gea-nz-v3-0-application-and-ict-services-reference-model-and-taxonomy

80
Government Enterprise Architecture GEA-NZ v3.0 Application and ICT Services Reference Model and Taxonomy November 2014

Upload: regine-deleu

Post on 06-Aug-2015

246 views

Category:

Documents


1 download

TRANSCRIPT

Government

Enterprise

Architecture

GEA-NZ v3.0

Application and ICT Services Reference Model and Taxonomy

November 2014

Document Version 1.0 Page 2 of 80

Crown copyright ©. This copyright work is licensed under the Creative Commons Attribution 3.0 New Zealand licence. In essence, you are free to

copy, distribute and adapt the work, as long as you attribute the work to the Department of Internal Affairs and abide by the other licence terms.

To view a copy of this licence, visit http://creativecommons.org/licenses/by/3.0/nz/. Please note that neither the Department of Internal Affairs

emblem nor the New Zealand Government logo may be used in any way which infringes any provision of the Flags, Emblems, and Names Protection Act 1981 or would

infringe such provision if the relevant use occurred within New Zealand. Attribution to the Department of Internal Affairs should be in written form and not by

reproduction of the Department of Internal Affairs emblem or New Zealand Government logo.

Published by the Department of Internal Affairs www.ict.govt.nz

Document Version 1.0 Page 3 of 80

Document

Purpose

The Government Enterprise Architecture for New Zealand (GEA-NZ) Reference Models outline the following

artefacts for each dimension of the architecture:

- Reference taxonomy

- Structure and description

- Context within the GEA-NZ v3.0

- Description of artefacts and relationships with other artefacts across all dimensions

The objective of a Reference Model is to provide widely accepted core taxonomy, and an appropriate visual

representation of that taxonomy. A Reference Taxonomy defines the terminology, and provides a useful,

coherent, consistent, and structured description of the components of an Enterprise Architecture. The need

for reference architectures and associated taxonomies as part of a Government Enterprise Architecture is

described in the GEA-NZ v3.0 Context Document.

There are eight architecturally significant dimensions within the Government Enterprise Architecture for

New Zealand v3.0 framework (GEA-NZ v3.0). Each of these dimensions has a Reference Model which

includes relevant reference artefacts and relationships. Where appropriate the Reference Model has an

associated Reference Taxonomy.

GEA-NZ v3.0 uses reference taxonomies to provide categorisation terms to describe the architecture of

capabilities for use across All of Government (AoG), sectors, clusters, and agencies. Reference taxonomies

reduce complexity by abstracting, organising and simplifying complex information sets.

The overall consistency and cohesiveness of cross government services, shared services and common

capabilities, can be improved when government entities apply common reference taxonomies to deliver

consistent and aligned views of commonly required operational and technological services.

The usage of the GEA-NZ reference taxonomy, at government, agency and sector level, will help drive ICT

efficiencies and Transformation programmes through identification of opportunities for development or and

reuse of common solutions. This will enable the implementation of the Government ICT Strategy and Action

Plan to 2017 and Better Public Services: Results for New Zealanders.

Use of the GEA-NZ v3.0 reference model will:

- Provide common language to promote service, information, system and technology interoperability

- Promote the identification and demand aggregation of sharable and common capabilities to improve

the efficacy, utility and cost effectiveness of ICT across government

- Foster traceability of features to meet requirements

- Support the re-use of solutions and services

- Support the development and delivery of coherent AoG Common Capabilities portfolio

- Support the AoG Data Governance initiatives

Document Version 1.0 Page 4 of 80

Scope

This document provides a description of the GEA-NZ v3.0 Application and ICT Services Reference Model and

Taxonomy. This will provide the basis for developing specific Application and ICT Services reference

architectures and patterns. These reference architectures and patterns can be more readily used across

government where the terms from the reference taxonomy are used consistently.

This document does not include the description of the Application and ICT Services reference architecture or

the use of software tools to construct and manage GEA-NZ v3.0 models.

References to related documents are contained within the context of the document.

Audience

The intended audience of this document is (but not limited to):

- Agencies’ Enterprise, Application and Solution Architects

- Agencies and Business partners involved in development and delivery of business and technology

solutions

- ICT and Architect Managers

- ICT Security Specialists for Certification & Accreditation activities (C&A)

Authors

Regine Deleu – All-of-Government Enterprise Architect

Jim Clendon – Senior Enterprise Architecture Modeller

Phil Cutforth – All-of-Government Enterprise Architect

Approval

This document has been created following engagement with the Chief Architect Forum (CAF) and the

Government Enterprise Architecture Group (GEAG). The content will be subject to yearly review and

improvement. The Government Enterprise Architect team will manage revisions and will indicate priorities

for this work. Approval for changes will be sought through the GEAG.

Version Control

Version Date Comment Modified by Approved by Next Review Date

1.0 November

2014

Initial version Regine Deleu GEAG End 2015

Acknowledgements

This version of the GEA-NZ Application and ICT Services Reference Model and Taxonomy was developed by

the Government Enterprise Architecture team, part of System Transformation Team, Department of Internal

Affairs, New Zealand. It was peer-reviewed and approved by GEAG members.

Additionally, feedback received from a number of experts from various agencies was greatly appreciated.

Document Version 1.0 Page 5 of 80

Table of Contents

Document .......................................................................................................................................... 3

Purpose ............................................................................................................................................ 3

Scope ................................................................................................................................................ 4

Audience .......................................................................................................................................... 4

Authors ............................................................................................................................................ 4

Approval ........................................................................................................................................... 4

Version Control ................................................................................................................................ 4

Acknowledgements ......................................................................................................................... 4

Table of Contents ............................................................................................................................. 5

Executive Summary ............................................................................................................................ 7

Application and ICT Services Reference Model and Taxonomy .......................................................... 8

Introduction ..................................................................................................................................... 8

Principles .......................................................................................................................................... 9

Context within GEA-NZ 3.0 ............................................................................................................ 10

Benefits .......................................................................................................................................... 10

Development ................................................................................................................................. 12

Background .......................................................................................................................... 12

Approach ............................................................................................................................. 12

Tools .................................................................................................................................... 13

Application and ICT Services Reference Model ................................................................................ 14

Structure ........................................................................................................................................ 14

Application Domains ...................................................................................................................... 15

Corporate Applications ........................................................................................................ 17

Common Line of Business Applications ............................................................................... 29

End User Computing ............................................................................................................ 34

Data and Information Management Services ..................................................................... 39

Identity and Access Management Services ......................................................................... 47

Security Services .................................................................................................................. 53

ICT Components, Services and Tools ................................................................................... 58

Interfaces and Integration ................................................................................................... 67

Specialist Line of Business Applications .............................................................................. 70

Appendix – GEA-NZ v3.0 Application and ICT Services Reference Taxonomy in Context with Other

Artefacts .......................................................................................................................................... 71

Strategy and Policy ........................................................................................................................ 71

Performance .................................................................................................................................. 72

Business ......................................................................................................................................... 73

Customer ............................................................................................................................. 73

Channel ................................................................................................................................ 73

Product and Service ............................................................................................................. 74

People and Organisations .................................................................................................... 74

Document Version 1.0 Page 6 of 80

Process ................................................................................................................................. 75

Data and Information .................................................................................................................... 76

Application and ICT Services .......................................................................................................... 76

Infrastructure ................................................................................................................................. 77

Security and Privacy ....................................................................................................................... 78

Standards ....................................................................................................................................... 79

Document Version 1.0 Page 7 of 80

Executive Summary The Government Enterprise Architecture for New Zealand (GEA-NZ) Reference Models outline the following

artefacts for each dimension of the architecture framework:

- Reference taxonomy

- Structure and description

- Context within the GEA-NZ v3.0

- Description of artefacts and relationships with other artefacts across all dimensions

The objective of a Reference Model is to provide widely accepted core taxonomy, and an appropriate visual

representation of that taxonomy. A Reference Taxonomy defines the terminology, and provides a useful,

coherent, consistent, and structured description of the components of an Enterprise Architecture.

The GEA-NZ Application and ICT Services Reference Taxonomy consistently categorise and describe the

government –wide Application and ICT that support business capabilities. It is used for identifying

opportunities for cost reduction, collaboration, shared services, common capabilities and solution reuse in

ICT portfolios within and across agencies to effectively and efficiently support citizen centric service

transformation.

The usage of the GEA-NZ reference taxonomy, at government, agency and sector level, will help drive ICT

efficiencies through identification of opportunities for development or and reuse of common solutions. This

will ultimately support the implementation of the Government ICT Strategy and Action Plan to 2017 and

Better Public Services: Results for New Zealanders.

Use of the GEA-NZ v3.0 reference model will:

- Provide common language to promote service, information, system and technology interoperability

- Promote the identification and demand aggregation of sharable and common capabilities to improve

the efficacy, utility and cost effectiveness of ICT across government

- Foster traceability of features to meet requirements

- Support the re-use of solutions and services

- Support the development and delivery of coherent AoG Common Capabilities portfolio

- Support the AoG Data Governance initiatives

Document Version 1.0 Page 8 of 80

Application and ICT Services Reference

Model and Taxonomy

Introduction

The GEA-NZ Application and ICT Services describes business applications, including ‘X as a Service’, that

support the business processes. It includes core business, corporate and specialist line of business

applications, end user computing, data and information management, identity and access management and

security services. It also includes ICT components, services and tools, interfaces and integration.

At an All-of-Government level, the model facilitates a common understanding of application assets and ICT

services, identifying opportunities for sharing, reuse, and consolidation or renegotiation of licenses. It also

assists the GCIO assurance function by identifying application assets that will require maintenance or

renewal within the business planning horizon.

At an agency level, the model describes the application assets and ICT services of the agency, and helps

application portfolio management. Mapping their current and planned Information Systems to the

Application and ICT Services Reference Taxonomy categories should help agencies and sectors identify

opportunities for sharing, reuse, and consolidation or renegotiation of licenses.

The GEA-NZ Application and ICT Services Reference Taxonomy provide the basis for categorising applications

and their components. It categorises software that supports business. It does not include operating systems

that are used to operate hardware, as these are contained in the Infrastructure Reference Model.

Document Version 1.0 Page 9 of 80

The GEA-NZ Infrastructure Reference Taxonomy is an integral part of the Government Enterprise

Architecture for New Zealand v3.0 (GEA-NZ v3.0).

Principles

The value of reference models comes from applying them as part of business as usual practices and

capability acquisition across agencies in a consistent manner. They are used to provide a consistent view

across a complex system of business services and supporting ICT so that the delivery of government services

can become customer centric, and that investments can be made that benefits the system as a whole, not

just specific agencies in accordance with the guiding principles of the Government ICT Strategy and Action

Plan to 2017:

- Centrally led, collaboratively delivered

The Strategy and Action Plan will be led by the GCIO and delivered in collaboration with agency

chief executives.

- Customer centricity

Customer insights must inform service design and delivery. Customers should be shielded from

the internal complexities of Government.

- Trust and Confidence

Build public trust and confidence in government’s ability to maintain the privacy and security of

information. This underpins our ability to use digital channels.

- Simplify by design

Remove complexity, fragmentation and duplication, and reengineer business processes end–to-

end.

- Share by default

Capabilities must be shared by default rather than by exception.

Document Version 1.0 Page 10 of 80

Context within GEA-NZ 3.0

The GEA-NZ Application and ICT Services Reference Taxonomy is a core part of the GEA-NZ Application and

ICT Services Reference Model within the GEA-NZ v3.0 framework. The GEA-NZ Application and ICT Services

Reference Model provides the basis for categorising Application and ICT Services assets at a department or

agency level as well as Sector and AoG levels.

The following table shows the GEA-NZ Application and ICT Services Reference Model in context with the

other GEA-NZ reference models.

Ap

pli

cati

on

an

d I

CT

Se

rvic

es

represents a key mechanism for realising strategic goals,

through adoption of agile core business applications and

industry standard corporate support functions

Strategy and Policy

provides the ICT services that enables performance

measurement and control, and offers opportunities to

improve business efficiency through sharing and reuse

Performance

provides the application and ICT services that support

business services, processes, capabilities, information

sharing, and reuse

Business

sets requirements and provides the tools to manage,

model, structure, share, and exchange data and

information

Data and Information

provides the application and ICT service requirements for

technology and infrastructure services, and supporting

applications for infrastructure management (e.g. CMDB)

Infrastructure

provides the application and ICT service controls needed

to support security and privacy requirements

Security and Privacy

sets the application and ICT service requirements that

drive development and scope of corresponding standards

Standards

In the Appendix you can find tables showing the GEA-NZ Application and ICT Services Reference Taxonomy in

context with other artefacts.

Benefits

The GEA-NZ Application and ICT Services Reference Model will provide the following benefits to agencies,

sectors and their business partners involved in the delivery of public services and joint capabilities:

- Drives standardisation at the technology layer, improving the overall manageability, ensuring

technologies are directly referenced to business outcomes, and making understanding the impact of

changes more unambiguous.

- Provides a government wide common language for applications and ICT services.

- Identification of opportunities for sharing, re-use and consolidation of services to improve efficiencies

and effectiveness of current capabilities. To guide change towards shared common services.

- It will enable both ‘horizontal’ assessments of where multiple products are delivering the same

business service (consolidation and sharing opportunities), and ‘vertical’ assessments of where

different technology products have been implemented for the same or similar services

(standardisation and re-use opportunities.

- Provides a basis for the objective review of ICT investment by the government.

Document Version 1.0 Page 11 of 80

- For agencies’ Four Year Plan to help show what they will achieve and how it will be achieved aligning

to Better Public Services and all-of-government shared services.

- Enables more cost-effective and timely delivery of ICT services through a repository of standards,

principles and templates that support repeatable and consistent design and delivery of ICT capability,

as well as business and operational support services.

- Identification of opportunities for the consolidation and standardisation of applications and ICT

services.

- Baseline for agencies’ Services and API Catalogue and their Application portfolio and Catalogue;

- An engagement framework that translates a high-level logical view for capability definition and

delivery. From a practical perspective, to provide a tool kit for Enterprise Architects to use in their

daily work.

This will ultimately result in increased collaboration between agencies, reduced risks, reduced number of

incompatible systems across and within agencies, and it contributes to government-wide interoperability

commitments in an affordable manner.

In real terms, this will allow the Government to realise savings in two key areas:

Financial Management

Aligning the GEA-NZ Application and ICT Services Reference Model within the broader architectural

framework enables explicit links to be established from the performance layer through to the data and

application and infrastructure layers.

This will facilitate continuous, robust analysis of the relationship between ICT investments and the

associated impact on performance against required business outcomes.

Once established, these linkages will support evidence-based decision making around which technologies

and standards are most essential to ensure the continued provision of priority, fit-for-purpose and value for

money systems, services and applications.

User Productivity

Standardisation and rationalisation of diverse set of technical standards will improve productivity for not

only the user community and those responsible for the management and delivery of ICT services, but also

those involved with capability definition, development, acquisition, and delivery and integration

(introduction into service, and integrated logistics support management).

Improved standardisation will reduce existing barriers to workforce interoperability, service availability and

sharing, and data access and sharing capabilities, and deliver improved consistency across communication

and collaboration platforms.

ICT will realise increases in productivity driven by the reduced complexity which flows from having a

standardised, agreed set of application and ICT services.

Additionally, as a more standardised suite of approved technologies and platforms develops over time, the

number of applications which are supported by bespoke or specialised technologies will fall, reducing the

requirement to maintain highly specialised skills to support legacy applications.

Document Version 1.0 Page 12 of 80

Development

The GEA-NZ Application and ICT Services Reference Taxonomy has been adapted for New Zealand based on

the United States Federal Enterprise Architecture version 2 (US FEAF v2)1 Application and ICT Services

Reference Model combined with content developed for the NZ Defence Technology Reference Model. NZ

Defence based the development of their Technology Reference Model on the following sources:

- GEA-NZ v2.0 AoG Common Operating Environment (COE) and NZDF COE

- NATO C32 Taxonomy

- Australian Department of Defence (DoD) Integrated Defence Architecture3 (IDA)

- US Information Exchange Architecture (IEA).

- UK Government ICT Strategy, End User Device Programme – Conceptual Framework dated Apr 12.

The GEA-NZ v3.0 framework separates Application and ICT Services from Applications and ICT Services, so

only content from the NZ Defence Technical Reference Model that relates to Application and ICT Services

have been included.

We have deliberately used the term ICT services to remove any confusion between the services delivered by

government to customers / New Zealand, and what are ICT services which support the delivery of services by

government to customers / New Zealand.

Background

The GEA-NZ v3.0 Application and ICT Services Reference Taxonomy replaces the GEA-NZ v2.0 Service

Reference Taxonomy which re-used the NZ FEAF Service Reference Model.

The Service Reference Model abstracted ICT services from the underlying applications. While this approach

has merit in a Service Oriented Architecture for the most part applications are delivering the services

directly. This Service Reference Taxonomy was originally approved as part of the NZ FEAF, back in 2008, and

was essentially the same as the taxonomy in the US FEAF Service Reference Model developed in 2006 – 8

years ago.

There has been some adoption of this within agencies. However 8 years is a long time in the fast moving

world of ICT and technology so it is missing some concepts. As a result agencies have in turn adapted and

expanded the taxonomy to the extent that it no longer provides a common set of terms. For example the

GEA-NZ v2.0 COE Reference Architecture was defined using a new set of terms, with very few terms from the

older reference taxonomies being reused.

Approach

Our approach is to reuse and adapt reference taxonomies from other jurisdictions. Three major sources for

GEA-NZ v3.0 are the Australian Government Architecture v3.0 (AGA v3.0), the UK Reference Architecture

(UK-RA 2012), and the US FEAF v2.0.

Representatives from the Chief Architects Forum (CAF) and the Government Enterprise Architecture Group

(GEAG), and other agencies review and contribute to the taxonomies.

1 http://www.whitehouse.gov/sites/default/files/omb/assets/egov_docs/fea_v2.pdf

2 NATO C3 = North Atlantic Treaty Organisation Command, Control and Co-ordination Agency

3 Note: The ADF IDA closely follows the US FEAF model.

Document Version 1.0 Page 13 of 80

Tools

The master GEA-NZ v3.0 Application and ICT Services Reference Model has been developed using the

OpenText ProVision4 modelling tool using hierarchical models. The diagrams are published using .png files,

and the taxonomy data is published using Microsoft Excel.

Government Enterprise Architecture will migrate the master Application and ICT Services Reference

Taxonomy to the Sparx Systems Enterprise Architect5 modelling tool in the last quarter of 2014. The

Application and ICT Services Reference Taxonomy will subsequently be published in Sparx EA compatible file

formats.

4 OpenText ProVision was the tool selected by the State Services Commission for Enterprise Architecture modelling by agencies in 2008

5 Sparx Systems Enterprise Architect, Ultimate Edition, has been selected by Government Enterprise Architecture in August 2014 as the go forward tool for developing and maintaining GEA-NZ v3.0.

Document Version 1.0 Page 14 of 80

Application and ICT Services Reference

Model

Structure

The GEA-NZ Application and ICT Services Reference Taxonomy model is a simple hierarchical structure made

up of application domains, which are divided into application areas, which have categories. Application

categories may have multiple levels where more detail is required.

The diagram below shows the structure of the taxonomy and an approach for implementation using the

Open Group ArchiMate6 elements and relationships.

6 ArchiMate is an emerging standard for enterprise architecture modelling in the GEA-NZ Standards.

GEA-NZ v3.0 Application Reference Taxonomy StructureGEA-NZ v3.0 Application Reference Taxonomy StructureGEA-NZ v3.0 Application Reference Taxonomy StructureGEA-NZ v3.0 Application Reference Taxonomy StructureGEA-NZ v3.0 Application Reference Taxonomy Structure*CategorisationAgency Implementation (Using ArchiMate elements)Application AreaApplication CategoryApplication DomainApplication DomainApplication DomainApplication DomainApplication and ICTServices ReferenceTaxonomy

ArchiMate Data Object(Information Asset) ArchiMate ApplicationComponentArchiMate Application Function11 111

«assignment»«access» «generalisation»GEA-NZ v3.0 Application Reference Taxonomy Structure*

GEA-NZ v3.0 Application Reference Taxonomy StructureGEA-NZ v3.0 Application Reference Taxonomy StructureGEA-NZ v3.0 Application Reference Taxonomy StructureGEA-NZ v3.0 Application Reference Taxonomy StructureApplication AreaApplication DomainApplication DomainApplication DomainApplication DomainApplication and ICTServices ReferenceTaxonomy 11 11 1CategorisationAgency Implementation (Using ArchiMate elements) Application Category

ArchiMate Data Object(Information Asset) ArchiMate ApplicationComponentArchiMate Application Function «assignment»«access» «generalisation»

Document Version 1.0 Page 15 of 80

Application Domains

The GEA-NZ Application and ICT Services Reference Model include nine domains that can be used as a

common language to classify Application and ICT Services. These are the:

- Corporate Applications

- Common Line of Business Applications

- End User Computing

- Data and Information Management Services

- Identity and Access Management Services

- Security Services

- ICT Components, Services and Tools

- Interfaces and Integration

- Specialist Line of Business Applications

Document Version 1.0 Page 16 of 80

The domains and their related areas are shown in the following diagram:

A8 Interfaces and IntegrationA8 Interfaces and IntegrationA8 Interfaces and IntegrationA8 Interfaces and Integration

Application and ICT Services Reference TaxonomyApplication and ICT Services Reference TaxonomyApplication and ICT Services Reference TaxonomyApplication and ICT Services Reference Taxonomy

A8.01 IntegrationA8.01 IntegrationA8.01 IntegrationA8.01 Integration A8.03 InterfaceA8.03 InterfaceA8.03 InterfaceA8.03 InterfaceA8.02 Data InteroperabilityA8.02 Data InteroperabilityA8.02 Data InteroperabilityA8.02 Data Interoperability A8.04 GatewaysA8.04 GatewaysA8.04 GatewaysA8.04 GatewaysA9 Specialist Line of Business ApplicationsA9 Specialist Line of Business ApplicationsA9 Specialist Line of Business ApplicationsA9 Specialist Line of Business Applications

A5 Identity and Access Management ServicesA5 Identity and Access Management ServicesA5 Identity and Access Management ServicesA5 Identity and Access Management Services

A1 Corporate ApplicationsA1 Corporate ApplicationsA1 Corporate ApplicationsA1 Corporate ApplicationsA2 Common Line of Business ApplicationsA2 Common Line of Business ApplicationsA2 Common Line of Business ApplicationsA2 Common Line of Business Applications

A6 Security ServicesA6 Security ServicesA6 Security ServicesA6 Security Services

A4 Data and Information Management ServicesA4 Data and Information Management ServicesA4 Data and Information Management ServicesA4 Data and Information Management Services

A7 ICT Components, Services and ToolsA7 ICT Components, Services and ToolsA7 ICT Components, Services and ToolsA7 ICT Components, Services and Tools

A3 End User ComputingA3 End User ComputingA3 End User ComputingA3 End User Computing

A1.04 Workforce CapabilityA1.04 Workforce CapabilityA1.04 Workforce CapabilityA1.04 Workforce CapabilityManagementManagementManagementManagementA1.07 ProcurementA1.07 ProcurementA1.07 ProcurementA1.07 ProcurementA1.03 Human Resource ManagementA1.03 Human Resource ManagementA1.03 Human Resource ManagementA1.03 Human Resource ManagementA1.02 Financial and AssetA1.02 Financial and AssetA1.02 Financial and AssetA1.02 Financial and AssetManagementManagementManagementManagement

A4.02 Data and InformationA4.02 Data and InformationA4.02 Data and InformationA4.02 Data and InformationInteroperabilityInteroperabilityInteroperabilityInteroperability A4.08 Geospatial InformationA4.08 Geospatial InformationA4.08 Geospatial InformationA4.08 Geospatial InformationA4.07 Additional Data and InformationA4.07 Additional Data and InformationA4.07 Additional Data and InformationA4.07 Additional Data and InformationServicesServicesServicesServicesA3.05 Graphics and MultimediaA3.05 Graphics and MultimediaA3.05 Graphics and MultimediaA3.05 Graphics and Multimedia A3.04 Productivity SuiteA3.04 Productivity SuiteA3.04 Productivity SuiteA3.04 Productivity Suite

