate level of information security is in place. The objective is to strive to implement the most effective security controls, in consideration of technical, budgetary, time, and resource limitations, while continuing to support business mission requirements. The third review is the Post-Implementation Review (PIR). After a period of sustained operation (after at least one full processing and reporting cycle has been completed and all users have been trained and are comfortable with the operation), a PIR is conducted of the completed IT solution or automated system/application that was released into the production environment to determine if it is operating as expected. The purpose of the review is to ascertain the degree of success from the project (in particular, the extent to which it met its objectives, delivered planned levels of benefit, and addressed the specific requirements as originally defined), to examine the efficacy of all elements of the working business solution to see if further improvements can be made to optimize the benefit delivered, and to learn lessons from the project that can be used to improve future project work and solutions.
3.9.2. Responsibilities
Project Manager: The Project Manager develops, documents, and executes plans and procedures for conducting activities and tasks of the Operations and Maintenance Phase. To provide for an avenue of problem reporting and customer satisfaction, the Project Manager should create and discuss communications instructions with the Business Products customers. Project Managers should keep Help Desk personnel informed of all changes to the Business Product, especially those requiring new instructions to users. Technical Support: Personnel who provide technical support to the Business Product. This support may involve granting access rights to the program, setup of workstations or terminals to access the system, and maintenance of the operating system for both server and workstation.
Page 50 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
Technical support personnel may be involved with issuing user IDs or login names and passwords. In a client-server environment, technical support may perform systems scheduled backups and operating system maintenance during downtime. Vendor Support: The technical support and maintenance on some programs are provided through vendor support. A contract is established outlining the contracted systems administration, operators, and maintenance personnel duties and responsibilities. One responsibility which should be included in the contract is that all changes to the system will be thoroughly documented. Help Desk: Help Desk personnel provide the day-to-day users help for the Business Product. Help desk personnel should be kept informed of all changes or modifications to the Business Product. Help Desk personnel are contacted by the users when questions or problems occur with the daily operations of the system. Help Desk personnel need to maintain a level of proficiency with the Business Product. Operations or Operators (turn on/off systems, start tasks, backup etc): For many mainframe systems, an operator provides technical support for a program. The operator performs scheduled backup, performs maintenance during downtime and is responsible to ensure the system is online and available for users. Operators may be involved with issuing user IDs or login names and passwords for the system. Customers: The customer needs to be able to share with the project manager the need for improvements or the existence of problems. Some users live with a situation or problem because they feel they must. Customers may feel that change will be slow or disruptive. Some feel the need to create work-arounds. A customer has the responsibility to report problems, make recommendations for changes to a system, and contribute to Operational Analyses. Program Analysts or Programmer: Interprets user requirements, designs and writes the code for specialized programs. User changes, improvements, enhancements may be discussed in Joint Application Design sessions. Analyzes programs for errors, debugs the program and tests program design. Configuration Control Board: A board of individuals may be convened to approve recommendations for changes and improvements to the Business Product. This group may be chartered. The charter should outline what should be brought before the group for consideration and approval. The board may issue a Change Directive. Users Group or Team: A group of computer users who share knowledge they have gained concerning a program or system. They usually meet to exchange information, share programs and can provide expert knowledge for a system under consideration for change. Contract Manager: The Contract Manager has many responsibilities when a contract has been awarded for maintenance of a program. The Contract Manager should have a certificate of training for completion of a Contracting Officers Technical Representative (COTR) course. The Contract Managers main role is to make sure that the interests of the Contracting Office are protected and that no modifications are made to the contract without permission from the Contracting Office. Data Administrator: Performs tasks which ensure that accurate and valid data are entered into the Business Product. Sometimes this person creates the information systems database,
Page 51 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38
maintains the databases security and develops plans for disaster recovery. The data administrator may be called upon to create queries and reports for a variety of user requests. The data administrators responsibilities include maintaining the databases data dictionary. The data dictionary provides a description of each field in the database, the field characteristics and what data is maintained with the field. Telecommunications Analyst and Network System Analyst: Plans, installs, configures, upgrades, and maintains networks as needed. If the investment requires it, they ensure that external communications and connectivity are available. Information Systems Security Officer (ISSO): The ISSO has a requirement to review system change requests, review and in some cases coordinate the Change Impact Assessments, participate in the Configuration Control Board process, and conduct and report changes that may be made that affect the security posture of the system. Critical Partners: The Critical Partners provide oversight, advice and counsel to the Project Manager during the Operations and Maintenance Phase. Enterprise Architecture: Confirm that the business product is being operated in accord with Enterprise Architecture guidelines. Security: Determine if the Authority to Operate, System Certification and Accreditation and Privacy Impact Assessments are reviewed and updated at the appropriate times for continued operation. Ensure that Security documents are updated as necessary in response to continuous testing and monitoring. Confirm that system backups, physical security, contingency planning, and continuous security monitoring and testing are operated in accord with established security controls. Acquisition: Guarantee that contracts are being fulfilled according to award or approved changes. Budget: Determine if modification requests include appropriate justification and cost benefit analysis. Finance: Ascertain if actual expenses are in accordance with the budget plan. HR: Verify that issues related to staffing, workforce, or other HR areas have been addressed. Section 508: Ascertain that ongoing change requests incorporate requirements for Section 508. CPIC: Ensure that Operational Analysis is within acceptable limits. Performance: Confirm service level objectives are being met and that performance measurements and system logs are being maintained. Determine that modifications needed to resolve errors or performance problems are made in accord with change control procedures. Ensure that annual Operational Analysis is performed to evaluate system performance and user satisfaction to verify that risk and performance goals are under control.
