DoD Enterprise Architecture Federation Strategy

DRAFT
1
2
Department of Defense
Enterprise Architecture Federation Strategy
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Draft Version 1.01
04 December 2006
Prepared by the DoD CIO
81921640
DRAFT
DRAFT
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
TABLE OF CONTENTS
1.
Introduction ............................................................................................................................1
1.1. Intended Audience .........................................................................................................2
1.2. Background ....................................................................................................................2
1.3. Related Guidance ...........................................................................................................4
2. Purpose....................................................................................................................................4
3. Vision.......................................................................................................................................4
4. Goals ........................................................................................................................................4
5. Objectives................................................................................................................................4
6. Benefits ....................................................................................................................................5
6.1. Benefits to DoD Decision Makers .................................................................................5
6.2. Benefits to DoD Architects ............................................................................................6
6.3. Benefits to Architectural Governance Bodies .............................................................7
7. Guiding Principles .................................................................................................................7
8. Scope........................................................................................................................................8
9. Federated EA Defined ...........................................................................................................8
10.
EA Federation Concepts....................................................................................................9
10.1.
The EA Federation .....................................................................................................9
10.2.
Tiered Accountability ................................................................................................9
10.3.
High-level Taxonomies ............................................................................................10
10.4.
Architecture Categorization ...................................................................................10
10.5.
Context ......................................................................................................................11
10.6.
Boundaries for Tiers ................................................................................................11
10.7.
Semantic Alignment .................................................................................................11
11.
EA Services — Making the EA Visible, Accessible, and Understandable ..................12
11.1.
Metadata ...................................................................................................................12
11.2.
Registration ..............................................................................................................13
11.3.
Discovery ...................................................................................................................13
12.
Governance .......................................................................................................................14
12.1.
EA Federation Roles and Responsibilities .............................................................15
12.2.
Information Assurance ............................................................................................16
13.
Implementing the Federated EA ....................................................................................17
13.1.
Pilot Efforts...............................................................................................................17
14.
Critical Success Factors ...................................................................................................18
15.
The Way Ahead ................................................................................................................18
APPENDIX A: ACRONYM LIST ..............................................................................................1
APPENDIX B: DEFINITIONS ...................................................................................................1
APPENDIX C: REFERENCE DOCUMENTS ..........................................................................1
APPENDIX D: RELATED GUIDANCE....................................................................................1
APPENDIX E: ARCHITECTURE CATEGORIZATION, STRUCTURE (TAXONOMY) 1
APPENDIX F: DOD FEDERATED EA GOVERNANCE DOCUMENT ..............................1
APPENDIX G: A DETAILED LIST OF CRITICAL SUCCESS FACTORS (CSF) BY
CSF CATEGORY ..........................................................................................................................1
APPENDIX H: ACTIVITY-BASED EA FEDERATION ALIGNMENT ..............................1
ii
81921640
DRAFT
DRAFT
68
69
70
71
72
73
74
75
76
77
78
79
80
LIST OF FIGURES
FIGURE 1: ARCHITECTURE LEVELS FOR TIERED ACCOUNTABILITY…………………………...10
FIGURE 2: MAKING ARCHITECTURE ACCESSIBLE .............................................................. 14
FIGURE E-1: FEDERATED DOD EA TAXONOMY ................................................................E-1
FIGURE H-1. FEDERATION RELATIONSHIPS AMONG ACTIVITIES ........................................ H-1
LIST OF TABLES
TABLE 1: ROLES AND RESPONSIBILITIES FOR INDIVIDUAL LEVELS OF FEDERATION ............. 15
TABLE E-1: FEDERATED DOD AND MA TAXONOMY CM AUTHORITY .................................E-1
iii
81921640
DRAFT
DRAFT
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
1. Introduction
The Department of Defense (DoD) Federated Enterprise Architecture (EA) represents the
“next generation” Global Information Grid (GIG) Architecture.
The current GIG Architecture, along with the Net-Centric Operations and Warfare
Reference Model (NCOW RM) is an overarching architecture description of the GIG.1
However, the DoD is too large and complex to be described within a single integrated
architecture. Additionally, Enterprise architectures have an inherent problem. To fully describe
an enterprise, architects must either abstract the content into simple constructs that don’t lend
themselves to supporting a broad range of decisions, or they must compile massive amounts of
data that make comprehension difficult at best. One of the primary objectives of enterprise
architectures is to describe the enterprise so that decision makers can make informed decisions
based on or within a common context. It will result in the development of a cohesive EA
supporting the alignment and integration of architecture efforts in support of DoD business and
warfighter strategic goals. Therefore, architects must constantly balance complexity with utility.
The DoD GIG Architecture is no different.
What is required is a rethinking of the GIG architecture concept to effectively leverage
current architecture efforts and maintain comprehension while, at the same time, providing DoD
decision makers with the information they need. Federating existing architectures of DoD
elements that describe the various echelons (or tiers) is one way to achieve this goal. Federation
techniques allow disparate architectures (based on a variety of established frameworks) to be
meaningfully related and permit acceleration of new architecture efforts across the DoD
community to support DoD decision makers who require more detailed content that is not
reasonable for the department level.
To date, there have been advancements in both the architecture and stakeholder
communities that use architecture information. Architecture products, however, are presently not
as sufficiently discoverable and accessible as needed to support decision making. Today’s
architectures are built for specific purposes and viewpoints; they do not normally refer to or
relate to each other as they should to gain maximum value from the architecture investment.
As a remedy, the Department has chosen architecture federation2 as a new GIG architecture
paradigm. The next generation GIG architecture will be constructed by federating the separate
architecture artifacts throughout the DoD and employ a set of EA Services for registering,
1
The current DoD overarching architecture description consists of three Components: GIG Architecture ver 1.0,
GIG Architecture ver 2.0, and the NCOW RM ver 1.1. The GIG Architecture consists of architecture products
describing the DoD Enterprise from the perspective of five different scenarios. Version 1.0 described the “as-is”
enterprise circa 2000; ver 2.0 describes the “to-be” enterprise circa 2015. While the NCOW RM is not an
architecture itself it does establish the strategies and target technical standards for migration to a net-centric
operating environment as the Department moves from the “as-is” to the “to-be”and therefore servs as a part of the
Enterprise Architecture as defined by OMB for Clinger-Cohen compliance.
2
The concept of federation or “federalism” infers both a division of authority, accountability and interdependence
between the Department level and the Commands, Services, and Agencies. See page 8 for full explanations of
Federated EA and Federation Concepts.
1
81921640
DRAFT
DRAFT
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
discovering, and utilizing architecture data to support key DoD decision processes by
implementing concepts from the DoD Net-Centric Strategies.
1.1.
Intended Audience
The primary audience for the DoD Federated Enterprise Architecture Strategy Document
includes two distinct classes — first, those responsible for implementation of the Federated EA,
and second, producers and consumers of architecture information, e.g., decision makers, program
managers, analysts, operators, architects, and engineers within DoD and external partners in the
extended enterprise.
1.2.
Background
The Director, Office of the Assistant Secretary of Defense for Networks and Information
Integration, Architecture & Interoperability (OASD[NII/A&I]) has worked with the Services
Chief Architects to define the federated approach. The federated approach will guide the
building of the next generation GIG Architecture. This approach recognizes the need for
autonomy but requires linkages and alignment of architectures from the Program level up to the
Federal Enterprise level. OASD(NII) will introduce requirements in phases to achieve enterprisewide GIG descriptions that move the Department toward a shared Net-Centric Vision and
Transition Plan. These requirements are being identified and met through systems engineering
processes that leverage architecture descriptions as blueprints. The use of shared architecture
descriptions in Test & Evaluation processes within the federated approach will provide the
ability to verify that capabilities are being fielded in accordance with (IAW) the GIG
Architecture.
There are challenges related to institutionalizing architecture into DoD core processes.
Challenge 1: There is no comprehensive architectural description of the DoD Enterprise
and its relationship between and among the entities that make up the enterprise that can be used
to support department-level decision making.
Challenge 2: Architectures are currently developed independently by many organizations
across DoD conforming to multiple frameworks. They are maintained in independent
repositories, and we assume this mode of operation will continue. This situation, however, raises
several concerns for architects and architecture end-users, specifically that there is no:

148
149
150
151
152
153
154
155


Capability to globally search, vertically or horizontally, for architectures
and/or artifacts3 that may be relevant for analysis, reference, or reuse
Consistent set of standards for architecture configuration management that
would enable users to determine the development status, quality, and authority
of data in various architectures and/or artifacts
Standard methodology for specifying linkages between architectures
developed using different tools and maintained in independent repositories
required to provide enterprise-wide context and understanding
See Appendix B for a definition of “artifact.” Examples include: graphical models, structured models, tabular data,
and structured or unstructured narratives. Individual artifacts may be aggregated.
3
2
81921640
DRAFT
DRAFT
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198

Architecture alignment through linking will require standardization of
vocabularies and taxonomies. The lack of these standards will impede the
level to which an individual architecture artifact may be federated. This work
is currently being addressed with such efforts as Consolidated Operational
Activities List (COAL), and Consolidated Systems Function List (CSFL) and
Joint Command, Control, and Consultation Information Exchange Data Model
(JC3IEDM).
Based on these challenges, DoD needs to provide an enterprise wide architecture
environment that will:
1. Improve the users’ ability to share information on architecture content.
2. Enable rapid access to actionable information to support strategic decisions;
and
3. Increase agility to address unforeseen requirements supporting warfighting
needs.
In the March 2005 National Defense Strategy, the DoD restated its commitment to
making operations net-centric. The foundation for net-centric operations is to give users the
ability to access the information and applications where and when needed. The key enabler of
this ability is the DoD GIG. To move the GIG from Net-Centric concept to Net-Centric reality,
the OASD(NII)/DoD Chief Information Officer (CIO) has established the following goals:


Make information available on a network that people depend on and trust.
Populate the network with new, dynamic sources of information to defeat the
enemy.
The DoD Net-Centric Data Strategy, May 2003, addressed the challenges of finding and
using information on the GIG. The Data Strategy defined a vision in which information is easily
made visible, accessible, and understandable. The draft GIG Enterprise Services Strategy
espouses a dual path approach to achieving these goals. It advocates that DoD Components—
Combatant Commands, Services, and Agencies (C/S/As)—continue to provide and consume
services and embrace service-oriented architecture (SOA) principles (see Appendix B). In
parallel, the GIG Enterprise Services Strategy drives the enterprise to identify and adopt the
necessary services, standards, policies, and processes to federate C/S/As services and SOAs for
the benefit of the Department and its partners.
This DoD EA Federation Strategy and associated EA Services apply the net-centric
concept, Data Strategy, and GIG Enterprise Services Strategy to the DoD Enterprise architecture.
A net-centric approach to Federated EA ensures that the Department has an accessible Enterprise
Architecture with content derived from multiple sources. The intent of this Strategy is to enable
cross-departmental discovery and use of architecture artifacts to support the Department’s
decision makers in evolving and maintaining the enterprise information technology (IT)
infrastructure in accordance with law and policy while maintaining autonomy for the owners of
the architecture artifacts.
3
81921640
DRAFT
DRAFT
1.3.
Related Guidance
199
200
201
202
203
204
205
Architecture requirements are solidly grounded in Law; the Clinger-Cohen Act assigned
CIOs the responsibility for “developing, maintaining, and facilitating the implementation of a
sound and integrated information technology architecture.” Additional details are provided in
the Office of Management and Budget Circular A-130 and are expanded upon in guidance from
the DoD and the Joint Staff (JS) regarding the development and use of architectures and their
relationship to net-centric operations. Full details are provided in Appendix D of this Strategy.
206
2. Purpose
207
208
209
210
211
212
213
214
215
The purpose of this Strategy is to present an agreed upon method and strategy to achieve a
DoD Federated EA that would support decision makers in the DoD at the department level as
well as the DOD Components and Programs.
216
217
218
219
3. Vision
220
221
222
223
4. Goals
224
225
226
227
228
229
230
231
232
233
234
235
236
After months of study, OASD, with participation from the JS and DoD Components, has
determined that the best way to address the challenges presented above is to federate disparate
architectures into a DoD-wide Federated EA. The DoD Federated EA would be constructed
using a set of federation standards and Core Enterprise EA Services (registration, discovery, and
translation services).
The Federated EA vision is to provide DoD decision makers and their staffs’ access to a
broader and deeper architecture data set that is available, accessible, understandable, trustworthy,
and able to be tailored for decision support at the department and DoD Component levels.
The challenges identified in the Background paragraph serve as the drivers for this
Strategy. Their resolution can be found in the following goals necessary to achieve EA
Federation:
1) An environment to support the decision makers and their staffs with access to a
set of common architecture artifacts enabling common understanding of the
DoD Enterprise that can be used to support DoD decision making at the
enterprise and DoD Component levels
2) A means to identify internal and external interfaces to the DoD Enterprise
3) Improved EA information sharing of architectural content, ensuring that users,
including unintended users, can find and use the right information
4) Increased agility that leverages existing architecture and/or artifacts to swiftly
adjust or expand their capabilities through architecture reuse and integration to
meet their changing mission and business needs
5. Objectives
The following five objectives provide the focus for achieving the Goals identified above.
Achievement of all is critical for success.
4
81921640
DRAFT
DRAFT
237
238
239
A.
Provide a structure for federating architectures to achieve the DoD EA and to
establish a means for autonomous development of DoD Component’s EA to support
tiered accountability. Related Goals: 1, 2, 3
240
241
242
243
B.
Provide guidance for federating architectures to achieve the DoD Federated EA and
to establish a means to allow each DoD Component to build its Architecture within
the guidance given by the Enterprise to support tiered accountability. Related Goals:
1, 2, 4
244
245
246
247
248
C.
Align DoD Component EA within a common framework of semantic
understanding .This common framework is based on the use of taxonomies from the
C/S/As and aligned with the Department level taxonomies to ensure that the DoD
Components can achieve standardization and semantic understanding with DoD
Component’s EAs. Related Goal: 1
249
250
251
252
253
D.
Leverage Core Enterprise EA Services to provide Architecture Registration and
Discovery Services that are available, accessible, and usable by consumers within the
enterprise to share architecture information both vertically and horizontally
throughout and achieve information visibility in a coherent manner. Related Goals:
1,3,4
254
255
256
257
258
259
260
E.
Provide a foundation to support emerging capabilities through Federated EA
services as a way of making the underlying business, mission, or transaction function
in a system or application available to a broad set of consumers. These services can
be easily reused and repurposed to provide building blocks for new capabilities. An
example of these services would be to provide specific analytic capabilities
leveraging EA holdings to support logistics, blue force tracking, and mission
planning. Related Goal: 3, 4
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
6. Benefits
There are many benefits to be realized from implementing a Federated EA. The
implementation of the Federated EA is intended to provide useful analytical information to
various stakeholders within the DoD. Multiple benefits accrue as the DoD GIG is federated and
progressively populated with widely sharable information and capabilities, which significantly
boost operational efficiency and effectiveness. This section will identify many of the reasons and
benefits and give a simple description or example of how they are used. These benefits are
dependent on the degree and nature of the content provided by program and DoD Component
architectures.
6.1.
Benefits to DoD Decision Makers
Enables Rapid Access to Information for Strategic Decisions:
Access to actionable, relevant, decision quality, architecture information will accelerate the
leaders’ ability to make better decisions that impact the enterprise (e.g., human resource
capabilities; condition, status, and location of assets; and how funds are invested for the
warfighting mission). The ability of the Federated EA to support these types of decisions is
content dependent.
5
81921640
DRAFT
DRAFT
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
Improves Information Sharing of Architecture Content:
Populating the GIG with federated architecture products and leveraging Core Enterprise
Services to provide EA discovery and search services ensures that architecture information can
be accessed throughout the enterprise. Any user who has access to the GIG will be able to find
and use information from any Web-enabled device.
Understanding of Interactions and Interdependencies:
One of the primary uses of federation is to allow an Enterprise to understand the
interactions and interdependencies among its component parts. DoD needs to understand the
interactions among its major elements, the DoD Components, with the means to govern and
manage the Department “cross-functionally” to realize a cost-effective, Net-Centric GIG. The
Department recognizes that the exchanges among the domains are vital to modernizing the
enterprise. By understanding the minimum set of exchanges required, the enterprise can reduce
or eliminate unnecessary processes and the resources required to support those unnecessary
processes.
Supports Portfolio Management of Technology Options:
The Federated EA depicts the supporting technology and implementation as defined by the
program and DoD Component’s architectures, for each activity within the enterprise. By
evaluating the set of technologies across the Federated EA, the analyst or portfolio manager can
gain an understanding of multiple uses of the same technology and multiple technologies applied
to support the same type of activities.
Supports the Joint Warfighting Capability of the DoD:
Joint military requirements are driving the need for greater commonality and integration of
mission operations across the Department. The Department’s infrastructure must enable rapid
response to the warfighting community and be compatible with the global, networked military it
supports.
Reduced Cost of Defense Operations:
Streamlining operations using Operational Architecture View data will enable decision
makers to deal with growing pressures on resources and ensure every Defense dollar is optimally
applied for long-term mission effectiveness.
6.2.
Benefits to DoD Architects
Promotes Distributed Configuration Management:
Once the enterprise has federated its architecture, configuration management is reduced to
two efforts: maintenance of the federation and configuration of enterprise artifacts. As part of
the centralized control and decentralized execution of developing the enterprise architecture, the
enterprise can very tightly manage the high-level taxonomies, the relationships with the DoD
Component’s activities, and the enterprise list of instances for each.
Provides Clear “stopping” rules for Enterprise Architecture Development:
When developing enterprise architectures, the greatest mistake comes from overstepping
the scope of the department level description. No architect should ever develop details that are
6
81921640
DRAFT
DRAFT
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
clearly in the purview of a lower-level tier. For example, the department level does not have the
authority or expertise to develop the details as well as the DoD Components. Once the
relationship is established between high-level taxonomies and a DoD Component’s architecture
artifact, the department level should then cease its examination of details and point to the DoD
Components. The DoD Component maintains the responsibility and authority to detail the
artifact and define how the enterprise achieves the goal.
Increases Agility:
This benefit is the natural result of the use of Web-based services for registration and
discovery, which are modular, reusable, interoperable building blocks. Users can search the
Federated EA Registry and find existing architecture content, significantly reducing the time and
cost for new architecture development, fielding of a new capability, and gaining improved
interoperability “out of the box.” By using these building blocks, warfighters can swiftly adjust
their architectures to meet changing business and mission needs.
6.3.
Benefits to Architectural Governance Bodies
Sets Enterprise Boundaries:
A Federated EA with activity-based alignment shows each DoD Component’s activities
and how they relate to achieving the enterprise’s goals. The relationships among the activities
identify the activities that are “owned” or performed uniquely and those that are shared by one or
more of the DoD Components. Once all the activities of the Enterprise are related to the
activities of the DoD Components, then the collection of all activities owned by a single DoD
Component sets boundaries throughout the Enterprise. Boundaries are vertical and horizontal
start and stop points for accountability in the roles and responsibilities for Federated EA’s.
Promotes Autonomy or Self-Governance:
A federated architecture supports a governance structure that defines the responsibility and
authority among Components to achieve and support enterprise-wide goals. Once a DoD
Component accepts its defined boundary, as depicted within the federated architecture, it enjoys
autonomous control of the development and analysis of its architecture. The DoD Components
determine the breadth and depth of detail relating to their individual architecture, and produce
and archive the artifacts, as required, to meet or support the goals of the enterprise.
7. Guiding Principles
In an effort to gain the most re-use out of existing architecture artifacts, and to minimize
the need for additional architecture development, the development of the DoD EA Federation is
guided by the principles below. The Federated EA will:
360
361
362