A1.10 Unified Communications andA1.10 Unified Communications andA1.10 Unified Communications andA1.10 Unified Communications andCollaborationCollaborationCollaborationCollaborationA2.03 Customer RelationshipA2.03 Customer RelationshipA2.03 Customer RelationshipA2.03 Customer RelationshipManagementManagementManagementManagementA2.01 Product and ServiceA2.01 Product and ServiceA2.01 Product and ServiceA2.01 Product and ServiceManagementManagementManagementManagement A2.04 Partner RelationshipA2.04 Partner RelationshipA2.04 Partner RelationshipA2.04 Partner RelationshipManagementManagementManagementManagementA2.08 Grants ManagementA2.08 Grants ManagementA2.08 Grants ManagementA2.08 Grants ManagementA2.07 Emergency ManagementA2.07 Emergency ManagementA2.07 Emergency ManagementA2.07 Emergency ManagementA2.06 Customer ServiceA2.06 Customer ServiceA2.06 Customer ServiceA2.06 Customer Service

A1.13 Business Transformation andA1.13 Business Transformation andA1.13 Business Transformation andA1.13 Business Transformation andImprovementImprovementImprovementImprovementA2.05 Customer AccountingA2.05 Customer AccountingA2.05 Customer AccountingA2.05 Customer Accounting A2.02 MarketingA2.02 MarketingA2.02 MarketingA2.02 Marketing

A7.02 ICT ComponentsA7.02 ICT ComponentsA7.02 ICT ComponentsA7.02 ICT Components

A1.05 Corporate Governance andA1.05 Corporate Governance andA1.05 Corporate Governance andA1.05 Corporate Governance andStrategyStrategyStrategyStrategy A1.06 Corporate AdministrationA1.06 Corporate AdministrationA1.06 Corporate AdministrationA1.06 Corporate Administration A1.12 Business Process ManagementA1.12 Business Process ManagementA1.12 Business Process ManagementA1.12 Business Process ManagementSystem (BPMS)System (BPMS)System (BPMS)System (BPMS)A1.01 Enterprise Resource PlanningA1.01 Enterprise Resource PlanningA1.01 Enterprise Resource PlanningA1.01 Enterprise Resource Planning(ERP)(ERP)(ERP)(ERP) A1.08 Business Intelligence andA1.08 Business Intelligence andA1.08 Business Intelligence andA1.08 Business Intelligence andAnalyticsAnalyticsAnalyticsAnalytics

A3.02 End User ToolsA3.02 End User ToolsA3.02 End User ToolsA3.02 End User Tools A3.03 Mobile ApplicationsA3.03 Mobile ApplicationsA3.03 Mobile ApplicationsA3.03 Mobile ApplicationsA3.01 End User Device ManagementA3.01 End User Device ManagementA3.01 End User Device ManagementA3.01 End User Device Management

A6.04 Security ControlsA6.04 Security ControlsA6.04 Security ControlsA6.04 Security ControlsA6.01 Encryption ServicesA6.01 Encryption ServicesA6.01 Encryption ServicesA6.01 Encryption Services A6.02 Network Security ServiceA6.02 Network Security ServiceA6.02 Network Security ServiceA6.02 Network Security ServiceA6.06 Enterprise Security ManagementA6.06 Enterprise Security ManagementA6.06 Enterprise Security ManagementA6.06 Enterprise Security Management A6.03 Public Key Infrastructure (PKI)A6.03 Public Key Infrastructure (PKI)A6.03 Public Key Infrastructure (PKI)A6.03 Public Key Infrastructure (PKI)ServicesServicesServicesServices

A4.04 Data Quality ManagementA4.04 Data Quality ManagementA4.04 Data Quality ManagementA4.04 Data Quality Management

A6.05 Digital ForensicsA6.05 Digital ForensicsA6.05 Digital ForensicsA6.05 Digital Forensics

A4.03 Data and Records GovernanceA4.03 Data and Records GovernanceA4.03 Data and Records GovernanceA4.03 Data and Records GovernanceA4.01 Data and InformationA4.01 Data and InformationA4.01 Data and InformationA4.01 Data and InformationArchitectureArchitectureArchitectureArchitectureA4.05 Data ProtectionA4.05 Data ProtectionA4.05 Data ProtectionA4.05 Data Protection A4.06 Database ManagementA4.06 Database ManagementA4.06 Database ManagementA4.06 Database ManagementA5.04 Authorisation and AccessA5.04 Authorisation and AccessA5.04 Authorisation and AccessA5.04 Authorisation and AccessManagement ServiceManagement ServiceManagement ServiceManagement ServiceA5.05 Directory ServiceA5.05 Directory ServiceA5.05 Directory ServiceA5.05 Directory Service A5.03 Authentication ServiceA5.03 Authentication ServiceA5.03 Authentication ServiceA5.03 Authentication ServiceA5.02 Identity Administration andA5.02 Identity Administration andA5.02 Identity Administration andA5.02 Identity Administration andOperationsOperationsOperationsOperations A5.07 Identity InteroperabilityA5.07 Identity InteroperabilityA5.07 Identity InteroperabilityA5.07 Identity InteroperabilityA5.01 Identity Governance andA5.01 Identity Governance andA5.01 Identity Governance andA5.01 Identity Governance andAccountabilityAccountabilityAccountabilityAccountability A5.99 Other Identity ServiceA5.99 Other Identity ServiceA5.99 Other Identity ServiceA5.99 Other Identity ServiceA5.06 Identity Functional CoreA5.06 Identity Functional CoreA5.06 Identity Functional CoreA5.06 Identity Functional CoreComponentsComponentsComponentsComponents

A7.03 ICT Development EnvironmentA7.03 ICT Development EnvironmentA7.03 ICT Development EnvironmentA7.03 ICT Development Environmentand Toolsand Toolsand Toolsand ToolsA7.01 Business Process ManagementA7.01 Business Process ManagementA7.01 Business Process ManagementA7.01 Business Process ManagementToolsToolsToolsTools A7.04 ICT Management ToolsA7.04 ICT Management ToolsA7.04 ICT Management ToolsA7.04 ICT Management ToolsA7.06 Core ICT Operation ServicesA7.06 Core ICT Operation ServicesA7.06 Core ICT Operation ServicesA7.06 Core ICT Operation Services

A1.09 Business ContinuityA1.09 Business ContinuityA1.09 Business ContinuityA1.09 Business Continuity A1.11 Enterprise Content ManagementA1.11 Enterprise Content ManagementA1.11 Enterprise Content ManagementA1.11 Enterprise Content Management(ECM)(ECM)(ECM)(ECM)

A4.09 Content Management SystemA4.09 Content Management SystemA4.09 Content Management SystemA4.09 Content Management System

A7.05 Cloud ServicesA7.05 Cloud ServicesA7.05 Cloud ServicesA7.05 Cloud Services xA7.07 Host LayeringxA7.07 Host LayeringxA7.07 Host LayeringxA7.07 Host Layering

Application and ICT Services Reference TaxonomyApplication and ICT Services Reference TaxonomyApplication and ICT Services Reference TaxonomyApplication and ICT Services Reference Taxonomy A1 Corporate ApplicationsA1 Corporate ApplicationsA1 Corporate ApplicationsA1 Corporate ApplicationsA2 Common Line of Business ApplicationsA2 Common Line of Business ApplicationsA2 Common Line of Business ApplicationsA2 Common Line of Business Applications

A8 Interfaces and IntegrationA8 Interfaces and IntegrationA8 Interfaces and IntegrationA8 Interfaces and Integration

A1.12 Business Process ManagementA1.12 Business Process ManagementA1.12 Business Process ManagementA1.12 Business Process ManagementSystem (BPMS)System (BPMS)System (BPMS)System (BPMS)

A8.01 IntegrationA8.01 IntegrationA8.01 IntegrationA8.01 Integration A8.02 Data InteroperabilityA8.02 Data InteroperabilityA8.02 Data InteroperabilityA8.02 Data Interoperability A8.03 InterfaceA8.03 InterfaceA8.03 InterfaceA8.03 Interface A8.04 GatewaysA8.04 GatewaysA8.04 GatewaysA8.04 Gateways

A5 Identity and Access Management ServicesA5 Identity and Access Management ServicesA5 Identity and Access Management ServicesA5 Identity and Access Management ServicesA7 ICT Components, Services and ToolsA7 ICT Components, Services and ToolsA7 ICT Components, Services and ToolsA7 ICT Components, Services and Tools

A4 Data and Information Management ServicesA4 Data and Information Management ServicesA4 Data and Information Management ServicesA4 Data and Information Management Services

A6 Security ServicesA6 Security ServicesA6 Security ServicesA6 Security Services

A1.03 Human Resource ManagementA1.03 Human Resource ManagementA1.03 Human Resource ManagementA1.03 Human Resource ManagementA1.07 ProcurementA1.07 ProcurementA1.07 ProcurementA1.07 ProcurementA2.06 Customer ServiceA2.06 Customer ServiceA2.06 Customer ServiceA2.06 Customer Service

A6.04 Security ControlsA6.04 Security ControlsA6.04 Security ControlsA6.04 Security ControlsA6.06 Enterprise Security ManagementA6.06 Enterprise Security ManagementA6.06 Enterprise Security ManagementA6.06 Enterprise Security Management

A1.04 Workforce CapabilityA1.04 Workforce CapabilityA1.04 Workforce CapabilityA1.04 Workforce CapabilityManagementManagementManagementManagementA1.08 Business Intelligence andA1.08 Business Intelligence andA1.08 Business Intelligence andA1.08 Business Intelligence andAnalyticsAnalyticsAnalyticsAnalyticsA1.02 Financial and AssetA1.02 Financial and AssetA1.02 Financial and AssetA1.02 Financial and AssetManagementManagementManagementManagement

A4.07 Additional Data and InformationA4.07 Additional Data and InformationA4.07 Additional Data and InformationA4.07 Additional Data and InformationServicesServicesServicesServices

A1.05 Corporate Governance andA1.05 Corporate Governance andA1.05 Corporate Governance andA1.05 Corporate Governance andStrategyStrategyStrategyStrategy A1.06 Corporate AdministrationA1.06 Corporate AdministrationA1.06 Corporate AdministrationA1.06 Corporate AdministrationA3 End User ComputingA3 End User ComputingA3 End User ComputingA3 End User Computing

A4.04 Data Quality ManagementA4.04 Data Quality ManagementA4.04 Data Quality ManagementA4.04 Data Quality Management

A9 Specialist Line of Business ApplicationsA9 Specialist Line of Business ApplicationsA9 Specialist Line of Business ApplicationsA9 Specialist Line of Business Applications

A3.05 Graphics and MultimediaA3.05 Graphics and MultimediaA3.05 Graphics and MultimediaA3.05 Graphics and Multimedia A4.02 Data and InformationA4.02 Data and InformationA4.02 Data and InformationA4.02 Data and InformationInteroperabilityInteroperabilityInteroperabilityInteroperabilityA3.04 Productivity SuiteA3.04 Productivity SuiteA3.04 Productivity SuiteA3.04 Productivity Suite

A1.10 Unified Communications andA1.10 Unified Communications andA1.10 Unified Communications andA1.10 Unified Communications andCollaborationCollaborationCollaborationCollaborationA3.02 End User ToolsA3.02 End User ToolsA3.02 End User ToolsA3.02 End User Tools

A4.08 Geospatial InformationA4.08 Geospatial InformationA4.08 Geospatial InformationA4.08 Geospatial InformationA4.03 Data and Records GovernanceA4.03 Data and Records GovernanceA4.03 Data and Records GovernanceA4.03 Data and Records GovernanceA4.01 Data and InformationA4.01 Data and InformationA4.01 Data and InformationA4.01 Data and InformationArchitectureArchitectureArchitectureArchitectureA4.05 Data ProtectionA4.05 Data ProtectionA4.05 Data ProtectionA4.05 Data Protection A4.06 Database ManagementA4.06 Database ManagementA4.06 Database ManagementA4.06 Database Management

A2.03 Customer RelationshipA2.03 Customer RelationshipA2.03 Customer RelationshipA2.03 Customer RelationshipManagementManagementManagementManagement

A5.04 Authorisation and AccessA5.04 Authorisation and AccessA5.04 Authorisation and AccessA5.04 Authorisation and AccessManagement ServiceManagement ServiceManagement ServiceManagement ServiceA5.03 Authentication ServiceA5.03 Authentication ServiceA5.03 Authentication ServiceA5.03 Authentication Service

A1.11 Enterprise Content ManagementA1.11 Enterprise Content ManagementA1.11 Enterprise Content ManagementA1.11 Enterprise Content Management(ECM)(ECM)(ECM)(ECM)

A5.06 Identity Functional CoreA5.06 Identity Functional CoreA5.06 Identity Functional CoreA5.06 Identity Functional CoreComponentsComponentsComponentsComponents A5.99 Other Identity ServiceA5.99 Other Identity ServiceA5.99 Other Identity ServiceA5.99 Other Identity ServiceA6.01 Encryption ServicesA6.01 Encryption ServicesA6.01 Encryption ServicesA6.01 Encryption ServicesA7.02 ICT ComponentsA7.02 ICT ComponentsA7.02 ICT ComponentsA7.02 ICT Components

A2.05 Customer AccountingA2.05 Customer AccountingA2.05 Customer AccountingA2.05 Customer Accounting A2.02 MarketingA2.02 MarketingA2.02 MarketingA2.02 MarketingA1.01 Enterprise Resource PlanningA1.01 Enterprise Resource PlanningA1.01 Enterprise Resource PlanningA1.01 Enterprise Resource Planning(ERP)(ERP)(ERP)(ERP)

A7.05 Cloud ServicesA7.05 Cloud ServicesA7.05 Cloud ServicesA7.05 Cloud Services

A1.09 Business ContinuityA1.09 Business ContinuityA1.09 Business ContinuityA1.09 Business Continuity

A6.02 Network Security ServiceA6.02 Network Security ServiceA6.02 Network Security ServiceA6.02 Network Security Service A6.03 Public Key Infrastructure (PKI)A6.03 Public Key Infrastructure (PKI)A6.03 Public Key Infrastructure (PKI)A6.03 Public Key Infrastructure (PKI)ServicesServicesServicesServices

A1.13 Business Transformation andA1.13 Business Transformation andA1.13 Business Transformation andA1.13 Business Transformation andImprovementImprovementImprovementImprovement

A4.09 Content Management SystemA4.09 Content Management SystemA4.09 Content Management SystemA4.09 Content Management SystemA3.03 Mobile ApplicationsA3.03 Mobile ApplicationsA3.03 Mobile ApplicationsA3.03 Mobile ApplicationsA3.01 End User Device ManagementA3.01 End User Device ManagementA3.01 End User Device ManagementA3.01 End User Device Management

A6.05 Digital ForensicsA6.05 Digital ForensicsA6.05 Digital ForensicsA6.05 Digital ForensicsA5.02 Identity Administration andA5.02 Identity Administration andA5.02 Identity Administration andA5.02 Identity Administration andOperationsOperationsOperationsOperations A5.07 Identity InteroperabilityA5.07 Identity InteroperabilityA5.07 Identity InteroperabilityA5.07 Identity InteroperabilityA5.01 Identity Governance andA5.01 Identity Governance andA5.01 Identity Governance andA5.01 Identity Governance andAccountabilityAccountabilityAccountabilityAccountability

A2.01 Product and ServiceA2.01 Product and ServiceA2.01 Product and ServiceA2.01 Product and ServiceManagementManagementManagementManagement A2.04 Partner RelationshipA2.04 Partner RelationshipA2.04 Partner RelationshipA2.04 Partner RelationshipManagementManagementManagementManagement

A5.05 Directory ServiceA5.05 Directory ServiceA5.05 Directory ServiceA5.05 Directory ServiceA7.01 Business Process ManagementA7.01 Business Process ManagementA7.01 Business Process ManagementA7.01 Business Process ManagementToolsToolsToolsTools A7.06 Core ICT Operation ServicesA7.06 Core ICT Operation ServicesA7.06 Core ICT Operation ServicesA7.06 Core ICT Operation Services

A2.08 Grants ManagementA2.08 Grants ManagementA2.08 Grants ManagementA2.08 Grants ManagementA2.07 Emergency ManagementA2.07 Emergency ManagementA2.07 Emergency ManagementA2.07 Emergency Management

A7.03 ICT Development EnvironmentA7.03 ICT Development EnvironmentA7.03 ICT Development EnvironmentA7.03 ICT Development Environmentand Toolsand Toolsand Toolsand Tools A7.04 ICT Management ToolsA7.04 ICT Management ToolsA7.04 ICT Management ToolsA7.04 ICT Management ToolsxA7.07 Host LayeringxA7.07 Host LayeringxA7.07 Host LayeringxA7.07 Host Layering

Document Version 1.0 Page 17 of 80

Corporate Applications

Note: Detailed diagrams are available as .png files, and this table is available as an Excel file.

Name Description

A1 Corporate Applications These are standard corporate applications within government to support the

internal facing functions for managing staff, money and the way government

agencies run their business.

Note: The applications found in this domain can also be used as ICT services or

application components. Many commercial applications may contain elements

of applications listed here and specific software solutions may offer a mix of

these in one suite.

A1.01 Enterprise Resource

Planning (ERP)

Enterprise resource planning (ERP) is business management software; usually a

suite of integrated applications, that an organisation can use to collect, store,

manage and interpret data from many business activities. In the past ERP

solutions focused on back office functions but modern solutions often include

some key front office functions as well.

Note: Application Categories for ERP can be found under the Corporate

Applications and Core Business Applications areas.

Example ERP Modules are:

- Financial Accounting: General ledger, fixed asset, payables including

vouchering, matching and payment, receivables cash application and

collections, cash management, financial consolidation.

- Management Accounting: Budgeting cost management; activity based costing

- Human Resources: Recruiting, training, rostering, payroll, benefits, diversity

management, retirement, and separation.

- Manufacturing: Engineering, bill of materials, work orders, scheduling,

capacity, workflow management, quality control, manufacturing process,

manufacturing projects, manufacturing flow, product life cycle management.

- Order Processing: Order to cash, order entry, credit checking, pricing,

available to promise, inventory, shipping, sales analysis and reporting, sales

commissioning.

- Supply Chain Management: Supply chain planning, supplier scheduling,

product configurator, order to cash, purchasing, inventory, claim processing,

and warehousing (receiving, put away, picking and packing).

- Project Management: Project planning, resource planning, project costing,

work breakdown structure, billing, time and expense, performance units,

activity management.

- Customer Relationship Management: Sales and marketing, commissions,

service, customer contact, call center support - CRM systems are not always

considered part of ERP systems but rather Business Support systems (BSS).

- Self Service: Various "self–service" interfaces for customers, suppliers and/or

employees.

A1 Corporate ApplicationsA1 Corporate ApplicationsA1 Corporate ApplicationsA1 Corporate Applications A1.04 Workforce CapabilityA1.04 Workforce CapabilityA1.04 Workforce CapabilityA1.04 Workforce CapabilityManagementManagementManagementManagementA1.07 ProcurementA1.07 ProcurementA1.07 ProcurementA1.07 ProcurementA1.03 Human Resource ManagementA1.03 Human Resource ManagementA1.03 Human Resource ManagementA1.03 Human Resource ManagementA1.02 Financial and AssetA1.02 Financial and AssetA1.02 Financial and AssetA1.02 Financial and AssetManagementManagementManagementManagementA1.10 Unified Communications andA1.10 Unified Communications andA1.10 Unified Communications andA1.10 Unified Communications andCollaborationCollaborationCollaborationCollaborationA1.13 Business Transformation andA1.13 Business Transformation andA1.13 Business Transformation andA1.13 Business Transformation andImprovementImprovementImprovementImprovementA1.05 Corporate Governance andA1.05 Corporate Governance andA1.05 Corporate Governance andA1.05 Corporate Governance andStrategyStrategyStrategyStrategy A1.06 Corporate AdministrationA1.06 Corporate AdministrationA1.06 Corporate AdministrationA1.06 Corporate Administration A1.12 Business Process ManagementA1.12 Business Process ManagementA1.12 Business Process ManagementA1.12 Business Process ManagementSystem (BPMS)System (BPMS)System (BPMS)System (BPMS)A1.01 Enterprise Resource PlanningA1.01 Enterprise Resource PlanningA1.01 Enterprise Resource PlanningA1.01 Enterprise Resource Planning(ERP)(ERP)(ERP)(ERP) A1.08 Business Intelligence andA1.08 Business Intelligence andA1.08 Business Intelligence andA1.08 Business Intelligence andAnalyticsAnalyticsAnalyticsAnalyticsA1.09 Business ContinuityA1.09 Business ContinuityA1.09 Business ContinuityA1.09 Business Continuity A1.11 Enterprise Content ManagementA1.11 Enterprise Content ManagementA1.11 Enterprise Content ManagementA1.11 Enterprise Content Management(ECM)(ECM)(ECM)(ECM)

A1 Corporate ApplicationsA1 Corporate ApplicationsA1 Corporate ApplicationsA1 Corporate ApplicationsA1.12 Business Process ManagementA1.12 Business Process ManagementA1.12 Business Process ManagementA1.12 Business Process ManagementSystem (BPMS)System (BPMS)System (BPMS)System (BPMS)

A1.03 Human Resource ManagementA1.03 Human Resource ManagementA1.03 Human Resource ManagementA1.03 Human Resource ManagementA1.07 ProcurementA1.07 ProcurementA1.07 ProcurementA1.07 Procurement A1.04 Workforce CapabilityA1.04 Workforce CapabilityA1.04 Workforce CapabilityA1.04 Workforce CapabilityManagementManagementManagementManagementA1.08 Business Intelligence andA1.08 Business Intelligence andA1.08 Business Intelligence andA1.08 Business Intelligence andAnalyticsAnalyticsAnalyticsAnalyticsA1.02 Financial and AssetA1.02 Financial and AssetA1.02 Financial and AssetA1.02 Financial and AssetManagementManagementManagementManagementA1.05 Corporate Governance andA1.05 Corporate Governance andA1.05 Corporate Governance andA1.05 Corporate Governance andStrategyStrategyStrategyStrategy A1.06 Corporate AdministrationA1.06 Corporate AdministrationA1.06 Corporate AdministrationA1.06 Corporate AdministrationA1.10 Unified Communications andA1.10 Unified Communications andA1.10 Unified Communications andA1.10 Unified Communications andCollaborationCollaborationCollaborationCollaboration A1.11 Enterprise Content ManagementA1.11 Enterprise Content ManagementA1.11 Enterprise Content ManagementA1.11 Enterprise Content Management(ECM)(ECM)(ECM)(ECM)A1.01 Enterprise Resource PlanningA1.01 Enterprise Resource PlanningA1.01 Enterprise Resource PlanningA1.01 Enterprise Resource Planning(ERP)(ERP)(ERP)(ERP)A1.09 Business ContinuityA1.09 Business ContinuityA1.09 Business ContinuityA1.09 Business ContinuityA1.13 Business Transformation andA1.13 Business Transformation andA1.13 Business Transformation andA1.13 Business Transformation andImprovementImprovementImprovementImprovement

Document Version 1.0 Page 18 of 80

A1.02 Financial and Asset

Management

Applications, software or services that support financial and asset

management. Financial management refers to the efficient and effective

management of money (funds) in such a manner as to accomplish the

objectives of the organisation. It is the specialised function directly associated

with the top management. It includes how to raise the capital, how to allocate

it i.e. capital budgeting. Not only about long term budgeting but also how to

allocate the short term resources like current assets. It also deals with the

dividend policies of the shareholders.

A1.02.01 Budget Planning and

Execution

Software that supports all activities undertaken to determine priorities for

future spending and to develop an itemised forecast of future funding and

expenditures during a specified period of time. This includes the collection and

use of performance information to assess the effectiveness of programs and

develop budget priorities and the legal (apportionment) and managerial

(allotment and sub-allotment) distribution of budget authority to achieve

results consistent with the formulated budget.

