实例介绍
美国联邦总体架构框架,2013年出,作参考
January 29 2013 2 Associated Methods/best Practices for the prm 25 12. 1 Line of sight 25 12.2 Selecting a balanced Set of Exhibit 300 Performance measures...............28 13 PRM Summary………,…,…,…,…,…,…,…,…,…,…,…,…,… 28 14 Introduction to the business reference model 30 14.1 Purpose of the business reference Model 30 14.2 Structure of the business reference model 灬30 15 Using the Business Reference Model Taxonomy .31 15.1 Identifying opportunities to share services government-wide 15.2 Reducing costs by eliminating duplication within the enterprise ...........31 16 BRM Touchpoints with other Reference Models 8音D 32 17 Associated Methods/Best Practices for the business reference Model 33 17.1 Business Architecture for Decision Support…..…………33 17.2 Business Process modeling 34 18 BRM Summary… ….34 19 Introduction to the data reference model 35 191 Purpose of the Data Reference Model……………………5 19.2 Structure of the data Reference model. 20 Using the Data Reference Model Taxonomy 36 20.1 Using the dRM to Compare Data Sources across Federal Agencies 36 20.2 Using the DRM to create a Standardized Information Exchange 36 21 DRM Touchpoints with other Reference models .37 22 Associated Methods/Best Practices for the data reference model 37 22.1 Data description 37 22.2 Data Context 38 22.3 Data Sharing…..............39 23 DRM Summary,… 39 24 Introduction to the application reference model 41 24.1 Purpose of the application Reference Model 241 24.2 Structure of the Application Reference Model…....………241 25 Using the Application Reference Model...... 42 251 IT Cost Reduction through IT/ Application Portfolio Management………………………42 January 29 2013 25.2 Using the arm with the entire Consolidated Reference Model (CRM)............. 43 26 ARM Touchpoints with other Reference Models 43 27 Associated Methods /Best Practices for the application Reference Model .............. 44 27. 1 Capability Modeling and analysis......... 44 27.2ServiceOrientedarchitecturewowwwwwwwwwgwwwwwwwwww.44 27.3 Portfolio management.,…,,………… 45 28 ARM Summary……………… 45 29 Introduction to the infrastructure reference model 46 29.1 Purpose of the Infrastructure Reference Model....... 46 29.2 Structure of the infrastructure reference model.ggggmmggmggwommmwwmmm.46 30 Using the Infrastructure reference model taxonomy ...............................................47 30.1 Using the IRM to Create an IT Asset Management(TAM) 47 30.2 Using the irm to Identify opportunities for Shared Services................. 48 31 IRM Touchpoints with other Reference Models 48 32 Associated Methods/ Best Practices for the Infrastructure Reference model ...........................49 32.1 Methods… 49 32.2 Best practices , 33| RM Summary.........,.,.,, 50 34 Introduction to the Security Reference Model 51 34.1 Purpose of the Security Reference Model.. 51 34.2 Structure of the security reference model 51 35 Using the Security Reference Model Taxonomy .52 35.1 Using Standards to classify Policy at the International, National, Federal, Sector, Enterprise or Department Level :=.:a=a.a 52 35.2 Using Policy to select Controls at the agency or Segment Level 53 35.3 Enforcing Design with Controls at the System or Application Level 53 36 SRM Touchpoints with other Reference models ................. 54 37 Associated Methods/ Best Practices for the security reference model 54 37.1 Risk Based Design.... ::::.:.:::::::a:a::::a:a::::::::a:::::::::a:a:a:a:::a:..:..a. 54 37.2 Security Controls 55 38 SRM Summary……….……………………….55 39 Artifacts…57 January 29 2013 39. 1 Strategy Sub-Architecture domain...... ∴58 39.2 Business sub-Architecture domain 59 39.3 Data Sub-Architecture domain .::::.:::·a...:.::::a:::.::.::.:· 60 394 Applications Sub- Architecture domain....,,…,…,………………………652 39.5 Infrastructure Sub-Architecture domain. 39.5 Security Sub- Architecture domain…….