Respect the diverse requirements of individual DoD Component while focusing
on the associations that cut across organizational boundaries IAW statutory
roles and responsibilities for the DoD Components.
363
364

Focus on federating existing disparate architecture artifacts regardless of
structure and format – not re-building architectures.
365

Maximize the reuse of existing architectures at all tiers.
7
81921640
DRAFT
DRAFT
366
367
368

Evolve from a product-centric approach (focused on DoDAF and other work
products produced by architecture developers) towards a data-centric
architecture approach focusing on common semantics.
369
370

Support DoD’s net-centricity objectives (e.g., make information and services
visible, accessible, and understandable) and vision.
371
372
373
374
375
376
377
378
379
380
381
8. Scope
This Strategy encompasses DoD architectures at all levels of detail and classification. It
defines or references interfaces to architectures outside the Department under the Federal
Enterprise Architecture Framework (FEAF) and the Federal Enterprise Architecture Reference
Models.4 The GIG, a Federated EA, will not be isolated to IT but will have relevance for
Doctrine, Organization, Training, Material, Leadership and education, Personnel, and Facilities
(DOTMLPF), as the use and utility of architecture expand in those areas.
This Strategy is applicable to all DoD Mission Areas and addresses the relationships among
all levels of enterprise details from the program/initiative level up to the Department level. This
Strategy will:
382

Define architecture federation and integration concepts.
383

Define architecture alignment (linking and mapping) processes.
384
385
386
387
388
389
390
391

Define EA Services for registering and discovery of architecture holdings and
associated metadata.
392
393
394
395
396
397
This Strategy will accommodate the range of architecture formats, methodologies, toolsets,
and levels of abstraction, and will be applicable to multiple decision processes.
As part of this Strategy, Policy, Governance, and Implementation Planning documents will
need to be defined and developed to support the vision and goals of this strategy.
9. Federated EA Defined
We use the term Federated Architecture to represent the concept that architecture artifacts
are related in a meaningful way. Federated Architectures conform to common or shared
architecture standards across autonomous Program, DoD Component, Mission Area enabling
developing/owning entities to maintain diversity and uniqueness, while providing opportunity for
implementing interoperability.5
4
Federal Enterprise Architecture (FEA) Reference Models (RM) - The FEA is a tool used to align the DoD
enterprise Architecture with the rest of the Federal Government’s Components. There are five Reference Models
within the FEA: Performance Reference Model (PRM); Business Reference Model (BRM); System Reference
Model (SRM); Technical Reference Model (TRM); and Data Reference Model (DRM).
PRM – Identifies the performance measures of the enterprise
BRM – Identifies the key activities of the enterprise
SRM – Identifies the primary systems used within the enterprise
TRM – Identifies the approved and emerging standards used within the enterprise
DRM – Identifies the data and information used within the enterprise
5
Adapted from New York State Office for Technology – see definitions
8
81921640
DRAFT
DRAFT
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
A Federated Enterprise Architecture shows how a DoD Component aligns activities,
services, systems, and infrastructure with federation standard taxonomies, providing context.
Initially, EA federation will be based on semantic alignment of each Program, DoD Component,
Mission Area, architecture’s top-level activity with the Enterprise’s top-level taxonomy of
activities called the “High-level Taxonomy.” An example of “High-level Taxonomy” is the
implementation of the BEA activity model which serves as the Business Mission Area’s
(BMA’s) “High-level Taxonomy” for DoD Component alignment. Semantic Alignment will be
based on the context6 of the architectures and the individual activities being related – for DoDAF
architectures this is normally identified in the (OV-5). Semantic alignment of other architectural
elements will be pursued, as needed, to support key decision processes and as other federation
high-level taxonomies are developed.
Federated Architecture shows the allocation of responsibility across the Enterprise. In
contrast, Integrated Architecture shows the interaction of multiple activities to achieve a mission
or goal across the Enterprise.
Federation is a way to organize an enterprise’s body of knowledge (architecture) about its
activities (processes), people, and things within a defined context and current/future
environment. Federation provides the architect-analyst additional means to examine aspects of
the DOTMLPF concepts across organizational boundaries.
419
10. EA Federation Concepts
420
421
422
423
424
10.1. The EA Federation
425
426
427
428
429
430
431
432
433
434
10.2. Tiered Accountability
435
436
Each tier has full authority and responsibility to develop their portion of the EA.
Unfortunately, data between tiers are often unavailable via an accurate, timely, and reliable
This section identifies key concepts that define the Federated Enterprise Architecture
elements. These concepts are important to understanding Federation and how it is most useful in
supporting decision making and Tiered Accountability. These concepts enable Department-wide
producers and consumers to achieve the Goals and Objectives of a Federated EA.
Tiered accountability is distribution of authority and responsibility of an element of the
enterprise architecture to an organization. Through the policy of Tiered Accountability (TA),
DoD addresses the responsibility for producing these EA architecture artifacts. Under TA, DoD
is currently defining and building enterprise-wide capabilities that include data standards,
business rules, enabling systems, and an associated layer of interfaces for Enterprise, Mission
Area, DoD Components, and Programs. Each tier of the enterprise – Department, Mission Area,
DoD Components, and Program – has specific goals, as well as responsibilities to the tiers above
or below them.
6
See definition on page 10.
9
81921640
DRAFT
DRAFT
437
438
method. In order to navigate through these tiers in a coherent way, and achieve information
visibility, accessibility, and responsiveness, an organizing structure is needed.
439
10.3. High-level Taxonomies
440
441
442
443
444
445
446
In the context of the Federated EA, a high-level taxonomy is a structure or model that
spans the enterprise. At the highest level of the enterprise, the DoD Activity High-level
Taxonomy7 sets the context for the alignment of the Mission Areas’ activities and associated
reference models. At the DoD Component level, it is used to categorize and organize the DoD
Component’s architectures to depict boundaries and provide context for federation. For the
Federated EA, the Activity High-level Taxonomy will be the first High-level taxonomy
produced.
447
10.4. Architecture Categorization
448
449
450
451
DoD EA DoD Component’s architectures need to be categorized to facilitate alignment
(mapping and linking), cataloging, navigating and searching disparate architecture in a DoD
registry of holdings, and providing a framework for aligning architectures. This Strategy
identifies four major levels of echelon and taxonomies to be used for categorization Figure x:




452
453
454
455
456
457
Department (OSD, JCS, etc)
DoD Mission Area (Warfighting, Business, DIMA, and EIE Mission Areas)
DoD Component (Army, JFCOM, DLA, etc)
Program (NECC, FCS, etc)
Department
Mission Area
Component
Program
458
459
460
Figure 1 Architecture Levels for Tiered Accountability
461
462
463
Where possible, this should include identifying a common reference language 8 or
model applicable to the mission areas that can be used by all participating architectures. These
7
The Business Reference Model (BRM) is the high-level Federated EA Activity Taxonomy.
As an example, for the BEA Materiel Visibility BEP, the (SFIS) provides a common reference for all DoD
Logistics architectures.
NOTE: This also complies with the guidance in DoD 4140.1-R, Paragraph C1.4.1.1, to use the SCOR processes of
“Plan, Source, Maintain/Make, Deliver, and Return as a framework for developing, improving, and conducting
8
10
81921640
DRAFT
DRAFT
464
465
466
467
468
top level taxonomies should be complemented by other architecture categorization schemes
including Joint Capability Areas (JCAs), Joint Mission Areas (JMAs), Missions, Universal Joint
Task List (UJTL), DoDAF product type, functional area, acquisition program, transformation
architecture, and others, as appropriate. A full description of a proposed categorization scheme
is in Appendix E.
469
10.5. Context
470
471
472
473
474
475
476
477
478
479
480
481
482
483
Context defines the environment of the enterprise architecture. Five basic questions
make up the Context and help to fully define the external environment of the enterprise.
484
485
486
The Context should be defined before the architecture effort is begun and articulated
within the AV-1. The context is part of the architecture’s metadata, which can be used for
discovery, semantic alignment, and contextual comparison with other architecture efforts.
487
10.6. Boundaries for Tiers
488
489
490
Each enterprise tier – Department, Mission Area, DoD Component, and Program – has
specific goals, as well as responsibilities to the tiers above or below them that are used to
determine the level of detail (or abstraction) necessary for their architecture.
491
492
493
494
495
496
497
498
499
500
501
10.7. Semantic Alignment
1) What is the purpose of the architecture effort and what are the questions to
be addressed by this architecture effort?
2) What is the boundary of the enterprise? What is considered inside the
enterprise versus external?
3) What is the scope of the architecture effort, what are the echelons or
organizational levels involved, and what level of detail will be required in
the descriptions?
4) What is the viewpoint of the architecture? From who’s perspective do we
examine the enterprise and write the descriptions (external customer,
supplier, or casual observer; internal role player; or process owner)?
5) What echelons are represented by the architecture?
A key goal of net-centricity is to enable semantic understanding of data so that
interoperability can be achieved between any applications that have the ability to access and
interpret the structural and semantic rules associated with data.
The Federated EA will be based on the semantic alignment of tier level architecture
elements with elements of federation high-level taxonomies. Semantic alignment refers to the
relationship specified between the meanings of taxonomy elements. The semantic relationships
specified between activities will typically include “is equivalent to,” “is part of,” or “is similar
to.” These relationships provide the alignment between the elements of DoD Component’s
materiel management activities to satisfy customer requirements developed collaboratively with the support
providers.”
11
81921640
DRAFT
DRAFT
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
C/S/As architectures and the high-level reference taxonomies that specify the interface points in
the federation for tiered accountability of the Federated EA content.
Through Tiered Accountability, Stakeholders and the DoD Components will retain the
authority to manage their own internal Architecture holdings, consistent with federation
standards or methodologies. However, the federated EA governance body at the appropriate tier
will have responsibility for capturing semantic consistency out of the separate DoD Components
and communities of interest/practice, defining the semantic (meaning) and syntactical (structure)
standards that will provide for consistent usage and meaning. Where possible, external and
industry standards will be considered for incorporation. Specifics on how semantic alignment
can be achieved will be included in the Federated EA Implementation Plan.
11. EA Services — Making the EA Visible, Accessible, and
Understandable
In order to make the EA visible, accessible, and understandable9, EA Services will be
implemented using Web Services, in which specific content and/or functionality is provided by
one user for others, many of whom may be unanticipated by the provider (see Figure 1). The
return on investment in the Federated EA will result from DoD providers continually populating
the Federated EA with architecture data and products that satisfy a variety of anticipated and
unanticipated consumer needs. This will require the following development of standards and
services:
522
523
524

A set of standard metadata will be maintained for all architectures in
confederating repositories and Web service specifications (Web service
definition language [WSDL]) for discovery and registration.
525
526

A registration service will enable cataloging and linking of architectures in
federated repositories.
527
528
529
530

A discovery service will enable users to execute a federated search for
architecture holdings meeting specified search parameters.
The following paragraphs elaborate on those concepts.
531
11.1. Metadata
532
533
534
535
536
537
538
To implement a Federated EA search service, metadata elements must be defined to
capture attributes of artifacts required to support search parameters based on user needs. The
DoD Discovery Metadata Specification (DDMS) V1.3 provides a baseline specification for
architecture discovery metadata. The architecture conceptual model (currently the CADM)
provides additional AV-1 discovery metadata specifications. Several new metadata elements,
defined as “DDMS Plus” metadata, enable configuration management, architecture registration,
and cataloging.
539
540
Data may be stored in any format using relational, object oriented, or hybrid
technologies based on any kind of data model. These principles do, however, require that
9
Visible, Accessible, and Understandable are key Net-Centric concepts from the NCOW RM v1.1 as integrated
from the Net-Centric Strategies.
12
81921640
DRAFT
DRAFT
541
542
543
544
545
agreements be reached within the DoD EA Community of Interest (COI) or Community of
Practice (COP) on the structure and semantics of data elements used for data asset discovery,
linking, exchange, and integration. Metadata elements needed to support the EA user services
described herein are defined and proposed for DoD EA COI/COP acceptance as the standard for
net-centric federated EA services.
546
11.2. Registration
547
548
549
550
551
Federation repositories will capture all architecture metadata for architectures
developed in local environments. Federation repository owners will be responsible for
implementing mechanisms to collect metadata specifics on the implementation of Registration,
including specific metadata requirements, which will be contained in the Federated EA Services
Implementation Plan.
552
11.3. Discovery
553
554
555
556
557
558
The Federated EA will include a federated metadata discovery capability. The intent is
to provide a user-friendly service that enables discovery of architecture metadata available from
federated repositories. Federated repositories are achieved when sources of similar content can
be searched via enterprise services. It will also enable the user to follow links to the source
architectures in the federated repositories. Specifics on the implementation of this tool will be
contained in the Federated EA Services Implementation Guidance Document.
559
560
The following sections address the two primary modes of discovery, registry browsing
and searching.
561
562
Registry Browsing:
563
564
565
566
567
568
569
570
571
Users may browse a catalog of holdings for Federated EA repositories to find artifacts of
interest. Cataloging of repository holdings should enable users to search for artifacts by
navigating categorization taxonomies similar to browsing item categorizations in online
shopping Web sites. Multiple categorizations may apply to any single architecture. Catalog
navigation trees should use standardized category names from “approved” enterprise
taxonomies, when available, and may be extended by domain extensions where needed.
Navigation trees should provide links to detailed metadata on architecture holdings to enable
users to determine potential interest value and include links to the products in source repositories
to enable user access to selected products.
572
573
Searching:
574
575
576
577
An architecture search capability must enable a user to specify a set of criteria for
architecture artifacts of interest. A single search interface using that set of search criteria needs
to be able to reach all architecture data repositories and present a consolidated response to the
user. The consolidated response, at a minimum, should:
578
579
580
581


