SlideShare a Scribd company logo
1 of 9
Download to read offline
Page 1 of 9 
© 2014 EAPJ.org 
Visualizing IT at the Department of Homeland Security with the ArchiMate® Visual Modeling Language 
By Iver Band 
Overview 
Department of Homeland Security (DHS) Chief Information Officer (CIO) Luke McCormack recently submitted testimony to a US Senate Subcommittee [1]. This case study, which is based on CIO McCormack’s testimony, demonstrates how enterprise architects using the ArchiMate® language [2] can quickly capture business situations using viewpoints defined in the ArchiMate specification. These viewpoints are templates for views that address particular sets of stakeholder concerns. This case study contains views based on and named after standard templates. For example, the ArchiMate Organization view in Figure 1 is based on the ArchiMate Organization viewpoint [2]. 
This case study is based almost completely on the content of a single summary document. Its views are not sufficiently detailed for analyzing and building upon a complex organization’s strategic capabilities. However, these simplified views should give readers a sense of what is possible with enterprise architecture visual modeling. Interested readers should consult the ArchiMate specification [2] to learn more about the language. 
Visual Modeling 
In his testimony, CIO McCormack refers to the organizational structure of DHS without fully summarizing it. Figure 1 is an ArchiMate Organization view that shows the key DHS components. It is based on a separately published DHS organization chart [3]. This view uses a single ArchiMate concept, business actor, which is defined “as an organizational entity that is capable of performing behavior” [2]. The view shows a set of business actors that compose DHS itself, which is also represented as a business actor. The composition relationship between DHS and its components is represented by nesting the DHS components within the symbol for the larger organization.
Page 2 of 9 
© 2014 EAPJ.org 
Figure 1. DHS Organization view. 
CIO McCormack describes DHS progress in addressing three key concerns: “Infrastructure Governance”, “Strengthening Our Stewardship”, and “Managing Our Workforce”. He prefaces these descriptions with the statement that “DHS has made great strides toward strong management of IT”. The Stakeholder view in Figure 2 models these three concerns as drivers, and models the statement about progress as an assessment related to those drivers. 
Figures 3, 4 and 5 each give more detail on CIO McCormack’s assessments. Each of these views models the DHS CIO as a stakeholder, which is “…the role of an individual, team, or organization that represents their interests in, or concerns relative to, the outcome of the architecture” [2]. Each view also models a particular concern of DHS CIO as an ArchiMate driver, which is “…something that creates, motivates, and fuels the change in an organization” [2]. Associated with each driver are a number of ArchiMate assessments, each of which are “…the outcome of some analysis of some driver” [2]. Some assessments aggregate, or group together non-exclusively, other assessments in these three views. The figures collectively use both nesting and the hollow diamond aggregation arrow to indicate this relationship. In Figure 3, the assessment “Clear responsibility for organizational excellence” aggregates the “Robust, tiered governance model”, which in turn aggregates six additional assessments.
Page 3 of 9 
© 2014 EAPJ.org 
Figure 2. Top-level Stakeholder view of CIO McCormack's concerns.
Page 4 of 9 
© 2014 EAPJ.org 
Figure 3. CIO McCormack's assessments related to infrastructure governance
Page 5 of 9 
© 2014 EAPJ.org 
Figure 4. CIO McCormack's assessments related to improving efficiency across DHS
Page 6 of 9 
© 2014 EAPJ.org 
Figure 5. CIO McCormack's assessments related to managing the DHS IT workforce. 
The testimony also covers the organizations and activities involved in oversight of DHS IT programs. Figure 6 describes theses oversight activities and some of the organizations that conduct them, to the extent that they are mentioned in the testimony. This figure models a series of bidirectional information flow relationships, indicated by the dashed, solid-arrow lines between the DHS IT program business function and a number of other business functions indicated by the chevron icon, and business processes indicated by the horizontal hollow arrow icon. Some of these business behaviors are assigned to business actors, indicated by the stick figure icon, that perform them. The TechStat Accountability session develops, or has a write access relationship to, the Root cause business object, which is read by the Center of Excellence business actor. In other words, the TechStat sessions determine root causes, which serve as input to centers of excellence. 
Figure 6. Business Process view of DHS IT program oversight activities.
Page 7 of 9 
© 2014 EAPJ.org 