Page 52 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39
3.9.3. Activities
Operations support is an integral part of the day-to-day operation of a system. In small systems, all or part of each task may be done by the same person. But in large systems, each function may be done by separate individuals or even separate areas. The O&M Manual was completed in the Implementation Phase. This document defines tasks, activities, and responsible parties and needs to be updated as changes occur. Systems operations activities and tasks need to be scheduled, on a recurring basis, to ensure that the production environment is fully functional and is performing as specified. The following is a checklist of systems operations key tasks and activities: Ensure that systems and networks are running and available during the defined hours of operation. Implement non-emergency requests during scheduled outages, as prescribed in the O&M Manual. Ensure all processes, manual and automated, are documented in the operating procedures. These processes should comply with the system documentation. Acquisition and storage of supplies, e.g., paper, toner, tapes, removable disks. Perform and test backups (day-to-day protection, contingency, and recovery). Perform the physical security functions including ensuring adequate uninterruptible power supply and ensuring that personnel have proper clearances and proper access privileges, etc. Ensure contingency planning for disaster recovery is current, tested, and funded. Ensure users are trained on current processes and new processes. Provide periodic refresher training and ensure funding. Ensure that service level objectives are kept accurate and are monitored. Maintain performance measurements, statistics, and system logs. Examples of performance measures include volume and frequency of data to be processed in each mode, order and type of operations. Monitor security controls and performance statistics, report the results, and escalate problems when they occur.
Data/software administration is needed to ensure that input data and output data and databases are correct and continually checked for accuracy and completeness. This includes ensuring that any regularly scheduled jobs are submitted and completed correctly. Software and databases should be maintained at (or near) the current maintenance level. The backup and recovery processes for databases are normally different than the day-to-day data/software administration volume backups. The backup and recovery process of the databases should be performed as a data/software administration task. A checklist of data/software administration tasks and activities includes the following: Performing production control and quality control functions (job submission, checking and corrections).
Page 53 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
Interfacing with other functional areas for day-to-day checking/corrections. Installing, configuring, upgrading and maintaining database(s). This includes updating processes, data flows, and objects (usually shown in diagrams). Developing and performing data/database backup and recovery routines for data integrity and recoverability. Ensuring all processes are documented properly in the Operations Manual. Developing and maintaining a performance and tuning plan for online process and databases. Performing configuration, security and design reviews/audits to ensure software, system, parameter, and configuration are correct. Perform patching of software for the system. Manage and control configuration and changes to the system.
One fact of life with any system is that change is inevitable. Users need an avenue to suggest changes and identify problems. A User Satisfaction Review which can include a Customer Satisfaction Survey can be designed and distributed to obtain feedback on operational systems to help determine if the systems are accurate and reliable. Systems administrators and operators need to be able to make recommendations for upgrades to hardware, architecture and streamlining processes. For small in-house systems, modification requests can be handled by an in-house process. For large integrated systems, modification requests may be addressed in the Requirements Document and may take the form of a change package and may require justification and cost benefits analysis for approval by a review board. The Requirements Document for the project may call for a modification cut-off and rollout of the system as a first version and all subsequent changes addressed as a new or enhanced version of the system. A request for modifications to a system may also generate a new project and require a new project initiation plan. Daily operations of the system/software may necessitate that maintenance personnel identify potential modifications needed to ensure that the system continues to operate as intended and produces quality data. Daily maintenance activities for the system must take place to ensure that any previously undetected errors are fixed. Maintenance personnel may determine that modifications to the system and databases are needed to resolve errors or performance problems. Also, modifications may be needed to provide new capabilities or to take advantage of hardware upgrades or new releases of system software and application software used to operate the system. New capabilities may take the form of routine maintenance or may constitute enhancements to the system or database as a response to user requests for new/improved capabilities. New capability needs may begin a new problem modification process described above. At the beginning of this phase any outstanding Plans of Action and Milestones (POA&Ms) must be completed. Throughout the phase, continuous security monitoring of selected controls must be conducted. In addition, periodic reviews of controls, periodic re-evaluation of information categorization and re-certifications and revision of risk assessments and security plans, and recertification and re-authorizations to process (re-accreditation) are conducted as required. Because systems undergo periodic maintenance, enhancements and improvement, mini life cycles
Page 54 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
may be required throughout this stage. Continuous vigilance should be given to virus and intruder detection. The Project Manager must be sure that security operating procedures are kept updated accordingly. Review and update system documentation including the operations from the previous phases. In particular, the Operations Manual, Business Case Analysis, and Contingency/Disaster Recovery Plan (including results of tests during this phase) need to be updated as required and finalized during the O&M Phase. Reporting of security incidents related to the system is also conducted during this phase. Periodically, a Continued Authority to Operate must also be prepared to assure that risks are assessed and the approving authority explicitly identifies risks to HHS operations, assets and individuals. System changes may also create new privacy risks. For such changes, OMB requires that Privacy Impact Assessments (PIAs) are performed and updated as necessary to reflect new or changed information collection authorities, business processes, or other factors affecting the collection and handling of information in identifiable form Inevitably, changes in requirements and technology will necessitate the replacement of IT systems. To facilitate that transition, a Disposition Plan is prepared to describe how the retirement of the system will be conducted and how records management will be addressed for both the system documentation and the Business Product.