Provide sufficient metadata on holdings, so that users can ascertain their
relevance.
Provide links to the results, taking the user to the source repository consistent
with the user’s role-based access privileges.
13
81921640
DRAFT
DRAFT
582
583
584
585
586
587
588

Figure 2 illustrates the concept for the proposed Core Enterprise EA Services/DARS
implementation for the DoD Federated EA Services. It illustrates metadata registration and
discovery of architecture content within the federated repositories required to make the enterprise
architecture data visible, accessible, and understandable for the DoD community.
589
590
591
592
593
594
595
596
597
Include all available architecture metadata, including metadata not specified as
search parameters.
Figure 2: Making Architecture Accessible
12. Governance
Since the Federated EA is not a unitary architecture, it will require a governance structure
to provide direction and oversight within the framework of TA and the existing DoD and DoD
Component governance structures. The DoD CIO, or the CIO’s delegate, will serve as the
ultimate chairperson for management of the Federated EA. However, due to the complex
relationships between the architecture producers/developers at various levels, the governance
roles within the Federated EA will vary according to roles within Tiered Accountability.
598
599
1) At the Enterprise or OASD/JS-level, governance will address DoD-wide
Authority, Direction, Guidance, Monitoring, and Affirmation/Remediation.
600
601
602
2) At the Mission Area-level, governance will address Implementation,
Monitoring, and Affirmation/Remediation in response to DoD-wide guidance as
well as Mission Area unique Authority, Direction, and Guidance.
603
604
3) Similarly, the DoD Component-level, governance will address Implementation,
Monitoring, and Affirmation/Remediation in response to DoD-wide guidance
14
81921640
DRAFT
DRAFT
605
606
607
608
609
and Mission Area input, as well as individual DoD Component requirements for
Authority, Direction, and Guidance.
The details for governance will be provided in a separate document, the planned DoD
Federated EA Governance Document. It will address areas such as:
610
611









612









Charter Development/Approval
Roles and Responsibilities
Organizational Framework
Resource Requirements and Responsibilities
Policies
Metrics
Incentives
Data Management
Standards
Services
Quality
Compliance
Maturity Models
Synchronization
Repositories
Security/Access
Accreditation
External Relationships
A tentative outline for Governance is provided in Appendix F.
613
12.1. EA Federation Roles and Responsibilities
614
615
616
617
618
This Federation Strategy is in accordance with DoD 8320.2-G, DoD Guidance for
Implementing Net-Centric Data Sharing by enforcing Tiered Accountability, whereby each tier,
or level, of the federation is responsible for managing its own architectures and data while also
making those architectures and data visible, accessible, and understandable to other members of
the federation. The Federation Strategy seeks to operationalize Tiered Accountability.
619
620
621
622
Each Tier has both internal and external roles and responsibilities that it must perform
to make the Federated EA function as intended. These are presented in Table 1, where external
roles and responsibilities are denoted with a star (*) and internal roles and responsibilities are
denoted with a square (■).
623
Table 1: Roles and Responsibilities for Individual Levels of Federation
624
Department

Impose constraints on federated Mission Areas,
DoD Components, and Programs in order to
achieve cross-federation.
 Add or remove information from the DoD
Federated EA as appropriate via the various
feedback loops outlined in the Implementation
Plan.
 Develop
top-level
taxonomies
and
categorization schemes in order to ensure that
Mission Areas, DoD Components and
 Establish a governance structure for the DoD
EA Federation.
 Develop and maintain the environment in
which the Federated EA is developed and
maintained.
 Create, publish, and administer the high-level
Discovery and Registration Services.
 Store, publish, and maintain federation
mapping “links” to enable traceability through
each tier and across the Department Level.
 Create and manage the DoD EA RMs.
15
81921640
DRAFT
DRAFT
Program architectures
meaningful way.
can
align
in
a
Mission Area

Impose constraints on the DoD Components  Provide configuration management (CM) to
DoD Components’ taxonomies by MA.
and Programs in order to achieve Mission Area

Provide content to taxonomies and
(MA) goals and support interoperability
categorization schemes utilized for the DoD
between mission areas.
Federated EA.
 Develop and maintain MA enterprise
 Report changes in content for DoD EA
architectures and mapping results.
Federation, as necessary.
625
DoD Components and Enterprise Programs

Impose constraints on DoD Components’
Programs in order to achieve the DoD
Components’ goals and support cross-DoD
interoperability.
 Manage its enterprise architecture to support its
mission and vision.
 Propose modifications to the DoD EA to
increase/improve alignment between tiers.
 Develop and maintain theDoD Components’
enterprise architectures.
 Extend high-level taxonomies.
 Implement the discovery services within the
DoD Components’ environments.
 Provide CM to domain taxonomies.
 Use the taxonomies and categorization
schemes provided by the MA levels to map its
architectures to the DoD EA.
 Make the DoD Components’ architecture
and mapping results visible, accessible, and
understandable.
 Adhere to the standards for data sharing
established by the Enterprise and MAs.
 Ensure that the DoD Components’ Program
architectures and mapping results are visible,
accessible, and understandable.
 Support metadata development.
DoD Component Program’s




Maintain Program architecture element names  Map to the taxonomies and categorization
schemes provided by the DoD Components
and definitions.
as appropriate.
Propose modifications to the DoD EA to

Make the Programs’ architecture and mapping
increase/improve alignment between tiers.
results visible, accessible, and understandable.
Develop and maintain the Programs’

Adhere to the standards for data sharing
architecture and mapping results.
established by the Enterprise, MAs, and DoD
Extend high-level taxonomies.
Components.
626
627
628
629
Additional roles and responsibilities will be identified, as required, within the Governance
Document. Detailed roles and responsibilities specific to each level will be outlined in the DoD
EA Federation Implementation Plan.
630
12.2. Information Assurance
631
632
633
634
This Strategy will embrace information assurance concepts and principles and other
DoD guidance, as appropriate. This is to ensure the integrity of the information across the
Federated EA that’s required to support the goals of visibility, accessibility, understandability,
and trustability (through metadata tagging of artifacts).
16
81921640
DRAFT
DRAFT
635
13. Implementing the Federated EA
636
637
As an integral part of this Strategy, a detailed Implementation Plan will be provided as a
separate document.
638
13.1. Pilot Efforts
639
640
641
642
There are two primary areas of interest for Proof-of-Concept (PoC) Pilot efforts. One is
to build and analyze a Federated EA using the DoD High-level Activity Taxonomy, a Mission
Area Taxonomy, and DoD Components’ architecture. The other is to build and demonstrate EA
Services with an initial focusing on Registration and Discovery Services.
643
Enterprise Federation – Federated EA Pilot
644
645
646
The first pilot will build and analyze a Federated EA using the DoD High-level Activity
Taxonomy, Mission Area Taxonomy, and DoD Components’ architecture. OASD(NII) and the
EA Summit are currently evaluating candidates for this pilot.
647
EA Services — The DARS Pilot for Registration and Discovery
648
649
650
651
652
653
654
655
656
For the second pilot – registration and discovery capabilities – EA Registration and
Discovery Services will be implemented initially as Core Enterprise EA Services in DARS and a
selected set of federated repositories. These capabilities will then be federated to other DoD
Components’ repositories, resulting in a more robust department-level capability. Using this
federated capability, a search request on one repository, e.g., DARS, will result in a returned set
of records matching the search criteria and will contain as much of the architecture metadata as is
available from each of the federated repositories having holdings that match the search criteria.
URLs in the reply metadata set will provide links to the source architectures in the federated
repositories.
657
658
659
660
661
An architecture search capability should enable a user to specify a set of criteria for
architecture artifacts of interest. Users should be able to specify specific search criteria in a
search GUI using methods such as pick lists for the allowable values for each of the criteria.
That set of search criteria needs to be propagated to all architecture data repositories. The user
then needs to receive a single consolidated response that:
662
663
664
665
666
667
668
669
670
671
672



