SlideShare a Scribd company logo
1 of 13
Service Oriented Architecture: 16
Integrated SOA Governance
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Integrated SOA Governance
Integrated SOA Governance Defined
• Integrated SOA Governance ensures the applicability,
integrity and usability of a wide range of assets through all
their lifecycle stages from asset identification through
deprecation.
• The full lifecycle is split into planning governance,
development lifecycle governance, and operational
governance
• Structured governance is required to carry out and see
through the commitments
• It helps organizations succeed with SOA adoption efforts by
mitigating risks through predefined constraints, rules, and
the allocation of necessary authority.
What is Governance
• Governance is the act of governing or administrating
something.
• By far the most common form of governance is that of an
organization. A system of governance is therefore generally
a type of organizational system.
• A company uses an organizational system to govern its own
internal community.
• A system for organizational governance exists as a meta-
decision system.
• In other words, it is not just a means by which the
organization makes decisions, it is the means by which the
organization makes decisions about decision-making.
What is Governance…
• Within this context, a governance system:
– places constraints on decisions
– determines who has responsibility and authority to make
decisions
– establishes constraints and parameters that control, guide, or
influence decisions
– prescribes consequences for non-compliance
• It mitigates conflict by clearly defining responsibilities and
assignments of authority, and further reduces ambiguity by
articulating constraints and parameters in practical forms
(such as rules and decision guidelines).
• It also helps balance tactical and strategic goals by
expressing the intents and purposes of its rules.
Planning Governance – Build the
Right Things
• Planning governance includes the identification
analysis and modeling of candidate services,
policies, profiles, processes and information.
• An effective planning governance tool will
manage an organization’s SOA portfolio while
examining existing and planned applications and
determining which capabilities should be exposed
as services, and where applications would benefit
from consuming shared services.
Planning Governance
• Planning Governance solutions will require:
– integration with a wide range of existing enterprise
repositories,
– application portfolio management, and
– enterprise architecture planning solutions, to harvest
current and desired architectures.
• The output from the Planning Governance process will
be:
– a set of candidate services that feed into the Development
Governance process, and
– candidate policies feeding into the Policy Governance
process.
Development Governance – Build
Things Right
• Marshals an asset through the development process
• Development process typically spans:
– Design
– Development
– Testing
– Staging
• Development Governance includes:
– Workflow mechanism to approve migration
between phases
– Policy compliance validation
– Clear separation between lifecycle stages
Development Governance
• Solution depends on Policy Governance for:
– Compliance policy definition
– Management, and validation
• Policies are used to determine:
– Relevance and suitability of services at each
lifecycle stage
– Determine if assets meet enterprise standards and
guidelines before they can promoted to the next
stage of the lifecycle.
Operational Governance – Ensure
What’s Built Behaves Right
• Idea is to ensure what’s built behaves right
• Controls the runtime aspects of SOA
• Typically includes
– Web Service monitoring
– Security and management
– Runtime policy system
• Relies heavily on Policy Governance solution
– Need to discover policies for implementation &
enforcement
Operational Governance Cont’d
• Key goal of a well architected system is to fully abstract service
consumers & providers from complexity
• Complexity includes:
 Policy implementation
 Enforcement
 Service endpoint location
 Transport
 Standards
 Message Exchange Pattern
 Other impedances to operability
• Should provide:
 Agents & delegates
 Network resident intermediary for service virtualization
Policy Governance – Uniform Policy
for All Governance Areas
• Policy Governance does the following:
– Defines and manages policies
– Associates polices with assets
– Validates and reports on policy compliance
• Policy types include:
– Metadata compliance policies applied in Planning and
Development Governance
– Security, reliability, and service-level policies applied
through an Operational Governance solution
• It is critical that the Policy Governance solution ensures
consistent policy definition, implementation, enforcement,
validation, and audit through all stages of the lifecycle, and
across all distributed and mainframe platforms.
Assignment
• Explain the Concept of Integrated SOA
Governance
• Thank You

More Related Content

Similar to Soa 16 integrated soa governance

a123.pdf
a123.pdfa123.pdf
a123.pdfAhTh3
 
CELOE MRKI Lecture Notes 02 v0.1_old.pptx
CELOE MRKI Lecture Notes 02 v0.1_old.pptxCELOE MRKI Lecture Notes 02 v0.1_old.pptx
CELOE MRKI Lecture Notes 02 v0.1_old.pptxDandzaPraditya
 
19600 Compliance Management System Guidelines
19600 Compliance Management System Guidelines19600 Compliance Management System Guidelines
19600 Compliance Management System GuidelinesNimonik
 
19600 compliance management system guidelines
19600   compliance management system guidelines19600   compliance management system guidelines
19600 compliance management system guidelinesNimonik
 