Page 55 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41
Page 56 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
3.10.2. Responsibilities
Project Manager: Authors the Disposition Plan and ensures that all aspects of the Disposition Plan are followed. The Disposition Plan should outline all roles and responsibilities for all actions related to the close down and archive of the system. Technical Support or Vendor Support: The Disposition Plan may call for the Technical Support Personnel to send system related hardware to a warehouse or may reassign equipment to a new or replacement system. Technical Support Personnel or Operators may perform the cutoff of users access per instructions from the Security Manager. Technical Support personnel may assist with the archive of the Information Systems data. Data Administrator: The Disposition Plan may direct that only certain Business Product data be archived. The Data Administrator would identify the data and assist technical personnel with the actual archive process. The Data Administrator may be involved with identifying data which due to its sensitive nature must be destroyed. They would also be involved with identifying and migrating data to a new or replacement Business Product. User Services (Training & Help Desk): User Services includes training, telecommunications, and Help Desk personnel. The training component coordinates and schedules the development and delivery of all training and facilitates the development of systems training methods and materials. In this phase, User Services may assist with the retraining of users to facilitate the transfer to a new or replacement Business Product. Operations: (turn off systems, start tasks, backup, etc.) Operations interfaces with the computer facility that hosts the Business Product being terminated. This group also schedules, executes, and verifies production job streams; distributes specified outputs; handles other production control activities; and maintains and monitors centralized mainframe database management system software and runtime environments. It also acquires, maintains, customizes and tunes operating system software, assesses the affect of new or changed systems upon the operational environments, manages system software capacities, and advises on or arranges accommodation of new application systems. In this phase, the Operators would assist Technical Support, Security Manager and Data Administrators with the actual archive process. Security Managers: The Security Managers need to make sure that all access authority has been eliminated for the users. Any users that only use the application should be removed from the system while others that use other applications as well as this one may still need access to the overall system, but not the application being shutdown. If there is another application that is taking the place of this application, the Security Managers should coordinate with the new Security Managers. Critical Partners: The Critical Partners handle transition reviews in their areas. EA: Make certain that the system is marked as decommissioned in the Enterprise Architecture and that any dependencies or relationships to the expired system are redirected or similarly expired if no replacement capability exists. Perform impact analysis to determine what changes need to be made to the architecture as a result of the disposition. This includes impact to any dependent systems.
Page 57 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36
Security: Guarantee that access authorities are removed, that data is properly migrated, and that all hardware and data storage devices have been sanitized to ensure no sensitive data is compromised. Acquisition: Verify that completed contracts are closed appropriately. Budget: Ascertain that the financial implications of the transition are reviewed for budget impacts. Finance: Finance: Make certain that final payments to contractors are made; project financial information/status is updated accordingly. HR: HR: Verify that workforce information is updated, and staff re-assignments are executed. CPIC: Establish that Lessons Learned have been prepared so that other HHS projects can benefit from them. Ensure that all documentation is complete and archived.
3.10.3. Activities
The tasks and activities required are dependent on the nature of the project. The retirement activities are performed at the end of the project life cycle. The Disposition Plan must be developed and implemented. The Disposition Plan identifies How the retirement of the system/data will be conducted and when. The system retirement date. Software components to be preserved. Data to be preserved. Retirement of remaining equipment. Archiving of life cycle products.
Project Archives include the system data, software, and documentation designated for archiving in the Disposition Plan. The data from the old system are migrated into the new system or archived. Similar to the data that is archived or transferred, the software components will need to be transferred to the new system, or if that is not feasible, dispositioned appropriately. The documentation that resulted from the development of the application or system needs to be archived, where it can be referenced, if needed, at a later date. Follow the plan in the Disposition Plan for the orderly breakdown of the system, its components and the data within. If the equipment can be used elsewhere in the organization, it should be recycled. If it is obsolete, notify the property management office to excess all hardware components.
Page 58 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Data archiving, security, and data and systems migrations are complete. If appropriate, has the migration of data and the function to a new system been wellplanned. Final phase-end review has been conducted. The Project Management Plan and component plans have been reviewed and appropriately updated. [This includes Risk Management, Acquisition Strategy, Change Management, Configuration Management, Project Categorization, Requirements Management, Communication Plan, WBS/Schedule, IV&V Planning, Quality Assurance, Records Management, Staff Development Plan and Security Approach.]
Page 59 of 79
1 2 3 4 5 6 7 8 9
Investment Project A
10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33
Project B Project C
When that is necessary, Project Managers will be assigned to the individual projects and they will be responsible to the Investment Manager for all aspects of the EPLC for that project. The Investment Manager undertakes the role of the IT governance organization, as depicted in Section 3, to provide independent review and approval of project plans, reviews and deliverables. The Investment Manager may rely upon Critical Partners to assist in reviewing EPLC deliverables and conducting Stage Gate Reviews. The Investment Manager is, in turn, responsible to the IT governance organization for the planning and execution of the overall investment. In some ways, the investment will represent a roll-up of individual investments (primarily in quantitative factors like expenditures). In other ways, the investment will need to express an investment-level view that integrates the status of the subordinate projects. Because investments may have projects that are in different life cycle phases at any one time (e.g., one project may be in development as another enters planning), the Investment Manager must develop a customized investment-level management plan that defines life cycle cost, schedule and performance baselines, phases and Stage Gate Reviews that are appropriate to the overall investment. The investment-level life cycle of an investment with multiple projects should be patterned after the EPLC framework, but will be unique depending on the deployment of the projects that make up the investment. The IT governance organization must approve the investment-level baselines (cost, schedule and performance), and the investment life cycle phases, activities, deliverables and Stage Gate Reviews appropriate to adequate oversight of the investment, taking into consideration the project-level activity that is planned.
Page 60 of 79
1 2 3
See Glossary
See Deliverables x x x
x x x x x x x x x x x x x x x x x x x x x x x x x x
Page 61 of 79
1 2
APPENDIX B: GLOSSARY
The table below is a glossary of terms used in the EPLC Overview Document.
Application
The use of information resources (information and information technology) to satisfy a specific set of user requirements (OMB A-130, App. III). In particular, an application is usually considered to be the software component of a system. An application runs on, and may or may not be part of, a general support system. The terms application and information system are sometimes used interchangeably although the latter has a broader definition to include general support systems.