The testimony also covers the DHS IT data center consolidation activities and the use of the consolidated data centers to deliver department-wide cloud computing services. Figure 7 summarizes this transition based on the limited information given in the testimony, and with the assumption that a phased approach was used to transition from eighteen data centers to two and to establish eleven cloud services. This view uses the ArchiMate plateau concept and the triggering relationship to depict a progression of “relatively stable” architectural states [2]. The initial and final plateaus each aggregate a number of data center locations, which are indicated by the map pin icon. Figure 7 also shows that the eleven cloud business services are assigned to the two consolidated data centers. A business service “…fulfills a business need for a customer (internal or external to the organization)” [2]. 
Figure 7. Summary ArchiMate Implementation and Migration view of DHS data center consolidation and cloud service development. 
CIO McCormack describes the value of the DHS IT “cloud computing business model”. Figure 8 depicts the model, based on its partial description in the testimony, as an ArchiMate product. ArchiMate defines a Product as “…a coherent collection of services, accompanied by a contract/set of agreements, which is offered as a whole to (internal or external) customers” [2]. This Product view also depicts the value CIO McCormack attributes to this product: capital expenditure reduction, spending transparency, and reduced time-to-market for new capabilities.
Page 8 of 9 
© 2014 EAPJ.org 
Figure 8. ArchiMate Product view of DHS IT cloud computing business model 
Conclusion 
This case study gives only a sampling of what is possible using the ArchiMate language. It very selectively demonstrates the ArchiMate Business layer, the ArchiMate Motivation extension and the ArchiMate Implementation and Migration extension. It does not use the ArchiMate Application or Technology layers. However, this case study demonstrates how enterprise architects can use the ArchiMate language to quickly capture any business situation and educate themselves in the process. Then, they can use their initial models to educate others and as the basis for more formal architecture activities. 
References 1. Written testimony of MGMT Chief Information Officer Luke McCormack for a Senate Committee on Homeland Security and Governmental Affairs, Subcommittee on Efficiency and Effectiveness of Federal Programs and the Federal Workforce hearing titled “A More Efficient and Effective Government: Examining Federal IT Initiatives and the IT Workforce”. Retrieved July 12, 2014 from http://www.dhs.gov/news/2014/06/10/written-testimony-mgmt-senate-homeland- security-and-governmental-affairs. 
2. The Open Group. ArchiMate 2.1 Specification. Retrieved July 12, 2014 from http://pubs.opengroup.org/architecture/archimate2-doc/. 
3. Department of Homeland Security Organizational Chart. Retrieved July 12, 2014 from http://www.dhs.gov/xlibrary/assets/dhs-orgchart.pdf.
Page 9 of 9 
© 2014 EAPJ.org 
About the Author 
Iver Band has a dual career as a practicing enterprise architect and as a developer of EA standards and methods. Late last year, he became an enterprise architect at a major health insurer, where he shapes solutions that enable health care reform. For the previous six years at a diversified financial services company, he focused on business solutions and governance, and prior to that, infrastructure. He guided contact center and CRM implementations, claims system modernization, end user computing and trading workflow automation. As enterprise infrastructure architect, Iver developed data center, computing platform and resilience strategies that continue to shape current investment. Prior to his work in financial services, Iver had a lengthy career at Hewlett-Packard with roles ranging from IT director for a global business to HP Labs visiting technologist. At HP Labs, he researched security topics such as role engineering, and led the development of a patented approach to network security management. 
Iver also serves as Director of Enterprise and Solution Architecture for EA Principals, a training and consulting firm, for which he consults with clients, develops curriculum materials, and edits the Enterprise Architecture Professional Journal and EAPJ.org. Iver also represents EA Principals in the Open Group, where he is the elected Vice Chair of The ArchiMate Forum. In that forum, Iver has led development of white papers demonstrating applications of the ArchiMate visual modeling language in financial services and manufacturing. Iver has also written and presented on how the ArchiMate language can be used with the TOGAF Architecture Content Framework for enterprise modeling, with UML for transitioning from enterprise to solution architecture, and with SABSA for enterprise security architecture. Iver has also co-developed the ArchiMate certification exams and made numerous other contributions to the standard. 
Iver is TOGAF and ArchiMate Certified, a Certified Information Systems Security Professional (CISSP), a Certified Information Professional (CIP), and a Prosci Certified Change Consultant.