A1.02.02 General Ledger Software that supports accounting for assets, liabilities, fund balances,

revenues and expenses associated with the maintenance of government funds

and expenditure of government appropriations (salaries and expenses,

operations and maintenance, procurement, working capital, trust funds, etc.),

in accordance with applicable standards.

A1.02.03 Accounts Payable Software that manages and pays the funds owed.

A1.02.04 Accounts Receivable Software that supports collections and receivables, including deposits, fund

transfers, and receipts for sales or service.

A1.02.05 Asset Management Software that supports the tracking of information related to deploying,

operating, maintaining, upgrading, and disposing of assets cost-effectively.

Includes an inventory of assets.

A1.02.06 Expense Management Support the management and reimbursement of costs paid by employees or an

organisation.

A1.02.07 Financial Audit Software used to track and manage financial audit and support the

examination and verification of records for accuracy.

A1.02.08 Portfolio Management Software or services that provide the set of capabilities to support the

administration of a group of investments held by an organisation.

A1.03 Human Resource

Management

Applications, software or services that support human resource management.

Human resource management (HRM or simply HR) is a function in

organisations designed to maximize employee performance in service of their

employer’s strategic objectives. HR is primarily concerned with how people are

managed within organisations, focusing on policies and systems. HR

departments and units in organisations are typically responsible for a number

of activities, including employee recruitment, training and development,

performance appraisal, and rewarding (e.g., managing pay and benefit

systems). HR is also concerned with industrial relations, that is, the balancing of

organisational practices with regulations arising from collective bargaining and

governmental laws.

A1.03.01 Recruitment Software that supports the procedures for attracting and selecting high-quality,

productive employees with the right skills and competencies, in accordance

with merit system principles. This includes developing a staffing strategy and

plan, and establishing an applicant evaluation.

Document Version 1.0 Page 19 of 80

A1.03.02 Education / Training Software that supports the design, development, and implementation of a

comprehensive employee development and training approach to ensure that

agency employees have the right competencies.

A1.03.03 Personnel

Administration

Support the matching between an organisation’s employees and potential

opportunities as well as the modification, addition and general upkeep of an

organisation’s employee-specific information.

A1.03.03.01 Employee Records Software that manages employee personnel records and files.

A1.03.03.02 Time and Attendance Software that supports the set of capabilities to support the submission,

approval and adjustment of employee hours.

A1.03.03.03 Career Development and

Retention

Support the monitoring of performance as well as the professional growth,

advancement and retention of an organisation's employees.

A1.03.04 Staff Directory Software that supports the listing of employees and their whereabouts.

A1.03.05 Payroll Software that supports the administration, calculation and payment of

employee wages, bonuses, and deductions including tax.

A1.03.05.01 Salary Management Software and or services that support the calculation and payment of salaries

and payroll taxes.

A1.03.05.02 Benefits Software that supports the design, development, and implementation of

benefits programs for agency employees. This includes establishing and

communicating benefits programs, processing benefits actions, and interacting

as necessary with third party benefits providers.

A1.03.05.03 Awards Software that supports the administration of employee bonus and monetary

awards programs. Also includes software used to design, develop, and

implement pay for performance compensation programs to recognize and

reward high performance, with both base pay increases and performance

bonus payments.

A1.03.06 Team and

Organisation Management

Software that supports the hierarchy structure and identification of employees

within the various sub-groups of an organisation.

A1.03.07 Skills Management Software that supports the proficiency of employees in the delivery of an

organisation's products or services.

A1.03.08 Emergency

Notification

Software that enables designated individuals to communicate critical

information to many individuals across multiple devices.

A1.04 Workforce Capability

Management

Applications, software or services supports workforce management. Workforce

capability management encompasses all the activities needed to maintain a

productive workforce. It can be part of or overlap with HR management and

ERP systems.

Document Version 1.0 Page 20 of 80

A1.04.01 Resource Planning and

Allocation

Software that supports the processes for identifying the workforce

competencies required to meet the agency’s strategic goals and for developing

the strategies to meet these requirements. The software also supports

procedures for attracting and selecting high-quality, productive employees with

the right skills and competencies, in accordance with merit system principles.

This includes developing a staffing strategy and plan; establishing an applicant

evaluation approach; announcing the vacancy, sourcing and evaluating

candidates against the competency requirements for the position; initiating

pre-employment activities; and hiring employees.

A1.04.02 Field Service

Management

Software to optimally plan and dispatch field service technicians and their

properly stocked vehicles to a customer's location in a timely manner in order

to deliver against their service commitments.

A1.04.02.01 Demand Management Software to help forecast work orders to plan the number and expertise of staff

that will be needed.

A1.04.02.02 Workforce Scheduler Software to predefined rules to automatically optimise the schedule and use of

resources (people, parts, vehicles).

A1.04.02.03 Workforce Dispatcher Software to automatically assigning work orders within predefined zones to

particular technicians.

A1.04.03 Contingent Workforce

Management

Software that supports the continuity of operations for an organisation's

business through the identification of surge or temporary personnel in addition

to agency staff.

A1.05 Corporate Governance

and Strategy

Applications, software or services that support corporate governance

functions. Corporate governance broadly refers to the mechanisms, processes

and relations by which corporations are controlled and directed. Governance

structures identify the distribution of rights and responsibilities among

different participants in the corporation (such as the board of directors,

managers, shareholders, creditors, auditors, regulators, and other

stakeholders) and include the rules and procedures for making decisions in

corporate affairs. Corporate governance includes the processes through which

corporations' objectives are set and pursued in the context of the social,

regulatory and market environment. Governance mechanisms include

monitoring the actions, policies and decisions of corporations and their agents.

Corporate governance practices are affected by attempts to align the interests

of stakeholders.

A1.05.01 Strategy and Planning Software that allows setting up the activities of determining strategic direction,

identifying and establishing programs, services and processes, and allocating

resources (capital and labour) among those programs and processes.

A1.05.02 Governance Software that supports decisions, actions, business rules and other matters

that govern an organisation.

A1.05.03 Compliance

Management

Compliance Management software and or services provide a common

framework and an integrated approach to manage all compliance requirements

faced by an agency. It enables companies to manage cross-industry mandates

and regulations such as SOX, OSHA, EH&S, and FCPA as well as industry focused

regulatory guidelines from FDA, FERC, FAA, HACCP, AML, Basel II, and Data

Retention laws.

Document Version 1.0 Page 21 of 80

A1.05.04 Internal Control Support the methods and procedures used by the organisation to safeguard its

assets, produce accurate accounting data and reports, contribute to efficient

operations, and encourage staff to adhere to management policies and mission

requirements.

A1.05.05 Corporate Policy Software that supports development and enforcement of corporate policy

within an organisation.

A1.05.06 Risk Management Software that allows planners to explicitly address uncertainty by identifying

and generating metrics, setting parameters, prioritizing, and developing

mitigations, and tracking risk.

A1.05.07 Corporate

Performance Management

Software that allows setting up performance metrics, planners to explicitly

address uncertainty by identifying and generating metrics, setting parameters,

prioritizing, and developing mitigations, and tracking risk.

A1.06 Corporate

Administration

Applications, software or services that support the day-to-day management

and maintenance of the internal administrative operations.

A1.06.01 Legal Advice Software that supports giving legal advice.

A1.06.02 Facilities Management Software that supports facilities management including the maintenance,

administration, certification, and operation of office buildings that are

possessions of the government / agency.

A1.06.03 Accommodation

Management

Software that supports managing the accommodation needs of the workforce.

A1.06.04 Media and Facilities

Reservations

Software that supports arrangements to track and secure the use of media and

facilities.

A1.06.05 Travel Software that supports activities associated with planning, preparing, and

monitoring of business-related travel expenses. This may include employees

and others supporting the work of the government.

A1.06.06 Issue Tracking Software that supports the management of a service center to respond to

government and contract employees' technical and administrative questions.

A1.07 Procurement Applications, software or services that supports procurement; the acquisition

of goods, services or works from an outside external source.

A1.07.01 Supplier Management Software used to manage the relationship and lifecycle of existing suppliers.

The purpose of Supplier Management is to obtain value for money from

suppliers and contracts. It ensures that underpinning contracts and agreements

align with business needs, Service Level Agreements and Service Level

Requirements. Supplier Management oversees process of identification of

business needs, evaluation of suppliers, establishing contracts, their

categorisation, management and termination.

Note: This has a close link to "Partner Relationship Management" in the

"Common Line of Business Application" area.

A1.07.01.01 Sourcing Management Support the supply of goods or services as well as the tracking and analysis of

costs for these goods.

A1.07.01.02 Supplier Contract

Management Supplier Contract Management (SPM) is about defining what a supplier is to

deliver in a contract.

Document Version 1.0 Page 22 of 80

A1.07.01.03 Supplier Performance

Management Supplier Performance Management (SPM) is about ensuring the supplier

delivers what has been promised in the contract.

A1.07.01.04 Supplier Balanced

Scorecard

A balanced scorecard includes a mixture of quantitative and qualitative

measures, including how key participants perceive the quality of the

relationship. These KPIs are shared between customer and supplier and

reviewed jointly, reflecting the fact that the relationship is two-way and

collaborative, and that strong performance on both sides is required for it to be

successful. Advanced organisations conduct 360 degree scorecards, where

strategic suppliers are also surveyed for feedback on their performance, the

results of which are built into the scorecard.

A1.07.02 Ordering / Purchasing Allow the placement of request for a product

A1.07.02.01 Supplier Catalogue

Management

Support the listing of available products or services that an organisation offers

and shopping cart / ordering functionality.

A1.07.02.02 Invoice Tracking and

Approval Software that manages inflow and outflows of "products", as well as data

about the level of "products" on hand and support the identification of where a

shipment or delivery is within the business cycle.

A1.07.02.03 Logistics and

Transportation

Provide for efficient freight and traffic management to receive purchased

goods and services.

A1.08 Business Intelligence and

Analytics

Software or services to support Business intelligence (BI). It includes

techniques and tools for the transformation of data and information into

meaningful and useful information and knowledge for business analysis

purposes.

Common functions of business intelligence technologies are reporting, online

analytical processing, analytics, data mining, process mining, complex event

processing, business performance management, benchmarking, text mining,

predictive analytics and prescriptive analytics.

A1.08.01 Data Warehouse A data warehouse (DW, DWH), or an enterprise data warehouse (EDW), is a

system used for reporting and data analysis. Integrating data from one or more

disparate sources creates a central repository of data, a data warehouse (DW).

Data warehouses store current and historical data and are used for creating

trending reports for senior management reporting such as annual and quarterly

comparisons.

The data stored in the warehouse is uploaded from the operational systems

(such as marketing, sales, etc.). The data may pass through an operational data

store for additional operations before it is used in the DW for reporting.

A1.08.01.01 Data Mart A data mart is the access layer of the data warehouse environment that is used

to get data out to the users. The data mart is a subset of the data warehouse

that is usually oriented to a specific business line or team. Data marts are small

slices of the data warehouse. Whereas data warehouses have an enterprise-

wide depth, the information in data marts may pertain to a single department.

A1.08.01.02 Data Mining Software that provides for the efficient discovery of non-obvious, valuable

patterns and relationships within a large collection of data.

A1.08.01.03 Decision Support Software or services that support business or organisational decision-making

activities. Supports the management, operations, and planning levels of an

organisation and helps to make decisions, which may be rapidly changing and

not easily specified in advance.

Document Version 1.0 Page 23 of 80

A1.08.01.04 Online Analytical

Processing (OLAP ) Software or services that support a process to swiftly answer multi-dimensional

analytical (MDA) queries and enable users to interactively analyse

multidimensional data from multiple perspectives. An OLAP consists of three

basic analytical operations: consolidation, drill-down, and slicing and dicing.

A1.08.01.05 Online Transaction

Processing (OLTP ) Online transaction processing (OLTP) is a class of information systems that

facilitate and manage transaction-oriented applications, typically for data entry

and retrieval transaction processing.

A1.08.01.06 Predictive Analysis Software and or services to provide predictive analysis. Predictive analysis is

about finding and quantifying hidden patterns in the data using complex

mathematical models that can be used to predict future outcomes. Predictive

analysis is different from OLAP in that OLAP focuses on historical data analysis

and is reactive in nature, while predictive analysis focuses on the future. These

systems are also used to support Customer Relationship Management (CRM).

A1.08.02 Knowledge and

Discovery Management

Software that supports knowledge and discovery management.

A1.08.02.01 Data and Information

Analysis Software and or services to support the analysis and inspection of data and

information. This feeds into:

- Data and Information Modelling

- Data Categorisation

- Data Cleaning

- Data Transformation

A1.08.02.02 Information Retrieval Software that provides access to data and information for use by an

organisation and its stakeholders.

A1.08.02.03 Knowledge Capture Software that facilitates collection of data and information.

A1.08.02.04 Knowledge Distribution

and Delivery Software that supports the transfer of knowledge to the end customer.

A1.08.02.05 Simulation Software or services that help manipulate information to identify patterns and

create possible changes.

A1.08.02.06 Survey Data Collection Software or services that support methods to collect information from a

sample of individuals in a systematic way for empirical research in social

sciences, marketing and official statistics.

A1.08.03 Business Intelligence

Reporting

Software and or services that supports analysis, reporting and statistics for

Business Intelligence.

A1.08.03.01 Ad hoc Reporting Software tools or services that support the creation and display of individually

designed and structured reports with self-service access to meaningful data.

A1.08.03.02 Balanced Scorecard A semi-standard structured report supported by proven design methods and

automation tools that can be used by managers to keep track of the execution

of activities by the staff within their control and to monitor the consequences

arising from these actions.

Document Version 1.0 Page 24 of 80

A1.08.03.03 BI Dashboard A dashboard is "an easy to read, often single page, real-time user interface,

showing a graphical presentation of the current status (snapshot) and historical

trends of an organisation’s key performance indicators to enable instantaneous

and informed decisions to be made at a glance.

In real-world terms, "dashboard" is another name for "progress report" or

"report." Often, the "dashboard" is displayed on a web page that is linked to a

database which allows the report to be constantly updated. A dashboard can

be created as a 'mashup' of data from different sources.

Note: This is not to be confused with a balanced scorecard.

A1.08.03.04 On Demand Reporting Software tools or services that support on-demand reporting. An on-demand

report is a formatted version of a report run with the currently available data

and viewed immediately. When you run an on-demand report, you can specify

the parameter values to use; the report is then formatted using the current

data and displayed in the report viewer.

A1.08.03.05 Standardised / Canned Software or services that support the creation and display of standard reports

with self-service access to meaningful data.

A1.08.04 Operational Data

Store (ODS)

An operational data store (ODS) is a database designed to integrate data from

multiple sources for additional operations on the data. Unlike a master data

store the data is not passed back to operational systems. It may be passed for

further operations and to the data warehouse for reporting.

Because the data originates from multiple sources, the integration often

involves cleaning, resolving redundancy and checking against business rules for

integrity. An ODS is usually designed to contain low-level or atomic (indivisible)

data (such as transactions and prices) with limited history that is captured "real

time" or "near real time" as opposed to the much greater volumes of data

stored in the data warehouse generally on a less-frequent basis.

A1.08.05 Statistical Analytics Software or services that support the study of a collection, organisation,

analysis, and interpretation of data.

A1.08.06 Data Profiling Software that supports all forms of data analysis of extremely large, complex

data sets (big data) that are manipulated for business consumption.

Data profiling is the process of examining the data available in an existing data

source (e.g. a database or a file) and collecting statistics and information about

that data. The purpose of these statistics may be to:

- Find out whether existing data can easily be used for other purposes.

- Improve the ability to search the data by tagging it with keywords,

descriptions, or assigning it to a category.

- Give metrics on data quality including whether the data conforms to

particular standards or patterns.

- Assess the risk involved in integrating data for new applications, including the

challenges of joins.

- Assess whether metadata accurately describes the actual values in the source

database.

- Understanding data challenges early in any data intensive project, so that late

project surprises are avoided. Finding data problems late in the project can

lead to delays and cost overruns.

- Have an enterprise view of all data, for uses such as master data management

where key data is needed, or data governance for improving data quality.

A1.09 Business Continuity Software or services to support the business continuity. This includes Health

and Safety Management, Disaster Management.

Document Version 1.0 Page 25 of 80

A1.09.01 Health & Safety Software and or services that support the security and physical well-being of an

organisation's employees.

A1.09.02 Disaster Management Software and or services that support the emergency processes and recovery

of the physical facilities and people in case of a disaster.

A1.10 Unified Communications

and Collaboration

Software and or services that support unified communications and

collaboration.

A1.10.01 Calendaring Software and or services that provide users with an electronic version of a

calendar, an appointment book, address book, and/or contact list.

A1.10.02 Communications

Integration

Software and or services that support the integration and coordination

between different communication types that delivers the value of unified

communications. It includes the ability to contact people with a range of

different types of communications technology as appropriate for the situation

and person, presence across different communication types, and follow-me

functionality across different communication types.

A1.10.03 Electronic Meeting

and Collaboration

Software and or services for sharing presentations, electronic whiteboards,

screens with other meeting participants. These may be delivered bundled as

part of video conferencing tools, or delivered separately.

A1.10.04 Email Server Software and or services for delivering, storing and managing e-mail. Electronic

mail, commonly referred to as email or e-mail, is a method of exchanging

digital messages from an author to one or more recipients. Modern email

operates across the Internet or other computer networks. Email systems are

based on a store-and-forward model. Email servers accept, forward, deliver

and store messages.

A1.10.05 Event / News

Management

Software and or services that provides users with frequently updated content

to which they subscribe.

A1.10.06 Instant Messaging Software and or services that provides Instant messaging (IM). These

technologies support a form of communication over the Internet that offers

quick transmission of text-based messages from sender to receiver. In push

mode between two or more people using personal computers or other devices,

along with shared clients, instant messaging basically offers real-time direct

written language-based online chat. The user's text is conveyed over a network,

such as the Internet. It may address point-to-point communications as well as

multicast communications from one sender to many receivers. More advanced

instant messaging allows enhanced modes of communication, such as live voice

or video calling, video chat and inclusion of hyperlinks to media.

A1.10.07 Social Software Software that supports the capturing, storing and presentation of

communication, usually written but may include audio and video as well.

Interactive tools handle mediated interactions between a pair or group of

users. They focus on establishing and maintaining a connection among users,

facilitating the mechanics of conversation and talk.

A1.10.08 Syndication

Management

Software and or services that supports web feed formats used to publish

frequently updated works, such as blog entries, news headlines, audio, and

video, in a standardised format. This can include ATOM feeds, RSS etc.

Document Version 1.0 Page 26 of 80

A1.10.09 Video Software and or services for communicating with people using video. Video is

the technology of electronically capturing, recording, processing, storing,

transmitting, and reconstructing a sequence of still images representing scenes

in motion.

A1.10.10 Voice Software for communicating with people using voice or audio channels.

A1.10.11 Voicemail Software for storing voicemail, delivering notifications and managing access to

stored messages. Voice-mail is a computer based system that allows users and

subscribers to exchange personal voice messages; to select and deliver voice

information; and to process transactions relating to individuals, organisations,

products and services, using an ordinary telephone.

A1.10.99 Other Unified

Communications and

Collaboration

Other Unified Communications and Collaboration software.

A1.11 Enterprise Content

Management (ECM)

Software and or services that support Enterprise Content Management. ECM is

an umbrella term covering document management, Web content

management, search, collaboration, records management, digital asset

management (DAM), workflow management, capture, and scanning. ECM is

primarily aimed at managing the life-cycle of information from initial

publication or creation all the way through archival and eventually disposal.

Note: The underlying modules / applications components / services are found

in "Records and Content Management".

A1.12 Business Process

Management System (BPMS)

The Business Process Management System (BPMS) is considered a critical

component of operational intelligence (OI) solutions to deliver real-time,

actionable information. This real-time information can be acted upon in a

variety of ways - alerts can be sent or executive decisions can be made using

real-time dashboards. OI solutions use real-time information to take

automated action based on pre-defined rules so that security measures and or

exception management processes can be initiated.

Note: BPM is viewed as a bridge between Information Technology (IT) and

Business.

Note: The components that make up BPMS are found in the application area

"Business Process Management Tools". For the purposes of the ART we have

taken this approach as while BPMS is a recognised application system or suite

the components can be found in many other applications as core building

blocks for those applications.

Document Version 1.0 Page 27 of 80

A1.13 Business Transformation

and Improvement

Software and or services that supports business transformation. Business

transformation is about making fundamental changes in how business is

conducted. Business improvement is about making evolutionary changes, and

includes the practice of Business Process Improvement (BPI). This application

area covers the software tools to manage both transformation and

improvement.

Business transformation is achieved by realigning the way staff work, how the

organisation is structured and how technology is used. Typically organisations

go through several stages in transforming themselves:

- Recognising the need to change and gaining consensus amongst stakeholders

that dramatic change is necessary.

- Agreeing what form the change should take the objectives of the change and

a vision that describes a better future.

- Understanding what the organisation is changing from and what needs to

change in detail.

- Designing the new organisational way of working and its support and

management.

- Testing and implementing changes, usually in waves, typically over a number

of years.

- Bedding in the change so that the organisation cannot move back to how it

was and achieves the intended benefits.

Business Process Improvement is a systematic approach to help an organisation

optimize its underlying processes to achieve more efficient results.

A1.13.01 Business Change

Management

Software and or services that support Change Management. Change

Management is the process, tools and techniques to manage the people-side of

change to achieve the required business outcome. It also incorporates the

organisational tools that can be utilised to help individuals make successful

personal transitions resulting in the adoption and realisation of change.

- Process: Planning for change, Managing change, Reinforcing change.

- Tools: Individual change model, Communications, Sponsorship, Coaching,

Training, Resistance management.

A1.13.02 Portfolio Management Software and or services that support the centralized management of

processes, methods, and technologies used by project managers and project

management offices to analyse and collectively manage current or proposed

projects based on numerous key characteristics.

A1.13.03 Programme

Management

Software and or services that support Program Management. Programme

Management is the process of managing several related projects. It provides

oversight of the purpose and status of the projects in a program and can use

this oversight to support project-level activity to ensure the program goals are

met by providing a decision-making capacity that cannot be achieved at project

level.

A1.13.04 Project Management Software and or services that provides capabilities for cost estimation and

planning, scheduling, cost control and budget management, resource

allocation, collaboration, communication, quality management and

documentation or administration systems, which are used to deal with the

complexity of large projects.

Project management is the application of knowledge, skills, tools and

techniques to project activities to meet project requirements.

Project management is accomplished through the application and integration

of the project management processes of initiating, planning, executing,

monitoring and controlling, and closing.

Document Version 1.0 Page 28 of 80

A1.13.05 Requirements

Management

Software and or services used to document, analyse, trace, prioritize and agree

on requirements for an initiative and communicate with the relevant

stakeholders.

Document Version 1.0 Page 29 of 80

Common Line of Business Applications

Note: Detailed diagrams are available as .png files, and this table is available as an Excel file.

Name Description

A2 Common Line of Business

Applications

These are standard business applications within government to support the

outward facing functions for managing touch-points with customers, partners

and anyone who interacts with government.

Note: The applications found in this domain can also be used as ICT services or

application components. Many commercial applications may contain elements

of applications listed here and specific software solutions may offer a mix of

these in one suite.

A2.01 Product and Service

Management

Software and or services that facilitate the creation and maintenance of

products and services.

A2.01.01 Product and Service

Lifecycle Management

These applications are used to manage the lifecycle of a product from idea

through to retiring a product. Features include: managing product

requirements, modelling products, providing detailed product specifications,

introducing new products, managing existing products, retiring products,

forecasting, and implement marketing and offer strategies.

A2.01.02 Product and Service

Catalogue Management

Product and Service Catalogue Management is the ability to create and

maintain products that can be offered to customers. More specifically, it is the

ability to explicitly model the structure of a product, then create and centrally

manage the instances (or “catalogue”) of products based upon that structure.

Products are not always discreet, single items. A product can be a number of

components associated together and sold as a single purchasable entity.

Therefore the product may be comprised of multiple components, tangible or

intangible, such as services, features, devices, etc., that are “assembled”

together to form a single sellable entity. Some of the components within a

product will be enabled by shared / common / reusable services (e.g., location

finder). Some of the components within a product will be enabled by shared /

common / reusable resources. These underlying services and resources may be

managed by different parts of the organisation.