Baseline
Baselines are the standard against which actual work is measured. Baselines are used in the annual report to Congress required by Federal Acquisition Streamlining Act Title V on variances of 10 percent or more from cost and schedule goals and any deviation from performance (scope) goals. Baseline cost and schedule goals should be realistic projections of total cost, total time to complete the project, and interim cost and schedule goals. Performance (scope) goals should be realistic assessments of what the investment or project is intended to accomplish, expressed in quantitative terms, if possible. The executive in charge of the organization, who serves as the primary customer and advocate for an IT project. The Business Owner is responsible for identifying the business needs and performance measures to be satisfied by an IT project; providing funding for the IT project; establishing and approving changes to cost, schedule and performance goals; and validating that the IT project initially meets business requirements and continues to meet business requirements. The CPIC process is an integrated, structured methodology to managing IT investments, which ensures that IT investments align with HHS mission and support business needs while minimizing risks and maximizing returns throughout the investments lifecycle. CPIC uses a systematic selection, control, and continual evaluation process to ensure that an investment supports HHS mission and business needs. C&A is composed of those activities and processes required to maintain security of information systems, periodically review the security controls, and maintain the certification and authorization of the information system to operate. This process includes activities involved in the security planning and security testing certification and authorization processes. The C&A phase of the security process is where the system staff (outlined in the security documentation) performs the day-to-day functions required to maintain an appropriate level of security to protect the system. This phase is ongoing while the system is in operation.
Business Owner
Page 62 of 79
The Office of the Chief Information Officer advises the Secretary and the Assistant Secretary for Resources and Technology (ASRT) on matters pertaining to the use of information and related technologies to accomplish Departmental goals and program objectives. The mission of the Office is to establish and provide: Assistance and guidance on the use of technology-supported business process reengineering; investment analysis; performance measurement; strategic development and application of information systems and infrastructure; policies to provide improved management of information resources and technology; and better, more efficient service to our clients and employees. The HHS CIO Council, a cross-OPDIV review committee comprised of the OPDIV CIOs and chaired by the HHS CIO, is responsible for reviewing the technical and managerial soundness of IT investments and providing technical recommendations to the ITIRB. COTS refers to a product available in the commercial market place. COTS products are sold to the general public in the course of normal commercial business operations at prices based on established catalog or market prices (Federal Acquisition Regulations). COTS products are delivered with pre-established functionality, although some degree of customization is possible. The Contracting Officer has the authority to enter into, administer, and/or terminate contracts and make related determinations and findings. The term includes certain authorized representatives of the contracting officer acting within limits of their authority as delegated by the contracting officer. The contracting officer and/or his representative is accountable for preparing solicitation documents with technical support from the Project Manager and acting on behalf of the Head of the Contracting Activity. This phase of the CPIC process ensures that IT initiatives are developed and implemented in a disciplined, well-managed, and consistent fashion; that project objectives are being met; that the costs and benefits were accurately estimated; and that spending is in line with the planned budget. This promotes the delivery of quality products and results in initiatives that are completed within scope, on time, and within budget. The Critical Partners are functional managers in Enterprise Architecture, Security, Acquisition Management, Finance, Budget and Human Resources that participate in IT investment reviews and governance decisions to ensure compliance with policies in their respective areas and to make timely tradeoff decisions where conflicts arise during the planning and execution of an investment. Earned Value Management integrates the scope of work with schedule and cost elements for optimum planning and control. The qualities and operating characteristics of earned value management systems are described in American National Standards Institute (ANSI) /Electronic Industries Alliance (EIA) Standard748-1998, Earned Value Management Systems.
CIO Council
Control Phase:
Critical Partner
Page 63 of 79
Enterprise Architecture is a strategic information asset base which defines business mission needs, the information content necessary to operate the business, the information technologies necessary to support business operations, and the transitional processes necessary for implementing new technologies in response to changing business mission needs. Enterprise architecture includes baseline architecture, target architecture and a sequencing plan. The EPLC is a framework to enhance IT governance through rigorous application of sound investment and project management principles and industry best practices. The EPLC provides the context for the HHS IT governance process and describes interdependencies between its project management, investment management, and capital planning components. The EPLC is comprised of 10 phases from initiation through disposition and identifies the activities, roles and responsibilities, Stage Gate Reviews, and exit criteria for each phase. The EPLC framework complies with federal regulations and policies, industry best practices, and HHS policies and standards. This phase of the CPIC process involves comparing actual to expected results once an IT investment has been implemented; evaluating mature systems on their continued effectiveness in supporting mission requirements, and evaluating the cost of continued support or potential retirement and replacement. Functional requirements specify Business Product features and what the Business Product must do. They are directly derived from the objectives defined in the Project Management Plan. A functional requirement is a tangible service, or function, that the Business Product must provide and is a non-technical requirement. See also Non-functional Requirements. GOTS refers to a product developed by or for a government agency and that can be used by another government agency with the products pre-established functionality and little or no customization. IV&V is a process employing rigorous methodologies for evaluating the correctness and quality of the product, conducted by personnel not directly engaged in the development of the product. IV&V is a way to ensure that the Business Product is developed in accordance with customer requirements, and that the product is wellengineered. Validation is concerned with checking that the product meets the user needs; Verification is concerned with checking that the product is well engineered. This is sometimes expressed as "Are we building the right product (or system)?" and "Are we building the product (or system) right?" Therefore, IV&V typically performs in-depth technical analyses of the products and the processes of system development. IV&V advises the customers when signs of problems begin to emerge so that the customer can make plans to deal with the situations.
