SlideShare a Scribd company logo
1 of 11
Service Oriented Architecture: 19
SOA Governance Teams
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Business/IT Steering Group
• Business/IT Steering Group
(Sponsorship of all IT Solutions and Services
Key Roles Responsibilities
CIO
CTO or Chief IT Strategist
Chief Architect
Business Domain Owners
Ultimate decision-makers for
decisions regarding SOA
solution, service, and business
and IT-related matters
Approve SOA strategic direction
Approve governance principles
SOA Steering Board
• Sponsorship of SOA Program and Leadership
Key Roles Responsibilities
SOA Chief Architect
SOA Program Director
SOA Business Sponsor
Define future SOA strategic direction
and roadmap
Monitor SOA strategic direction
Ensure SOA principles and practices
will make an appropriate and
necessary contribution to the overall
enterprise business strategy
Support the desired outcomes and
objectives by providing funding and
resources for the SOA and SOA
governance
Defines the SOA governance principles
EA Governance Board
• EA Governance Board
Key Roles Responsibilities
Chief Enterprise Architect
Enterprise Architects
Chief SOA Architect
Define and develop the service
portfolio
Define and develop the SOA
solution portfolio
(segment/domain architecture)
SOA Center of Excellence
Key Roles Responsibilities
Business Champion
Chief SOA Solution Architect
Organizational Change Consultant
Test Strategist
Roles responsible for:
 SDLC
 Project management processes
 Operational processes management
Tool strategist
Represents the business organizations in the CoE
Collaborate to develop SOA Governance
Roadmap, Transition Plans, and governance
principles (SGVM)
Definition and development of SOA governing
processes and best practices
Definition and development of governed SOA
processes and best practices
Defines where compliance checkpoints should
be inserted into governed SOA processes
Definition and monitoring of SOA metrics across
the LOBs (SOA governance KPIs)
Architectural definition and integration support
across LOBs (consult)
Develop governed SOA transformation plans
Identify SOA training and mentoring plans
Define and validate changes to the project
management process
Select and implement the SOA governance tool
strategy
Business Domain Representatives
(Scope and Delivery Management)
Key Roles Responsibilities
Program Manager
Business Architect
Process Engineer
Business Subject-matter Expert
Responsible for the solution from a
business perspective by justifying the
solution and services existence and
continuous operation to the
stakeholders
Determine business service
functionality
Communicate business requirements
and identify business services for each
domain
Work on prioritizing program
requirements and services
Develop service proposals to go
through funding process
SOA Governance Board
(Informing and Monitoring)
Key Roles Responsibilities
SOA Chief Architect
Business Architects
Ensure compliance with
standards and guidelines
Dispensation
Communication
Solution Development Team
(Execution and Delivery)
Key Roles Responsibilities
Project Manager
Business Analysts
Solution Architects
Integration Specialist
Operations Architect
Developers
Testers
Security Architect
Manage the solutions within a specific
domain
Design, development, testing,
deployment, execution, and delivery of
the SOA solution within the domain
Maintain consumer-side interfaces to
services
Follow standards and guidelines
Understand and abide by the
governing processes
Service Development Team
(Execution and Delivery)
Key Roles Responsibilities
Project Manager
Business Analysts
Service Architects
Integration Specialist
Operations Architect
Developers
Testers
Security Architects
Design, development, testing,
deployment, execution, and delivery of
the services
Maintain interfaces to its services
Follow standards and guidelines
Understand and abide by the
governing processes
IT Operations
(Execution and Delivery)
Key Roles Responsibilities
Database Administrator
Network Infrastructure Architect
System Administrator
Operations
Database administration services
support
Network infrastructure services
support
Systems administration support
Support for central IT functions
Follow standards and guidelines
Understand and abide by the
governing processes
Assignment
• Describe the roles and responsibilities of
various teams for SOA Governance
• Thank You

More Related Content

Similar to Soa 19 soa governance teams

CBDI SAE Togaf V1 21072008
CBDI SAE Togaf V1 21072008CBDI SAE Togaf V1 21072008
CBDI SAE Togaf V1 21072008SOA Process
 
Rapid Results PLM Implementation Methodology
Rapid Results PLM Implementation MethodologyRapid Results PLM Implementation Methodology
Rapid Results PLM Implementation Methodologyilievadaniela
 