……,…,…,…… 64 Appendix A: Collaborative Planning Methodology Guidance Document 65 A.1 Overview of the collaborateⅳ ve Planning Methodology…… 65 A.1.1 Step 1: Identify and validate A 1.2 Step 2: Research and leverage. ............................................................................................68 A 1.3 Step 3: Define and plan 68 A 1.4 Step 4: Invest and Execute 69 A 1.5 Step 5: Perform and Measure ...............................................................................70 A2 Step 1: Identify and validate 71 A.2. 1 Step At-a-Glance nce..,,,,, 72 A. 2. A Note on core artifacts A.2.3 Activity 1.1: Engage Sponsor and Assess Stakeholder Needs......73 A24 Activity1.2: Analyze and validate Needs………….…........176 A.2.5 Activity 1.3: Formulate case to address the needs 78 A.2.6 Activity 1.4: Identify and Engage Governance 81 A.3step2: Research and Leverage,……,, 85 A.3.1 Step At-a-Glance 86 A.3.2A Note on core artifacts :· .87 A.3. 3 Activity 2.1: Identify Organizations and Service Providers to Engage 87 A. 3. 4 Activity 2.2 Analyze Opportunities to Leverage 89 IvIty2.3: Determine whether to Leverage..,,,,…,…,…,,…,,,…,,,, 92 A 4 Step 3: Define and Plan 94 A.4.1 Step at-a-Glance.......................... 95 A. 4.2A Note on core artifacts 497 A43 Activity3.1: Formalize Collaborative Planning Team and Launch planning……………97 A. 4. 4 Activity 3. 2: Refine the vision for performance and outcomes 100 A 4.5 Activity 3. 3: Analyze the current State, Determine Adjustments, and plan the target State.104 January 29 2013 A.4.6 Activity 3. 4: Formulate the Integrated plan and roadmap. .................... 125 A 4.7 Activity 3. 5: Initiate Execution governance 131 A.5 Step 4: Invest and Execute....... 135 A.5.1 Step At-a-Glance 137 A.5.2A Note on core artifacts wwwwwwwwwwwwwwwwwwwwwwwwwww 137 A.5.3 Activity 4.1: Define Funding Strategy and Make Decision 138 A.5.4 Activity 4.2: Obtain Resources and Validate Plan 139 A.5.5 Activity 4.3: Execute the Plan 139 A6 Step 5: Perform and Measure....... 141 A.6.1 Step At-a-Glance... 142 A 6.2A Note on core artifacts …142 A.6.3 Activity 5.1: Operate with the New capabilities............... 142 A.6. 4 Activity 5.2: Measure Performance Against Metrics 自音着自D,D·音··自。自D自自。自自音着自着,··自非自音 143 A.6.5 Activity 5.3: Analyze and provide feedback 143 Appendix B: Business Reference Model (BRM) 144 B.1 Business reference mode| Overview,……144 B.1.1 BRM Structure.wwwwwwwwwwwwwwwwwwwwwwwww 145 B2 Using the BRM Taxonomy...........,……… 147 B.2.1nter- Agency.… 147 B 2.1.1 Office of Management and budget 147 B.2.2 Intra-Agency 147 B 2.2.1 Agency Executives and Business Managers 147 B.2.2.2 Agency C|Os… 148 B 2.2.3 Portfolio managers 149 B 2.2 4 Architects 149 B.2.2.5 Project Managers 151 B 2.2.6 Development Teams 151 B 3 Associated methods 152 B 3. 1 Business Architecture for Decision Support.. 152 B32 Business Process Modeling......…..….………………………153 B 3. 3 Business Process Modeling Notation(BPMN) ::::a·:·: 154 B.4 BRM Taxonomy.…….….……… …155 6 January 29 2013 Appendix C: Data Reference Model (dRM)........ 156 DRM EXecutive Summary .... 156 C.1 ntroduction∴……157 C 1.1 FEA DRM Focus ..................m...............157 C.1.2 DRM as Federal guidance…………157 C1,3 What the drm is and is not 158 C1.4 The drm and Knowledge management………………………………………158 C15 FEA DRM Meta-Model 159 1.6 DRM Fundamental methods 161 C.1.7 DRM Overview 162 C 2 Associated methods and data standards 163 C.21 Data Description……… 163 C2 1.1 Overview of metadata .wwwwwwwwwwwwwwwwwwwww 163 C 2.1.2 Data Description Methods 164 C.2.2 Data context……… 1··着:。。非看 166 C 2.2.1 Role of data context in governance 166 C222 Data Categorization Method5...,,,,………167 C.2.2.3 Usage Context…,,,……,…,………,………………………168 C.2.3 Data sharing… 170 C.2.3.1 Sharing Data through Data Exchange Services……,…… 170 C.2.3.2 Data Sharing through Data Access Services 173 C.2.3. 3 Information Sharing ..... 174 C 3 DRM EXamples of Use 176 C 3. 1 Use Case Example One: Comparing Data Sources across Federal Agencies 176 C.3.2 Use Case Example Two: Standardized Information Exchange for Suspicious Activity Reporting 176 C 4 Measurement Success Factors 177 179 AppendxCi:ListofAcronyms..............,.180 Appendix D: Application Reference Model ( ARM) 182 D 1 Introduction to the Application Reference Model ( arm 182 D.1.1 Purpose∴.44 183 7 January 29 2013 D. 1.1. 