Evaluate Phase:
Functional Requirements
Page 64 of 79
Information technology, as defined by the Clinger-Cohen Act of 1996, sections 5002, 5141, and 5142, means any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information. For purposes of this definition, equipment is used by an agency whether the agency uses the equipment directly or it is used by a contractor under a contract with the agency that (1) requires the use of such equipment or (2) requires the use, to a significant extent, of such equipment in the performance of a service or the furnishing of a product. Information technology includes computers, ancillary equipment, software, firmware and similar procedures, services (including support services), and related resources. It does not include any equipment that is acquired by a Federal contractor incidental to a Federal contract. The ITIRB is a cross-functional executive review committee responsible for overseeing the management of the HHS IT portfolio, approving and prioritizing IT investments to best achieve HHS strategic goals and objectives, and leveraging opportunities for collaboration across HHS OPDIVs on IT investments that support common lines of business. The HHS ITIRB shall ensure that the HHS IT investment portfolio is of the highest quality and meets the business needs of the Department in the most effective and efficient manner. An organizational investment employing or producing IT or IT-related assets. Each investment has or will incur costs for the investment, has expected or realized benefits arising from the investment, has a schedule of project activities and deadlines, and has or will incur risks associated with engaging in the investment. The combination of all IT assets, resources, and investments owned or planned by an organization in order to achieve its strategic goals, objectives, and mission. A project is a temporary planned endeavor funded by an approved information technology investment; thus achieving a specific goal and creating a unique product, service, or result. A project has a defined start and end point with specific objectives that, when attained signify completion The IPT is established by the manager of each IT investment with technical and critical partner expertise appropriate to the size, complexity and operational requirements of the investment. An IPT typically shall consist of representatives from the business office, including any applicable subject matter experts, technical IT staff, budget, acquisition, security, and EA. The Investment Manager is responsible for planning and executing the investment to achieve approved baselines. The IM may or may not be a subject matter expert in the business area supported by the investment. The IT governance organization at HHS and at each OPDIV is responsible for ensuring that investments are technically sound, follows established IT investment management practices, and meets the Business Owners needs. Components of the IT governance organization are the ITIRB, the CIO Council (Technical Review Board at the OPDIV level), the Chief Information Officer, and CPIC Manager.
IT Investment
IT Portfolio IT Project
IT Governance Organization
Page 65 of 79
Non-functional Requirements
Non-functional requirements specify the criteria that are used to judge the operation of a Business Product, rather than specific behaviors (in contrast to functional requirements, which describe behavior or functions). Typical non-functional requirements are reliability, scalability, accessibility, performance, availability, and cost. Other terms for non-functional requirements are constraints, quality attributes, and quality of service requirements". Non-functional requirements also specify the laws, regulations, and standards with which the Business Product must comply. A project is a temporary planned endeavor funded by an approved investment; thus achieving a specific goal and creating a unique product, service, or result. A project has a defined start and end point with specific objectives that, when attained signify completion The Project Manager is responsible for project performance in relation to approved cost, schedule and performance baselines. The PM maintains information project status, control, performance, risk, corrective action and outlook. This person is accountable to the Business Owner for meeting business requirements and to IT governance for meeting IT project management requirements. The PM shall develop the business case in conjunction with the Business Owner to clearly define and capture business need requirements, conduct project planning to adequately define and execute the tasks required to meet approved cost, schedule and performance baselines and conform to HHS policies that apply to IT projects. Project Managers shall be responsible for timely reporting of significant variances from approved baselines and providing corrective action plans or rebaselining proposals as appropriate. Records Management consists of the planning, controlling, directing, organizing, training, promoting, and other managerial activities involved in records creation, maintenance and use, and disposition in order to achieve adequate and proper documentation of the policies and transactions of the Federal Government and effective and economical management of agency operations (44 U.S.C. 2901). Requirements specify what should be produced. They are descriptions of either how the Business Product should behave (functional requirements), or of how the Business Product must comply with laws, regulations, and standards (nonfunctional requirements). An uncertain event that may affect the performance objectives (i.e., cost, schedule, scope or quality) of an investment, usually negatively. An approach for addressing the risks associated with investment. Risk management includes identification, analysis, prioritization, and control of risks. Especially critical are those techniques that help define preventative measures to reduce the probability of these factors from occurring and identify countermeasures to successfully deal with these constraints if they develop. Cost and schedule estimates based on high-level requirements, and an overall prediction of work to be done to satisfy those requirements. Typically, ROM estimates are based on approximate cost models or expert analysis, and presented as a range.
Project
Records Management
Requirements
Risk
Risk Management
Page 66 of 79
Section 508
Section 508 refers to Section 508 of the Rehabilitation Act of 1973 (29 U.S.C. 794d), which requires Federal agencies to develop, procure, maintain, or use electronic and information technology that is accessible to Federal employees and members of the public with disabilities. This phase of the CPIC process ensures that IT investments are chosen that best support the Agencys mission and align with HHS approach to enterprise architecture. A comprehensive architectural response to a business problem. Solutions address all layers of the Enterprise Architecture - strategy, business, data, applications and technology/security. Phase-driven go/no-go decision points where EPLC activities are reviewed to ensure that appropriate OMB and HHS requirements are observed. A system cannot proceed without a go decision by the appropriate senior manager for the specific control gate. The Privacy Act defines a SOR as a group of any records under the control of a Federal agency from which information is retrieved by the name of the individual or by some identifying number, symbol, or other identifying particular assigned to the individual. Additionally, the Privacy Act requires that the Federal government inform the public of any collection of information about its citizens from which data are retrieved by a unique identifier as described above
Select Phase
Solution
Stage Gate
Page 67 of 79
1 2
Deliverable Description
Concept Business Case with components (Final) Business Process Models (BPMs) Investment/Project (e.g., FIPS199 categorization needed for security) High-Level Requirements Preliminary Acquisition Strategy Project Charter (Final)
The Business Case is a documented, structured proposal for business improvement that is prepared to facilitate a selection decision for a proposed investment or project by organizational decision makers. The Business Case describes the reasons and justification for the investment or project in terms of business process performance, needs and/or problems, and expected benefits. It identifies the highlevel requirements that are to be satisfied, an analysis of proposed alternative solutions (with reasons for rejecting or carrying forward each option), assumptions, constraints, a risk-adjusted cost-benefit analysis, and preliminary acquisition strategy. The Project Charter formally authorizes a project, describes the business need for the project and the product to be created by the project. It provides the project manager with the authority to apply up to a certain level of organizational resources to project activities. The Project Management Plan (PMP) is a dynamic formal approved document that defines how the project is executed, monitored and controlled. It may be summary or detailed and may be composed of one or more subsidiary management plans and other planning documents. The main objective of the PMP is to document assumptions and decisions for how the project is to be managed, to help in communication between all of the concerned parties and to document the scope, costs and time sequencing of the project.