Provides consistent metadata from all sources
Provides sufficient metadata to enable the user to ascertain their relevance
Provides links to the sources
Once a user determines which architecture artifacts are of interest, a link associated with
each result will take the user to the source repository. Depending on the security policy of the
source repository, the link may either provide direct access to the selected artifact in the native
repository format or visualization environment, or, in future versions; it may direct the user to a
role subscription service on the native repository for requesting access to the product. User
credentials may also be passed by the search service to the source repository for authentication to
enable automated access based on access roles/privileges associated with the user in the source
repository.
17
81921640
DRAFT
DRAFT
673
14. Critical Success Factors
674
675
676
677
A review of the business and warfighting mission drivers/needs (with respect to their
information needs), at an enterprise, i.e., joint level, reveals the high degree of cooperation and
participation needed for federating the disparate architectures across the entire DoD, including
alignment of external organizations and agencies in support of strategic, joint decision making.
678
679
680
Following is a list of broad categories of candidate Critical Success Factors (CSF) related
to the institutionalizing of a DoD Federated Architecture environment. The broad CSF
categories are:
681
682

Required commitment by OSD, JS, and DoD DoD Components for participation
in the FJAWG,
683
684
685

Adoption and implementation by OSD, JS, and DoD DoD Components for
architecture governance, registration, high-level taxonomies, federation levels,
roles and responsibilities, federation methodologies, etc.
686
687

Selection and successful implementation of a PoC Pilot in order to validate EA
Federation concepts, governance, methods, tools, high-level taxonomies, etc.
688

Linking Business and Warfighting mission drivers/needs.
689
690

Commitment of resources at OSD, JS, and DoD DoD Components to support
federation development and implementation.
691
692
693

Adoption of DARS as the Federated EA Registry.
694
Appendix G contains a detailed list of CSFs within each category.
15. The Way Ahead
695
To begin implementation of this Strategy:
696
697

OSD Leadership, working with the DoD Components and other stakeholders,
will articulate details required for implementation.
698
699

Registry and repository owners will work with the registry pilot lead on
federating discovery services.
700
701

FJAWG as the EA Summit arm will complete the development of the high-level
activity taxonomies.
702
703

The community will define how linkages are managed between the Tiers in the
Federation.
704
705
706

DARS will implement the linkages between the Tiers in accordance with the
community requirements as a community extension to Core Enterprise EA
Services for EA.
707
708

Mission Area Leads will define their high-level taxonomies for inclusion in the
DoD EA Reference Models.
18
81921640
DRAFT
DRAFT
APPENDIX A: ACRONYM LIST
709
710
ACAT
ACCB
BEA
BMA
BRM
BTA
C/S/A
CADM
CCB
CIO
CJCS
CJCSI
CM
COAL
COI
COP
COTS
C/S/As
CSF
CSFL
DARS
DDMS
DIA
DoD
DODD
DODI
DOTMLPF
DRM
EA
EIE
FCB
FEAF
FJAWG
GIG
GOTS
IT
JCA
JC3IEDM
JCS
JMA
JS
81921640
Acquisition Category
Architecture Configuration Control Board
Business Enterprise Architecture
Business Mission Area
Business Reference Model
Business Transformation Area
Command/Service/Agency
Core Architecture Data Model
Configuration Control Board
Chief Information Officer
Chairman of the Joint Chiefs of Staff
CJCS Instruction
Configuration Management
Consolidated Operational Activities List
Community of Interest
Community of Practice
Commercial Off The Shelf
Combatant Commands, Services, and Agencies
Critical Success Factors
Consolidated Systems Function List
DoD Architecture Registry System
DoD Discovery Metadata Specification
Defense Intelligence Agency
Department of Defense
DoD Directive
DoD Instruction
Doctrine, Organization, Training, Material, Leadership and
education, Personnel, and Facilities
Data Reference Model
Enterprise Architecture
Enterprise Information Environment
Functional Control Board
Federal Enterprise Architecture Framework
Federated Joint Architecture Working Group
Global Information Grid
Government Off The Shelf
Information Technology
Joint Capability Area
Joint Consultation Command and Control Information
Exchange Data Model
Joint Chiefs of Staff
Joint Mission Area
Joint Staff
A-1
DRAFT
DRAFT
MA
NCOW
OASD
PoC
PRM
RM
SFIS
SOA
SRM
TA
TRM
UJTL
WSDL
Mission Area
Net Centric Operations and Warfare
Office of the Assistant Secretary of Defense
Proof of Concept
Performance Reference Model
Reference Model
Service Oriented Architecture
System Reference Model
Tiered Accountability
Technical Reference Model
Universal Joint Task List
Web Service Definition Language
711
81921640
A-2
DRAFT
DRAFT
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
APPENDIX B: DEFINITIONS
Architecture:
Architecture is the structure of components, their interrelationships, and the principles and
guidelines governing their design and evolution over time. [CIO Council, A Practical Guide to Federal
Enterprise Architecture, February 2001]
Architecture Integration:
Architecture Integration is the process of consolidating the content of disparate architectures to
support analyses of a broader scope than that possible with any single disparate architecture.
Architecture integration includes the mapping or standardization of terms and definitions across
disparate architectures and the integration results in a set of data and products that support Joint
operations and development efforts. [DoD Federated Joint Architecture Working Group (FJAWG)
recommendation, Dec 2005]
Artifact:
An abstract representation of some aspect of an existing or to-be-built system, component, or
view. Examples of individual artifacts are a graphical model, structured model, tabular data, and
structured or unstructured narrative. Individual artifacts may be aggregated. [US Department of
Agriculture Office of the CIO, http://www.ocio.usda.gov/e_arch/glossary.html]
High-level (Adj.):
For purposes of this Strategy, the phrase “high-level” is used as an adjective representing the
highest-level structure within an enterprise, mission area, or DoD Components providing context
and guidance for all lower levels. It is used primarily as a modifier to another term “taxonomy”
to represent highest-level structure within an echelon shown above.
Core Enterprise EA Services:
Core Enterprise Services are IT services that provide the foundation for DoD service and data
providers by delivering and managing the underlying capabilities from which communities build
and receive the services they need to meet their business and information processing needs. For
EA, the initial IT services that support the registration and discovery of architectural artifacts,
architectures, or products will be developed. Additional anticipated services include translation
services that ensure artifacts, architectures, or products are understandable between DARS and
other architectural repositories.
Discovery:
The act of locating a machine-processable description of a Web service-related resource that may
have been previously unknown and that meets certain functional criteria. It involves matching a
set of functional and other criteria with a set of resource descriptions. The goal is to find an
appropriate Web service-related resource. [Web Services Glossary, W3C Working Group Note 11 February
2004]
Discovery Service:
A discovery service is a service that enables agents to retrieve Web services-related resource
description. [Web Services Glossary,W3C Working Group Note 11 February 2004]
81921640
B-1
DRAFT
DRAFT
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
Enterprise:
Enterprise is an organization (or cross-organizational entity) supporting a defined business scope
and mission. An enterprise includes interdependent resources (people, organizations, and
technology) that must coordinate their functions and share information in support of a common
mission (or set of related missions). [CIO Council, A Practical Guide to Federal Enterprise Architecture,
February 2001]
Federated Architecture:
Federated architectures define common or shared architecture standards across autonomous
program areas, enabling state government entities to maintain diversity and uniqueness, while
providing interoperability. [New York State Office for Technology http://www.oft.state.ny.us/arcPolicy/policy/
glossary.htm]
An Architecture Federation is a framework for enterprise architecture development, maintenance
and use that links, locates, and aggregates disparate architectures and architecture information.
A federated architecture approach recognizes the uniqueness and specific purpose of disparate
architectures, and allows for their autonomy and local governance, while enabling the enterprise
to benefit from their content. [DoD FJAWG recommendation, Dec 2005]
Federated Architectures: Separate, Distinct, Individual Architectures:
Separate architectures were built under different contexts but may be aligned within an
overarching scope and boundary, viewed from a common point of view, for a common purpose,
and a specified set of questions to be addressed by the resulting federated architecture. [DoD
FJAWG recommendation, Dec 2005]
Services:
A mechanism to enable access to one or more capabilities, where the access is provided using a
prescribed interface and is exercised consistent with constraints and policies as specified by the
service description. [From the GIG Enterprise Services Strategy, Oct 2006]
Service-Oriented Architecture and SOA Principles:
SOA is a paradigm for organizing and utilizing distributed capabilities that may be under the
control of different ownership domains. It represents a collection of services on a network that
communicate with one another. It is any architecture that can be decomposed, on a logical level,
into three categories of components: a service, a provider of the service, and a consumer of the
service. SOA addresses three roles and three operations. The three roles are the service producer
(provider), the service consumer (requester), and the service registry The objects acted upon are
the service and the service description, and the operations performed on these objects are
publish, find, and bind. Within industry and DoD the concept and service principles are evolving
as we gain experience with SOA. Some general service-oriented principals are: discoverable,
accessible, and dynamically bound; enable interoperability; are loosely coupled; have a network
addressable interface; are location transparent; and are not bound to specific systems. [NCOW RM
v1.2 (draft)]
81921640
B-2
DRAFT
DRAFT
805
806
807
808
809
810
811
Service Registry or Registry Service:
Is a platform neutral, network based directory that stores information about services and is
searchable based on the descriptive metadata defined in the service specification. [DoDAF Version
1.5 Vol 2 Oct 2006]
81921640
B-3
DRAFT
DRAFT
812
813
814
815
816
817
818
819
820
821
822
823
824
APPENDIX C: REFERENCE DOCUMENTS
A Practical Guide to Federal Enterprise Architecture, CIO Council, February 2001.
BMA – Federation Strategy and Roadmap [Working Draft], Business Transformation Agency,
28 August 2006.
Concepts of Enterprise Architecture: Federating Components of an Enterprise Architecture,
Draft MITRE Corporation Paper for SAF/XCXA, 6 September 2006.
Department of Defense Chief Information Officer Memorandum, "DoD Net-Centric Data
Strategy," May 9, 2003.
825
826
827
828
DoD Architecture Framework, Version 1.0, 9 February 2004.
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
DoD Federated Joint Architecture Working Group (FJAWG) Internal Working Papers,
December 2005-Present.
DoD Directive 8100.1, "Global Information Grid (GIG) Overarching Policy," September 19,
2002.
DoD Net Centric Spectrum Management Strategy, OASD (NII), 25 April 2005.
Federated Architectures, Enterprise Integration Inc., 2005.
Global Information Grid Enterprise Services Strategy, Working Draft, OASD(NII) CIO, Oct
2006.
http://www.ocio.usda.gov/e_arch/glossary.html, U.S. Department of Agriculture Office of the
CIO.
http://www.oft.state.ny.us/arcPolicy/policy/glossary.htm,
Technology.
New
York
State
Office
for
National Defense Strategy of the United States of America, March 2005.
The “Net-Centric Operations and Warfare Reference Model, OASD (NII)”, 17 Nov 2005.
“Joint Concept of Operations for Global Information Grid NETOPS version 2.0”,
USSTRATCOM, 10 Aug 2005
81921640
C-1
DRAFT
DRAFT
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
APPENDIX D: RELATED GUIDANCE
Architecture requirements are solidly grounded in Law; the Clinger-Cohen Act assigned
Chief Information Officers the responsibility for “developing, maintaining, and facilitating the
implementation of a sound and integrated information technology architecture.” Additional
details are provided in Office of Management and Budget Circular A-130. The Circular
establishes an Enterprise Architecture (replacing the term “information technology architecture”)
as consisting of the following elements: business processes, information flows, data
descriptions, applications, technology infrastructure, and standards. The Circular also establishes
the requirement for the EA to be incorporated in the Executive Agency’s Capital Planning and
Investment Control Process.
DoD prescribes the DoDAF version 1.0 (DoDAF) as the basis for DoD developing
architecture descriptions. DoDAF-based architecture descriptions are required in many of the
Department’s major processes; these descriptions are also required to be consistent with the GIG
Architecture and NCOW RM. The following policies require the development of architecture
descriptions:


869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
These policies are enforced through processes that include assessments of compliance with
applicable architectures. DoDI 5000.2, for example, includes requirements for Clinger-Cohen
Compliance. One of the compliance criteria requires that acquisitions are “consistent with the
Global Information Grid policies and architecture, to include relevant standards.” The DoD CIO
as well as the DoD Component CIO’s assess lower Acquisition Category (ACAT) programs.
887
888
889
890
The development of a DoD Federated EA will be conducted in accordance with both DoD
and Federal policy on the development and use of Enterprise Architectures. The approach to
federation described herein shall closely follow DoD policy and directives on net-centric data
management. The following net-centric references are applicable:
891







CJCSI 3170.01E, Joint Capabilities Integration and Development System
CJCSI 6212.01D, Interoperability and Supportability of Information
Technology and National Security Systems
DoDD 5000.1, The Defense Acquisition System
DoDI 5000.2, Operation of the Defense Acquisition System
DoDD 4630.5, Interoperability and Supportability of Information Technology
and National Security Systems
DoDI 4630.8, Procedures for Interoperability and Supportability of Information
Technology and National Security Systems
DoDD 8000.1, Management of DoD Information Resources and Information
Technology
DoDD 8115.1, Information Technology Portfolio Management
DoD CIO Memorandum, DoD Net-Centric Data Strategies:
–
–
–
892
893
894
81921640
Net-Centric Data
Shared Services
Information Assurance
D-1
DRAFT
DRAFT
–
–
–
895
896
897
Spectrum
Networking
Computing Infrastructure
898