A2.01.03 Product and Service

Performance Management

These applications are used to manage the performance of products and

services. Features include: campaign tracking, revenue reporting, cost

reporting, capacity analysis, cost management, inventory optimisation, and

sourcing determination.

A2.02 Marketing Software and or services to facilitate marketing and promotion of products and

services.

A2.02.01 Sales and Marketing

Management

Software and or services to manage promotions of a product or service and

capture of new business.

A2 Common Line of Business ApplicationsA2 Common Line of Business ApplicationsA2 Common Line of Business ApplicationsA2 Common Line of Business ApplicationsA2.03 Customer RelationshipA2.03 Customer RelationshipA2.03 Customer RelationshipA2.03 Customer RelationshipManagementManagementManagementManagementA2.01 Product and ServiceA2.01 Product and ServiceA2.01 Product and ServiceA2.01 Product and ServiceManagementManagementManagementManagement A2.04 Partner RelationshipA2.04 Partner RelationshipA2.04 Partner RelationshipA2.04 Partner RelationshipManagementManagementManagementManagementA2.08 Grants ManagementA2.08 Grants ManagementA2.08 Grants ManagementA2.08 Grants ManagementA2.07 Emergency ManagementA2.07 Emergency ManagementA2.07 Emergency ManagementA2.07 Emergency ManagementA2.06 Customer ServiceA2.06 Customer ServiceA2.06 Customer ServiceA2.06 Customer ServiceA2.05 Customer AccountingA2.05 Customer AccountingA2.05 Customer AccountingA2.05 Customer Accounting A2.02 MarketingA2.02 MarketingA2.02 MarketingA2.02 Marketing A2 Common Line of Business ApplicationsA2 Common Line of Business ApplicationsA2 Common Line of Business ApplicationsA2 Common Line of Business ApplicationsA2.06 Customer ServiceA2.06 Customer ServiceA2.06 Customer ServiceA2.06 Customer Service A2.03 Customer RelationshipA2.03 Customer RelationshipA2.03 Customer RelationshipA2.03 Customer RelationshipManagementManagementManagementManagementA2.05 Customer AccountingA2.05 Customer AccountingA2.05 Customer AccountingA2.05 Customer Accounting A2.02 MarketingA2.02 MarketingA2.02 MarketingA2.02 MarketingA2.01 Product and ServiceA2.01 Product and ServiceA2.01 Product and ServiceA2.01 Product and ServiceManagementManagementManagementManagement A2.04 Partner RelationshipA2.04 Partner RelationshipA2.04 Partner RelationshipA2.04 Partner RelationshipManagementManagementManagementManagementA2.08 Grants ManagementA2.08 Grants ManagementA2.08 Grants ManagementA2.08 Grants ManagementA2.07 Emergency ManagementA2.07 Emergency ManagementA2.07 Emergency ManagementA2.07 Emergency Management

Document Version 1.0 Page 30 of 80

A2.02.02 Brand Management Software and or services to support the application of a trade name to a

product or service as well as developing an awareness for the name

A2.02.03 Marketing Surveys Software and or services to support surveys to collect useful information from

an organisation's customers.

A2.02.04 Campaign

Management

Software and or services to manage the lifecycle of marketing campaigns.

Ideally this should leverage a single consistent view of the customer data. It

provides design, execution, analytics and refinement.

A2.03 Customer Relationship

Management

Software and or services to support customer relationship management (CRM).

Software used to plan, schedule, and control the activities between the

customer and the enterprise, both before and after a product or service is

offered.

A2.03.01 Customer Contact and

Profile Management

Software and or services to provide a comprehensive view of all customer

interactions, including calls, e-mail, correspondence and meetings; also

provides for the maintenance of a customer’s account, business and personal

information. It can automatically synchronize suitable appointment dates,

times, and methods for customer contact.

A2.03.02 Customer Order and

Registration Management

Software and or services to support customer order and registration that

allows order creation and tracking.

A2.03.03 Customer Account

Management

Software and or services to support the retention and delivery of a service or

product to an organisation's clients.

A2.03.04 Customer Self

Management

Software and or services to support customer self-management that can

include:

- Browsing the product and services catalogue.

- Viewing product and services eligibility.

- Shopping cart driven order management.

- Reporting problems and troubleshooting.

- Setting preferences, alerts and notifications.

- Access to guidelines and tutorials.

- Access to Call center agents.

- Account management.

- Self registration to online services.

- Service requests management.

- Service request submission.

- Service request amendment.

- Service request closure.

A2.03.05 Customer Problem

Management

Software and or services to support customer problem management that

allows problem qualification & reception.

A2.03.06 Customer Analytics Software and or services that supports the analysis of an agency’s customers,

customer experiences, as well as the scoring of third-party information as it

relates to customers. This also includes handling comments and feedback from

customers.

Document Version 1.0 Page 31 of 80

A2.04 Partner Relationship

Management

Software and or services that supports the effective collaboration between an

organisation and its business partners, providers, particularly members of the

distribution chain (e.g. channel and alliance partners, resellers, agents, brokers

and dealers) and other third parties that support operations and service

delivery to an organisation’s customers; includes performance evaluation of

partners, if necessary.

This becomes increasingly important as government products and services are

delivered through non-agency channels.

A2.04.01 Partner Contract and

SLA Management

Software and or services that support partner contract and SLA management

including features such as: issue reception, collection, analysis, violation

management, and reporting.

A2.04.02 Partner Account

Management

Software and or services that support the retention and delivery of a service or

product to an agency's partners.

A2.04.03 Partner Contact and

Profile Management

Software and or services that provides a comprehensive view of all partner

interactions, including calls, e-mail, correspondence and meetings; also

provides for the maintenance of a customer’s account, business and

organisational information.

A2.04.04 Partner Problem

Management

Software and or services that support partner problem qualification &

reception features such as: ID validation, reception of problems from various

sources, problem triage, and access to a complete partner problem history

database... It also includes problem lifecycle management, problem resolution,

problem reporting.

A2.04.05 Partner Analytics Software and or services for the analysis of an agency's partners, partner

collaboration, partner engagement, as well as the scoring of partner

information. This also includes handling comments and feedback from

partners.

A2.05 Customer Accounting Software and or services for financial interactions with the customers of

Government, business and individuals.

A2.05.01 Customer Financial

Account Management

Software and or services that support financial account management for

customer financial transactions with the agency.

A2.05.02 Customer Invoicing

and Statement Management

Software and or services that support the management of customer invoices

and statements produced by the agency.

A2.05.03 Customer Collections Software and or services that is concerned with financial transactions which

include receipts and payments from / to Customers.

A2.05.04 Customer Debts and

Recovery

Software and or services that handles customer debts and recovery.

A2.06 Customer Service Software and or services that supports activities associated with providing an

agency’s customers with information regarding the agency’s service offerings

and managing the interactions and relationships with those customers.

These tools can also be used by partners involved in providing service to

customers.

A2.06.01 Contact Centre / Help

Desk

Software and or services that support activities associated with providing an

agency’s customers with information regarding the agency’s service offerings

and managing the interactions and relationships with those customers.

Document Version 1.0 Page 32 of 80

A2.06.02 Contact Centre

Management

Software and or services that support Contact Centre Management. Contact

Centre Management handles telephone sales and/or service to the end

customers. Application services include; contact centre workforce management

(including virtual operators that may work outside the call centre), queue

management (including call backs where customer choose to be called back

rather than wait, and automatic call distributing queuing (ACDQ), quality

monitoring, analysis, and reporting.

A2.06.03 Contact Centre

Knowledge Base

Software and or services that support a Contact Centre Knowledge base. This

provides instant, reliable answers to agents, for example process guides,

product guides, frequently asked questions, escalation etc. Includes; search,

ability to collaborate with other departments, and reporting on knowledge

base usage.

A2.06.04 Case Management Software and or services that support the management of the life cycle of a

particular claim or investigation within an agency to include creating, routing,

tracing, assignment and closing of a case as well as collaboration among case

handlers.

Note: The terms case management is fairly generic, and we can find specific

instances of case management for example order management, problem

management, grant management etc.

A2.06.05 Online Interactive

Assistance

Software and or services that provide an electronic interface for customers

receive assistance from customer service personnel.

A2.06.06 Online Guidelines Software and or services that provide an electronic interface to educate and

assist customers.

A2.06.07 Translation Software Software and or services that supports or enables translation functionality. This

does not include software for other purposes that can be used in multiple

languages. Also known as multi-lingual support.

A2.06.08 Payment Systems Software and or services that support the use of credit cards or electronic

funds transfer for payment and collection of products or services. Examples:

PayPal, cash, Bitcoin, etc. Also known as point of sale systems (POS).

A2.07 Emergency Management Software that supports delivery of emergency management services.

A2.07.01 Emergency

Management Information

System (EMIS)

Software that supports emergency management information collection and

management. For continuity and inter-operability between emergency

management stakeholders, EMIS supports an infrastructure that integrates

emergency plans at all levels of government and non-government involvement

for all four phases of emergencies.

Common features of the software include Geographic Information Systems

(GIS), weather and plume modelling, resource management, and Command,

Control, and Communication (C3) functions.

A2.07.02 Hospital Incident

Command System (HICS)

A Hospital Incident Command System (HICS) is an incident command system

(ICS) designed for hospitals and intended for use in both emergency and non-

emergency situations. It provides hospitals of all sizes with tools needed to

advance their emergency preparedness and response capability—both

individually and as members of the broader response community.

Document Version 1.0 Page 33 of 80

A2.07.03 Emergency

Communications System (ECS)

An Emergency Communication System (ECS) is any system (typically, computer-

based) that is organised for the primary purpose of supporting one-way and

two-way communication of emergency messages between both individuals and

groups of individuals. These systems are commonly designed to integrate the

cross-communication of messages between varieties of communication

technologies, forming a unified communication system intended to optimize

communications during emergencies.

A2.08 Grants Management Software that supports grants management, where a grant of money is made

to an organisation or individual for a specific purpose.

A2.08.01 Grant Receipt of

Proposals

Portal for the receipt of grant proposals.

A2.08.02 Grant Administration Software that supports the administration and monitoring of grants.

A2.08.03 Grant Review Software that supports the review process for grants.

A2.08.04 Grant Announcement Portal that posts and publishes announcements of grants to be funded.

Document Version 1.0 Page 34 of 80

End User Computing

Note: Detailed diagrams are available as .png files, and this table is available as an Excel file.

Name Description

A3 End User Computing The End User Computing application domain brings together the various

applications and ICT services needed to support a range of end user computing

devices, from traditional PC's through to smart phones and tablets and

personalisation services.

A3.01 End User Device

Management

Software and or services that controls the hardware and software

environments, as well as documents of end users (individuals and or

organisations).

Note: Security aspects are covered under "Security Services".

A3.01.01 Application

Compatibility Testing

Tool to automate the analysis of applications to determine compatibility with

device operating systems.

A3.01.02 Application

Deployment

Mechanism to install packaged applications to workstations and other end user

devices running locally installed applications. See also "Packaging Tools".

A3.01.03 Application Discovery Application Discovery is a tool that can be used to discover which applications

are being used within an agency. Discovery tools may be agent-less or require

agents and may use a variety of means to discover applications.

A3.01.04 OS Deployment The OS Deployment tools are used to deploy (patched) operating system

images. See also "Packaging Tools".

A3.01.05 Packaging Tools Tools or solution set for packaging applications for delivery to an end user

device. See also" OS Deployment" and "Application Deployment".

A3.01.06 Patch Manager Tools to automatically remediate manage installation of and report on

operating system and application software patches. The applicability of this

functional component is mainly focussed on fat device desktop and fat device

laptop.

A3.01.07 Persona Manager Persona Manager tools maintain information relevant to a particular user

(settings, preferences, and configuration) and determine how it is managed

across devices and contexts.

A3 End User ComputingA3 End User ComputingA3 End User ComputingA3 End User ComputingA3.05 Graphics and MultimediaA3.05 Graphics and MultimediaA3.05 Graphics and MultimediaA3.05 Graphics and Multimedia A3.04 Productivity SuiteA3.04 Productivity SuiteA3.04 Productivity SuiteA3.04 Productivity SuiteA3.02 End User ToolsA3.02 End User ToolsA3.02 End User ToolsA3.02 End User Tools A3.03 Mobile ApplicationsA3.03 Mobile ApplicationsA3.03 Mobile ApplicationsA3.03 Mobile ApplicationsA3.01 End User Device ManagementA3.01 End User Device ManagementA3.01 End User Device ManagementA3.01 End User Device Management A3 End User ComputingA3 End User ComputingA3 End User ComputingA3 End User ComputingA3.05 Graphics and MultimediaA3.05 Graphics and MultimediaA3.05 Graphics and MultimediaA3.05 Graphics and Multimedia A3.04 Productivity SuiteA3.04 Productivity SuiteA3.04 Productivity SuiteA3.04 Productivity SuiteA3.02 End User ToolsA3.02 End User ToolsA3.02 End User ToolsA3.02 End User Tools A3.03 Mobile ApplicationsA3.03 Mobile ApplicationsA3.03 Mobile ApplicationsA3.03 Mobile ApplicationsA3.01 End User Device ManagementA3.01 End User Device ManagementA3.01 End User Device ManagementA3.01 End User Device Management

Document Version 1.0 Page 35 of 80

A3.01.08 Policy Compliance

Manager

Policy Compliance Manager tools monitor configuration against policy for

compliance and initiates action if the configuration does not comply with the

relevant policy.

Note: Policy Compliance Manager, Policy Manager and Security Configuration

Manager are often, though not always, implemented using the same software

technology.

A3.01.09 Policy Manager Tools to manage deployment and enforcement of policy on the configuration

and settings of devices and their operating systems. NB: Policy Compliance

Manager, Policy Manager and Security Configuration Manager are often,

though not always, implemented using the same software technology.

A3.01.10 Security Configuration

Manager

Tools to manage, report on and enforce required security configuration of

client devices. NB: Policy Compliance Manager, Policy Manager and Security

Configuration Manager are often, though not always, implemented using the

same software technology.

A3.01.11 Self Service

Application Store

A Self-Service App Store allows users to self-select, and automatically provision

applications onto their devices. This may include workflow functionality to

allow for line-management approval or to control expenditure, license

consumption and financial approval.

A3.01.12 User Data Manager User Data Manager tools provide access to users’ files regardless of their

environment. This functional building block does NOT guarantee off-line

access, but may deliver that as an additional feature.

A3.01.13 Virtualisation

Compatibility Testing

Tool to automate the analysis of applications to determine compatibility with

application virtualisation. Note: these tools are often implemented in

combination with Application Compatibility Testing.

A3.01.14 Virtual Desktop

Manager

Virtual Desktop Manager tools manage the allocation and configuration of

virtual desktops and virtual desktop pools to PC's and other end user devices.

A3.01.15 Privacy and Policy

Enforcement Management

Tools to manage, report on and enforce required privacy and policy

configuration of client devices.

A3.01.99 Other End User

Configuration Management

Other End User Configuration Management tools.

A3.02 End User Tools End User Tools consists of all of the utility applications that are available for use

by the users of the Standard Operating Environment (SOE). There will be a

variance of the utilities required between devices. In addition, some operating

systems deliver these capabilities as part of the operating system’s native

capabilities. Therefore care needs to be taken not to merely provide a utility

because it is in this list, but instead to ensure that these capabilities are

delivered by the complete SOE while minimising the number of utilities

delivered as separate applications.

Note: Productivity, Mobile Applications, Unified Communications and

Collaboration, and Visualisation have specific application areas and are not

include here.

A3.02.01 Additional Language

Support

Software and or services that support additional languages. This gives the use

the ability to enter, display and spell-check additional languages as required.

Māori should be installed as a default.

Document Version 1.0 Page 36 of 80

A3.02.02 Audio Tools Audio Tools are required to adjust and tune audio components installed in the

devices. There are some tools resident in the OS, but advanced functionality

can be gained from using the native tools that are provided with the audio

components.

A3.02.03 File Compression and

Extraction

File compression software and or services. File Compression is the capability to

compress files for storage or transit and extract files that have been

compressed. There are formats that are commonly used such as ZIP, which

require an additional software component or could be supported natively in

the Operating System being run.

A3.02.04 File Screen Saver An application that displays an image on and end user device display after a

pre-set time to hide applications and the information they display when

running on that device to minimise the opportunity for unauthorised access.

Screen Savers include the ability to auto-lock a device.

A3.02.05 Display Tools Display Tools are required to attach additional monitors / projectors and to

change resolution states etc. Some display tools are resident in the OS, but

advanced functionality can be gained by using the native tools that are

provided with the display adapter.

A3.02.06 Legacy Browser

Support

Legacy Browser Support services provide the ability to display web applications

that require legacy browsers, for example some applications require Internet

Explorer 6 proprietary extensions.

A3.02.07 PDF Reader PDF Reader is the software required to read PDF files. This is a basic tool that

does not allow editing of the PDF file. This software is subject to regular version

updates which can be problematic for users and cause issues in locked down

environments. Because of this, the software is a perfect candidate for

Application Virtualisation technology.

A3.02.08 Power Management

Tools

Power Management Tools allow changes to be made to the power scheme on

the device. This can reduce the energy consumption on the device or ensure

power saving doesn't affect expected operation. As an example, users would

turn off hibernation if they were going to be doing a presentation. Power

settings have the potential to save an organisation a substantial amount of

money, when the savings per device are multiplied by the number of devices

installed.

A3.02.09 Runtime Environment Runtime Environments (also known as Development frameworks) such as a

Java runtime environment or .NET are required to allow applications or applets

based on those frameworks to execute. Incompatibility issues can arise when

different versions of the frameworks are required on a single device. This can

be resolved using Application Virtualisation Client and its associated backend

technologies, as each virtual bubble forms an isolation barrier.

A3.02.10 Web Application

Frameworks

Web Application Frameworks are required to run web application components

developed in that framework. Examples of these frameworks are Adobe Flash

and Air or Microsoft Silverlight.

A3.02.11 Web Browser Web Browser provides the interface to all web based content, be it on the

Internet or Intranet. Often the delivery of web applications is underestimated

because of a perception that it’s simply browser based. Web applications often

require additional applets or plug-ins for the application to work or to be

displayed for the visually impaired. These factors need to be considered to

ensure usability and security is not compromised.

Document Version 1.0 Page 37 of 80

A3.02.12 Secure Remote Access Solution providing secure access from outside the boundaries of the agency to

a user’s end user computing environment. Enables authorised individuals to

remotely access the user interface of a computing resource for the purpose of

installation, configuration, auditing or process management.

A3.02.99 Other End User Tools Other end user tools without a defined application category.

A3.03 Mobile Applications Mobile applications are deployed on mobile devices such as smart phones and

tablets.

A3.04 Productivity Suite Productivity Suite is the core suite of bundled applications that support the

most commonly used office activities such as; Word processor, Spreadsheet,

Email clients, Presentation software, Drawing tools, Publishing software, and

Database application.

A3.04.01 Image Manipulation Software used to create or edit images. Includes: vector and raster drawings,

colour manipulation, image filtering, etc.

A3.04.02 Email Clients Email Clients also known as Mail User Agents - MUA.

A3.04.03 Presentation Software used to display information, normally in the form of a slide show.

A3.04.04 Publishing Software used to publishing.

A3.04.05 Spreadsheet Software used to create, update and/or read a two-dimensional matrix of rows

and columns.

A3.04.06 Word Processing Software used for the composition, editing, formatting and/or possibly printing

of print material.

A3.04.07 Follow-me Printing A service for sending documents to a print queue that can be accessed by any

networked printer when the user authenticates with that printer.

A3.04.99 Other Productivity

Suite

Other Productivity Suite software that does not have an existing application

category.

A3.05 Graphics and Multimedia Software and or services that supports visualisation.

A3.05.01 Charting Software to develop graphical representation of data in which the data is

represented by symbols such as bars, lines, slices, dots, size, etc.

A3.05.02 Computer Aided

Design (CAD)

Software that supports the use of computer technology for the process of

design and design-documentation and includes software or environments

which provide the user with input-tools for the purpose of streamlining design

processes; drafting, documentation, and manufacturing processes.

A3.05.04 Idea Mapping Software that is used to create diagrams of relationships between concepts,

ideas or other pieces of information.

A3.05.05 Multimedia Software to manage, develop and manipulate content from a combination of

different content forms such as text, audio, still images, animation, video, or

interactivity.

A3.05.06 Photographic Software that supports the capture, storage, and manipulation of photographic

images.

Document Version 1.0 Page 38 of 80

A3.05.07 Video Editors Software that enables a person to manipulate animated or video visual images

on a computer.

A3.05.99 Other Visualisation

Applications

Other visualisation software that does not have an existing application

category.

Document Version 1.0 Page 39 of 80

Data and Information Management Services

Note: Detailed diagrams are available as .png files, and this table is available as an Excel file.

Name Description

A4 Data and Information

Management Services

Software and or services that support management of government data and

information and the alignment with standards, quality initiatives, good practice

accessibility, etc. This includes the development, execution and supervision of

plans, policies, programmes and practices that control, protect, deliver and

enhance the value of data and information assets.

A4.01 Data and Information

Architecture

Software and or services that support data and information architecture which

is composed of models, policies, rules or standards that govern which data is

collected, and how it is stored, arranged, integrated, and put to use in data

systems and in organisations. Data and Information is one of the architecture

dimensions that form the pillars of an enterprise architecture or solution

architecture

A4.01.01 Data and Information

Categorisation

Software and or services that supports the creation and maintenance of

relationships between data entities, naming standards and categorisation and

allows classification of data and information into specific layers or types to

support an organisation.

A4.01.02 Data and Information

Modelling

Software and or services to support data and information modelling to define

and analyse data requirements needed to support the business.

A4.01.03 Data Representation

Languages

Software languages used for data representation, such as XML, JSOW, SDL,

GSML and other markup languages.

A4.01.04 Metadata

Management

Software that supports the maintenance and administration of data that

describes data.

A4.02 Data and Information

Interoperability

Software and services that support data and information interoperability.

Interoperability is the ability of making systems and organisations work

together (inter-operate) to allow for information exchange,

A4.02.01 Data and Information

Catalogue

Software and or services that support the cataloguing of data and information

assets.

A4.02.02 Data Extraction,

Transformation and Loading

Software that supports the extraction of data from a data source, the

manipulation and change of data to a different format and the population of

data destination with the transformed data.

A4 Data and Information Management ServicesA4 Data and Information Management ServicesA4 Data and Information Management ServicesA4 Data and Information Management ServicesA4.02 Data and InformationA4.02 Data and InformationA4.02 Data and InformationA4.02 Data and InformationInteroperabilityInteroperabilityInteroperabilityInteroperability A4.08 Geospatial InformationA4.08 Geospatial InformationA4.08 Geospatial InformationA4.08 Geospatial InformationA4.07 Additional Data and InformationA4.07 Additional Data and InformationA4.07 Additional Data and InformationA4.07 Additional Data and InformationServicesServicesServicesServices A4.04 Data Quality ManagementA4.04 Data Quality ManagementA4.04 Data Quality ManagementA4.04 Data Quality ManagementA4.03 Data and Records GovernanceA4.03 Data and Records GovernanceA4.03 Data and Records GovernanceA4.03 Data and Records GovernanceA4.01 Data and InformationA4.01 Data and InformationA4.01 Data and InformationA4.01 Data and InformationArchitectureArchitectureArchitectureArchitectureA4.05 Data ProtectionA4.05 Data ProtectionA4.05 Data ProtectionA4.05 Data Protection A4.06 Database ManagementA4.06 Database ManagementA4.06 Database ManagementA4.06 Database ManagementA4.09 Content Management SystemA4.09 Content Management SystemA4.09 Content Management SystemA4.09 Content Management SystemA4 Data and Information Management ServicesA4 Data and Information Management ServicesA4 Data and Information Management ServicesA4 Data and Information Management ServicesA4.07 Additional Data and InformationA4.07 Additional Data and InformationA4.07 Additional Data and InformationA4.07 Additional Data and InformationServicesServicesServicesServices A4.04 Data Quality ManagementA4.04 Data Quality ManagementA4.04 Data Quality ManagementA4.04 Data Quality ManagementA4.02 Data and InformationA4.02 Data and InformationA4.02 Data and InformationA4.02 Data and InformationInteroperabilityInteroperabilityInteroperabilityInteroperability A4.08 Geospatial InformationA4.08 Geospatial InformationA4.08 Geospatial InformationA4.08 Geospatial InformationA4.03 Data and Records GovernanceA4.03 Data and Records GovernanceA4.03 Data and Records GovernanceA4.03 Data and Records GovernanceA4.01 Data and InformationA4.01 Data and InformationA4.01 Data and InformationA4.01 Data and InformationArchitectureArchitectureArchitectureArchitectureA4.05 Data ProtectionA4.05 Data ProtectionA4.05 Data ProtectionA4.05 Data Protection A4.06 Database ManagementA4.06 Database ManagementA4.06 Database ManagementA4.06 Database ManagementA4.09 Content Management SystemA4.09 Content Management SystemA4.09 Content Management SystemA4.09 Content Management System

Document Version 1.0 Page 40 of 80

A4.02.03 Data Integration and

Exchange

Software services that enable elements of distributed business applications to

interoperate and the software development necessary to facilitate such

integration. These elements can share function, content, and communications

across heterogeneous computing environments. Includes data import and

export between systems and or services.