Project Management Plan (PMP) with components (Preliminary) Risk Management Acquisition Strategy Change Management Configuration Management Project Categorization Requirements Management Communications Plan Work Breakdown Structure (WBS) /Project Schedule IV&V Planning Quality Assurance Records Management Staff Development Plan Security Approach Planning Project Management Plan (PMP) with components (Final)
The Project Management Plan (PMP) is a dynamic formal approved document that defines how the project is executed, monitored and
Page 68 of 79
Deliverable
Risk Management Acquisition Strategy Change Management Configuration Management Project Categorization Requirements Management Communications Plan Work Breakdown Structure (WBS) /Project Schedule IV&V Planning Quality Assurance Records Management Staff Development Plan Security Approach
Deliverable Description
controlled. It may be summary or detailed and may be composed of one or more subsidiary management plans and other planning documents. The main objective of the PMP is to document assumptions and decisions for how the project is to be managed, to help in communication between all of the concerned parties and to document the scope, costs and time sequencing of the project.
Privacy Impact Assessment (PIA) Based on the initial FIPS 199 categorization and the identification of the need or potential to collect Privacy Act data/information, the (Final) assessment required by the Privacy Act and/or E-Government Act of 2002 to conduct assessments on investments before developing or procuring information technology that collects, maintains, or disseminates personal information in identifiable form. A PIA is an agency review of how collected information is handled by and protected in a manner consistent with Federal standards for privacy and security. The PIA determines what kind of information in identifiable form is contained within a system, what is done with that information, and how that information is protected. Though the PIA specifically refers to "privacy", a PIA also typically covers confidentiality, access to data, and use of data. Project Process Agreement (PPA) (Final) Deliverable & Stage Gate Waivers Authorization to Proceed Requirements Analysis
The Requirements Document describes both the project and product Requirements Document with requirements. It outlines the technical, functional, performance and components (Final) other requirements necessary to deliver the end business product. Functional & Non-Functional Requirements Requirements Traceability Matrix (RTM) Business Process Model (BPM) Expansion Logical Data Model The Project Process Agreement (PPA) is used to authorize and document the justifications for using, not using, or combining specific Stage Gate Reviews and the selection of specific deliverables applicable to the investment/project, including the expected level of detail to be provided.
Page 69 of 79
Deliverable detailed elements) (Final) Physical Data Model (database design) Release Strategy Data Conversion Interface Control Section 508 Compliance Capacity /Implementation Planning Updated RTM Computer Match Agreement (CMA) (Final)
Deliverable Description
directly or by reference to other documents, the Design Document provides a high-level overview of the entire solution architecture and data design, including external interfaces, as well as lower-level detailed design specifications for internal components of the Business Product that are to be developed.
A Computer Match Agreement CMA is a written accord that establishes the conditions, safeguards, and procedures under which a Federal organization agrees to disclose data where there is a computerized comparison of two or more automated System of Records (SORs). In conjunction with a CMA, an Inter/Intra-agency Agreement (IA) is also prepared when the SOR(s) involved in the comparison are the responsibility of another Federal agency. The Test Plan defines the types of tests (e.g. unit, function, integration, system, security, performance (load and stress), regression, user acceptance, and/or independent verification and validation) to be carried out. The document describes the acceptance criteria for those tests, roles and responsibilities of individuals involved in the testing process, traceability matrix, resources required (hardware and software environments), and other elements relevant to test planning and execution. This plan details the manner of testing (test cases, simulation, etc) of the integrated software/hardware system. It must include as part of the main document or as a separate document detailed Test Case Specifications that describe the purpose and manner of each specific test, the required inputs and expected results for the test, step-by-step procedures for executing the test, and the pass/fail criteria for determining acceptance. The Contingency/Disaster Recovery Plan describes the strategy and organized course of action that is to be taken if things dont go as planned or if there is a loss of use of the established business product (e.g., system) due to a disaster such as a flood, fire, computer virus, or major failure. The plan describes the strategy for ensuring recovery of the business product in accordance with stated recovery time and recovery point objectives.
Page 70 of 79
Deliverable
Deliverable Description
System of Record Notice (SORN) The Privacy Act defines a System of Record (SOR) as a group of any records under the control of a Federal agency from which information (Final Draft) is retrieved by the name of the individual or by some identifying number, symbol, or other identifying particular assigned to the individual. Additionally, the Privacy Act requires that the Federal government inform the public of any collection of information about its citizens from which data are retrieved by a unique identifier as described above. The System of Record Notice (SORN) fulfills this requirement to inform the public via the publication of a system notice in the Federal Register. This notice describes the SOR and gives the public an opportunity to comment. Without the written consent of the subject individual, the Privacy Act prohibits the release of protected information maintained in a SOR unless one of the 12 defined disclosure exceptions is applicable. Development Test Plan (Final) Test Case Specification
The Test Plan defines the types of tests (e.g. unit, function, integration, system, security, performance (load and stress), regression, user acceptance, and/or independent verification and validation) to be carried out. The document describes the acceptance criteria for those tests, roles and responsibilities of individuals involved in the testing process, traceability matrix, resources required (hardware and software environments), and other elements relevant to test planning and execution. This plan details the manner of testing (test cases, simulation, etc) of the integrated software/hardware system. It must include as part of the main document or as a separate document detailed Test Case Specifications that describe the purpose and manner of each specific test, the required inputs and expected results for the test, step-by-step procedures for executing the test, and the pass/fail criteria for determining acceptance.
Operation & Maintenance Manual The Operations & Maintenance Manual clearly describes the Business Product that will be operating in the production environment and (Final Draft) provides the operations and support staff with the information Help Desk Support necessary to effectively handle routine production processing, ongoing maintenance, and identified problems, issues, and/or change requests. Systems Security Plan (SSP) (Final Draft) Training Plan (Final Draft)
The SSP describes managerial, technical and operational security controls (defined by the National Institute of Standards and Technology) that are designed and implemented within the system. The Training Plan describes the overall goals, learning objectives, and activities that are to be performed to develop, conduct, control, and evaluate instructions that are to be provided to users, operators, administrators, and support staff who will use, operate, and/or otherwise support the solution. Training Materials include the documentation associated with the deployment of the Business Product or software. This includes instructor and student guides, audio-visual aids, and computer-based or other media used to disseminate information about the final product to the target audience that is in need of the instruction.