ISO27001_COBIT_Students.pptx
ISO27001_COBIT_Students.pptxISO27001_COBIT_Students.pptx
ISO27001_COBIT_Students.pptxjojo82637
 
Toronix - SOA Governance Quick Start
Toronix - SOA Governance Quick StartToronix - SOA Governance Quick Start
Toronix - SOA Governance Quick Startrrowntree
 
Service Oriented Architecture (SOA) [4/5] : SOA Governance
Service Oriented Architecture (SOA) [4/5] : SOA GovernanceService Oriented Architecture (SOA) [4/5] : SOA Governance
Service Oriented Architecture (SOA) [4/5] : SOA GovernanceIMC Institute
 
Topic 2 - Project Life Cycle and Project Management Organization.pdf
Topic 2 - Project Life Cycle and Project Management Organization.pdfTopic 2 - Project Life Cycle and Project Management Organization.pdf
Topic 2 - Project Life Cycle and Project Management Organization.pdfHuyNguyen657394
 
04 Service Oriented Architecture Series - SOA Management
04 Service Oriented Architecture Series - SOA Management04 Service Oriented Architecture Series - SOA Management
04 Service Oriented Architecture Series - SOA ManagementPouria Ghatrenabi
 
ITIL Service Strategy
ITIL Service StrategyITIL Service Strategy
ITIL Service StrategyMarvin Sirait
 
New Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxNew Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxRajanVerma67117
 
Internal financial control - how ready are you - Webinar
Internal financial control - how ready are you - WebinarInternal financial control - how ready are you - Webinar
Internal financial control - how ready are you - WebinarAli Zeeshan
 
Aws dev ops saif ahmed
Aws dev ops   saif ahmedAws dev ops   saif ahmed
Aws dev ops saif ahmedsaifam
 
UNIT_2_HRM.ppt
UNIT_2_HRM.pptUNIT_2_HRM.ppt
UNIT_2_HRM.pptsharma1785
 
Systems Migration
Systems MigrationSystems Migration
Systems Migrationrichchihlee
 

Similar to Soa 16 integrated soa governance (20)

A Guide to SOA Governance | Torry Harris Whitepaper
A Guide to SOA Governance | Torry Harris WhitepaperA Guide to SOA Governance | Torry Harris Whitepaper
A Guide to SOA Governance | Torry Harris Whitepaper
 
Soa 15 soa governance
Soa 15 soa governanceSoa 15 soa governance
Soa 15 soa governance
 
a123.pdf
a123.pdfa123.pdf
a123.pdf
 
CELOE MRKI Lecture Notes 02 v0.1_old.pptx
CELOE MRKI Lecture Notes 02 v0.1_old.pptxCELOE MRKI Lecture Notes 02 v0.1_old.pptx
CELOE MRKI Lecture Notes 02 v0.1_old.pptx
 
19600 Compliance Management System Guidelines
19600 Compliance Management System Guidelines19600 Compliance Management System Guidelines
19600 Compliance Management System Guidelines
 
19600 compliance management system guidelines
19600   compliance management system guidelines19600   compliance management system guidelines
19600 compliance management system guidelines
 
ISO27001_COBIT_Students.pptx
ISO27001_COBIT_Students.pptxISO27001_COBIT_Students.pptx
ISO27001_COBIT_Students.pptx
 
Toronix - SOA Governance Quick Start
Toronix - SOA Governance Quick StartToronix - SOA Governance Quick Start
Toronix - SOA Governance Quick Start
 
Service Oriented Architecture (SOA) [4/5] : SOA Governance
Service Oriented Architecture (SOA) [4/5] : SOA GovernanceService Oriented Architecture (SOA) [4/5] : SOA Governance
Service Oriented Architecture (SOA) [4/5] : SOA Governance
 
Topic 2 - Project Life Cycle and Project Management Organization.pdf
Topic 2 - Project Life Cycle and Project Management Organization.pdfTopic 2 - Project Life Cycle and Project Management Organization.pdf
Topic 2 - Project Life Cycle and Project Management Organization.pdf
 
04 Service Oriented Architecture Series - SOA Management
04 Service Oriented Architecture Series - SOA Management04 Service Oriented Architecture Series - SOA Management
04 Service Oriented Architecture Series - SOA Management
 
standards1.pdf
standards1.pdfstandards1.pdf
standards1.pdf
 
CSI principles
CSI principlesCSI principles
CSI principles
 
ITIL Service Strategy
ITIL Service StrategyITIL Service Strategy
ITIL Service Strategy
 
New Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxNew Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptx
 
Internal financial control - how ready are you - Webinar
Internal financial control - how ready are you - WebinarInternal financial control - how ready are you - Webinar
Internal financial control - how ready are you - Webinar
 