Business Analyst_PennonSoft
Business Analyst_PennonSoftBusiness Analyst_PennonSoft
Business Analyst_PennonSoftPennonSoft
 
Service Management Solution Framework (SMSF)
Service Management Solution Framework (SMSF)Service Management Solution Framework (SMSF)
Service Management Solution Framework (SMSF)Malcolm Ryder
 
Center of Excellence Building Blocks
Center of Excellence Building BlocksCenter of Excellence Building Blocks
Center of Excellence Building BlocksArup Dutta
 
10 Steps to Simplify and Improve Service-Oriented Architecture Governance
10 Steps to Simplify and Improve Service-Oriented Architecture Governance10 Steps to Simplify and Improve Service-Oriented Architecture Governance
10 Steps to Simplify and Improve Service-Oriented Architecture GovernancePerficient, Inc.
 
Soa modeling & bpmn
Soa modeling & bpmnSoa modeling & bpmn
Soa modeling & bpmnAyaz Shahid
 
Agile architecture
Agile architectureAgile architecture
Agile architecturePaul Preiss
 
Transformation of the Enterprise to SOA
Transformation of the Enterprise to SOATransformation of the Enterprise to SOA
Transformation of the Enterprise to SOAtom termini
 
SDLC Process_Document.pptx
SDLC Process_Document.pptxSDLC Process_Document.pptx
SDLC Process_Document.pptxSivakumar Pola
 
Salesforce Application Lifecycle Management presented to EA Forum by Sam Garf...
Salesforce Application Lifecycle Management presented to EA Forum by Sam Garf...Salesforce Application Lifecycle Management presented to EA Forum by Sam Garf...
Salesforce Application Lifecycle Management presented to EA Forum by Sam Garf...Sam Garforth
 
Project Managment Plan V1.0 related to business.pptx
Project Managment Plan V1.0 related to business.pptxProject Managment Plan V1.0 related to business.pptx
Project Managment Plan V1.0 related to business.pptxvenupk
 
Enterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful BusinessEnterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful BusinessNathaniel Palmer
 
CMAD Group Workbook 3.3 Op Model Enable
CMAD Group Workbook 3.3 Op Model Enable CMAD Group Workbook 3.3 Op Model Enable
CMAD Group Workbook 3.3 Op Model Enable Alexander Doré
 
Announcing DA.PO Augury Customer Experience Lifecycle Services - feb 2014
Announcing DA.PO Augury Customer Experience Lifecycle Services - feb 2014Announcing DA.PO Augury Customer Experience Lifecycle Services - feb 2014
Announcing DA.PO Augury Customer Experience Lifecycle Services - feb 2014Meng Choon Tan
 
projec kickoff presentation template
 projec kickoff presentation template projec kickoff presentation template
projec kickoff presentation templatedadiiskandar4
 
Nagaraja Naik - Resume 105805
Nagaraja Naik - Resume 105805Nagaraja Naik - Resume 105805
Nagaraja Naik - Resume 105805Nagaraja Naik
 
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016Daljit Banger
 

Similar to Soa 19 soa governance teams (20)

CBDI SAE Togaf V1 21072008
CBDI SAE Togaf V1 21072008CBDI SAE Togaf V1 21072008
CBDI SAE Togaf V1 21072008
 
Rapid Results PLM Implementation Methodology
Rapid Results PLM Implementation MethodologyRapid Results PLM Implementation Methodology
Rapid Results PLM Implementation Methodology
 
SoftServe Overview
SoftServe  OverviewSoftServe  Overview
SoftServe Overview
 
Business Analyst_PennonSoft
Business Analyst_PennonSoftBusiness Analyst_PennonSoft
Business Analyst_PennonSoft
 
Service Management Solution Framework (SMSF)
Service Management Solution Framework (SMSF)Service Management Solution Framework (SMSF)
Service Management Solution Framework (SMSF)
 
Center of Excellence Building Blocks
Center of Excellence Building BlocksCenter of Excellence Building Blocks
Center of Excellence Building Blocks
 
10 Steps to Simplify and Improve Service-Oriented Architecture Governance
10 Steps to Simplify and Improve Service-Oriented Architecture Governance10 Steps to Simplify and Improve Service-Oriented Architecture Governance
10 Steps to Simplify and Improve Service-Oriented Architecture Governance
 