More Related Content

What's hot

Cloud Integration for Hybrid IT: Balancing Business Self-Service and IT Control
Cloud Integration for Hybrid IT: Balancing Business Self-Service and IT ControlCloud Integration for Hybrid IT: Balancing Business Self-Service and IT Control
Cloud Integration for Hybrid IT: Balancing Business Self-Service and IT ControlAshwin V.
 
BR Allen Associates compares Information Infrastructure providers
BR Allen Associates compares Information Infrastructure providersBR Allen Associates compares Information Infrastructure providers
BR Allen Associates compares Information Infrastructure providersIBM India Smarter Computing
 
Tailoring hybrid cloud exec report
Tailoring hybrid cloud exec reportTailoring hybrid cloud exec report
Tailoring hybrid cloud exec reportJose Pena
 
AGILE CLOUD: MANAGING THE EMPOWERED USER
AGILE CLOUD: MANAGING THE EMPOWERED USERAGILE CLOUD: MANAGING THE EMPOWERED USER
AGILE CLOUD: MANAGING THE EMPOWERED USERdinCloud Inc.
 
Information System Architecture
Information System ArchitectureInformation System Architecture
Information System ArchitectureSuresh Pokharel
 
IT Outsourcing: Job Embeddedness
IT Outsourcing: Job EmbeddednessIT Outsourcing: Job Embeddedness
IT Outsourcing: Job EmbeddednessO' Neil Lim
 
Gartner Cmdb Article
Gartner Cmdb ArticleGartner Cmdb Article
Gartner Cmdb Articlekvz
 
A blueprint for data in a multicloud world
A blueprint for data in a multicloud worldA blueprint for data in a multicloud world
A blueprint for data in a multicloud worldMehdi Charafeddine
 
Craig Ellis MBA Dissertation
Craig Ellis MBA DissertationCraig Ellis MBA Dissertation
Craig Ellis MBA DissertationCraig Ellis
 
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...christophefeltus
 
Understanding_IT_Assets_Today
Understanding_IT_Assets_TodayUnderstanding_IT_Assets_Today
Understanding_IT_Assets_TodayDavid Messineo
 
Tca best practices2
Tca best practices2Tca best practices2
Tca best practices2huynhducbi
 
"How CenturyLink is Setting the standard for the Next Generation of Cloud Ser...
"How CenturyLink is Setting the standard for the Next Generation of Cloud Ser..."How CenturyLink is Setting the standard for the Next Generation of Cloud Ser...
"How CenturyLink is Setting the standard for the Next Generation of Cloud Ser...Lillian Hiscox
 
Enterprise Microsharing Tools Comparison 11032008
Enterprise Microsharing Tools Comparison 11032008Enterprise Microsharing Tools Comparison 11032008
Enterprise Microsharing Tools Comparison 11032008Laura "@pistachio" Fitton
 
A Glimpse into Software Defined Data Center
A Glimpse into Software Defined Data CenterA Glimpse into Software Defined Data Center
A Glimpse into Software Defined Data CenterFung Ping
 
Organizing Asset Management Today
Organizing Asset Management TodayOrganizing Asset Management Today
Organizing Asset Management TodayDavid Messineo
 

What's hot (17)

Conceptualizing a responsibility based approach for elaborating and verifying...
Conceptualizing a responsibility based approach for elaborating and verifying...Conceptualizing a responsibility based approach for elaborating and verifying...
Conceptualizing a responsibility based approach for elaborating and verifying...
 
Cloud Integration for Hybrid IT: Balancing Business Self-Service and IT Control
Cloud Integration for Hybrid IT: Balancing Business Self-Service and IT ControlCloud Integration for Hybrid IT: Balancing Business Self-Service and IT Control
Cloud Integration for Hybrid IT: Balancing Business Self-Service and IT Control
 
BR Allen Associates compares Information Infrastructure providers
BR Allen Associates compares Information Infrastructure providersBR Allen Associates compares Information Infrastructure providers
BR Allen Associates compares Information Infrastructure providers
 
Tailoring hybrid cloud exec report
Tailoring hybrid cloud exec reportTailoring hybrid cloud exec report
Tailoring hybrid cloud exec report
 