A4.02.04 Data Mapping Software that supports the process of creating data element mappings

between two distinct data models. Data mapping is used as a first step for a

wide variety of data integration tasks.

A4.02.05 Metadata Extraction Software and or services that support metadata extraction. It includes:

- Automatically extracts preservation-related metadata from digital files.

- Output metadata in a standard format (XML) for use in preservation activities.

Can be used for preservation data processes and activities, resource discovery

and other.

A4.02.06 Records Linking /

Association

Software and or services that support the correlation between logical data and

information sets.

A4.03 Data and Records

Governance

Software and or services that supports data and records governance. Data

governance encompasses the people, processes, and information technology

required to create a consistent and proper handling of an organisation's data

across the business enterprise. It is a set of processes that ensures that

important data assets are formally managed throughout the enterprise. Data

governance ensures that data can be trusted and that people can be made

accountable for any adverse event that happens because of low data quality. It

is about putting people in charge of fixing and preventing issues with data so

that the enterprise can become more efficient. Data governance also describes

an evolutionary process for a company, altering the company’s way of thinking

and setting up the processes to handle information so that it may be utilised by

the entire organisation. It’s about using technology when necessary in many

forms to help aid the process.

Note: Note: In New Zealand (Australia and Canada) we have a view that

something is inherently a record because it provides evidence of a transaction;

therefore almost all content including data and documents are also records.

However most software has been developed to support the US model where

records only becomes records only after someone or some process has

formally declared them to be a record.

Note: "Data Quality Management" can be part of "Data Governance".

A4.03.01 Data Lifecycle

Management

Software and or services that support a policy-based approach to managing the

flow of an information system's data throughout its life cycle: from creation

and initial storage to the time when it becomes obsolete and is deleted.

A4.03.02 Master Data

Management

Software and or services that supports a set of processes and tools that

consistently define and manage the non-transactional data entities of an

organisation, which may include reference data. It has the objective of

providing processes for collecting, aggregating, matching, consolidating,

quality-assuring, and distributing such data throughout an organisation to

ensure consistency and control in the ongoing maintenance and application use

of this information.

Document Version 1.0 Page 41 of 80

A4.03.03 Records Disposal Software and or services that supports the process of records disposal. In

records management there are five possible disposal outcomes under the NZ

Public Records Act 2005 Subsection 20:

- Destruction.

- Transfer to another government agency.

- Transfer to Archives NZ for long term preservation and availability.

- Discharge to another entity, e.g. another government department.

- Sale.

Disposal supports these steps:

> Step 1 - A record becomes inactive because a passive or active trigger:

- No person or mechanism is continuing to alter it – we observe the lack of

activity, and after a period of time we conclude that it is inactive.

- A later version has been created and/or a record has been superseded and

this record should No longer be in current use.

- In some cases a person or mechanism closes/finalises the record to prevent

any further changes to the content and to some attributes.

> Step 2 - The record is retained for a period of time after last alteration. This

period could be seconds (keep the sent data packet until recipient

acknowledges receipt) through to decades.

> Step 3 - The record disposal action occurs – destruction or transfer to an

archival authority, discharge.

A4.03.03.01 Records Transfer to Chief

Archivist

Software and or services that support the transfer of control of the record to

the chief archivist. This may, or may not, involve transfer of the actual records.

Note: In records management the term 'archival' is not a proxy for storage.

A4.03.03.02 Records Destruction Software and or services that supports the destruction of records.

A4.03.03.03 Records Discharge Software and or services that supports the discharge of records.

A4.03.03.04 Records Transfer Software and or services that support the transfer of the control of records

from one government agency to another. This may, or may not, involve

transfer of the actual records.

A4.03.03.05 Records Sale Software and or services that support the sale of the records from a

government agency to a buyer.

A4.03.04 Controlled Vocabulary Software and or services that provides a way to organize knowledge for

subsequent retrieval. They are used in subject indexing schemes, subject

headings, thesauri, taxonomies and other forms of knowledge organisation

systems. Controlled vocabulary schemes mandate the use of predefined,

authorised terms that have been preselected by the designer of the vocabulary,

in contrast to natural language vocabularies, where there is no restriction on

the vocabulary.

A4.04 Data Quality

Management

Software and or services to ensure that data are fit for their intended uses in

operations, decision making and planning and to ensure internal consistency of

the data.

A4.04.01 Data Cleansing Software and or services that support the cleaning of data and information.

Cleansing can including merging data, removing duplicates, identifying

authoritative sources, fixing data entry errors, marking suspect records.

A4.04.02 Data Enrichment Software and or services that support data enrichment. Data enrichment is a

general term that refers to processes used to enhance, refine or otherwise

improve raw data. This idea and other similar concepts contribute to making

data a valuable asset for almost any modern business or organisation.

Document Version 1.0 Page 42 of 80

A4.04.03 Data Integrity Software and or services that support data integrity. Data integrity refers to

maintaining and assuring the accuracy and consistency of data over its entire

life-cycle, and is a critical aspect to the design, implementation and usage of

any system which stores, processes, or retrieves data.

A4.04.04 Data Quality

Assurance

Software and or services that support data quality assurance. Data quality

assurance is the process of profiling the data to discover inconsistencies and

other anomalies in the data, as well as performing data cleansing activities (e.g.

removing outliers, missing data interpolation) to improve the data quality.

These activities can be undertaken as part of data warehousing or as part of the

database administration of an existing piece of applications software.

A4.05 Data Protection Software and or services that support data security and protection.

Note: Other aspects of data security are covered under the application domain

"Security Services".

A4.05.01 Data Access Levels Software and or services that support adding access levels to data entities,

attributes and record level content.

A4.05.02 Data Archiving Software and or services that support data archiving. Data archiving is the

process of moving data that is no longer actively used to a separate data

storage device for long-term retention. Data archives consist of older data that

is still important and necessary for future reference, as well as data that must

be retained for regulatory compliance. Data archives are indexed and have

search capabilities so that files and parts of files can be easily located and

retrieved.

Note: Data archives are often confused with data backups, which are copies of

data. Data backups are used to restore data in case it is corrupted or destroyed.

In contrast, data archives protect older information that is not needed for

everyday operations but may occasionally need to be accessed.

A4.05.03 Data Erasure Software and or services that support data erasure (also called data clearing or

data wiping) is a software-based method of overwriting the data that aims to

completely destroy all electronic data residing on a hard disk drive or other

digital media. Permanent data erasure goes beyond basic file deletion

commands, which only remove direct pointers to the data disk sectors and

make the data recovery possible with common software tools. Unlike

degaussing and physical destruction, which render the storage media unusable,

data erasure removes all information while leaving the disk operable,

preserving IT assets and the environment. New flash memory–based media

implementations, such as solid-state drives or USB flash drives can cause data

erasure techniques to fail allowing remnant data to be recoverable.

A4.05.04 Data Masking Software and or services that support the masking of data entities at attribute

and record level to support privacy of information such as a credit card

number, passwords, and for the creating of test data.

A4.05.05 Data Replication Software and or services that support the replication of data so that data is not

lost in the event of a failure of the storage hardware. This is related to but

different from backup and restore.

A4.06 Database Management Software and or services that support database management.

Document Version 1.0 Page 43 of 80

A4.06.01 Database

Management System (DBMS)

Database management systems (DBMSs) are computer software applications

that interact with the user, other applications, and the database itself to

capture and analyse data. A general-purpose DBMS is designed to allow the

definition, creation, querying, update, and administration of databases.

Note: Database Management System covers database, administration, tuning,

backup, recovery, upgrades, etc.

A4.06.02 Database

Administration

Registering and monitoring users, enforcing data security, monitoring

performance, maintaining data integrity, dealing with concurrency control, and

recovering information if the system fails.

A4.06.03 Database Backup and

Recovery

Software and or services that creates copies of databases which may be used to

restore the original after a data loss event or to restore and stabilize data sets

to a consistent, desired state.

A4.06.04 Database Tuning Database maintenance includes software tools and or services to monitor,

tune, upgrade, migrate and optimise databases. It also includes tablespace

maintenance.

A4.07 Additional Data and

Information Services

Software and or services that supports data and information services.

Note: "Enterprise Content Management" is in the "Corporate Applications"

domain. "Data Mining" and "Data Profiling" are covered in the "Business

Intelligence and Analytics" in area A1.

A4.07.01 Auto Categorisation Auto Categorisation is an approach to use technology to automatically

determine what a piece of electronic content is and how to address it. In the

context of records management, auto categorisation can be helpful in two

areas: determining whether a piece of content is a record or not and then

assigning that record to its logical spot in the classification scheme.

The technology analyses the record to determine what it is and where it goes.

In most cases this analysis is based on the content of the record itself. For a

record that contains text-type information, such as Microsoft Word, email,

PDFs, project files, and others, the text can be analysed. For records that are

images, some solutions can use character recognition technologies like OCR

and barcodes to extract meaning from the image and analyse that.

For other types of content, and even for some of these types as well in some

systems, the application analyses the metadata of the record. For email this

might include date sent and address of the sender, while for a Word document

it might include the title of the document or its author. Even the file format

itself could provide initial analysis; for an engineering firm, for example, the

mere fact that a document is a CAD drawing or a .dwg file could be enough to

start the classification process (though it would almost certainly not end there).

A4.07.02 Digital Rights

Management

Software and or services that support the claim and ownership of intellectual

capital and artefacts belonging to an organisation.

A4.07.03 Digital Conversion Software that supports scanning and the interpretation into digital formats.

Depending on the reason for an image being scanned there may be special

requirements as to the quality of the image. For example scanning a tax invoice

does not need to be high quality whereas LINZ scanning a map for a record of a

property needs to have a very high quality image. Includes 3D scanning of

objects.

Document Version 1.0 Page 44 of 80

A4.07.04 Enterprise Search Software and or services that support the search information within an

enterprise (though the search function and its results may still be public).

Enterprise search can be contrasted with web search, which applies search

technology to documents on the open web, and desktop search, which applies

search technology to the content on a single computer.

Enterprise search systems index data and documents from a variety of sources

such as: file systems, intranets, document management systems, e-mail, and

databases. Many enterprise search systems integrate structured and

unstructured data in their collections. Enterprise search systems also use

access controls to enforce a security policy on their users.

A4.07.05 Optical Character

Recognition (OCR)

Software that supports scanning and the interpretation of images into digital

formats. Depending on the reason for an image being scanned there may be

special requirements as to the quality of the image. For example scanning a tax

invoice does not need to be high quality whereas LINZ scanning a map for a

record of a property needs to have a very high quality image. Includes 3D

scanning of objects.

A4.07.06 Data and Information

Analytics

Software and or services to support text, voice, video, sound analytics. This

involves information retrieval, lexical analysis to study word frequency

distributions, pattern recognition, tagging/annotation, information extraction,

data mining techniques including link and association analysis, visualisation,

and predictive analytics. The overarching goal is, essentially, to turn text, voice,

video, sound into data for analysis, via application of natural language

processing (NLP) and analytical methods.

A4.07.07 Version Control Software and or services to support version control. Most commonly run as

stand-alone applications, but revision control is also embedded in various types

of software such as word processors and spreadsheets.

Note: It is also covered by the "Content Control" application category within

the "Content Management" application area and in various content

management systems.

A4.07.99 Other Data and

Information Services

Other Data and Information Services without a defined application category.

A4.08 Geospatial Information Software and or services that supports geospatial information. Geospatial

information is information describing the location and names of features

beneath, on or above the earth's surface.

A4.08.01 Cartography Software that supports the creation of maps. Includes hydrography.

A4.08.02 Collection and

Manipulation of Satellite and

Aerial Photographs

Software which supports the modification or analysis of imagery information.

A4.08.03 Geometric Networks Software that supports modelling of common networks and infrastructures

found in the real world. Water distribution, electrical lines, gas pipelines,

telephone services, and water flow in a stream are all examples of resource

flows that can be modelled and analysed using a geometric network.

A4.08.04 Geocoding (Forward

Geocoding)

Software that supports Geocoding. This is sometimes called forward geocoding

and is the process of enriching a description of a location, most typically a

postal address or place name, with geographic coordinates from spatial

reference data such as building polygons, land parcels, street addresses, ZIP

codes (postal codes) and so on. Geocoding facilitates spatial analysis using

Geographic Information Systems and Enterprise Location Intelligence systems.

Document Version 1.0 Page 45 of 80

A4.08.05 Geospatial Data

Analysis

Supports the application of statistical analysis and other informational

techniques to geographically based data. Also known as Geostatistics.

A4.08.06 Geospatial Data

Collection

Software that supports the collection or management of geospatial

information. Includes hydrographic data collection

A4.08.07 Hydrological

Modelling

Software that supports Hydrologic modelling. They are primarily used for

hydrologic prediction and for understanding hydrologic processes.

A4.08.08 Imagery Software that supports the collection of information via satellite and aerial

photography.

A4.08.09 Reverse Geocoding Software that supports Reverse Geocoding. Reverse geocoding is the process of

enriching geographic coordinates with a description of the location, most

typically a postal address or place name.

A4.08.10 Spatial Data

Infrastructure

Software that supports linking online spatial data and allowing it to be

discovered, accessed and used.

A4.08.11 Topological Modelling Software that supports modelling utilising the topological properties of spatial

objects. Topology is one of the mechanisms to describe relationships between

spatial objects. Thus, it is the basis for many spatial operations.

A4.08.12 Spatial Data Modelling Software that supports modelling of spatial data. This includes:

- Vector data representation as discrete points, lines, and polygons.

- Raster data representation of landscapes as a rectangular matrix of square

cells.

- Projections

- Tiling.

It supports the Geo Service Standards.

A4.09 Content Management

System

Software used to track, store and retrieve content. It is usually capable of

keeping track of the different versions created by different users (history

tracking).

A4.09.01 Content

Categorisation

Software and or services that support the categorisation of content, both

electronic and physical, and artefacts using metadata for aggregation,

A4.09.02 Content Control Software and or services that support the control of content and artefacts used

by an organisation and its stakeholders. Content control is used to put in place

defined processes around the development, publication and

withdrawal/retirement of documents.

A4.09.03 Content Library On line repository of content, documents, letters, speeches, web sites, books,

or articles to be shared.

A4.09.04 Content Publishing Software and or services that supports the collection, managing, and publishing

of information in any form or medium, including intranet, internet, etc. When

stored and accessed via computers, this information has come to be referred

to, simply, as content or, to be precise, digital content. Digital content may take

the form of text (such as electronic documents), multimedia files (such as audio

or video files), or any other file type that follows a content lifecycle requiring

management.

Document Version 1.0 Page 46 of 80

A4.09.05 Content Workflow Software and or services that supports routing documents (or pages) between

users responsible for working on them. This is often used to implement a

review and sign-off process for new or updated content.

Workflow is the management of who exactly is working on a ContentElement

or ContentTemplate, what exactly they are doing, and when. The workflow

reporting system sends messages to others working on a page, with details of

actions taken.

Different workers can have assigned roles. Notification may be sent to the roles

rather than the individuals.

Typical roles are writers, copy editors, editors, illustrators, graphic artists, rights

clearance managers, lawyers, (multilingual) localizers, and publishers.

Note: This is specialised workflow software. Generic workflow software and

services can be found in the ICT Service Components domain.

Document Version 1.0 Page 47 of 80

Identity and Access Management Services

Note: Detailed diagrams are available as .png files, and this table is available as an Excel file.

Name Description

A5 Identity and Access

Management Services

Software and services to support Identity and access management (IAM),

identifying, controlling and auditing interactions with government assets. This

enables the security discipline of authorised access to the right resources at the

right times for the right reasons.

A5.01 Identity Governance and

Accountability

Software and or services at which entities create, monitor, and enforce rules,

guidelines, and requirements for executing the IDESG functional elements

across communities or actors. Unlike the administration and operations layer,

the governance and accountability layer is specifically intended to address

cross entity efforts rather than enterprise or internal governance.

A5.01.01 Policy / Rule /

Requirements Development

Software and or services for creating a trust framework including identifying or

adopting rules, requirements, and policy for governing the use of identities and

identity technology within a specific community.

A5.01.02 Identity Accreditation Software and or services for the evaluation, approval and formal recognition

that an entity is capable of carrying out certification or assessment activities for

a trust framework.

A5.01.03 Identity Certification Software and or services for the evaluation, approval and formal recognition

that an entity is capable of carrying out certification or assessment activities for

a trust framework of assessing, validating, and determining that a product or

service provider meets the defined requirements of a trust framework.

A5.01.04 Identity Reporting Software and or services to support identity performance reporting; such as

revocation lists, user accounts list, incidents, recovery, redress etc.

A5.01.05 Role / Persona

Engineering & Modelling

Software and or services to support modelling of personas and roles within an

organisation.

A5.01.06 Separation of Duties

(SoD) Compliance

Software and or services to enforce separation of duties for tasks where

additional fail safes are required or advisable to prevent loss due to fraud or

mistake.

A5.01.07 Identity Conformance Software and or services to support the process of reviewing and collecting

evidence of an entity’s conformance with enterprise rules, policies, and

requirements.

A5.02 Identity Administration

and Operations

Software and or services to administer and support the basic operations and

functions that may occur in online identity-related interactions — grouped into

core operations. Not all elements will be invoked in every identity interaction,

and some may be invoked multiple times. While logically some functions are

likely to occur before or after others, there is no explicit order specified in the

model.

A5 Identity and Access Management ServicesA5 Identity and Access Management ServicesA5 Identity and Access Management ServicesA5 Identity and Access Management Services A5.04 Authorisation and AccessA5.04 Authorisation and AccessA5.04 Authorisation and AccessA5.04 Authorisation and AccessManagement ServiceManagement ServiceManagement ServiceManagement ServiceA5.05 Directory ServiceA5.05 Directory ServiceA5.05 Directory ServiceA5.05 Directory Service A5.03 Authentication ServiceA5.03 Authentication ServiceA5.03 Authentication ServiceA5.03 Authentication ServiceA5.02 Identity Administration andA5.02 Identity Administration andA5.02 Identity Administration andA5.02 Identity Administration andOperationsOperationsOperationsOperations A5.07 Identity InteroperabilityA5.07 Identity InteroperabilityA5.07 Identity InteroperabilityA5.07 Identity InteroperabilityA5.01 Identity Governance andA5.01 Identity Governance andA5.01 Identity Governance andA5.01 Identity Governance andAccountabilityAccountabilityAccountabilityAccountability A5.99 Other Identity ServiceA5.99 Other Identity ServiceA5.99 Other Identity ServiceA5.99 Other Identity ServiceA5.06 Identity Functional CoreA5.06 Identity Functional CoreA5.06 Identity Functional CoreA5.06 Identity Functional CoreComponentsComponentsComponentsComponents A5 Identity and Access Management ServicesA5 Identity and Access Management ServicesA5 Identity and Access Management ServicesA5 Identity and Access Management Services A5.04 Authorisation and AccessA5.04 Authorisation and AccessA5.04 Authorisation and AccessA5.04 Authorisation and AccessManagement ServiceManagement ServiceManagement ServiceManagement ServiceA5.03 Authentication ServiceA5.03 Authentication ServiceA5.03 Authentication ServiceA5.03 Authentication ServiceA5.06 Identity Functional CoreA5.06 Identity Functional CoreA5.06 Identity Functional CoreA5.06 Identity Functional CoreComponentsComponentsComponentsComponents A5.99 Other Identity ServiceA5.99 Other Identity ServiceA5.99 Other Identity ServiceA5.99 Other Identity ServiceA5.02 Identity Administration andA5.02 Identity Administration andA5.02 Identity Administration andA5.02 Identity Administration andOperationsOperationsOperationsOperations A5.07 Identity InteroperabilityA5.07 Identity InteroperabilityA5.07 Identity InteroperabilityA5.07 Identity InteroperabilityA5.01 Identity Governance andA5.01 Identity Governance andA5.01 Identity Governance andA5.01 Identity Governance andAccountabilityAccountabilityAccountabilityAccountabilityA5.05 Directory ServiceA5.05 Directory ServiceA5.05 Directory ServiceA5.05 Directory Service

Document Version 1.0 Page 48 of 80

A5.02.01 Role Management Software and or services providing centralised or federated role management

function to a single set of organisations and services regardless of geographic

location.

A5.02.02 Identity Workflow

Design and Implementation

Software and or services to design and implement workflow solutions to

Identity & Access Management requirements.

A5.02.03 Identity Provisioning Software and or services supporting the provisioning of approved identities and

access controls such as the creation of accounts on target enterprise

applications in response to a user profile.

A5.02.04 Identity Updates

(Periodic & Event Based)

Software and or services by which an entity updates accounts, attributes,

credentials, and other identity information to determine eligibility for an

entitlement; may be periodic in nature or event based (e.g., marriage, end of

subscription, etc.), including revocation.

A5.02.05 Identity Recovery Software and or services to support identity recovery; this includes the

continuity of credentials, attributes, and other identity services following a

security or privacy event (e.g., data breach, disruption of services, etc.) All

ecosystem participants are responsible for executing recovery activities.

A5.02.06 Identity Redress Software and or service that support reconciliation of errors that occur during

the operations and processes of an identity system. All ecosystem participants

must execute redress activities.

A5.02.07 Identity Assurance Software and or services to determine, with some level of certainty, that a

claim to a particular identity by some entity can be trusted to be the claimant's

"true" identity.

A5.02.08 Identity Entitlement &

Access Audit

Software and or services to enable an organisation to certify users, and support

the process of reviewing and collecting evidence of an entity’s conformance

with the rules, policies, and requirements for a trust framework or community.

This is essentially an audit of the entitlements that personnel hold to ensure

they do not have entitlements that they should not hold.

A5.03 Authentication Service Software and or services used to confirm the identity of a user.

A5.03.01 Adaptive

Authentication

Software and or service that support a risk based approach to authentication

where the complexity of the authentication "challenge" is determined by the

risk of the transaction. Factors considered in determining the risk include the

profile of the user, connection type, IP geolocation and keystroke dynamics)

A5.03.02 Authentication

Brokerage

Software and or service that support centralised responsibility for

authenticating the consumer and issuing them with a credential that can be

used to access services.

A5.03.03 Multi-factor

Authentication

Software and or service that supports multi-factor authentication that requires

the presentation of two or more of the three authentication factors, being the

knowledge factor (something the user "knows), the possession factor

(something the user "has") and the inherence factor (something the user "is").

A5.03.04 Out of Band

Authentication

Software and or service that supports authentication performed over a

network or channel separate from the primary network or channel - used in

multi-factor authentication. An example of this is sending users a one-time

password via their cell phone, which is required to complete the authentication

process.

Document Version 1.0 Page 49 of 80

A5.03.05 Biometrics Software and or service that supports biometrics; biometric identifiers are the

distinctive, measurable characteristics used to label and describe individuals.

Biometric authentication is used as a form of identification and access control.

It is also used to identify individuals in groups that are under surveillance.

Biometric identifiers are often categorised as physiological versus behavioural

characteristics.