Soa modeling & bpmn
Soa modeling & bpmnSoa modeling & bpmn
Soa modeling & bpmn
 
Agile architecture
Agile architectureAgile architecture
Agile architecture
 
Transformation of the Enterprise to SOA
Transformation of the Enterprise to SOATransformation of the Enterprise to SOA
Transformation of the Enterprise to SOA
 
SDLC Process_Document.pptx
SDLC Process_Document.pptxSDLC Process_Document.pptx
SDLC Process_Document.pptx
 
Salesforce Application Lifecycle Management presented to EA Forum by Sam Garf...
Salesforce Application Lifecycle Management presented to EA Forum by Sam Garf...Salesforce Application Lifecycle Management presented to EA Forum by Sam Garf...
Salesforce Application Lifecycle Management presented to EA Forum by Sam Garf...
 
Project Managment Plan V1.0 related to business.pptx
Project Managment Plan V1.0 related to business.pptxProject Managment Plan V1.0 related to business.pptx
Project Managment Plan V1.0 related to business.pptx
 
Enterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful BusinessEnterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful Business
 
CMAD Group Workbook 3.3 Op Model Enable
CMAD Group Workbook 3.3 Op Model Enable CMAD Group Workbook 3.3 Op Model Enable
CMAD Group Workbook 3.3 Op Model Enable
 
Announcing DA.PO Augury Customer Experience Lifecycle Services - feb 2014
Announcing DA.PO Augury Customer Experience Lifecycle Services - feb 2014Announcing DA.PO Augury Customer Experience Lifecycle Services - feb 2014
Announcing DA.PO Augury Customer Experience Lifecycle Services - feb 2014
 
projec kickoff presentation template
 projec kickoff presentation template projec kickoff presentation template
projec kickoff presentation template
 
Real example of PMO deployment
Real example of PMO deploymentReal example of PMO deployment
Real example of PMO deployment
 
Nagaraja Naik - Resume 105805
Nagaraja Naik - Resume 105805Nagaraja Naik - Resume 105805
Nagaraja Naik - Resume 105805
 
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016
A Day in the Life of an Enterprise Architect (Role Play Exercise) 2016
 

More from Vaibhav Khanna

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applicationsVaibhav Khanna
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmVaibhav Khanna
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standardVaibhav Khanna
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesVaibhav Khanna
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signaturesVaibhav Khanna
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeVaibhav Khanna
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication codeVaibhav Khanna
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmVaibhav Khanna
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmVaibhav Khanna
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Vaibhav Khanna
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationVaibhav Khanna
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremVaibhav Khanna
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primalityVaibhav Khanna
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithmVaibhav Khanna
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsVaibhav Khanna
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbersVaibhav Khanna
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmVaibhav Khanna
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfishVaibhav Khanna
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple desVaibhav Khanna
 

More from Vaibhav Khanna (20)

Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Information and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithmInformation and network security 46 digital signature algorithm
Information and network security 46 digital signature algorithm
 
Information and network security 45 digital signature standard
Information and network security 45 digital signature standardInformation and network security 45 digital signature standard
Information and network security 45 digital signature standard
 
Information and network security 44 direct digital signatures
Information and network security 44 direct digital signaturesInformation and network security 44 direct digital signatures
Information and network security 44 direct digital signatures
 
Information and network security 43 digital signatures
Information and network security 43 digital signaturesInformation and network security 43 digital signatures
Information and network security 43 digital signatures
 
Information and network security 42 security of message authentication code
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
 
Information and network security 41 message authentication code
Information and network security 41 message authentication codeInformation and network security 41 message authentication code
Information and network security 41 message authentication code
 
Information and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithmInformation and network security 40 sha3 secure hash algorithm
Information and network security 40 sha3 secure hash algorithm
 
Information and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithmInformation and network security 39 secure hash algorithm
Information and network security 39 secure hash algorithm
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Information and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authenticationInformation and network security 37 hash functions and message authentication
Information and network security 37 hash functions and message authentication
 
Information and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theoremInformation and network security 35 the chinese remainder theorem
Information and network security 35 the chinese remainder theorem
 