AGILE CLOUD: MANAGING THE EMPOWERED USER
AGILE CLOUD: MANAGING THE EMPOWERED USERAGILE CLOUD: MANAGING THE EMPOWERED USER
AGILE CLOUD: MANAGING THE EMPOWERED USER
 
Information System Architecture
Information System ArchitectureInformation System Architecture
Information System Architecture
 
IT Outsourcing: Job Embeddedness
IT Outsourcing: Job EmbeddednessIT Outsourcing: Job Embeddedness
IT Outsourcing: Job Embeddedness
 
Gartner Cmdb Article
Gartner Cmdb ArticleGartner Cmdb Article
Gartner Cmdb Article
 
A blueprint for data in a multicloud world
A blueprint for data in a multicloud worldA blueprint for data in a multicloud world
A blueprint for data in a multicloud world
 
Craig Ellis MBA Dissertation
Craig Ellis MBA DissertationCraig Ellis MBA Dissertation
Craig Ellis MBA Dissertation
 
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...Alignment of remmo with rbac to manage access rights in the frame of enterpri...
Alignment of remmo with rbac to manage access rights in the frame of enterpri...
 
Understanding_IT_Assets_Today
Understanding_IT_Assets_TodayUnderstanding_IT_Assets_Today
Understanding_IT_Assets_Today
 
Tca best practices2
Tca best practices2Tca best practices2
Tca best practices2
 
"How CenturyLink is Setting the standard for the Next Generation of Cloud Ser...
"How CenturyLink is Setting the standard for the Next Generation of Cloud Ser..."How CenturyLink is Setting the standard for the Next Generation of Cloud Ser...
"How CenturyLink is Setting the standard for the Next Generation of Cloud Ser...
 
Enterprise Microsharing Tools Comparison 11032008
Enterprise Microsharing Tools Comparison 11032008Enterprise Microsharing Tools Comparison 11032008
Enterprise Microsharing Tools Comparison 11032008
 
A Glimpse into Software Defined Data Center
A Glimpse into Software Defined Data CenterA Glimpse into Software Defined Data Center
A Glimpse into Software Defined Data Center
 
Organizing Asset Management Today
Organizing Asset Management TodayOrganizing Asset Management Today
Organizing Asset Management Today
 

Viewers also liked

Create a brand Poem Admap Publicatie 2014
Create a brand Poem Admap Publicatie 2014Create a brand Poem Admap Publicatie 2014
Create a brand Poem Admap Publicatie 2014Sanoma Netherlands
 
Dcc business model canvas presentation
Dcc business model canvas presentationDcc business model canvas presentation
Dcc business model canvas presentationDublinked .
 
Colorado Animals Card Games A-D
Colorado Animals Card Games A-DColorado Animals Card Games A-D
Colorado Animals Card Games A-DKira_C_Olson
 

Viewers also liked (6)

Aman Ki Asha Slideshow
Aman Ki Asha SlideshowAman Ki Asha Slideshow
Aman Ki Asha Slideshow
 
Create a brand Poem Admap Publicatie 2014
Create a brand Poem Admap Publicatie 2014Create a brand Poem Admap Publicatie 2014
Create a brand Poem Admap Publicatie 2014
 
Dcc business model canvas presentation
Dcc business model canvas presentationDcc business model canvas presentation
Dcc business model canvas presentation
 
Wap
WapWap
Wap
 
2. svetovna. vojna
2. svetovna. vojna2. svetovna. vojna
2. svetovna. vojna
 
Colorado Animals Card Games A-D
Colorado Animals Card Games A-DColorado Animals Card Games A-D
Colorado Animals Card Games A-D
 

Similar to Visualizing IT at the Department of Homeland Security with the ArchiMate® Visual Modeling Language

Cis 519 Week 3 Individual Assignment
Cis 519 Week 3 Individual AssignmentCis 519 Week 3 Individual Assignment
Cis 519 Week 3 Individual AssignmentApril Dillard
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxelinoraudley582231
 
Information security-integration-part-1-of-2
Information security-integration-part-1-of-2Information security-integration-part-1-of-2
Information security-integration-part-1-of-2wardell henley
 
Enterprise architecture
Enterprise architecture Enterprise architecture
Enterprise architecture Hamzazafeer
 