Aws dev ops saif ahmed
Aws dev ops   saif ahmedAws dev ops   saif ahmed
Aws dev ops saif ahmed
 
UNIT_2_HRM.ppt
UNIT_2_HRM.pptUNIT_2_HRM.ppt
UNIT_2_HRM.ppt
 
SABSA Implementation(Part VI)_ver1-0
SABSA Implementation(Part VI)_ver1-0SABSA Implementation(Part VI)_ver1-0
SABSA Implementation(Part VI)_ver1-0
 
Systems Migration
Systems MigrationSystems Migration
Systems Migration
 

More from Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applicationsVaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmVaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standardVaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesVaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signaturesVaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeVaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication codeVaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmVaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmVaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationVaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremVaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primalityVaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsVaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbersVaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmVaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfishVaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple desVaibhav Khanna
 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Recently uploaded

Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfLivetecs LLC
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 

Recently uploaded (20)

2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdf
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 

Soa 16 integrated soa governance

  • 1. Service Oriented Architecture: 16 Integrated SOA Governance Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 3. Integrated SOA Governance Defined • Integrated SOA Governance ensures the applicability, integrity and usability of a wide range of assets through all their lifecycle stages from asset identification through deprecation. • The full lifecycle is split into planning governance, development lifecycle governance, and operational governance • Structured governance is required to carry out and see through the commitments • It helps organizations succeed with SOA adoption efforts by mitigating risks through predefined constraints, rules, and the allocation of necessary authority.
  • 4. What is Governance • Governance is the act of governing or administrating something. • By far the most common form of governance is that of an organization. A system of governance is therefore generally a type of organizational system. • A company uses an organizational system to govern its own internal community. • A system for organizational governance exists as a meta- decision system. • In other words, it is not just a means by which the organization makes decisions, it is the means by which the organization makes decisions about decision-making.
  • 5. What is Governance… • Within this context, a governance system: – places constraints on decisions – determines who has responsibility and authority to make decisions – establishes constraints and parameters that control, guide, or influence decisions – prescribes consequences for non-compliance • It mitigates conflict by clearly defining responsibilities and assignments of authority, and further reduces ambiguity by articulating constraints and parameters in practical forms (such as rules and decision guidelines). • It also helps balance tactical and strategic goals by expressing the intents and purposes of its rules.
  • 6. Planning Governance – Build the Right Things • Planning governance includes the identification analysis and modeling of candidate services, policies, profiles, processes and information. • An effective planning governance tool will manage an organization’s SOA portfolio while examining existing and planned applications and determining which capabilities should be exposed as services, and where applications would benefit from consuming shared services.
  • 7. Planning Governance • Planning Governance solutions will require: – integration with a wide range of existing enterprise repositories, – application portfolio management, and – enterprise architecture planning solutions, to harvest current and desired architectures. • The output from the Planning Governance process will be: – a set of candidate services that feed into the Development Governance process, and – candidate policies feeding into the Policy Governance process.
  • 8. Development Governance – Build Things Right • Marshals an asset through the development process • Development process typically spans: – Design – Development – Testing – Staging • Development Governance includes: – Workflow mechanism to approve migration between phases – Policy compliance validation – Clear separation between lifecycle stages
  • 9. Development Governance • Solution depends on Policy Governance for: – Compliance policy definition – Management, and validation • Policies are used to determine: – Relevance and suitability of services at each lifecycle stage – Determine if assets meet enterprise standards and guidelines before they can promoted to the next stage of the lifecycle.
  • 10. Operational Governance – Ensure What’s Built Behaves Right • Idea is to ensure what’s built behaves right • Controls the runtime aspects of SOA • Typically includes – Web Service monitoring – Security and management – Runtime policy system • Relies heavily on Policy Governance solution – Need to discover policies for implementation & enforcement
  • 11. Operational Governance Cont’d • Key goal of a well architected system is to fully abstract service consumers & providers from complexity • Complexity includes:  Policy implementation  Enforcement  Service endpoint location  Transport  Standards  Message Exchange Pattern  Other impedances to operability • Should provide:  Agents & delegates  Network resident intermediary for service virtualization
  • 12. Policy Governance – Uniform Policy for All Governance Areas • Policy Governance does the following: – Defines and manages policies – Associates polices with assets – Validates and reports on policy compliance • Policy types include: – Metadata compliance policies applied in Planning and Development Governance – Security, reliability, and service-level policies applied through an Operational Governance solution • It is critical that the Policy Governance solution ensures consistent policy definition, implementation, enforcement, validation, and audit through all stages of the lifecycle, and across all distributed and mainframe platforms.
  • 13. Assignment • Explain the Concept of Integrated SOA Governance • Thank You