- Physiological characteristics are related to the shape of the body. Examples

include, but are not limited to fingerprint, palm veins, face recognition, DNA,

palm print, hand geometry, iris recognition, retina and odour/scent.

- Behavioural characteristics are related to the pattern of behaviour of a

person, including but not limited to typing rhythm, gait, and voice.

A5.03.06 Simple Key

Management Protocol (SKIP)

Software and or services that support Simple Key Management Protocol (SKIP)

- a protocol developed by Sun Microsystems to handle key management across

IP networks and VPNs. (http://www.networksorcery.com/enp/rfc/rfc2356.txt)

A5.03.07 Web Services Security

(WS Security)

Software and or services that support Web Services Security (WS Security);

describes enhancements to SOAP (Simple Object Access Protocol) messaging to

provide message integrity, message confidentiality and single message

authentication.

A5.04 Authorisation and Access

Management Service

Software and or services to provide authorised access management to

resources.

A5.04.01 Enterprise SSO SSO = Single Sign On.

Software and or services to store and transmit encrypted user credentials

across local and network boundaries, including domain boundaries. SSO stores

the credentials in the credential database. Because SSO provides a generic

single sign on solution, middleware applications and custom adapters can take

advantage of SSO to securely store and transmit user credentials across the

environment. End users do not have to remember different credentials for

different applications.

A5.04.02 Federation Service Software and or services to maintain the relationship between identity

providers and service providers whereby authentication is performed by the

identity provider and is then used by service providers to make authorisation

decisions.

A5.04.03 Access Control Software and or services to support provisioning of user access rights based on

their assumed roles or attributes.

A5.04.04 Web Access

Management

Software and or services to control access to web resources, providing

authentication management, policy based authorisations, and reporting

services.

A5.04.05 Web SSO SSO = Single Sign On.

Software and or services to support users to access resources over the internet

using a single set of user credentials. The user provides a set of credentials to

log onto different web sites that belong to different organisations.

A5.04.06 Delegation Service Software and or services to support a delegation service, such as where

consent is provided for legal or financial liable transactional activities.

Document Version 1.0 Page 50 of 80

A5.05 Directory Service Software and or services that store, organize and provide access to information

held within a directory, which can be considered a map between ‘objects’ and

information about those objects, typically described as ‘attributes’. Attributes

of objects can be made secure so that only users with the available permissions

are able to access it.

Examples of directory services include Active Directory, Open LDAP, e-Directory

and other implementations of the X.500 ISO/IEC 9594 directory services

standards.

A5.06 Identity Functional Core

Components

Software and or services that provide the basic identity operations that may

occur in online identity-related interactions — grouped into core operations.

Not all elements will be invoked in every identity interaction, and some may be

invoked multiple times. While logically some functions are likely to occur

before or after others, there is no explicit order specified in the model.

A5.06.01 Registration

Components

Components that support the process that establishes a digital identity for the

purpose of issuing or associating a credential.

A5.06.01.01 Identity Application Supports process by which an entity or agent requests initiation of registration.

A5.06.01.02 Registration Attribute

Control

Supports process of managing and releasing attributes for the purposes of

registration.

A5.06.01.03 Registration Attribute

Verification Supports process of confirming or denying that claimed identity attributes are

correct and meet the pre-determined requirements for accuracy, assurance,

etc.

A5.06.01.04 Registration Decision Supports decision that an entity does or does not meet the pre-determined

eligibility requirements for a digital identity or credential.

A5.06.02 Credentialing

Components

Components that support the process to bind an established digital identity

with a credential.

A5.06.02.01 Credential Provisioning Supports process by which ownership of a credential is conferred, confirmed,

or associated with a digital identity.

A5.06.02.02 Token Binding Supports process of binding a physical or electronic token to a credential.

A5.06.02.03 Attribute Binding Supports process of binding attributes to a credential.

A5.06.02.04 Identity Revocation Supports process by which an issuing authority renders a digital identity, issued

credential, token, or verified attribute invalid for authentication or

authorisation.

A5.06.03 Authentication

Components

Components that support the process determining the validity of one or more

credentials used to claim a digital identity.

A5.06.03.01 Authentication Request Supports process by which authentication is initiated by an entity.

A5.06.03.02 Credential Presentation Supports process by which an entity submits a credential for the purposes of

authentication.

A5.06.03.03 Credential Validation Supports process of establishing the validity of the presented credential.

A5.06.03.04 Authentication Decision Supports decision to accept or not accept the results of the credential

validation process.

Document Version 1.0 Page 51 of 80

A5.06.04 Authorisation

Components

Components that support the process of granting or denying specific requests

for access to resources.

A5.06.04.01 Authorisation Request Supports process by which authorisation is initiated by an entity.

A5.06.04.02 Authorisation Attribute

Control

Supports process of managing and releasing attributes for the purposes

authorisation.

A5.06.04.03 Authorisation Attribute

Verification

Supports process of confirming or denying that claimed attributes are correct

and meet the pre-determined requirements for authorisation; typically, these

attributes for authorisation have not been bound to the credential or

previously available to the organisation making the authorisation decision.

A5.06.04.04 Authorisation Decision Supports decision to grant and deny access to a resource based on the results

of the authorisation processes and policies.

A5.06.05 Transaction

Intermediation

Processes and procedures that limit linkages between transactions and

facilitate credential portability.

A5.06.05.01 Identity Blinding Support process by which service providers involved in a transaction are

prevented from observing each other (i.e., a relying party does not know which

credential service provider an entity is utilizing in a transaction or vice versa).

Based upon the transaction type and the number of service providers involved,

blinding may be done to prevent a single, multiple, or all transactional partners

from viewing the other participating services.

A5.06.05.02 Identity Pseduonymisation Supports process by which an intermediary prevents service providers from

linking a digital identity with a particular person or entity.

A5.06.05.03 Transaction Consent Supports process by which consent is granted to an intermediary, such as in

conducting liability transactions (Land Online, Lawyers, Accountants etc.), or

sharing personal information.

A5.07 Identity Interoperability Software and services to support processes and procedures that limit linkages

between transactions and facilitate credential portability. This allows entities in

the identity ecosystem establish and maintain the ability to communicate and

exchange identity data.

A5.07.01 Identity Mapping Software and or service to support the mapping of different identities on

various platforms, user repositories and applications to a single identity. It can

be used with a range of authentication mechanisms to allow one repository to

authenticate the user and for this to be passed to another platform for

authorisation even when the identities differ.

A5.07.02 Identity Credential

Exchange

Software and or service to support the process of facilitating technical

(including semantic) interoperability to support credential portability between

participants within a specific community or across the identity ecosystem.

A5.07.03 Identity Policy / Rule

Exchange

Software and or service to exchange policy and rules for governing the use of

identities and identity technology.

A5.07.04 Identity Translation Software and or service by which one identity format is translated to another

for consumption by different entities involved in a transaction.

Document Version 1.0 Page 52 of 80

A5.07.05 Security Assertion

Markup Language (SAML)

Software and or services that support Security Assertion Markup Language

(SAML) - an XML-based framework for exchanging security information

expressed in the form of assertions about subjects, where a subject is an entity

(either human or computer) that has an identity in some security domain.

SAML is expected to play a key role in the federal-wide e-Authentication

initiative and is supported by both the Liberty Alliance and WS Security.

A5.99 Other Identity Service Other identity service and or software without a specific application area or

application category.

Document Version 1.0 Page 53 of 80

Security Services

Note: Detailed diagrams are available as .png files, and this table is available as an Excel file.

Name Description

A6 Security Services The Security Services domain defines the methods of protecting information

and information systems from unauthorised access, use, disclosure, disruption,

modification or destruction in order to provide integrity, confidentiality and

availability. That is, protecting the assets at rest and in-transit.

A6.01 Encryption Services Software and or services that ensure network protection and information

assurance through encryption and decryption. Defines the methods of

protecting information and information systems from unauthorised access,

use, disclosure, disruption, modification, or destruction in order to provide

integrity, confidentiality and availability. Biometrics, two-factor identification,

encryption, and technologies based on the NIST FIPS-140 standards are

particular areas of focus.

A6.01.01 Crypto Key

Management

Software and or services that support Crypto Key Management (CKM) or Key

Variable Management (KVM) which includes all of the activities involved in the

handling of cryptographic keys during the entire life cycle of the keys, in

accordance with an agreed security policy. These can be used in addition to

certificates and digital signatures.

A6.01.02 Drive Encryption Encryption of data stored on local drives or encryption of the complete local

drive for thick clients.

A6.01.03 Information

Encryption

Software and or services to protect the information that is exchanged across

organisations networks, and/or externally with other organisations. Includes

protection of information at rest, particularly in Cloud architecture. Includes

products used to apply cryptographic protection to a data set, file or drive.

A6.01.04 Network Encryption Software and or services used to apply crypto services at the network transfer

layer.

A6.01.05 Removable media

encryption

Software that provides device encryption for portable storage devices.

A6.02 Network Security Service Software and or service to support security requirements in and across ICT

networks.

Note: Network Encryption is covered under the Encryption Services.

A6.02.01 Infrastructure Guard Connect networks of different security policy and usage areas to control traffic

flow in-between the networks following a set of predefined rules for

Infrastructure Services.

A6.02.02 Internet Protocol

Security (IPSec)

Software and or services that support Internet Protocol Security (IPSec).

A6 Security ServicesA6 Security ServicesA6 Security ServicesA6 Security Services A6.04 Security ControlsA6.04 Security ControlsA6.04 Security ControlsA6.04 Security ControlsA6.01 Encryption ServicesA6.01 Encryption ServicesA6.01 Encryption ServicesA6.01 Encryption Services A6.02 Network Security ServiceA6.02 Network Security ServiceA6.02 Network Security ServiceA6.02 Network Security ServiceA6.06 Enterprise Security ManagementA6.06 Enterprise Security ManagementA6.06 Enterprise Security ManagementA6.06 Enterprise Security Management A6.03 Public Key Infrastructure (PKI)A6.03 Public Key Infrastructure (PKI)A6.03 Public Key Infrastructure (PKI)A6.03 Public Key Infrastructure (PKI)ServicesServicesServicesServicesA6.05 Digital ForensicsA6.05 Digital ForensicsA6.05 Digital ForensicsA6.05 Digital Forensics A6 Security ServicesA6 Security ServicesA6 Security ServicesA6 Security Services A6.04 Security ControlsA6.04 Security ControlsA6.04 Security ControlsA6.04 Security ControlsA6.06 Enterprise Security ManagementA6.06 Enterprise Security ManagementA6.06 Enterprise Security ManagementA6.06 Enterprise Security ManagementA6.01 Encryption ServicesA6.01 Encryption ServicesA6.01 Encryption ServicesA6.01 Encryption Services A6.02 Network Security ServiceA6.02 Network Security ServiceA6.02 Network Security ServiceA6.02 Network Security Service A6.03 Public Key Infrastructure (PKI)A6.03 Public Key Infrastructure (PKI)A6.03 Public Key Infrastructure (PKI)A6.03 Public Key Infrastructure (PKI)ServicesServicesServicesServicesA6.05 Digital ForensicsA6.05 Digital ForensicsA6.05 Digital ForensicsA6.05 Digital Forensics

Document Version 1.0 Page 54 of 80

A6.02.03 Network Access

Control

Software and or services that provides the configuration of devices connecting

to the network based on endpoint security (such as OS patch level, antivirus

updates, host IPS, etc.) user and system authentication and network security

enforcement. The NAC will protect the network by preventing non-compliant

clients from accessing the network at the IP-level. In case of non-compliance a

remote user will be redirected to a network quarantine segment where the

client can be updated to the level of required compliancy. Includes VLAN

assignment.

A6.02.04 Secure Multipurpose

Internet Mail Extensions

(S/MIME)

Software and or services that support Secure Multipurpose Internet Mail

Extensions (S/MIME); provides a consistent way to send and receive secure

MIME data. Based on the Internet MIME standard, S/MIME provides

cryptographic security services for electronic messaging applications:

authentication, message integrity and non-repudiation of origin (using digital

signatures) and data confidentiality (using encryption). S/MIME is not restricted

to mail: it can be used with any transport mechanism that transports MIME

data, such as HTTP.

A6.02.05 Secure Sockets Layer

(SSL)

Software and or services that support Secure Sockets Layer (SSL); an open, non-

proprietary protocol for securing data communications across computer

networks. SSL is sandwiched between the application protocol (such as HTTP,

Telnet, FTP and NNTP) and the connection protocol (such as TCP/IP, UDP). SSL

provides server authentication, message integrity, data encryption and optional

client authentication for TCP/IP connections.

A6.02.06 Secure Shell (SSH) Software and or services that support Secure Shell (SSH); a strong method of

performing client authentication. Because it supports authentication,

compression, confidentiality and integrity, SSH is used frequently on the

Internet. SSH has two important components: RSA certificate exchange for

authentication and Triple DES for session encryption.

A6.02.07 Transport Layer

Security (TLS)

Software and or services that support the Transport Layer Security (TLS)

standard for the next generation SSL. TLS provides communications privacy

over the Internet. The protocol allows client/server applications to

communicate in a way that is designed to prevent eavesdropping, tampering or

message forgery.

A6.03 Public Key Infrastructure

(PKI) Services

Software and or services that manage Public Key Infrastructure (PKI) that

includes policies and procedures needed to create, manage, distribute, use,

store, and revoke digital certificates.

A6.03.01 Digital Certificate

Management

Software and or services to manage and use certificates to secure access to

information.

A6.03.01.01 Client Authentication

(Personal Certificates) Software and or services to provide authentication of personal certificates for

client applications during the handshake in order to confirm their identity.

A6.03.01.02 Digital Certificate

Revocation

Software and or services to support the revocation of digital certificates.

A6.03.01.03 Digital Certificate Issuing Software and or services used by a certification authority (CA) to issue digital

certificates and secure access to information.

A6.03.01.04 Digital Certificate

Authentication Software and or services to support Digital Certificate Authentication;

authentication implementation for controlling access to network and Internet

resources through managing user identification. An electronic document

(digital certificate) is issued and used to prove identity and public key

ownership over the network or Internet.

Document Version 1.0 Page 55 of 80

A6.03.02 Digital Signature

Management

Software and or services that support Digital Signature Management that

specifies a digital signature algorithm (DSA) appropriate for applications

requiring a digital, rather than written, signature. The DSA authenticates the

integrity of the signed data and the identity of the signatory. The DSA may also

be used to prove that data was actually signed by the generator of the

signature.

Digital signatures can provide non-repudiation, meaning that the signer cannot

successfully claim they did not sign a message, while also claiming their private

key remains secret; further, some non-repudiation schemes offer a time stamp

for the digital signature, so that even if the private key is exposed, the

signature is valid.

A6.03.02.01 Document Signing Software and or services to create a digital signature for a document using such

data as account numbers, transaction amounts and timestamp. This is to

preserve data integrity and ensure authenticity, rendering any changes made

to a document after it has been electronically signed, and invalid. This

cryptographically binds an electronic identity to an electronic document.

A6.03.02.02 Time Stamping Service Software and or services to provide a trusted time stamping service. Digital

signatures can also provide non-repudiation; some non-repudiation schemes

offer a time stamp for the digital signature, so that even if the private key is

exposed, the signature is valid.

A6.03.02.03 Transaction Signing Software and or services to create a digital signature for a transaction using

such data as account numbers, transaction amounts and timestamp. This is to

preserve data integrity and ensure authenticity, rendering any changes made

to a transaction after it has been electronically signed, and invalid. This

cryptographically binds an electronic identity to an electronic transaction.

A6.03.05 Key Generation Software and or services to generate keys.

A6.04 Security Controls Software that supports security controls.

A6.04.01 Application

Whitelisting

Software and or services to only allow approved applications to run on user’s

device.

A6.04.02 Content Security

Control

Software used to control information content received or sent via web, email

or other means, between networks, organisations, or domains/zones

(especially over the Internet). Includes content filtering and application of

censorship or classification rules on material (files, documents).

A6.04.03 Decommissioning and

Disposal

Software and or services to support system decommissioning, media

sanitisation destruction and disposal.

A6.04.04 Device Port Manager Controls read & write access to external ports & portable storage devices (USB

devices at a minimum).

A6.04.05 Perimeter Protection Software and or service to securely control network access to and/or from a

device, or between network zones/domains includes host firewalls, gateways,

data diodes, cross domain solutions.

A6.04.06 Physical Access

Security Services

Software to regulate entry to facilities, turnstiles, gates, campuses, doors,

equipment rooms, racks, server and network devices, and cabling

infrastructure, etc.

Document Version 1.0 Page 56 of 80

A6.04.07 Radio Spectrum

Security Controls

Software to or services that protect information and assets implying RF

spectrum devices such as mobile phone jammers, electronic counter measures

(ECM) equipment, remote controlled improvised explosive devices (RCIED).

A6.04.08 Virus Protection Software used to prevent, detect, and remediate infection or self-replicating

programs that run and spread by modifying other programs, files or operating

systems of government computing assets. Anti-virus Tools provide protection

against viruses and other threats at the device level. Common components

that are included are real time, scheduled and manual scans.

A6.04.99 Other Security

Controls

Other security control software and or services that do not have a specific

application category.

A6.05 Digital Forensics Software or services that support the practice of gathering, retaining, and

analysing computer-related data for investigative purposes in a manner that

maintains the integrity of the data.

A6.05.01 Computer Forensics Software and or services that support computer forensics. Computer forensics

explains the current state of a digital artefact; such as a computer system,

storage medium or electronic document. The discipline usually covers

computers, embedded systems (digital devices with rudimentary computing

power and on-board memory) and static memory (such as USB pen drives).

Computer forensics can deal with a broad range of information; from logs (such

as internet history) through to the actual files on the drive.

A6.05.02 Mobile Device

Forensics

Software and or services that support mobile device forensics. Mobile device

forensics is a sub-branch of digital forensics relating to recovery of digital

evidence or data from a mobile device. It differs from Computer forensics in

that a mobile device will have an inbuilt communication system and proprietary

storage mechanisms.

Mobile devices are also useful for providing location information; either from

inbuilt gps/location tracking or via cell site logs, which track the devices within

their range.

A6.05.03 Network Forensics Software and or services that support network forensics. Network forensics

involves monitoring and analysis of computer network traffic, both local and

WAN/internet, for the purposes of information gathering, evidence collection,

or intrusion detection.

A6.05.04 Forensic Data Analysis Software and or services that support forensic data analysis. Forensic data

analysis examines structured data with the aim to discover and analyse

patterns of fraudulent activities resulting from financial crime.

A6.05.05 Database Forensics Software and or services that support database forensics. Database forensics is

a branch of digital forensics relating to the forensic study of databases and

their metadata. Investigations use database contents, log files and in-RAM data

to build a timeline or recover relevant information.

A6.06 Enterprise Security

Management

Software and or services that supports security management for an

organisation.

A6.06.01 Intrusion Prevention Software and or service to prevent unauthorised access to a government

network or information system.

Document Version 1.0 Page 57 of 80

A6.06.02 Intrusion Detection Software products that gather and analyse information from various areas

within a computer or a network to identify possible security breaches, which

include both intrusions (attacks from outside the organisations) and misuse

(attacks from within the organisations.)

Products that monitor network and/or system activities for malicious activities

or policy violations and produces reports to a Management Station. Some

services may attempt to stop an intrusion attempt but this is neither required

nor expected of a monitoring system. Intrusion detection and prevention

services are primarily focused on identifying possible incidents, logging

information about them, and reporting attempts. In addition, organisations use

them for other purposes, such as identifying problems with security policies,

documenting existing threats, and deterring individuals from violating security

policies.

A6.06.03 Security Audit Trail

and Capture

Software that supports the set of capabilities to support the identification and

monitoring of activities within an application, system, or network.

A6.06.04 Security Configuration

Manager

Software and or services to manage, report on and enforce required security

configuration of client devices. Also known as audit logging, where it describes

the set of capabilities to support the identification and monitoring of activities

within an application, system, or network.

A6.06.05 Security Incident

Management

Software that supports the set of capabilities to provide active response and

remediation to a security incident that has allowed unauthorised access to a

government information system. Covers the detection, reporting, and

resolution management of information security incidents.

A6.06.06 Security Intelligence

and Analysis

Software and or services that support security intelligence and analysis.

A6.06.07 Security Metrics Software and or services to support the key performance indicators measuring

effective security management such as event detection, incidents, and

vulnerabilities addressed.

A6.06.08 Security Reporting Software and or services to support reporting across incidents, intrusions,

threats etc. in order to track conformance of security services against

organisational security and privacy policy.

Document Version 1.0 Page 58 of 80

ICT Components, Services and Tools

Note: Detailed diagrams are available as .png files, and this table is available as an Excel file.

Name Description

A7 ICT Components, Services

and Tools

Software and services for operational management and maintenance of

applications, ICT components and services.

A7.01 Business Process

Management Tools

Software and or services that allows organisations to abstract business process

from technology infrastructure and support the managerial approach through

enabling technology, bridging organisational and technology silos.

A7.01.01 Business Activity

Monitoring (BAM)

Business activity monitoring (BAM) is Software and or services that aids in

monitoring of business activities, as those activities are implemented in

computer systems.

One of the most visible features of BAM solutions is the presentation of

information on dashboards that contain key performance indicators (KPIs) used

to provide assurance and visibility of activity and performance. This

information is used by technical and business operations to provide visibility,

measurement, and assurance of key business activities. It is also exploited by

event correlation to detect and warn of impending problems.

Although BAM systems usually use a computer dashboard display to present

data, BAM is distinct from the dashboards used by business intelligence (BI)

insofar as events are processed in real-time or near real-time and pushed to

the dashboard in BAM systems, whereas BI dashboards refresh at

predetermined intervals by polling or querying databases. Depending on the

refresh interval selected, BAM and BI dashboards can be similar or vary widely.

Note: Some BAM solutions additionally provide trouble notification functions,

which allow them to interact automatically with the trouble ticket system. For

example, whole groups of people can be sent e-mails, voice or text messages,

according to the nature of the problem. Automated problem solving, where

feasible, can correct and restart failed processes.

A7.01.02 Business Process

Modelling and Simulation

Process modelling tools provide business users with the ability to model their

business processes, implement and execute those models, and refine the

models based on as-executed data. As a result, business process modelling

tools can provide transparency into business processes, as well as the

centralisation of corporate business process models and execution metrics.

Process Modelling and simulation functionality allows for pre-execution “what-

if” modelling and simulation. Post-execution optimisation is available based on

the analysis of actual as-performed metrics.

A7.01.03 Business Process

Engine (BPE)

A business process engine (BPE) is a software framework that enables the

execution and maintenance of process workflows. It provides business process

interaction and communication between different data/process sources spread

across one or more IT applications and services. BPE automates linking

processes and their activities in an enterprise IT environment.

A7 ICT Components, Services and ToolsA7 ICT Components, Services and ToolsA7 ICT Components, Services and ToolsA7 ICT Components, Services and ToolsA7.02 ICT ComponentsA7.02 ICT ComponentsA7.02 ICT ComponentsA7.02 ICT Components A7.03 ICT Development EnvironmentA7.03 ICT Development EnvironmentA7.03 ICT Development EnvironmentA7.03 ICT Development Environmentand Toolsand Toolsand Toolsand ToolsA7.01 Business Process ManagementA7.01 Business Process ManagementA7.01 Business Process ManagementA7.01 Business Process ManagementToolsToolsToolsTools A7.04 ICT Management ToolsA7.04 ICT Management ToolsA7.04 ICT Management ToolsA7.04 ICT Management ToolsA7.06 Core ICT Operation ServicesA7.06 Core ICT Operation ServicesA7.06 Core ICT Operation ServicesA7.06 Core ICT Operation ServicesA7.05 Cloud ServicesA7.05 Cloud ServicesA7.05 Cloud ServicesA7.05 Cloud Services xA7.07 Host LayeringxA7.07 Host LayeringxA7.07 Host LayeringxA7.07 Host LayeringA7 ICT Components, Services and ToolsA7 ICT Components, Services and ToolsA7 ICT Components, Services and ToolsA7 ICT Components, Services and ToolsA7.02 ICT ComponentsA7.02 ICT ComponentsA7.02 ICT ComponentsA7.02 ICT ComponentsA7.05 Cloud ServicesA7.05 Cloud ServicesA7.05 Cloud ServicesA7.05 Cloud ServicesA7.01 Business Process ManagementA7.01 Business Process ManagementA7.01 Business Process ManagementA7.01 Business Process ManagementToolsToolsToolsTools A7.06 Core ICT Operation ServicesA7.06 Core ICT Operation ServicesA7.06 Core ICT Operation ServicesA7.06 Core ICT Operation Services A7.03 ICT Development EnvironmentA7.03 ICT Development EnvironmentA7.03 ICT Development EnvironmentA7.03 ICT Development Environmentand Toolsand Toolsand Toolsand Tools A7.04 ICT Management ToolsA7.04 ICT Management ToolsA7.04 ICT Management ToolsA7.04 ICT Management ToolsxA7.07 Host LayeringxA7.07 Host LayeringxA7.07 Host LayeringxA7.07 Host Layering

Document Version 1.0 Page 59 of 80

A7.01.04 Business Process

Monitoring

Business process monitoring tools provide real-time scrutiny of an activity or

set of activities that have been set up to accomplish a specific organisational

goal. As part of a larger business process management initiative, business

process monitoring enables an organisation to measure and analyse process

performance to identify critical process problems pro-actively, using data to

make decisions that will improve the speed, quality and efficiency of business

processes.