Six Practical, Tactical Tips for the Enterprise Architect
Six Practical, Tactical Tips for the Enterprise ArchitectSix Practical, Tactical Tips for the Enterprise Architect
Six Practical, Tactical Tips for the Enterprise Architectubmedia
 
Is The Architectures Of The Convnets ) For Action...
Is The Architectures Of The Convnets ) For Action...Is The Architectures Of The Convnets ) For Action...
Is The Architectures Of The Convnets ) For Action...Sheila Guy
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security EssayJennifer Wood
 
Discussion 1 post responses.Please respond to the following.docx
Discussion 1 post responses.Please respond to the following.docxDiscussion 1 post responses.Please respond to the following.docx
Discussion 1 post responses.Please respond to the following.docxcuddietheresa
 
Enterprise Systems Architecture Of An Organization
Enterprise Systems Architecture Of An OrganizationEnterprise Systems Architecture Of An Organization
Enterprise Systems Architecture Of An OrganizationNicole Jones
 
A Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudA Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudJeff Nelson
 
Optimize Your Execution by Aligning Business and IT
Optimize Your Execution by Aligning Business and ITOptimize Your Execution by Aligning Business and IT
Optimize Your Execution by Aligning Business and ITcapstera
 
Aligning business and tech thru capabilities - A capstera thought paper
Aligning business and tech thru capabilities  - A capstera thought paperAligning business and tech thru capabilities  - A capstera thought paper
Aligning business and tech thru capabilities - A capstera thought paperSatyaIluri
 
Enterprise Architecture Framework Paper
Enterprise Architecture Framework PaperEnterprise Architecture Framework Paper
Enterprise Architecture Framework PaperLaura Benitez
 
Mike Schleif - Executive Biography
Mike Schleif - Executive BiographyMike Schleif - Executive Biography
Mike Schleif - Executive BiographyMike Schleif
 
Vermont Teddy Bear Essay
Vermont Teddy Bear EssayVermont Teddy Bear Essay
Vermont Teddy Bear EssayAmy Williams
 
Assessment Of An Enterprise-Level Business System
Assessment Of An Enterprise-Level Business SystemAssessment Of An Enterprise-Level Business System
Assessment Of An Enterprise-Level Business SystemTiffany Graham
 
1245176206446 ecm alternatives_to_sharepoint_120609
1245176206446 ecm alternatives_to_sharepoint_1206091245176206446 ecm alternatives_to_sharepoint_120609
1245176206446 ecm alternatives_to_sharepoint_120609tom termini
 
A Method To Define An Enterprise Architecture Using The Zachman Framework
A Method To Define An Enterprise Architecture Using The Zachman FrameworkA Method To Define An Enterprise Architecture Using The Zachman Framework
A Method To Define An Enterprise Architecture Using The Zachman FrameworkKim Daniels
 

Similar to Visualizing IT at the Department of Homeland Security with the ArchiMate® Visual Modeling Language (19)

Cis 519 Week 3 Individual Assignment
Cis 519 Week 3 Individual AssignmentCis 519 Week 3 Individual Assignment
Cis 519 Week 3 Individual Assignment
 
Discussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docxDiscussion 1Recommend three countermeasures that could enhance.docx
Discussion 1Recommend three countermeasures that could enhance.docx
 
Information security-integration-part-1-of-2
Information security-integration-part-1-of-2Information security-integration-part-1-of-2
Information security-integration-part-1-of-2
 
Enterprise architecture
Enterprise architecture Enterprise architecture
Enterprise architecture
 
Tw 1101025 smartrchitect2_z
Tw 1101025 smartrchitect2_zTw 1101025 smartrchitect2_z
Tw 1101025 smartrchitect2_z
 
Six Practical, Tactical Tips for the Enterprise Architect
Six Practical, Tactical Tips for the Enterprise ArchitectSix Practical, Tactical Tips for the Enterprise Architect
Six Practical, Tactical Tips for the Enterprise Architect
 
Is The Architectures Of The Convnets ) For Action...
Is The Architectures Of The Convnets ) For Action...Is The Architectures Of The Convnets ) For Action...
Is The Architectures Of The Convnets ) For Action...
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security Essay
 
Discussion 1 post responses.Please respond to the following.docx
Discussion 1 post responses.Please respond to the following.docxDiscussion 1 post responses.Please respond to the following.docx
Discussion 1 post responses.Please respond to the following.docx
 