Security Risk Assessment (SRA) A Security Risk Assessment will document the analysis of the security
Page 71 of 79
Deliverable Description
functional requirements and will identify the protection requirements for the system using a formal risk assessment process. The risk assessment includes the identification of threats to and vulnerabilities in the information system; the potential impact or magnitude of harm that a loss of confidentiality, integrity, or availability would have on agency assets or operations and the identification and analysis of security controls for the information system. The User Manual clearly explains how a business user is to use the established Business Product from a business function perspective. The Business Product is the primary result from the development effort that satisfies the established requirements. In software development efforts, it includes the original source code and machinecompiled, executable computer instructions and data repository(ies). It also includes an identification and description of all configuration items that comprise a specific build or release of the Business Product.
User Manual (Final Draft) Business Product (Final Draft) Version Description Document
Implementation Authority to Operate (ATO) with components (Final) Security Certification & Accreditation Letters Section 508 Product Certifications/Exceptions
An Authority to Operate (ATO) is a formal declaration by a Designated Approving Authority (DAA) that authorizes operation of a Business Product and explicitly accepts the risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals, based on the implementation of an agreed-upon set of security controls. Though not security-specific, formal documentation of Section 508 Certification or Exception is also required before a Business Product can be released into operation.
System of Record Notice (SORN) The Privacy Act defines a System of Record (SOR) as a group of any records under the control of a Federal agency from which information (Final) is retrieved by the name of the individual or by some identifying number, symbol, or other identifying particular assigned to the individual. Additionally, the Privacy Act requires that the Federal government inform the public of any collection of information about its citizens from which data are retrieved by a unique identifier as described above. The System of Record Notice (SORN) fulfills this requirement to inform the public via the publication of a system notice in the Federal Register. This notice describes the SOR and gives the public an opportunity to comment. Without the written consent of the subject individual, the Privacy Act prohibits the release of protected information maintained in a SOR unless one of the 12 defined
Page 72 of 79
Deliverable
Deliverable Description
disclosure exceptions is applicable.
A Service Level Agreement(s) (SLAs) is a contractual agreement Service Level Agreement(s) (SLAs) and/or Memorandum(s) of between a service provider and their customer specifying performance guarantees with associated penalties should the service not be Understanding (MOU) performed as contracted. A Memorandum(s) of Understanding (MOU) is a legal document that outlines the terms and details of an agreement between parties, including each parties requirements, responsibilities and period of performance.
Operation & Maintenance Manual The Operations & Maintenance Manual clearly describes the Business Product that will be operating in the production environment and (Final) provides the operations and support staff with the information Help Desk Support necessary to effectively handle routine production processing, ongoing maintenance, and identified problems, issues, and/or change requests. Systems Security Plan (SSP) (Final) Training Plan (Final)
The SSP describes managerial, technical and operational security controls (defined by the National Institute of Standards and Technology) that are designed and implemented within the system. The Training Plan describes the overall goals, learning objectives, and activities that are to be performed to develop, conduct, control, and evaluate instructions that are to be provided to users, operators, administrators, and support staff who will use, operate, and/or otherwise support the solution. Training Materials include the documentation associated with the deployment of the Business Product or software. This includes instructor and student guides, audio-visual aids, and computer-based or other media used to disseminate information about the final product to the target audience that is in need of the instruction.
Security Risk Assessment (SRA) A Security Risk Assessment will document the analysis of the security functional requirements and will identify the protection requirements (Final) for the system using a formal risk assessment process. The risk assessment includes the identification of threats to and vulnerabilities in the information system; the potential impact or magnitude of harm that a loss of confidentiality, integrity, or availability would have on agency assets or operations and the identification and analysis of security controls for the information system. User Manual (Final) Business Product (Final) Version Description Document
The User Manual clearly explains how a business user is to use the established Business Product from a business function perspective. The Business Product is the primary result from the development effort that satisfies the established requirements. In software development efforts, it includes the original source code and machinecompiled, executable computer instructions and data repository(ies). It also includes an identification and description of all configuration items that comprise a specific build or release of the Business Product. The Project Completion Report describes any differences between proposed and actual accomplishments, documents lessons learned, provides a status of funds, and provides an explanation of any openended action items, along with a certification of conditional or final
Page 73 of 79
Deliverable
Lessons Learned
Deliverable Description
closeout of the development project. The Contingency/Disaster Recovery Plan describes the strategy and organized course of action that is to be taken if things dont go as planned or if there is a loss of use of the established business product (e.g., system) due to a disaster such as a flood, fire, computer virus, or major failure. The plan describes the strategy for ensuring recovery of the business product in accordance with stated recovery time and recovery point objectives.
Operations & Maintenance Annual Operational Assessment The Annual Operational Assessment (AOA) combines elements from the CPIC evaluation and results from monitoring the performance of (AOA) (Final) the Business Product during normal operations against original user requirements and any newly implemented requirements or changes. This document assists in the analysis of alternatives for deciding on new functional enhancements and/or modifications to the business product, or the need to dispose of or replace the business product altogether. Disposition Plan (Final) Records Management
The Disposition Plan addresses how the various components of an operating Business Product (e.g., system) are to be handled at the completion of operations to ensure proper disposition of all the Business Product components and to avoid disruption of the individuals and/or any other Business Products impacted by the disposition. Includes the planning for the deliberate and systematic decommissioning of the asset with appropriate consideration of records management.
Page 74 of 79
Deliverable
Deliverable Description
requires that a System of Records (SOR) be in effect, which allows for the disclosure of the data being used.