Information and network security 34 primality
Information and network security 34 primalityInformation and network security 34 primality
Information and network security 34 primality
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Information and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystemsInformation and network security 32 principles of public key cryptosystems
Information and network security 32 principles of public key cryptosystems
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Information and network security 30 random numbers
Information and network security 30 random numbersInformation and network security 30 random numbers
Information and network security 30 random numbers
 
Information and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithmInformation and network security 29 international data encryption algorithm
Information and network security 29 international data encryption algorithm
 
Information and network security 28 blowfish
Information and network security 28 blowfishInformation and network security 28 blowfish
Information and network security 28 blowfish
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 

Recently uploaded

W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationJuha-Pekka Tolvanen
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benonimasabamasaba
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...masabamasaba
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...masabamasaba
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburgmasabamasaba
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxAnnaArtyushina1
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Bert Jan Schrijver
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 

Recently uploaded (20)

W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 

Soa 19 soa governance teams

  • 1. Service Oriented Architecture: 19 SOA Governance Teams Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Business/IT Steering Group • Business/IT Steering Group (Sponsorship of all IT Solutions and Services Key Roles Responsibilities CIO CTO or Chief IT Strategist Chief Architect Business Domain Owners Ultimate decision-makers for decisions regarding SOA solution, service, and business and IT-related matters Approve SOA strategic direction Approve governance principles
  • 3. SOA Steering Board • Sponsorship of SOA Program and Leadership Key Roles Responsibilities SOA Chief Architect SOA Program Director SOA Business Sponsor Define future SOA strategic direction and roadmap Monitor SOA strategic direction Ensure SOA principles and practices will make an appropriate and necessary contribution to the overall enterprise business strategy Support the desired outcomes and objectives by providing funding and resources for the SOA and SOA governance Defines the SOA governance principles
  • 4. EA Governance Board • EA Governance Board Key Roles Responsibilities Chief Enterprise Architect Enterprise Architects Chief SOA Architect Define and develop the service portfolio Define and develop the SOA solution portfolio (segment/domain architecture)
  • 5. SOA Center of Excellence Key Roles Responsibilities Business Champion Chief SOA Solution Architect Organizational Change Consultant Test Strategist Roles responsible for:  SDLC  Project management processes  Operational processes management Tool strategist Represents the business organizations in the CoE Collaborate to develop SOA Governance Roadmap, Transition Plans, and governance principles (SGVM) Definition and development of SOA governing processes and best practices Definition and development of governed SOA processes and best practices Defines where compliance checkpoints should be inserted into governed SOA processes Definition and monitoring of SOA metrics across the LOBs (SOA governance KPIs) Architectural definition and integration support across LOBs (consult) Develop governed SOA transformation plans Identify SOA training and mentoring plans Define and validate changes to the project management process Select and implement the SOA governance tool strategy
  • 6. Business Domain Representatives (Scope and Delivery Management) Key Roles Responsibilities Program Manager Business Architect Process Engineer Business Subject-matter Expert Responsible for the solution from a business perspective by justifying the solution and services existence and continuous operation to the stakeholders Determine business service functionality Communicate business requirements and identify business services for each domain Work on prioritizing program requirements and services Develop service proposals to go through funding process
  • 7. SOA Governance Board (Informing and Monitoring) Key Roles Responsibilities SOA Chief Architect Business Architects Ensure compliance with standards and guidelines Dispensation Communication
  • 8. Solution Development Team (Execution and Delivery) Key Roles Responsibilities Project Manager Business Analysts Solution Architects Integration Specialist Operations Architect Developers Testers Security Architect Manage the solutions within a specific domain Design, development, testing, deployment, execution, and delivery of the SOA solution within the domain Maintain consumer-side interfaces to services Follow standards and guidelines Understand and abide by the governing processes
  • 9. Service Development Team (Execution and Delivery) Key Roles Responsibilities Project Manager Business Analysts Service Architects Integration Specialist Operations Architect Developers Testers Security Architects Design, development, testing, deployment, execution, and delivery of the services Maintain interfaces to its services Follow standards and guidelines Understand and abide by the governing processes
  • 10. IT Operations (Execution and Delivery) Key Roles Responsibilities Database Administrator Network Infrastructure Architect System Administrator Operations Database administration services support Network infrastructure services support Systems administration support Support for central IT functions Follow standards and guidelines Understand and abide by the governing processes
  • 11. Assignment • Describe the roles and responsibilities of various teams for SOA Governance • Thank You