A7.01.05 Workflow Engine A workflow engine is a software application that defines a process, the rules

governing process decisions, and routes information. It is a key component in

workflow technology and typically makes use of a database server.

A workflow engine manages and monitors the state of activities in a workflow,

such as the processing and approval of a loan application form, and determines

which new activity to transition to according to defined processes (workflows).

The actions may be anything from saving an application form in a document

management system to sending a reminder e-mail to users or escalating

overdue items to management. A workflow engine facilitates the flow of

information, tasks, and events. Workflow engines may also be referred to as a

Workflow Orchestration Engines.

Workflow engines mainly have three functions:

- Verification of the current status: Check whether the command is valid in

executing a task.

- Determine the authority of users: Check if the current user is permitted to

execute the task.

- Executing condition script: After passing the previous two steps, workflow

engine begins to evaluate condition script in which two processes are carried

out, if the condition is true, workflow engine execute the task, and if execution

successfully complete, it returns the success, if not, it reports the error to

trigger and roll back the change.

A workflow engine is a core technique for task allocation software application,

such as BPM in which the workflow engine allocates task to different executors

with communicating data among participants. A workflow engine can execute

any arbitrary sequence of steps, for example, a healthcare data analysis.

A7.02 ICT Components ICT Components that can be used to make new business applications and

services or is used in business processes.

A7.02.01 Alerts Components that generate alerts based upon settings or rules.

A7.02.02 Inbound

Correspondence Component

Components to support externally initiated communication between an

organisation and its stakeholders.

A7.02.03 Notifications Component that sends a notification based upon an alert or rules.

A7.02.04 Outbound

Correspondence Component

Components to support internally initiated communication between an

organisation and its stakeholders.

A7.02.05 Personalisation Personalisation allows a user or customer to change preferences about user

interfaces / portals in terms of the way that data is displayed, levels of detail,

and even language.

A7.02.06 Rating Engine Component that rates atomic events or transactions based on upon rules

applied to data associated with the event or transaction. Rates can be event or

transaction specific, for example each lookup of a database cost $x.xx, or that

can use customer specific rates, so that each lookup of a database, for

customer xyz cost $x.xx.

Document Version 1.0 Page 60 of 80

A7.02.07 Storefront / Shopping

Cart

Component to support the online equivalent of the supermarket cart, where

orders and merchandise are placed.

A7.02.08 Subscriptions Allow users to subscribe and unsubscribe to a service.

A7.02.99 Other ICT

Components

Any other ICT Components for which there no applicable application category.

Note: Components may be found in a number of the application areas.

A7.03 ICT Development

Environment and Tools

Software and or services that forms development environments and related

tools.

A7.03.01 Development

Frameworks

Development frameworks such as a Java runtime environment or .NET are

required to allow applications or applets based on those frameworks to

execute. Incompatibility issues can arise when different versions of the

frameworks are required on a single device. This can be resolved using

Application Virtualisation Client and its associated backend technologies, as

each virtual bubble forms an isolation barrier.

A7.03.02 Development

Resource Libraries

A collection of resources used to develop software which may include pre-

written code and subroutines, classes, values or type specifications.

A7.03.03 Forms Management Software and or services that support the creation, modification, and usage of

physical or electronic documents used to capture information within the

business cycle.

A7.03.04 Integrated

Development Environment

Software and or services that provides comprehensive facilities to computer

programmers for software development.

A7.03.05 Mash-up Editor Software and or services that uses and combines data, presentation or

functionality from two or more sources to create new services. The main

characteristics of the mash-up are combination, visualisation, and aggregation.

A7.03.06 Software

Configuration Management

Software to track and control changes in the software including the

establishment of baselines and revision control.

A7.03.07 Software

Development Kit

Software development tools that allow for the creation of applications for a

certain software package, software framework, hardware platform, computer

system, video game console, operating system, or similar platform.

A7.03.08 Testing Tools Software and or services that support testing of infrastructure, software, and

services against requirements.

A7.03.08.01 Security Testing Tools Software and or service to support security testing, for example penetration

testing of web portals, networks, ICT assets.

A7.03.08.02 Test Automation Tools Software and or services that support automated testing of infrastructure,

software, and services against requirements.

A7.03.09 User Innovation

Toolkit

Software toolkit based on the idea that manufacturers possess the knowledge

of the solution possibilities, while the users possess the knowledge about

needs.

A7.03.10 Validation Tools Software tools that check web pages for accessibility and syntactical

correctness of code.

A7.03.99 Other Development

Environment and Tools

Any other development environment or tools without a suitable application

category.

Document Version 1.0 Page 61 of 80

A7.04 ICT Management Tools ICT Management tools support the day to day operations and management of

ICT. It includes tools enabling the ICT support organisation to quickly resolve or

escalate issues and problems, improve root cause isolation, and provide higher

levels of business user satisfaction. Using this business view, IT support

organisations manage incidents, problems and service requests throughout

their life cycles at a more efficient and effective rate.

A7.04.01 Fault Management Software and or services that detects, isolates, and corrects malfunctions in a

telecommunications network and compensates for environmental changes.

This includes maintaining and examining error logs, accepting and acting on

error detection notifications, tracing and identifying faults, carrying out

sequences of diagnostics tests, correcting faults, reporting error conditions,

and localizing and tracing faults by examining and manipulating database

information.

A7.04.02 ICT Configuration

Management Database (CMDB)

A configuration management database (CMDB) is a repository that acts as a

data warehouse for information technology (IT) organisations. Its contents are

intended to hold a collection of IT assets that are commonly referred to as

configuration items (CI), as well as descriptive relationships between such

assets. When populated, the repository becomes a means of understanding

how critical assets such as information systems are composed, what their

upstream sources or dependencies are, and what their downstream targets

are.

CMDBs are used to keep track of the state of different things that are normally

referred to as assets, such as products, systems, software, facilities, and people

as they exist at specific points in time, as well as the relationships between

such assets. The maintenance of such state related information allows for

things like the reconstruction of such assets, at any point in their existence, as

well as for things such as impact analysis, in the cases of root cause analysis or

change management.

A7.04.03 ICT Definitive Media

Library (DML)

A Definitive Media Library (DML) is a secure Information Technology repository

in which an organisation's definitive, authorised versions of software media are

stored and protected. Before an organisation releases any new or changed

application software into its operational environment, any such software

should be fully tested and quality assured. The Definitive Media Library

provides the storage area for software objects ready for deployment and

should only contain master copies of controlled software media Configuration

Items (CIs) that have passed appropriate quality assurance checks, typically

including both procured and bespoke application and gold build source code

and executables. In the context of the ITIL best practice framework, the term

Definitive Media Library supersedes the term Definitive Software Library

referred to prior to version ITIL v3. In conjunction with the Configuration

Management Database (CMDB), it effectively provides the DNA of the data

center i.e. all application and builds software media connected to the CMDB

record of installation and configuration.

The Definitive Media Library (DML) is a primary component of an organisation's

release and provisioning framework and service continuity plan.

A7.04.04 Monitoring Software and or services that continuously records performance, capacity use,

throughput of computer hardware or software and provides notification about

deviations from normal.

Note: This includes utilities that are deployed down to the infrastructure level

to monitor hardware performance and generate log files etc.

Document Version 1.0 Page 62 of 80

A7.04.05 Software Asset

Management

Software and or services that supports license management. Software asset

management (SAM) is a business practice that involves managing and

optimizing the purchase, deployment, maintenance, utilisation, and disposal of

software applications within an organisation.

The goals of SAM are to reduce information technology (IT) costs and limit

business and legal risk related to the ownership and use of software, while

maximizing IT responsiveness and end-user productivity.

Note: A software license manager is different from a software asset

management tool, which end-user organisations employ to manage the

software they have licensed from many software vendors.

A7.04.06 Software Distribution Software and or services that supports distribution of software, propagation,

installation and upgrade of written computer programs, applications and

components.

A7.04.07 Software License

Manager

A software license manager is a software management tool used by

Independent software vendors or by end-user organisations to control where

and how software products are able to run. License managers protect software

vendors from losses due to software piracy and enable end-user organisations

to comply with software license agreements. License managers enable

software vendors to offer a wide range of usage-centric software licensing

models, such as product activation, trial licenses, subscription licenses, feature-

based licenses, and floating licensing from the same software package they

provide to all users.

Note: A software license manager is different from a software asset

management tool, which end-user organisations employ to manage the

software they have licensed from many software vendors.

A7.04.08 ICT Diagnostic Tools Diagnostic tools to examine the state and configuration of ICT infrastructure,

network, and software applications.

A7.04.09 Network Management

Tools

Tools that pertain to the operation, administration, maintenance, and

provisioning of networked systems. Network management is essential to

command and control practices and is generally carried out of a network

operations center.

A7.04.99 Other ICT

Management Tools

Any other ICT Management Tools that do not have an application category.

A7.05 Cloud Services The Cloud Services area contains a range of ICT services that are provided

externally to the agency such as cloud service and XaaS (X as a Service).

A7.05.01 Cloud Computing

Services

Cloud computing services are large groups of remote servers networked to

allow the centralised data storage, and online access to computer services or

resources. Cloud computing services can support various "X as a Service"

models such SaaS, PaaS, IaaS, UCaaS.

A7.05.01.01 Community Cloud Community cloud shares infrastructure between several organisations from a

specific community with common concerns (security, compliance, jurisdiction,

etc.), whether managed internally or by a third-party, and either hosted

internally or externally. The costs are spread over fewer users than a public

cloud (but more than a private cloud), so only some of the cost savings

potential of cloud computing are realised.

Document Version 1.0 Page 63 of 80

A7.05.01.02 Hybrid Cloud Hybrid cloud is a composition of two or more clouds (private, community or

public) that remain distinct entities but are bound together, offering the

benefits of multiple deployment models. Hybrid cloud can also mean the ability

to connect collocation, managed and/or dedicated services with cloud

resources.

Gartner, Inc. defines a hybrid cloud service as a cloud computing service that is

composed of some combination of private, public and community cloud

services, from different service providers. A hybrid cloud service crosses

isolation and provider boundaries so that it can’t be simply put in one category

of private, public, or community cloud service. It allows one to extend either

the capacity or the capability of a cloud service, by aggregation, integration or

customisation with another cloud service.

A7.05.01.03 Personal Cloud Personal cloud is a collection of digital content and services which are

accessible from any device. The personal cloud is not a tangible entity. It is a

place which gives users the ability to store, synchronize, stream and share

content on a relative core, moving from one platform, screen and location to

another. Created on connected services and applications, it reflects and sets

consumers’ expectations for how next-generation computing services will

work.

The four primary types of personal cloud in use today are: Online cloud, NAS

device cloud, server device cloud, and home-made clouds.

A7.05.01.04 Private Cloud Private cloud is cloud infrastructure operated solely for a single organisation,

whether managed internally or by a third-party, and hosted either internally or

externally. Undertaking a private cloud project requires a significant level and

degree of engagement to virtualize the business environment, and requires the

organisation to re-evaluate decisions about existing resources. When done

right, it can improve business, but every step in the project raises security

issues that must be addressed to prevent serious vulnerabilities. Self-run data

centres are generally capital intensive. They have a significant physical

footprint, requiring allocations of space, hardware, and environmental

controls. These assets have to be refreshed periodically, resulting in additional

capital expenditures. They have attracted criticism because users "still have to

buy, build, and manage them" and thus do not benefit from less hands-on

management, essentially lacking the economic model that makes cloud

computing such an intriguing concept.

A7.05.01.05 Public Cloud A cloud is called a "public cloud" when the services are rendered over a

network that is open for public use. Public cloud services may be free or

offered on a pay-per-usage model. Technically there may be little or no

difference between public and private cloud architecture, however, security

consideration may be substantially different for services (applications, storage,

and other resources) that are made available by a service provider for a public

audience and when communication is effected over a non-trusted network.

Generally, public cloud service providers like Amazon AWS, Microsoft and

Google own and operate the infrastructure at their data centre and access is

generally via the Internet. AWS and Microsoft also offer direct connect services

called "AWS Direct Connect" and "Azure ExpressRoute" respectively, such

connections require customers to purchase or lease a private connection to a

peering point offered by the cloud provider.

Document Version 1.0 Page 64 of 80

A7.05.02 Infrastructure as a

Service (IaaS)

In the most basic cloud-service model & according to the IETF (Internet

Engineering Task Force), providers of IaaS offer computers – physical or (more

often) virtual machines – and other resources. (A hypervisor, such as Xen,

Oracle VirtualBox, KVM, VMware ESX/ESXi, or Hyper-V runs the virtual

machines as guests. Pools of hypervisors within the cloud operational support-

system can support large numbers of virtual machines and the ability to scale

services up and down according to customers' varying requirements.) IaaS

clouds often offer additional resources such as a virtual-machine disk image

library, raw block storage, and file or object storage, firewalls, load balancers,

IP addresses, virtual local area networks (VLANs), and software bundles.[49]

IaaS-cloud providers supply these resources on-demand from their large pools

installed in data centres. For wide-area connectivity, customers can use either

the Internet or carrier clouds (dedicated virtual private networks).

To deploy their applications, cloud users install operating-system images and

their application software on the cloud infrastructure. In this model, the cloud

user patches and maintains the operating systems and the application

software. Cloud providers typically bill IaaS services on a utility computing

basis: cost reflects the amount of resources allocated and consumed.

A7.05.03 Platform as a Service

(PaaS)

In the PaaS models, cloud providers deliver a computing platform, typically

including operating system, programming language execution environment,

database, and web server. Application developers can develop and run their

software solutions on a cloud platform without the cost and complexity of

buying and managing the underlying hardware and software layers. With some

PaaS offers like Microsoft Azure and Google App Engine, the underlying

computer and storage resources scale automatically to match application

demand so that the cloud user does not have to allocate resources manually.

The latter has also been proposed by an architecture aiming to facilitate real-

time in cloud environments.

A7.05.04 Software as a Service

(SaaS)

Software as a service (SaaS) is a software licensing and delivery model in which

software is licensed on a subscription basis and is centrally hosted. It is

sometimes referred to as "on-demand software". SaaS is typically accessed by

users using a thin client via a web browser. SaaS has become a common

delivery model for many business applications, including office & messaging

software, payroll processing software, DBMS software, management software,

CAD software, development software, accounting, collaboration, customer

relationship management (CRM), enterprise resource planning (ERP), invoicing,

human resource management (HRM), enterprise content management (ECM)

and service desk management.

Note: A New Zealand Government Common Capability is called Enterprise

Content Management as a Service (ECMS) and is an example of SaaS.

A7.05.05 Unified

Communications as a Service

(UCaaS)

In the UCaaS model, multi-platform communications over the network are

packaged by the service provider. The services could be in different devices,

such as computers and mobile devices. Services may include IP telephony,

unified messaging, video conferencing and mobile extension etc.

A7.05.99 Other ICT Services Any other ICT services which do not have an applicable application category.

A7.06 Core ICT Operation

Services

Services that support core ICT operations. This includes server configurations,

network operation services, file services, etc.

Document Version 1.0 Page 65 of 80

A7.06.01 Application Server In a three-tier environment, a separate computer (application server) performs

the business logic, although some part may still be handled by the user's

machine. After the popularity of the Web exploded in the mid-1990s,

application servers became Web-based.

An application server's function is dedicated to the efficient execution of

procedures (programs, routines, scripts) for supporting its applied applications.

It acts as a set of components accessible to the software developer through an

API defined by the platform itself.

A7.06.02 Communications

Server

Communications servers are open, standards-based computing systems that

operate as a carrier-grade common platform for a wide range of

communications applications and allow equipment providers to add value at

many levels of the system architecture.

A7.06.03 Compute / Simulation

Server

High performance servers used in simulation and modelling synthetic

environments such as gaming, defence, mining, and medical industries.

A7.06.04 Database Server Refers to a collection of information organised in such a way that a computer

program can quickly select desired pieces of data. A database management

system (DBMS) is a software application providing management,

administration, performance, and analysis tools for databases.

A7.06.05 File Server A file server is a computer attached to a network that has the primary purpose

of providing a location for shared disk access, i.e. shared storage of computer

files (such as documents, sound files, photographs, movies, images, databases,

etc.) that can be accessed by the workstations that are attached to the same

computer network.

A7.06.06 Mail Server A mail server is a computer that serves as an electronic post office for email.

Mail exchanged across networks is passed between mail servers that run

specially designed software. This software is built around agreed-upon,

standardised protocols for handling mail messages and any data files (such as

images, multimedia or documents) that might be attached to them.

A7.06.07 Management Server A centralised device that receives information from sensors or agents on

devices from around the network, allowing specialist personnel to analyse and

manage the performance of those devices via a management console.

A7.06.08 Media Server Provide optimised management of media-based files such as audio and video

streams and digital images.

A7.06.09 Name Server / DNS A name server is a computer hardware or software server that implements a

network service for providing responses to queries against a directory service.

It translates an often humanly-meaningful, text-based identifier to a system-

internal, often numeric identification or addressing component. This service is

performed by the server in response to a service protocol request.

An example of a name server is the server component of the Domain Name

System (DNS), one of the two principal name spaces of the Internet. The most

important function of DNS servers is the translation (resolution) of human-

memorable domain names and hostnames into the corresponding numeric

Internet Protocol (IP) addresses, the second principal name space of the

Internet which is used to identify and locate computer systems and resources

on the Internet.

A7.06.10 Portal Server Portals represent focus points for interaction, providing integration and single-

source corporate information.

Document Version 1.0 Page 66 of 80

A7.06.11 Print Server A print(er) server is a device that connects printers to client computers over a

network. It accepts print jobs from the computers and sends the jobs to the

appropriate printers, queuing the jobs locally to accommodate the fact that

work may arrive more quickly than the printer can actually handle it.

A7.06.12 Proxy Server A proxy server is a server (a computer system or an application) that acts as an

intermediary for requests from clients seeking resources from other servers. A

client connects to the proxy server, requesting some service, such as a file,

connection, web page, or other resource available from a different server and

the proxy server evaluates the request as a way to simplify and control its

complexity. Proxies were invented to add structure and encapsulation to

distributed systems. Today, most proxies are web proxies, facilitating access to

content on the World Wide Web and providing anonymity.

A7.06.13 Storage Server Storage devices are designed to provide shared storage access across a

network. These devices provide extended storage capabilities to the network

with reduced costs compared to traditional file servers.

A7.06.14 Web Server A computer that provides World Wide Web services on the Internet. It includes

the hardware, operating system, Web server software, TCP / IP protocols, and

the Web site content (Web pages). If the Web server is used internally and not

by the public, it may be known as an "intranet server."

A7.06.99 Other Server

Configurations

Other server applications types not defined.

A7.07 Business Rules

Management Tools

Software and or services that allows organisations to abstract and execute

business rules from technology infrastructure and support the managerial

approach through enabling technology, bridging organisational and technology

silos.

A7.07.01 Business Rules

Management System (BRMS)

A BRMS or Business Rule Management System is a software system used to

define, deploy, execute, monitor and maintain the variety and complexity of

decision logic that is used by operational systems within an organisation or

enterprise. This logic, also referred to as business rules, includes policies,

requirements, and conditional statements that are used to determine the

tactical actions that take place in applications and systems.

A BRMS includes, at minimum:

- A repository, allowing decision logic to be externalised from core application

code.

- Tools, allowing both technical developers and business experts to define and

manage decision logic.

- A runtime environment, allowing applications to invoke decision logic

managed within the BRMS and executes it using a business rules engine.

A7.07.02 Business Rules Engine A business rules engine is a software system that executes one or more

business rules in a runtime production environment. The rules might come

from legal regulation ("An employee can be fired for any reason or no reason

but not for an illegal reason"), company policy ("All customers that spend more

than $100 at one time will receive a 10% discount"), or other sources. A

business rule system enables these company policies and other operational

decisions to be defined, tested, executed and maintained separately from

application code. Rule engines typically support rules, facts, priority (score),

mutual exclusion, preconditions, and other functions.

Document Version 1.0 Page 67 of 80

Interfaces and Integration

Note: Detailed diagrams are available as .png files, and this table is available as an Excel file.

Name Description

A8 Interfaces and

Integration

The Interfaces and Integration application area refers to the collection of

software and services that support how agencies will interface and integrate

both internally and externally. This includes interfaces and integration with

back office / legacy assets as well as the use of gateways and portals as points

with which to integrate.

A8.01 Integration Defines the software services enabling elements of distributed business

applications to interoperate. In particular, service integration offers a set of

architecture services such as platform and service location transparency,

transaction management, basic messaging between two points, and

guaranteed message delivery.

A8.01.01 Services Integration In SOA compliant systems/services, provides the application functionality to

manage SOA-based integration, including the Services Registry.

A8.01.02 Enterprise Service Bus In SOA compliant systems/services, the software layer used for designing and

implementing the interaction and communication between mutually

interacting software applications in SOA environments.

A8.01.03 Enterprise Application

Integration (EAI)

Support the redesigning of disparate information systems into one system that

uses a common set of data structures and rules.

A8.01.03.01 Broker Refers to software used to 'broker' interfaces; typically with legacy systems

that are not SOA compliant. This includes integration with various protocol or

software specific adapters. Also includes mapping of data as it passes from the

source system to the destination system(s).

A8.01.03.02 Adapter Refers to a protocol or software specific interface, typically for integration to a

legacy system that is not SOA-enabled. Examples of adapters include API

wrapper, FTP, Database, Message queuing, Siebel adapter.

A8.01.03.03 File Transfer Refers to software or protocols specifically used for file transfer handling; such

as FTP or SFTP protocols, and specialist utility applications.

A8.01.04 Legacy Integration Support the communication between newer generation hardware/software

applications and the previous major generation of hardware/software

applications.

A8.02 Data Interoperability Data Interoperability defines the software and or services for sharing data and

services across disparate systems and vendors.

A8.02.01 Data Structure

Dictionary

This service holds the data definition, structure, and metadata and mapping

rules used by the data transformation service to map incoming messages to the

required destination services or software.

A8 Interfaces and IntegrationA8 Interfaces and IntegrationA8 Interfaces and IntegrationA8 Interfaces and IntegrationA8.01 IntegrationA8.01 IntegrationA8.01 IntegrationA8.01 Integration A8.03 InterfaceA8.03 InterfaceA8.03 InterfaceA8.03 InterfaceA8.02 Data InteroperabilityA8.02 Data InteroperabilityA8.02 Data InteroperabilityA8.02 Data Interoperability A8.04 GatewaysA8.04 GatewaysA8.04 GatewaysA8.04 GatewaysA8 Interfaces and IntegrationA8 Interfaces and IntegrationA8 Interfaces and IntegrationA8 Interfaces and IntegrationA8.01 IntegrationA8.01 IntegrationA8.01 IntegrationA8.01 Integration A8.02 Data InteroperabilityA8.02 Data InteroperabilityA8.02 Data InteroperabilityA8.02 Data Interoperability A8.03 InterfaceA8.03 InterfaceA8.03 InterfaceA8.03 Interface A8.04 GatewaysA8.04 GatewaysA8.04 GatewaysA8.04 Gateways

Document Version 1.0 Page 68 of 80

A8.02.02 Data Transformation

Service

The Data Transformation Service takes incoming messages and transforms and

maps the data to the output format needed by the destination service or

software.