DoD Directive 8320.2, Data Sharing in a Net-Centric Department of Defense
899

Federal Enterprise Architecture Program, EA Assessment Framework 2.0
900

Federal Enterprise Architecture Program, Data Reference Model 2.0
901
902
903
904
905
906
907
908
909
910
Key net-centric principles that must be adhered to are that data assets must be made visible,
accessible, understandable, and trusted (when referring to IA), and they must be enabled to
support interoperability. These principles do not assume or prescribe any requirements for
physical data storage. Data may be stored in any format using relational, object oriented, or
hybrid technologies based on any kind of data model. These principles do, however, require that
agreements be reached within the DoD EA Community of Interest (COI) or Community of
Practice (COP) on the structure and semantics of data elements used for data asset discovery,
linking, exchange, and integration. Metadata elements needed to support the EA user services
described herein are defined and proposed for DoD EA COI/COP acceptance as the standard for
net-centric federated EA services.
81921640
D-2
DRAFT
DRAFT
APPENDIX E: ARCHITECTURE CATEGORIZATION,
STRUCTURE (TAXONOMY)
911
912
913
914
915
916
The top level of the DoD Federated EA taxonomy will initially consist of the four DoD
Business Reference Model (BRM) Mission Areas (MAs) [see Figure E-1] and be coordinated by
a federated DoD EA control board.
917
Federated DoD EA Control Board
Warfighter
MA
Business
MA
Intel
MA
EIEEIE
MA
MA
Managed by
MA Authority
Service
Agency
COCOM
Subordinate architectures
mapped to MA-level by Components
918
919
Figure E-1: Federated DoD EA Taxonomy
920
921
922
923
Table E-1 identifies MA Taxonomy Configuration Management (CM) Authorities that will
have autonomy for defining and managing a core set of taxonomy elements for each MA.
Mission area taxonomies should be derived from MA activity decomposition and synchronized
with the DoD BRM.
924
Table E-1: Federated DoD and MA Taxonomy CM Authority
Warfighting
Taxonomy Content
CM Authority
JS
FCBs/JCAs
Business
Intelligence
Enterprise Information Environment
BTA
DIA
DoD CIO
BEA (TBD)
DoD BRM for Intel
DoD BRM for EIE
BRM Mission Area
925
926
927
928
Decomposition Basis
The number of High-level taxonomy tiers defined and managed, as a core set will depend
on the degree to which the MA Taxonomy CM Authority wishes to exercise CM control over the
taxonomy structure. Decomposition levels below the MA core structure will be defined by DoD
Components, as authorized by the MA Taxonomy CM Authority. Each EA DoD Components’
81921640
E-1
DRAFT
DRAFT
929
930
931
932
architecture developer will classify its architectures in the DoD Architecture Registry System
(DARS) by associating DoD Components’ architectures with nodes of the MA core or authorized
DoD Component extensions to the core by registering Taxonomy Node and Association Type
metadata.
933
934
935
The Federated Joint Architecture Working Group (FJAWG) has already developed several
assessments and recommendations in regard to taxonomy, which are provided here for reference,
pending establishment of the formal structure for their implementation:
936
937
938
939
1. Mission Area Taxonomy CM Authorities must accept responsibility for defining
and managing MA core upper tier taxonomy nodes. Therefore, the EA summit
should adopt and promulgate the recommended EA High-level Taxonomy
strategy.
940
941
942
943
944
945
946
947
2. DoD Components will have autonomy in developing domain taxonomies.
However, domain architecture mappings and extensions to the MA core must be
regulated to minimize categorization redundancies. Therefore:
a. MA authorities should provide guidance on developing and mapping
domain extensions to the MA core, to include approval and mapping of
“authoritative” extensions.
b. The FJAWG should recommend guidance to MA authorities on regulating
DoD Component domain extensions and mappings to the MA core.
948
949
950
951
952
953
954
955
956
957
958
3. MA core taxonomies need to be coordinated to maximize uniqueness of toplevel nodes and minimize potential categorization redundancy; and business
analysis needs may drive requirements for additional taxonomies to be
incorporated into the MA high-level taxonomy in the future. Therefore, a
Federated EA high-level taxonomy configuration control function and
governance should be established above the individual MAs for regulating the
high-level taxonomy structure and coordinating/de-conflicting the MAtaxonomy top-level nodes. Governance authority should be assigned to the
DoD Architecture Configuration Control Board (ACCB).
Execution
responsibility should be assigned to the FJAWG as the technical advisor to the
ACCB.
959
960
961
Changes in the MA core taxonomies will impact alignments in the registry and should be
managed. Therefore, MA Authorities should develop and implement a core taxonomy CM
process subject to ACCB approval.
81921640
E-2
DRAFT
DRAFT
962
963
APPENDIX F: DOD FEDERATED EA GOVERNANCE
DOCUMENT
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
Draft Governance Outline
Scope
Governance Framework
OASD/JS Level
 Authority
o Charter Development/Approval
o Organizational Framework
 Governance Bodies
 Voting Members
 Stakeholder Participation
o Roles and Responsibilities
o Resource Requirements and Responsibilities
 Guidance
o Policies
o Synchronization
o Security/Access
 Accreditation of content
 Accreditation of members
 Access control and privileges
o External Relationships
 Direction
o Standards
 Tools
 Metadata
o Quality
o Maturity Models
o Repositories
o Registries
o Data Management
o Services
o Configuration Management
 Monitoring
o Metrics
o Compliance
 Affirmation/Remediation
Mission Area and DoD Component Levels
 Implementation Responsibilities
 Monitoring Responsibilities
 Affirmation/Remediation Responsibilities
81921640
F-1
DRAFT
DRAFT
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
APPENDIX G: A DETAILED LIST OF CRITICAL SUCCESS
FACTORS (CSF) BY CSF CATEGORY
 Commitment by DoD DoD Components to:
o Actively participate in FJAWG effort
o Maintain DoD Components -level architecture metadata
o Be willing to participate in and support EA Federation PoC Pilot efforts
o Organizations external to DoD that need to assist or provide access to information for
identifying external architecture interface needs
 Adoption and implementation by DoD DoD Components of the following:
o Federated EA registration and discovery services
o Architecture federation rules
o Federated EA metadata standards
o Recommended Federation structure
o EA Federation roles and responsibilities
o Proposed high-level taxonomies
o Standard methodologies for aligning and linking architectures
o Architecture categorization schemes
o Architecture federation governance
 Proof-of-Concept Pilot is needed to validate the following:
o Applicability & effectiveness of proposed high-level taxonomies
o Architecture configuration management
o Architecture discovery capabilities and performance requirements are satisfied
o Architecture governance at the all levels ensures integrity, visibility, accessibility,
availability, understandability, and usability of architecture data by business/mission
users
o Architecture metadata at DoD Components level satisfies business/Mission Area
information discovery needs
o Architecture navigation and discovery provides correct architecture content
o Architecture registration and discovery capabilities and performance requirements are
satisfied
o Capability to discover (and acquire) architecture content via navigation, search, and
browsing services
o Capability to provide and search on user-defined search criteria
o Categorization schemes are effective in serving business and MA information
discovery needs
o Correctness of rules for federating architectures across the DoD
o Discovery capabilities meet unanticipated user needs
o Effectiveness and efficiency of architecture navigation schemes
o Effectiveness and efficiency of registration service
o Guidance for federation structure
o Key interface points for linking architectures are the correct ones
o Linkage to architectures external to the DoD EA Federation
81921640
G-1
DRAFT
DRAFT
o Linkages are established, on different platforms, with independent repositories within
the federation
o Viability and effectiveness of implemented EA Federation roles and responsibilities
framework
o Viability of accommodating various formats and toolsets
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093

Linking Business and Warfighting mission drivers/needs:
o Alignment of operational activities
o Identifying a “common scenario” applicable to the business or warfighting missions
o Supporting IT enablers for the operational activities
 Resources at DoD Components and EA Federation levels must be available to:
o Participate in and support the PoC Pilot efforts
o Aid in identifying all architecture formats and toolsets in use
o Identify interface needs
o Assist in identifying architecture interface points
o Develop and governance structure at DoD Enterprise and DoD Component levels
o Develop and update architecture metadata at DoD Component level
o Develop and update links to architecture content at the DoD Component level
o Map Mission Areas to each other
o Assist in DoD Component repository federation effort
 Adoption of DARS as the Federated EA Registry for Architecture - DARS must be:
o Accessible and available across entire DoD
o Intuitive, user-friendly, fast, responsive, and timely for architecture registration and
discovery
 EA Federation Tools performance requirements involve the following:
o Automated mapping and linking of architecture content
o Applications that must have timely response times
o Must be user-friendly, intuitive, fast online response
o Interfaces that must be developed to accommodate all architecture formats and
toolsets for architecture registration and discovery
 Knowledge and/or skills in:
o Architectures external to the DoD that need to be interfaced with the Federated EA
o DoD technology infrastructure
o Existing disparate architectures across the DoD
o Technologies and tools to provide linking to architecture content
o Web technology
o Metadata standards that need to be implemented
o Architecture formats, methodologies, and toolsets
o Prospective current and future types of unanticipated users of Federated EA
o Types of architecture artifacts needed by unanticipated users
81921640
G-2
DRAFT
DRAFT
APPENDIX H: ACTIVITY-BASED EA FEDERATION
ALIGNMENT
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
Activity-Relationship-Activity:
Federating the architecture in an enterprise requires a high-level taxonomy (under
development) of the enterprise and an activity model for each DoD Componentof interest in the
enterprise. The activities within the high-level taxonomy and DoD Components’ activity models
will be related in one of the following four ways as illustrated in Figure H-1 below.




Equivalent to
Similar to
Part of
No relationship
Federated Architecture Relationships
High-level Activity Taxonomy
…
…
FM
IL
Is Equivalent to
AFMC
Is Equivalent
Is Similar toto
Is Part of
1108
1109
Figure H-1. Federation Relationships Among Activities
1110
1111
A DoD Components’ activity is considered “equivalent to” a high-level activity if the
descriptions and artifacts of both are identical.
1112
1113
1114
1115
1116
A DoD Components’ activity is considered “similar to” a high-level activity if the
descriptions are the same but the primitives differ in some specification between the enterprise
design and the DoD Components implementation, the activity is done differently by two or more
DoD Components, or two or more DoD Components accomplish the same activity with different
primitive specifications.
1117
1118
A DoD Components’ activity is considered “part of” a high-level activity if the description
of the DoD Components’ activity achieves part of the high-level activity’s goal, and another
81921640
H-1
DRAFT
DRAFT
1119
1120
DoD Components’ activity that also has a “part of” relationship with the same high-level activity
completes the goal.
1121
1122
If a DoD Components’ activity has no relationship with any of the high-level activities,
then no relationship is shown.
1123
1124
1125
Relationships between the high-level and DoD Components’ activities can occur at any
level of decomposition.
81921640
H-2
DRAFT