Enterprise Systems Architecture Of An Organization
Enterprise Systems Architecture Of An OrganizationEnterprise Systems Architecture Of An Organization
Enterprise Systems Architecture Of An Organization
 
A Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudA Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise Cloud
 
Optimize Your Execution by Aligning Business and IT
Optimize Your Execution by Aligning Business and ITOptimize Your Execution by Aligning Business and IT
Optimize Your Execution by Aligning Business and IT
 
Aligning business and tech thru capabilities - A capstera thought paper
Aligning business and tech thru capabilities  - A capstera thought paperAligning business and tech thru capabilities  - A capstera thought paper
Aligning business and tech thru capabilities - A capstera thought paper
 
Enterprise Architecture Framework Paper
Enterprise Architecture Framework PaperEnterprise Architecture Framework Paper
Enterprise Architecture Framework Paper
 
Mike Schleif - Executive Biography
Mike Schleif - Executive BiographyMike Schleif - Executive Biography
Mike Schleif - Executive Biography
 
Vermont Teddy Bear Essay
Vermont Teddy Bear EssayVermont Teddy Bear Essay
Vermont Teddy Bear Essay
 
Assessment Of An Enterprise-Level Business System
Assessment Of An Enterprise-Level Business SystemAssessment Of An Enterprise-Level Business System
Assessment Of An Enterprise-Level Business System
 
1245176206446 ecm alternatives_to_sharepoint_120609
1245176206446 ecm alternatives_to_sharepoint_1206091245176206446 ecm alternatives_to_sharepoint_120609
1245176206446 ecm alternatives_to_sharepoint_120609
 
A Method To Define An Enterprise Architecture Using The Zachman Framework
A Method To Define An Enterprise Architecture Using The Zachman FrameworkA Method To Define An Enterprise Architecture Using The Zachman Framework
A Method To Define An Enterprise Architecture Using The Zachman Framework
 

More from Enterprise Architecture Professional Journal

More from Enterprise Architecture Professional Journal (9)

An Introduction to Enterprise Architecture Visual Modeling with The ArchiMate...
An Introduction to Enterprise Architecture Visual Modeling with The ArchiMate...An Introduction to Enterprise Architecture Visual Modeling with The ArchiMate...
An Introduction to Enterprise Architecture Visual Modeling with The ArchiMate...
 
Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...
Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...
Thought Leader Interview: Atefeh Riazi on the Past, Present and Future of Met...
 
Technology Foundation for a Real-Time Distributed Problem-Solving Environment...
Technology Foundation for a Real-Time Distributed Problem-Solving Environment...Technology Foundation for a Real-Time Distributed Problem-Solving Environment...
Technology Foundation for a Real-Time Distributed Problem-Solving Environment...
 
Enterprise Architecture Professional Journal Volume I April 2013
Enterprise Architecture Professional Journal Volume I April 2013Enterprise Architecture Professional Journal Volume I April 2013
Enterprise Architecture Professional Journal Volume I April 2013
 
Enterprise Architecture Professional Journal Volume I March 2014
Enterprise Architecture Professional Journal Volume I March 2014Enterprise Architecture Professional Journal Volume I March 2014
Enterprise Architecture Professional Journal Volume I March 2014
 
Thought Leader Interview: Dr. William Turner on the Software-Defined Future ...
Thought Leader Interview:  Dr. William Turner on the Software-Defined Future ...Thought Leader Interview:  Dr. William Turner on the Software-Defined Future ...
Thought Leader Interview: Dr. William Turner on the Software-Defined Future ...
 
Complementing Agile SDLC with Agile Architecture
Complementing Agile SDLC with Agile ArchitectureComplementing Agile SDLC with Agile Architecture
Complementing Agile SDLC with Agile Architecture
 
Thought Leader Interview: Allen Podraza on Records Management
Thought Leader Interview: Allen Podraza on Records ManagementThought Leader Interview: Allen Podraza on Records Management
Thought Leader Interview: Allen Podraza on Records Management
 
Enterprise Architecture Professional Journal Volume II April 2014
Enterprise Architecture Professional Journal Volume II April 2014Enterprise Architecture Professional Journal Volume II April 2014
Enterprise Architecture Professional Journal Volume II April 2014
 

