By: Viral Rathod Aman Goyal 1 1. Enterprise Architecture. 2. History of Enterprise Architecture 3. Overview of Zachman Framework 4. The Owner’s Perspective (Row 2) 5. Security in Owner’s Perspective. 6. Criticism of Zachman Framework 7. Other Framework / Approaches. 2 What is Enterprise? What is Enterprise Architecture? Why to use an Enterprise Architecture? What are currently available solutions? 1. 2. 3. IBM Enterprise Architecture SAP – ERP Oracle Enterprise Manager 3 Development of various Enterprise Architecture: 1980-1990 • A framework for information systems architecture,' John Zachman article in IBM Systems Journal. 1990-2000 • Capgemini Integrated Architecture Framework (IAF) • The Open Group Architecture Framework (TOGAF) 1.0 • Federal CIO Council introduces Federal Enterprise Architecture Framework (FEAF) 2000-2010 TOGAF 7.0 / 8.0 / 9.0 Zachman DoDAF 1.0 / 2.0 FEAF (mostly complete) 4 Relationships between various Enterprise Architecture: Zackman 1987 TAFIM 1994 Adoption EAP 1992 FEAF 1999 TEAF 2000 TOGAF 1995 Influence C4ISR 1996 DODAF 2003 5 What is Zachman Framework? Classification schema. Tabular tool / matrix. Provides Rational for decisions made. Clear understanding of what is happening. Clear understanding of why is happening. Problem solving kit. 6 What problems does it solve? Any complex problem involving multiple individual components. E.g. Flight Reservation System. E.g. Building a rail road. E.g. Building Empire State Building. 7 8 Most basic Work Flow Diagram for Car Manufacturing. Company Cars 9 Car Manufacturing company HR Finance Design Regulation Check Manufacturing for Testing Testing Marketing Sales Manufacturing 10 11 Row 1: The Planner Perspective Motivation/Why: Business goals Ex: Company Core Values, Mission Statement, Strategic Goals 12 Row 1: The Planner Perspective Data/What: Objectives. Multiple objectives align and help achieving the business goals. Each objective should provide the outputs clearly. 13 Row 1: The Planner Perspective Function/How: How to achieve business objectives ? In this cell we mostly concentrate on the all the aspects of the activity to achieve the goal. 14 Row 1: The Planner Perspective Network/Where : Alignment of the objectives Ex: Head office, Manufacturing Units, Dealer Locations 15 Row 1: The Planner Perspective People/Who: Stakeholders related to each function & objective Ex: Roles & Responsibilities in the Process. 16 Row 1: The Planner Perspective Time/When : Cycles and events related to each function Ex: External events, Process execution. 17 Row 2: The Owner Perspective Motivation/Why: Business Procedures and standards for each process. Consider various constraints while achieving this goal. 18 Row 2: The Owner Perspective Data/What: Business data Ex: Inputs & Outputs for each functioning Unit. 19 Row 2: The Owner Perspective Function/How: Business Process One of the most important block in the Zachman Framework Architecture. 20 Row 2: The Owner Perspective Network/Where: Locations related to each process / objectives Ex: Communication may be through email, mail, fax, VoIP 21 Row 2: The Owner Perspective People/Who: Roles and responsibilities in each process 22 Row 2: The Owner Perspective Time/ When: Events for each process and sequencing of integration and process improvements. Owner will go through the life cycle of the product i.e. Corporate calendar Planner will propose various proposals . 23 Row 3: The Designer Perspective Motivation/Why: Policies, standards and procedures associated with a business rule model. Provide a model or blueprint of enterprise. 24 Row 3: The Designer Perspective Data /What: Data models and data relationships underlying information The data received from the owner is now verified by the designer. The designer may schedule data backup at this stage. 25 Row 3: The Designer Perspective Function/How: Information systems and their relationships Ex: The designer defines the functions of different modules of the enterprise. The designer checks the process for access control, recovery control . 26 Row 3: The Designer Perspective Network/Where: Distributed system architecture for locations Ex: The designer now designs the network and depending on the security of the data provides security end to end or link to link or both. 27 Row 3: The Designer Perspective People/Who: Access privileges constrained by roles and responsibilities Ex: Role are assigned to different users based on their skillset. A hierarchy is built for better result. The end product of every employer is decided. 28 Row 3: The Designer Perspective Time/When : Events and their triggered responses constrained by business events and their responses Ex: Designers defines the timely events of the enterprise and the up gradation of product to be done on timely basis. 29 Row 4: The Builder Perspective Motivation/Why: Business rules constrained by information systems standards Ex: This cell deals with the constrained due to the limitation of resources and technology. 30 Row 4: The Builder Perspective Data/What: DBMS type requirements constrained by logical data models Ex: Requirement are expressed in technology format. The main goal of this cell is to make sure that the data is available in proper format i.e. secured for various technologies. 