1 ARM Guiding Principles ∴184 D2 Associated Methods/Best Practices 184 D2.1 Capability modeling and analysis..........,………,……………185 D.2.2 Service Oriented Architecture Q D2.3 Portfolio Management..,,……… 185 D3 Using the Application Reference Model 186 D.3.1 Use case:| T Cost Reduction through IT/ Application Portfolio Management……………186 D.3.1.1 Synopsis 186 D.3.1.2 Challenge 186 D 3.1.3 Solution 87 D,3. 1, 4 Possible results 187 D.3.2 Use Case: Using the arm with the entire Consolidated reference model (crm)......187 D.3.2.1 Synopsis..........,,.,…..,…,,…,,,….…,…,……….,187 D 3.2.2 Challenge.......... 188 Solution 188 D.3.2, 4 Results …189 Appendix E:| nfrastructure Reference model(RM)….…………………………………………191 E 1 Introduction to the irm ∴…191 E.1.1 Purpose.. 191 E.1.1.1 Guiding Principles.…,,,,,…,, 191 E.1.1.2| RM Outcomes∴ 192 E.1.1.3 Stakeholder Usage.... 192 E.1.2 RM Structure 193 E.1.2.1| RM Taxonomy.………… 94 E 1.2.2 IRM Relationships....................... 195 E2 Using the IRM Taxonomy. ......................................................................................197 E. 2. 1 Use Case: IT Asset Management(TAM) 198 E.2.1.1Goa 198 E 2.1.2 Challenges...... 199 E213 How the|RMHe|ps..,.,.,.,.,.,.,.,.,.,,…,,….……,199 E.2.2 Use Case: Shared Services- Cloud first 200 E.2.2.1Goa. 200 8 January 29 2013 E 2.2.2 Challenges 200 E 2.2.3 How the IRM Helps...... ∴…201 E3 Associated Methods/Best Practices. E3, 1 Methods E.3.2BestPracticeswwwwwwwwwwwwwwwwwwwww.205 Appendix F: Security Reference Model (srm) 207 F 1 Approach to Security Architecture 灬207 F.1.1 The Security reference model 207 F 1.2 SRM Approach to security 208 F 1.2.1 What is a risk? 209 F2 Design Compliance for Architectural layers 211 F 2.1 International, National, Federal, Sector, Enterprise or Department -> Standards set Policy 211 2.1.1 Architecture guidance D 211 F 2.2 Agency or Segment-> Policy influences Controls ∴212 F.2.2.1 Architecture guidance.…………………213 F.2.3 System or Application-> Controls enforce Design………,………213 F 23. 1 Architecture guidance. 214 F.3 Relationship to other Reference models....,.,.,.,.,,.…………,215 F.4 Optimal Risk Based Design......,,…,…,… 218 5 Security Controls and Metrics…… …22 F.5.1 Purpose of Controls 222 F.5.1.1 Managing Risk as Part of the Control Strategy 222 F.5.1. Security value chain .224 F, 5.1.3 Control selection 225 514 Defense in Depth… 225 F.5.1.5 How to use Control Appendices............225 F.5.2 Metrics…………………………226 F.5.2.1 Performance and compliance ......................................226 F.5.2.2PRM 226 F.5.2.3 Metrics Maturity 227 F.5.2.4 How to use performance metrics……227 January 29 2013 Appendix F i Ontology list of methods.............229 Appendix F ii: Controls and Metrics mapping 233 Appendix f iii: Security reference document Mappings..……………,274 Appendix F iv: Links to Lists of Threat Sources and vulnerabilities............ 281 Appendix G: Performance Reference Model taxonomy with Definitions………,… 283 Appendix H: Business Reference Model Taxonomy with Definitions……….……… 311 Appendix I: Data Reference Model Taxonomy with Definitions……….,…………………360 Appendix J: Application Reference Model Taxonomy with Definitions 380 Appendix K: Infrastructure Reference Model Taxonomy with Definitions 401 Appendix L: Security reference Model Taxonomy with Definitions 427 10 【实例截图】
【核心代码】
标签:
小贴士
感谢您为本站写下的评论,您的评论对其它用户来说具有重要的参考价值,所以请认真填写。
- 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
- 相信您也不想看到一排文字/表情墙,所以请不要反馈意义不大的重复字符,也请尽量不要纯表情的回复。
- 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
- 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。
关于好例子网
本站旨在为广大IT学习爱好者提供一个非营利性互相学习交流分享平台。本站所有资源都可以被免费获取学习研究。本站资源来自网友分享,对搜索内容的合法性不具有预见性、识别性、控制性,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,平台无法对用户传输的作品、信息、内容的权属或合法性、安全性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论平台是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二与二十三条之规定,若资源存在侵权或相关问题请联系本站客服人员,点此联系我们。关于更多版权及免责申明参见 版权及免责申明
网友评论
我要评论