Recently uploaded

Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Visualizing IT at the Department of Homeland Security with the ArchiMate® Visual Modeling Language

  • 1. Page 1 of 9 © 2014 EAPJ.org Visualizing IT at the Department of Homeland Security with the ArchiMate® Visual Modeling Language By Iver Band Overview Department of Homeland Security (DHS) Chief Information Officer (CIO) Luke McCormack recently submitted testimony to a US Senate Subcommittee [1]. This case study, which is based on CIO McCormack’s testimony, demonstrates how enterprise architects using the ArchiMate® language [2] can quickly capture business situations using viewpoints defined in the ArchiMate specification. These viewpoints are templates for views that address particular sets of stakeholder concerns. This case study contains views based on and named after standard templates. For example, the ArchiMate Organization view in Figure 1 is based on the ArchiMate Organization viewpoint [2]. This case study is based almost completely on the content of a single summary document. Its views are not sufficiently detailed for analyzing and building upon a complex organization’s strategic capabilities. However, these simplified views should give readers a sense of what is possible with enterprise architecture visual modeling. Interested readers should consult the ArchiMate specification [2] to learn more about the language. Visual Modeling In his testimony, CIO McCormack refers to the organizational structure of DHS without fully summarizing it. Figure 1 is an ArchiMate Organization view that shows the key DHS components. It is based on a separately published DHS organization chart [3]. This view uses a single ArchiMate concept, business actor, which is defined “as an organizational entity that is capable of performing behavior” [2]. The view shows a set of business actors that compose DHS itself, which is also represented as a business actor. The composition relationship between DHS and its components is represented by nesting the DHS components within the symbol for the larger organization.
  • 2. Page 2 of 9 © 2014 EAPJ.org Figure 1. DHS Organization view. CIO McCormack describes DHS progress in addressing three key concerns: “Infrastructure Governance”, “Strengthening Our Stewardship”, and “Managing Our Workforce”. He prefaces these descriptions with the statement that “DHS has made great strides toward strong management of IT”. The Stakeholder view in Figure 2 models these three concerns as drivers, and models the statement about progress as an assessment related to those drivers. Figures 3, 4 and 5 each give more detail on CIO McCormack’s assessments. Each of these views models the DHS CIO as a stakeholder, which is “…the role of an individual, team, or organization that represents their interests in, or concerns relative to, the outcome of the architecture” [2]. Each view also models a particular concern of DHS CIO as an ArchiMate driver, which is “…something that creates, motivates, and fuels the change in an organization” [2]. Associated with each driver are a number of ArchiMate assessments, each of which are “…the outcome of some analysis of some driver” [2]. Some assessments aggregate, or group together non-exclusively, other assessments in these three views. The figures collectively use both nesting and the hollow diamond aggregation arrow to indicate this relationship. In Figure 3, the assessment “Clear responsibility for organizational excellence” aggregates the “Robust, tiered governance model”, which in turn aggregates six additional assessments.
  • 3. Page 3 of 9 © 2014 EAPJ.org Figure 2. Top-level Stakeholder view of CIO McCormack's concerns.
  • 4. Page 4 of 9 © 2014 EAPJ.org Figure 3. CIO McCormack's assessments related to infrastructure governance
  • 5. Page 5 of 9 © 2014 EAPJ.org Figure 4. CIO McCormack's assessments related to improving efficiency across DHS
  • 6. Page 6 of 9 © 2014 EAPJ.org Figure 5. CIO McCormack's assessments related to managing the DHS IT workforce. The testimony also covers the organizations and activities involved in oversight of DHS IT programs. Figure 6 describes theses oversight activities and some of the organizations that conduct them, to the extent that they are mentioned in the testimony. This figure models a series of bidirectional information flow relationships, indicated by the dashed, solid-arrow lines between the DHS IT program business function and a number of other business functions indicated by the chevron icon, and business processes indicated by the horizontal hollow arrow icon. Some of these business behaviors are assigned to business actors, indicated by the stick figure icon, that perform them. The TechStat Accountability session develops, or has a write access relationship to, the Root cause business object, which is read by the Center of Excellence business actor. In other words, the TechStat sessions determine root causes, which serve as input to centers of excellence. Figure 6. Business Process view of DHS IT program oversight activities.