31 Row 4: The Builder Perspective Function/How :Specifications of applications that operate on particular technology platforms Ex: The builder decides what technology to be used for the particular process and its counter measures. 32 Row 4: The Builder Perspective Network/Where: Specification of network devices and their relationships within physical boundaries Ex: This cell decides which hardware to use for networking and where they should be installed. 33 Row 4: The Builder Perspective People/Who: Specification of access privileges to specific platforms and technologies . Ex: What access control should be provided to different people for different technology?? Also the workflow is decided . 34 Row 4: The Builder Perspective Time/When: Specification of triggers to respond to system events on specific platforms and technologies This stage decides when to trigger which process. When to release a particular data for a particular process??? 35 Row 5: The Sub-Contractor Perspective Motivation/Why: Business rules constrained by specific technology standards . Reduce the complexity of the operation. Provide better quality work in specific time frame. 36 Row 5: The Sub-Contractor Perspective Data/What: Data definitions constrained by physical data models 37 Row 5: The Sub-Contractor Perspective Function/How: Programs coded to operate on specific technology platforms 38 Row 5: The Sub-Contractor Perspective Network/Where: Network devices configured to conform to node specifications 39 Row 5: The Sub-Contractor Perspective People/Who: Access privileges coded to control access to specific platforms and technologies 40 Row 5: The Sub-Contractor Perspective Time/When: Timing definitions coded to sequence activities on specific platforms and technologies 41 Who is Owner? What is Owner’s Perspective? Business Process Business Model Entities & Relationships The Complete facts about business & processes. 42 Owner’s Problems in Enterprises. Business Process Internal & External Entities Analyzing changes in the business processes. Business Entities Adding Removing Merging 43 How does this model solve these problems? Holistic Objective Complete Understanding Revisiting the Car Company. 44 45 46 47 48 49 50 What is important in business. Classification of Data: Highly Sensitive Ex: Financial Data / Future Strategies Very few people have access (Access control & Authorization) Secrecy (Strict Confidentiality; Digital Signatures + Encryption) Validity (Integrity & Availability) Sensitive Ex: Operational Information Comparatively large group knows (Access Control & Authorization) Secrecy (Confidentiality; Encryption only, No Digital Signatures) Validity (Integrity & Availability) Classification of Data (ctd…) Company Secret: Ex: Business Processes Company wide everybody knows. (Access control & Authorization) Everyone can read but only few can modify (top levels) No Secrecy (No Confidentiality) Validity (Integrity) Public: Ex: Quarterly Results Publically available information (No Access control or authorization) No Secrecy (No Confidentiality) Validity (Integrity) Data Sensitivity Financial Data Highly Sensitive Research Statistics Highly Sensitive Design Requirements Highly Sensitive Design Document Highly Sensitive Test Cases Sensitive Test Results Highly Sensitive Defining Assembly Company Secret Marketing Strategy Sensitive Quarterly Statements Public Define the business process How components function & how they interact. Use rules, regulation & feedback. Marketing Research • Refer information about previously made cars/competitive cars. • Produces "Statistics" for Planning Security: Only available to Market Research & Planning departments Designing may access it based on requests. Planning •Refers the "Statistics" from Marketing Research •Uses experience as 'feedback‘. •Produces "Design Requirements", "Marketing Strategy", "Sales Strategy” •Security: •Only available to planning. Design • Refers "Design Requirement" • Uses regulations & experience as 'feedback'. • Produces "Design Document“ • Security: • Available to Planning, Design, Regulatory check Design Regulations check • Refers "Design Document“ • Uses • design guide lines as 'control‘ • Previous experience as 'feedback‘ • Produces "Acceptance Status". • Security: • Available to Planning, Design, Regulatory check. Sandbox • Refers "Design Document“ • Uses • Manual Manufacturing & Testing methods as 'control‘ • Previous experience as 'feedback‘ • Produces "Test Results“ • Security: • Available to Testing & Planning. Manufacturing • Refers "Design Document“ • Uses • Manufacturing methods as 'control‘ • Previous experience as 'feedback‘ • Produces "Cars“ • Security: • Available to Manufacturing, Design & Planning. Marketing • Refers "Marketing Strategy” • Uses • Marketing methods as 'control’ • Previous experience as 'feedback’ • Produces public awareness/hype of the new car Sales • Refers "Sales Strategy” • Uses dealerships & other methods as 'control’ • Produces • defines dealers & geographical availability. • channels for supply • serves actually demand Market Research : Where market is ex: Detroit Planning: Head office ex: New York (corporate HQ) Design: Where designs are made as per requirements ex: •SF (US specific security requirements) • Munich, Germany (Basic design) Sandbox: Where test models are created and tested ex: Detroit (Test manufacturing & testing) Manufacturing: Where cars will be manufactured ex: •China(all basic parts will be manufactured) • India (backup supply) •Detroit (Basic frame & assembly for all the parts) •Fremont, CA (Backup facility) Marketing: at head quarter ex: NY (Marketing head office) Sales: at head quarter ex: •NY (Sales head office) •All regions will have their regional branches. Security: 1. Inter-office communication using VPN on Frame-relay. 