Independent Verification &Validation (IV&V) Reports document the findings obtained during a specific IV&V Assessment that is conducted by an independent third party. A PIA is an agency review of how collected information is handled by and protected in a manner consistent with Federal standards for privacy and security. The PIA determines what kind of information in identifiable form is contained within a system, what is done with that information, and how that information is protected. Though the PIA specifically refers to "privacy", a PIA also typically covers confidentiality, access to data, and use of data.
Contractor Performance Report (CPR), or acceptable equivalent, if full EVM standards compliance is not required
Contract Fund Status Report A status report that provides investment and project managers with (CFSR), or acceptable equivalent, the following information necessary to: if full EVM standards compliance Update and forecast contract fund requirements. is not required
Plan and decide on funding changes. Develop fund requirements and budget estimates to support approved investments or projects. Determine funds in excess of contract needs and available for de-obligation. Develop rough estimates of termination costs. Determine if sufficient funds are available by fiscal year to execute the contract.
Typically, the investment or project manager requires only the minimum data necessary for effective management control. The
Page 75 of 79
Deliverable
Deliverable Description
contracting officer and contractor negotiate reporting provisions in the contract, including level of detail and reporting frequency. In addition, the CFSR is not applied to Firm-Fixed Price contracts unless unusual circumstances dictate specific funding visibility.
The project schedule is developed so that tasks and milestones are clearly defined. It is updated regularly to identify IT investment elements that are behind as well as those ahead of schedule. The project schedule maps directly to the WBS, providing the investment management team with a single point of reference for all activities. Contract DID elements for a project schedule are provided in HHSOCIO-2005.0004P, HHS OCIO IT Earned Value Management Processes and Procedures, December 30, 2005. Periodic Status Report describes work accomplished as of the reporting period, work planned for the next reporting period, and any issues that require management attention. The status report also typically includes investment cost and schedule data for the reporting period and cumulatively Meeting Minutes are a written record of what transpired during a meeting. Meeting minutes provide the purpose of a meeting, list of attendees, topics discussed, decisions made, the status of actions from previous meeting, new action items and the individuals assigned responsibility for the actions.
Meeting Minutes
Page 76 of 79
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
APPENDIX D: REFERENCES
Information Resource Management OMB Circular A-11, Preparation, Submission and Execution of the Budget OMB Circular A-127, Financial Management Systems OMB Circular A-130, Management of Federal Information Resources HHS Policy for Section 508 Electronic and Information Technology, January 2005 Enterprise Architecture HHS OCIO IT Policy for Enterprise Architecture, January 10, 2006 Capital Planning and Investment Control HHS OCIO Policy for IT Capital Planning and Investment Control, December 30, 2005 HHS OCIO CPIC Procedures, December 30, 2005 Earned Value Management OMB Memorandum 05-23, Improving Information Technology (IT) Project Planning and Execution, August 5, 2005 HHS OCIO Policy for IT Earned Value Management, December 30, 2005 HHS OCIO IT Earned Value Management Processes and Procedures, December 30, 2005 Acquisition HHS Acquisition Regulation, January 17, 2001 Security & Privacy HHS OCIO Information Security Program Policy, December 15, 2004 Records Management HHS OCIO Policy for Records Management, September 15, 2005 HHS OCIO Policy for Electronic Records Management, September 15, 2005
Page 77 of 79
1 2 3
OPDIV
ACF AHRQ AHRQ AoA ASAM/OS ASRT/OCIO ASRT/OCIO ASRT/OCIO ASRT/OCIO ASRT/OCIO ASRT/OCIO ASRT/OCIO ASRT/OCIO ASRT/OCIO ASRT/OCIO ASRT/OCIO ASAM/OS ASAM/OS ASAM/OS CDC CMS CMS CMS FDA HRSA HRSA IHS NIH NIH OIG SAMHSA ACF ASRT/OCIO ASRT/OCIO ASRT/OCIO ASRT/OCIO ASRT/OCIO ASRT/OCIO ASRT/OCIO ASRT/OCIO CDC FDA
Name Brad Hendrick Pat Bosco Mark Handelman Sue Banning Doris Gibson Lutricia Bowden John Teeter Melanie Turner Michael Turley Jeff Lovern Mark Brown Mary Forbes John Antlitz Phil Clark Simona Lovin Jane Small Ruth Doerflein Mike Stringer Alan Schoenberg Sandra McGill
Cynthia Anderson Janet Tierney Kristine Maenner Kimberly Sanders Joseph Roach Arun Acharya Carl Gervais Renee Edwards Carmen Cheng
Phone 240-453-2838 301-427-1207 301-427-1703 202-357-3435 202-690-7590 202-690-6376 202-690-6162 202-690-7684 202-619-0018 202-690-6640 202-690-8685 202-690-5408 202 205-8495 202-690-5703 202 205-7955 301-435-2980 202-690-5709 202-690-5476 202-690-6391 770-488-8544
410-786-5841 410-786-2985 410-786-1880 240-276-9746 301-443-5037 301.443.4306 505-248-4197 301-496-4729 301-402-4453
E-mail [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected]
[email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected]
Brian Sparry 202-401-5177 [email protected] Bill Reed 240-276-1134 [email protected] EPLC Workgroup/Contractor Support AnneMarie McCaslin 202-401-5064 [email protected] Tamara Greene 202-690-8669 [email protected] 703-470-7690 Nancy Brown [email protected] Sylvia Cornette [email protected] Matthew Shallbetter 202-205-9593 [email protected] Neda Akbarzadeh 202-805-8495 [email protected] Latina Brinson 202-260-0902 [email protected] Marco Demartin [email protected] John Hilson [email protected] Peggy Joyner 404-498-2414 [email protected] Jan Hapstack 301-827-1263 [email protected]
Page 78 of 79
IHS SAMHSA
505-248-4446
[email protected] [email protected]
1 2 3
Page 79 of 79