  • 7. Page 7 of 9 © 2014 EAPJ.org The testimony also covers the DHS IT data center consolidation activities and the use of the consolidated data centers to deliver department-wide cloud computing services. Figure 7 summarizes this transition based on the limited information given in the testimony, and with the assumption that a phased approach was used to transition from eighteen data centers to two and to establish eleven cloud services. This view uses the ArchiMate plateau concept and the triggering relationship to depict a progression of “relatively stable” architectural states [2]. The initial and final plateaus each aggregate a number of data center locations, which are indicated by the map pin icon. Figure 7 also shows that the eleven cloud business services are assigned to the two consolidated data centers. A business service “…fulfills a business need for a customer (internal or external to the organization)” [2]. Figure 7. Summary ArchiMate Implementation and Migration view of DHS data center consolidation and cloud service development. CIO McCormack describes the value of the DHS IT “cloud computing business model”. Figure 8 depicts the model, based on its partial description in the testimony, as an ArchiMate product. ArchiMate defines a Product as “…a coherent collection of services, accompanied by a contract/set of agreements, which is offered as a whole to (internal or external) customers” [2]. This Product view also depicts the value CIO McCormack attributes to this product: capital expenditure reduction, spending transparency, and reduced time-to-market for new capabilities.
  • 8. Page 8 of 9 © 2014 EAPJ.org Figure 8. ArchiMate Product view of DHS IT cloud computing business model Conclusion This case study gives only a sampling of what is possible using the ArchiMate language. It very selectively demonstrates the ArchiMate Business layer, the ArchiMate Motivation extension and the ArchiMate Implementation and Migration extension. It does not use the ArchiMate Application or Technology layers. However, this case study demonstrates how enterprise architects can use the ArchiMate language to quickly capture any business situation and educate themselves in the process. Then, they can use their initial models to educate others and as the basis for more formal architecture activities. References 1. Written testimony of MGMT Chief Information Officer Luke McCormack for a Senate Committee on Homeland Security and Governmental Affairs, Subcommittee on Efficiency and Effectiveness of Federal Programs and the Federal Workforce hearing titled “A More Efficient and Effective Government: Examining Federal IT Initiatives and the IT Workforce”. Retrieved July 12, 2014 from http://www.dhs.gov/news/2014/06/10/written-testimony-mgmt-senate-homeland- security-and-governmental-affairs. 2. The Open Group. ArchiMate 2.1 Specification. Retrieved July 12, 2014 from http://pubs.opengroup.org/architecture/archimate2-doc/. 3. Department of Homeland Security Organizational Chart. Retrieved July 12, 2014 from http://www.dhs.gov/xlibrary/assets/dhs-orgchart.pdf.
  • 9. Page 9 of 9 © 2014 EAPJ.org About the Author Iver Band has a dual career as a practicing enterprise architect and as a developer of EA standards and methods. Late last year, he became an enterprise architect at a major health insurer, where he shapes solutions that enable health care reform. For the previous six years at a diversified financial services company, he focused on business solutions and governance, and prior to that, infrastructure. He guided contact center and CRM implementations, claims system modernization, end user computing and trading workflow automation. As enterprise infrastructure architect, Iver developed data center, computing platform and resilience strategies that continue to shape current investment. Prior to his work in financial services, Iver had a lengthy career at Hewlett-Packard with roles ranging from IT director for a global business to HP Labs visiting technologist. At HP Labs, he researched security topics such as role engineering, and led the development of a patented approach to network security management. Iver also serves as Director of Enterprise and Solution Architecture for EA Principals, a training and consulting firm, for which he consults with clients, develops curriculum materials, and edits the Enterprise Architecture Professional Journal and EAPJ.org. Iver also represents EA Principals in the Open Group, where he is the elected Vice Chair of The ArchiMate Forum. In that forum, Iver has led development of white papers demonstrating applications of the ArchiMate visual modeling language in financial services and manufacturing. Iver has also written and presented on how the ArchiMate language can be used with the TOGAF Architecture Content Framework for enterprise modeling, with UML for transitioning from enterprise to solution architecture, and with SABSA for enterprise security architecture. Iver has also co-developed the ArchiMate certification exams and made numerous other contributions to the standard. Iver is TOGAF and ArchiMate Certified, a Certified Information Systems Security Professional (CISSP), a Certified Information Professional (CIP), and a Prosci Certified Change Consultant.