2. Inter-office backup-communication using lease lines. 3. Intra-office communication using Giga-bit Ethernet. 4. Intra-office backup-communication using lease lines. 5. Each office network is protected by Firewall & Gateway. 6. One active (NY) & one backup authentication servers. 7. Each office has several certificates, for authentication, integrity & authorization. Define Roles & Responsibility. Organizational Chart. Departments Department Head Higher control over department Might have access to other departments Department Staff When should things happen. Corporate Calendar. Sequence of the functions (Col 2) Specific Milestones. Ex: •Design dead line •Testing Results dead line •Production start date •Market Release date •Sales start date. •Sales Targets dead lines Each of them refers / depends on other. Market Research Production Planning Test Car Design Regulation Marketing Sales Earn Money Corporate Ethics Ex: • Ethics in Human Resources • Ethics in Finance • Ethics in Production • Ethics in Intellectual Property. Government Rules & Regulations Generalized Every business is special. Old school Analysis paralysis Hard to include changes The Open Group Architectural Framework (TOGAF) The Federal Enterprise Architecture. The Gartner The Open Group Architectural Framework (TOGAF) Defines categories as follows Business architecture. Application architecture. Data architecture. Technical architecture. Federal Enterprise Architecture (FEA) FEA requires all of the following: A perspective on how enterprise architectures should be viewed. A set of reference models for describing different perspectives of the enterprise architecture. A process for creating an enterprise architecture A transitional process for migrating from a pre-EA to a post-EA paradigm Gartner • Constituents: business owners, information specialists, the technology implementer. • Believes in defining goals first. • Prime importance is strategy. • Taxonomy completeness : How well you can use the methodology to classify the various architectural artifacts. • Process completeness : How the methodology guides you through a stepby-step process for creating an enterprise architecture. • Reference-model guidance : How useful the methodology is in helping you build a relevant set of reference models. • Practice guidance : How much the methodology helps you assimilate the culture in which it is valued and used. 4.5 4 3.5 3 ZACHMAN 2.5 TOGAF 2 FEA 1.5 GARTNER 1 0.5 0 Taxonomy Completeness Process Reference-model completeness guidance Practice guidance • Maturity model : Level of guidance to assess the effectiveness and maturity of different organizations entities. • Business focus : to whether the methodology will focus on using technology to drive business value,. • Governance guidance : How much help the methodology will be in understanding and creating an effective governance model. • Partitioning guidance : How well the methodology will guide you into effective autonomous partitions of the enterprise. 4.5 4 3.5 3 ZACHMAN 2.5 TOGAF 2 FEA 1.5 GARTNER 1 0.5 0 Maturity model Business focus Governance guidance Partioning guidance • Prescriptive catalog : How well the methodology guides you in setting up a catalogue of architectural assets . • Vendor neutrality : How likely you are to get locked-in to a specific consulting organization by adopting this methodology. • Information availability : The amount and quality of free or inexpensive information about this methodology • Time to value : The length of time you will likely be using this methodology. 4.5 4 3.5 3 ZACHMAN 2.5 TOGAF 2 FEA 1.5 GARTNER 1 0.5 0 Prescriptive Catalog Vendor neutrality Information availability Time to value Zachman Framework provide a holistic view of the Enterprises. The best case could also include consideration for future expansions and some unexpected changes to the organization. At the same time doing this may lead to “Analysis Paralysis”. So before implementing / accepting Zachman alternate solutions should be analyzed. • Enterprise Security Planning, Dr. Ertaul [http://www.mcs.csueastbay.edu/~lertaul/CSTC6899INTRODUCTION.pdf ] • IBM Enterprise Architecture [http://www-01.ibm.com/software/info/itsolutions/enterprisearchitecture] • A Comparison of the Top Four Enterprise-Architecture Methodologies [http://msdn.microsoft.com/en-us/library/bb466232.aspx] • History of the Frameworks [http://www.thefullwiki.org/Enterprise_architecture_framework] • Gartner [http://www.gartner.com/DisplayDocument?doc_cd=133132] • "Enterprise Architecture: Using the Zachman Framework", O'Rourke, Fishman, Selkow • "The Zachman Framework Populated with Baseball Models", Terry Bahill, Rick Botta, and Jesse Daniels