A8.03 Interface Software or services supporting the communicating, transporting and

exchanging information through a common dialog or method. Delivery

Channels provide the information to reach the intended destination, whereas

Interfaces allow the interaction to occur based on a predetermined framework.

A8.03.01 Service Discovery Software or services supporting the method in which applications, systems or

web services are registered and discovered.

For example: Universal Description, Discovery and Integration (UDDI) are a

platform-independent, Extensible Markup Language (XML)-based registry by

which businesses worldwide can list themselves on the Internet, and a

mechanism to register and locate web service applications. UDDI is an open

industry initiative, sponsored by the Organisation for the Advancement of

Structured Information Standards (OASIS), for enabling businesses to publish

service listings and discover each other, and to define how the services or

software applications interact over the Internet.

A8.03.02 Service Description /

Interface

Software or services supporting the method for publishing the way in which

web services or applications can be used.

For example: The Web Services Description Language (WSDL) is an XML-based

interface definition language that is used for describing the functionality

offered by a web service. The acronym is also used for any specific WSDL

description of a web service (also referred to as a WSDL file), which provides a

machine-readable description of how the service can be called, what

parameters it expects, and what data structures it returns.

A8.03.03 API Software components that use an application programming interface (API) to

communicate with each other. May include specifications for routines, data

structures, object classes, and variables.

A8.03.04 Electronic Business

eXtensible Markup Language

(ebXML)

Electronic Business using eXtensible Markup Language, commonly known as e-

business XML, or ebXML as it is typically referred to, is a family of XML based

standards sponsored by OASIS and UN/CEFACT whose mission is to provide an

open, XML-based infrastructure that enables the global use of electronic

business information in an interoperable, secure, and consistent manner by all

trading partners.

A8.03.05 RESTful APIs RESTful APIs do not require XML-based Web service protocols (SOAP and

WSDL) to support their interfaces as they use HTTP. Representational State

Transfer (REST) is a style of software architecture for distributed hypermedia

systems such as the World Wide Web.

A8.03.06 Web API A Web API is a development in Web services where emphasis has been moving

to simpler representational state transfer (REST) based communications.

RESTful APIs do not require XML-based Web service protocols (SOAP and

WSDL) to support their interfaces.

A8.03.07 Web Services (WS-*) A Web service is a method of communication between two electronic devices

over a network. It is a software function provided at a network address over

the Web with the service always on as in the concept of utility computing.

“WS-“is a prefix used to indicate specifications associated with Web Services

and there exist many WS* standards including WS-Addressing, WS-Discovery,

WS-Federation, WS-Policy, WS-Security, and WS-Trust, WS-

SecureConversation, WS-Federation, WS-Authorisation, WS-Privacy, WS-Test.

Document Version 1.0 Page 69 of 80

A8.03.99 Other Application

Interfaces

Other application interfaces.

A8.04 Gateways Software and or services used for information-layer gateways and automated

electronic interfaces between networks or systems. Does not extend to

boundary protection devices. Provides the various gateways that are used to

provide automated electronic interfaces with external organisations or parties,

and internally between communities of interest or network domains.

A8.04.01 B2B Software and or services that provides B2B (Business to Business) gateway

functionality. Includes variations such as C2G (Citizen to Government), G2G

(Government to Government), and B2G (Business to Government).

A8.04.02 Command and Control Software and or services that provides system-system gateway interaction for

the exchange of C2 critical information, such as Battle Management System

'tracks', obstacles, events, items of interest. Typical standard here would be the

Multilateral Interoperability Programme (MIP) JC3IEDM (STANAG 2252).

A8.04.03 Formal Messaging Software and or services that provides system-system gateway interaction for

official, mission critical messaging services that typically have attributes such as

non-repudiation, full-traceability (audit tracking), guaranteed delivery

timelines.

A8.04.04 Informal Messaging Software and or services that provide system-system gateway interaction for

email services. This may just be an enterprise application, such as Microsoft

Exchange, or an external providers own services.

A8.04.05 Remote Access Software and or services that provides system-system gateway functionality to

manage user remote-access to the organisations networks or systems. Typically

web-based using VPN protocol and thin-client delivery.

A8.04.06 SMS/MMS Software and or services that provides system-system gateway interaction for

SMS or MMS messaging services.

A8.04.07 Web Access Software and or services that provides system-system gateway functionality to

manage web-based access.

A8.04.99 Other Gateways Software and or services that provides other gateway types.

For example:

- Intelligence; provides system-system gateway interaction for exchange of

intelligence-led information. Typical standard here would be the MAJIIC data

model.

Document Version 1.0 Page 70 of 80

Specialist Line of Business Applications

The Specialist Line of Business Applications domain is intended to be used by agencies to add the unique

business applications used to support specific functions within that agency, or could be a unique application

supporting multiple agencies, for example within a sector such as health.

Note: The specific line of business applications should have direct alignment to the Business Reference

Taxonomy sub business functions or line of business.

Note: This domain should not contain common business applications; a common application is where

multiple agencies have an implementation of a business application category.

Document Version 1.0 Page 71 of 80

Appendix – GEA-NZ v3.0 Application and ICT Services Reference

Taxonomy in Context with Other Artefacts These tables are showing the relationship of the GEA-NZ Application and ICT Services Reference Taxonomy in context with other artefacts. The legend used in the tables

consists of solid black ‘ticks’ showing a direct and easily attributable dependency, and a lighter grey ‘tick’ that indicates a reduced level or limited dependency applicability.

Strategy and Policy

Str

ate

gy

an

d P

oli

cy

Art

efa

ct

De

scri

pti

on

AR

T G

uid

es

/ In

form

s

Art

efa

ct

AR

T U

ses

/ C

on

sum

es

Art

efa

ct

AR

T C

ate

go

rise

s

AR

T D

esc

rib

es

AR

T A

ids

Tra

cea

bil

ity

AR

T A

ids

Pri

ori

tisa

tio

n

AR

T I

de

nti

fie

s In

ve

stm

en

t

Are

as

AR

T I

de

nti

fie

s D

up

lica

tio

n

AR

T I

de

nti

fie

s R

isk

Are

as

AR

T P

rov

ide

s C

om

mo

n

Lan

gu

ag

e

All of Government

Government ICT Strategy and

Action Plan

This is the guiding document for government ICT strategy for

delivery of integrated digital services, information assurance and

the realisation of the economic potential of the government’s

information holdings.

� � � �

Better Public Services Results A set of ten goals for improving public services across New

Zealand. �

� � �

Government Common

Capability Roadmap

The prioritisation and sequencing of government common

capabilities produced by the GCIO. � � � � � � �

Action Plan / Government

Common Capability Matrix

Traceability from the Action Plan to government common

capabilities produced by GCIO. � � � �

Better Public Service /

Government Common

Capability Matrix

Traceability from better public services to government common

capabilities. �

Architecture Governance

Recommendations

Architecture governance recommendations the implementation of

controls for the design of all architectural components and

activities, to ensure effective evolution of architectures within the

agency. It sets out compliance with internal and external

standards and regulations, and guidelines that ensure

accountability for the architectural solutions within and across

agencies.

� � � �

Four Year Plans and Excellence

Horizons

Central agencies’ view across all agencies’ Four Year Plan,

Excellence Horizon Programme and transformation programmes. � � �

� � �

AoG Risk and Assurance

Framework

GCIO Assurance artefacts including operational and project

assurance frameworks. � � � � �

Agency and Sector

Agency Four Year Plan Four-Year Plans set out what the agency is seeking to achieve and

how it plans to achieve this. It sets out how the agency intends to

address challenges facing delivery of its strategy, including how it

will manage within existing funding levels.

https://www.ssc.govt.nz/four-year-plans

� �

� �

� �

Agency Change Portfolio This is the pipeline of potential change initiatives that are being

contemplated at agency and sector level. � � � �

� �

Agency Investment Plans These are the planned investments, prioritised and drawn from

the change portfolio, which the agency/sector intends to

undertake within its planning horizon. �

� �

� �

Business Motivation Model The BMM captures business requirements across different

dimensions to justify what the agency is aiming to achieve, how it

plans to get there, and how it assesses the result. It will provide a

scheme and structure for developing, communicating, and

managing business plans.

Agency Information Systems

Strategic Plan (ISSP)

The ISSP is the information technology component of the overall

business strategy. It should cover the following aspects: people,

data, policies, processes and systems.

http://www.ssc.govt.nz/node/5860

� �

� �

� �

Agency ICT roadmaps Agency roadmaps guided by ISSP, Strategy and Action Plan, and

internal ICT initiatives. � � � � � � �

Agency Architecture

Governance Framework

Architecture governance framework sets out the controls for the

design of all architectural components and activities, to ensure

effective evolution of architectures within the agency. It ensures

the compliance with internal and external standards and

regulations, and ensures the accountability for the architectural

solutions within and across the agency.

� � � �

� �

Legislation List of acts that are administered by the agency.

� �

Agency Policy and Governance List of relevant agency policies and related governance structures,

including Investment, risk and assurance, enterprise programme

management (EPMO), and enterprise design authority. � � �

� � �

Agency Risk and Assurance

Framework

Agencies are required to maintain an enterprise risk and

assurance model and an associated hierarchy of risk registers. � � � � � � �

Document Version 1.0 Page 72 of 80

Performance P

erf

orm

an

ce

Art

efa

ct

De

scri

pti

on

AR

T G

uid

es

/ In

form

s

Art

efa

ct

AR

T U

ses

/ C

on

sum

es

Art

efa

ct

AR

T C

ate

go

rise

s

AR

T D

esc

rib

es

AR

T A

ids

Tra

cea

bil

ity

AR

T A

ids

Pri

ori

tisa

tio

n

AR

T I

de

nti

fie

s In

ve

stm

en

t

Are

as

AR

T I

de

nti

fie

s D

up

lica

tio

n

AR

T I

de

nti

fie

s R

isk

Are

as

AR

T P

rov

ide

s C

om

mo

n

Lan

gu

ag

e

All of Government

AoG Enterprise Architecture

Maturity Assessment tool

Enterprise Architecture (EA) maturity assessment guides

agencies to improve their enterprise architecture capability to

the level needed to achieve their strategic goals.

� �

Action Plan Performance Targets GCIO and Cabinet targets for government ICT transformation.

� � � � � �

Better Public Services

Performance Results

Better Public Services (BPS) results are State Services

Commission targets for improving public service outcomes. �

Benchmarking Administrative and

Support Services

Benchmarking Administrative Support Services (BASS) is an

annual Treasury benchmarking service to support agencies to

make value for money assessments, with target-setting, and

the tracking of improvements over time.

� � �

Performance Improvement

Framework

Performance Improvement Framework (PIF) is a SSC review of

agency's fitness-for-purpose today and for the future using the

PIF Framework. It looks at the current state of an agency, then

how well placed it is to deal with the issues that confront it in

the medium-term future. It looks at the areas where the

agency needs to do the most work to make itself fit-for-

purpose.

� � �

Technology Performance

Framework

BASS and PIF are coarse-grained and we need more fine

grained ICT specific measurements. � � � � � �

� � �

Agency

Agency Enterprise Architecture

Maturity Assessment results and

improvement plan

Results of the Enterprise Architecture Maturity Assessment and

a plan to improve the maturity level of EA within the agency. �

� �

� � � � �

Agency Performance

Improvement Model The agency SSC PIF report and associated modelling supporting

performance improvement. Includes the Four Year Excellence

Horizon.

� � � � � �

Agency Specific Customer

Performance Measurements

Agency customer related targets which need to be met.

Agency Specific Action Plan

Performance Targets

Action plan agency related targets which need to be met.

� � � � � �

Agency Specific Better Public

Services Performance Targets

Better Public Services (BPS) agency related targets which need

to be met.

� � � � � �

Agency Benchmarking

Administrative Support Services

Report

The agency annual Treasury benchmarking (BASS) report

supporting the agency to make value for money assessments,

with target-setting, and tracking of improvements over time.

� � � � � �

Agency Data and Information

Quality Measurements

Agency related data and information quality targets.

Agency Application Portfolio Risk

/ Currency Heat Map

An overview of effectiveness and sustainability risks across the

agency’s application portfolio. � � � � � �

Agency Technology Performance

Measurements

Agency related technology performance targets. � � � � � �

� � �

Document Version 1.0 Page 73 of 80

Business

Customer

Bu

sin

ess

Cu

sto

me

r

Art

efa

ct

De

scri

pti

on

AR

T G

uid

es

/ In

form

s

Art

efa

ct

AR

T U

ses

/ C

on

sum

es

Art

efa

ct

AR

T C

ate

go

rise

s

AR

T D

esc

rib

es

AR

T A

ids

Tra

cea

bil

ity

AR

T A

ids

Pri

ori

tisa

tio

n

AR

T I

de

nti

fie

s In

ve

stm

en

t

Are

as

AR

T I

de

nti

fie

s D

up

lica

tio

n

AR

T I

de

nti

fie

s R

isk

Are

as

AR

T P

rov

ide

s C

om

mo

n

Lan

gu

ag

e

All of Government

AoG Customer Personas and

Profiles

The customer personas and profiles are defined by R9

(business) and R10 (individual) and provide a means of cross

agency alignment within the context of these result areas. (R9

and R10)

AoG Customer Experience and

Usability

Customer experience and usability is the sum of all experiences

a customer has with government and this over the duration of

the relationship with the customer. This includes awareness,

discovery, attraction, interaction, purchase, enrol, use,

cultivation and advocacy.

Organisation and Individual

Customer Identity and Access

Management

Addresses the mission-critical need to ensure correspondence

of identity and appropriate access to resources across business

and technology while meeting privacy and other compliance

requirements.

� � �

� �

Agency

Agency Customer Personas and

Profiles

The agency specific customer personas and profiles are defined

by the agency and will provide an oversight of the different

kind of customers for that agency.

Customer Experience Customer experience is the sum of all experiences a customer

has with the agency and its services, and this over the duration

of their relationship with the customer. This includes

awareness, discovery, attraction, interaction, purchase, enrol,

use, cultivation and advocacy.

Customer / Channel Matrix Shows the relationship between the agency’s customers and

the channels. � � �

� � �

Customer / Product and Service

Matrix

Shows the relationship between the agency’s customers and

their products and services.

� � � �

Channel

Bu

sin

ess

Ch

an

ne

l

Art

efa

ct

De

scri

pti

on

AR

T G

uid

es

/ In

form

s

Art

efa

ct

AR

T U

ses

/ C

on

sum

es

Art

efa

ct

AR

T C

ate

go

rise

s

AR

T D

esc

rib

es

AR

T A

ids

Tra

cea

bil

ity

AR

T A

ids

Pri

ori

tisa

tio

n

AR

T I

de

nti

fie

s In

ve

stm

en

t

Are

as

AR

T I

de

nti

fie

s D

up

lica

tio

n

AR

T I

de

nti

fie

s R

isk

Are

as

AR

T P

rov

ide

s C

om

mo

n

Lan

gu

ag

e

All of Government

AoG Channel Strategy A co-ordinated cross-agency channel strategy for government

that covers business and citizen services across all channels

including digital/mobile, assisted, face-to-face, call centre, etc. �

� � �

AoG Channel Types The channel types defined by R9 (for business) and R10 (for

individual persons) will be provided as a means of cross agency

alignment. �

� � �

AoG Channel Catalogue An AoG channel catalogue with channels such as www.govt.nz. �

� Agency

Channel Catalogue An agency specific channel catalogue. �

� � � Channel / Product and Service

Matrix

Shows the relationship between the agency’s channels and

their product and services. �

� � �

Document Version 1.0 Page 74 of 80

Product and Service B

usi

ne

ss

Pro

du

ct a

nd

Se

rvic

e

Art

efa

ct

De

scri

pti

on

AR

T G

uid

es

/ In

form

s

Art

efa

ct

AR

T U

ses

/ C

on

sum

es

Art

efa

ct

AR

T C

ate

go

rise

s

AR

T D

esc

rib

es

AR

T A

ids

Tra

cea

bil

ity

AR

T A

ids

Pri

ori

tisa

tio

n

AR

T I

de

nti

fie

s In

ve

stm

en

t

Are

as

AR

T I

de

nti

fie

s D

up

lica

tio

n

AR

T I

de

nti

fie

s R

isk

Are

as

AR

T P

rov

ide

s C

om

mo

n

Lan

gu

ag

e

All of Government

Business Reference Taxonomy Business reference taxonomy defines the business terminology,

and provides a coherent description and conceptual structure

of the functions and services for New Zealand. � � � �

Agency

Product and Service Catalogue An agency’s product and services catalogue.

Product and Service /

Organisational Structure Matrix

Shows the relationship between the agency’s product and

services and their organisational structure. I.e. which

department is responsible for which product or services.

Product and Service / Process

Matrix

Shows the relationship between the agency’s product and

services and their processes. I.e. which process produces,

handles, changes which product or services.

� �

People and Organisations

Bu

sin

ess

Pe

op

le a

nd

Org

an

isa

tio

ns

Art

efa

ct

De

scri

pti

on

AR

T G

uid

es

/ In

form

s

Art

efa

ct

AR

T U

ses

/ C

on

sum

es

Art

efa

ct

AR

T C

ate

go

rise

s

AR

T D

esc

rib

es

AR

T A

ids

Tra

cea

bil

ity

AR

T A

ids

Pri

ori

tisa

tio

n

AR

T I

de

nti

fie

s In

ve

stm

en

t

Are

as

AR

T I

de

nti

fie

s D

up

lica

tio

n

AR

T I

de

nti

fie

s R

isk

Are

as

AR

T P

rov

ide

s C

om

mo

n

Lan

gu

ag

e

All of Government

New Zealand Public Sector The structure of New Zealand’s Public Sector, this includes the

public services, state services, state sector and public sector

and the government sectors and clusters.

https://www.business.govt.nz/procurement/pdf-

library/agencies/NZ-Public-Sector-agencies-list.pdf

New Zealand Industry Sectors This provides an overview of all the industry sectors that make

up New Zealand’s economy. This is provided by MBIE.

http://www.mbie.govt.nz/what-we-do/business-growth-

agenda/sectors-reports-series

Agency

Delivery Partners Shows an overview of the agency’s vendors and business

partners. � � � � �

Agency Organisational Structure Shows an overview of the organisational structure of the

agency. � � �

Workforce Plan Describes how the agency's workforce composition and

development will evolve in response to agency strategy and

transformation. � � � �

Document Version 1.0 Page 75 of 80

Process B

usi

ne

ss

Pro

cess

Art

efa

ct

De

scri

pti

on

AR

T G

uid

es

/ In

form

s

Art

efa

ct

AR

T U

ses

/ C

on

sum

es

Art

efa

ct

AR

T C

ate

go

rise

s

AR

T D

esc

rib

es

AR

T A

ids

Tra

cea

bil

ity

AR

T A

ids

Pri

ori

tisa

tio

n

AR

T I

de

nti

fie

s In

ve

stm

en

t

Are

as

AR

T I

de

nti

fie

s D

up

lica

tio

n

AR

T I

de

nti

fie

s R

isk

Are

as

AR

T P

rov

ide

s C

om

mo

n

Lan

gu

ag

e

All of Government

Accelerated Delivery

Methodology

The Accelerated Delivery Methodology (ADM) improves the

collaboration between agencies, the speed and quality of

projects and will decrease costs of large scale business cases

and funding requirements. The ADM was developed by DIA for

all-of-government projects.

Business Process Management

Maturity Assessment Tool

Business Process Management (BPM) maturity assessment tool

and guidelines for using a subset of the BPMN to describe high

level business processes consistently across government.

Note: Full BPMN would be used where processes are to be

automated using standards such as BPEL (Business Process

Execution Language).

Agency

Business Process Management Business process management (BPM) is a management

discipline that focuses on improving agencies performance by

managing and optimising their business processes. It enables

agencies to be more efficient, more effective and more capable

of change than a functionally focused, traditional hierarchical

management approach. These processes impact the cost and

revenue generation of an agency. The Agency BPM should

include:

* Library of current state business processes

* Project based library of future state processes

* Process / Business Application matrix

� � � �

Process Inventory Inventory of all the business processes within the agency and

the interactions between processes, products, services,

information and infrastructure. � � � �

BPM Maturity Assessment

Results and Improvement Plan

Results of the Business Process Management Maturity

Assessment and a plan to improve the maturity level of

Business Process Management within the agency.

Document Version 1.0 Page 76 of 80

Data and Information D

ata

an

d I

nfo

rma

tio

n

Art

efa

ct

De

scri

pti

on

AR

T G

uid

es

/ In

form

s

Art

efa

ct

AR

T U

ses

/ C

on

sum

es

Art

efa

ct

AR

T C

ate

go

rise

s

AR

T D

esc

rib

es

AR

T A

ids

Tra

cea

bil

ity

AR

T A

ids

Pri

ori

tisa

tio

n

AR

T I

de

nti

fie

s In

ve

stm

en

t

Are

as

AR

T I

de

nti

fie

s D

up

lica

tio

n

AR

T I

de

nti

fie

s R

isk

Are

as

AR

T P

rov

ide

s C

om

mo

n

Lan

gu

ag

e

All of Government

AoG Data Asset Catalogue This is a catalogue of important data and information assets

required, produced across government. This includes template

and guidelines. �

Data Reference Taxonomy The data and information reference taxonomy defines a

standard means by which data may be described, categorised,

and shared, and it facilitates discovery and exchange of core

information across organisational boundaries. Includes a

conceptual data model which is a simple abstract data model

used for communicating ideas to a wide range of stakeholders.

Data and Information Quality

Framework.

Framework to insure the quality of the data and information

within and across agencies. � � �

Party Domain Model The party domain model describes the management of the

core identity, relationships and channel preferences of a Party,

where a Party is defined as an individual or organisation with

which NZ Government interacts or about which NZ

Government holds information.

Data and Information

Governance Maturity Assessment

Tool

Data and Information Governance maturity assessment tool

and guidelines are focussed on the use, management and

quality of data and information within an agency. It is a low-

cost tool, developed by DIA, to help agencies assess current

level of maturity and to develop appropriate structures and

processes towards the next level of maturity.

Agency

Data Asset Catalogue This is a catalogue of important data and information assets

required or produced by an agency in order to deliver its

products and services to customers. �

Data and Information Maturity

Assessment Results and

Improvement Plan

Results of the data and information governance maturity

assessment and an optional plan to improve the maturity level

of data and information governance within the agency �

� � � �

Application and ICT Services

Ap

pli

cati

on

an

d I

CT

Se

rvic

es

Art

efa

ct

De

scri

pti

on

AR

T G

uid

es

/ In

form

s

Art

efa

ct

AR

T U

ses

/ C

on

sum

es

Art

efa

ct

AR

T C

ate

go

rise

s

AR

T D

esc

rib

es

AR

T A

ids

Tra

cea

bil

ity

AR

T A

ids

Pri

ori

tisa

tio

n

AR

T I

de

nti

fie

s In

ve

stm

en

t

Are

as

AR

T I

de

nti

fie

s D

up

lica

tio

n

AR

T I

de

nti

fie

s R

isk

Are

as

AR

T P

rov

ide

s C

om

mo

n

Lan

gu

ag

e

All of Government

AoG Business Application Asset

Catalogue

Catalogue of the significant business applications across

government taken from the collective agency business

application catalogues. This includes template and guidelines. �

Application and ICT Service

Reference Taxonomy

The application and ICT service reference taxonomy provides

the basis for categorising applications and their components. � �

Common Services and API

Catalogue

Catalogue of the common services and APIs across

government. This includes template and guidelines. � �

Agency

Application Portfolio / Catalogue Inventory and management of applications and ICT services

used by the agency. At minimum this should be based on GCIO

template that captures classification, ownership, maintenance

risks, operational cost, investment plan etc.

� � � �

Total Cost of Ownership Models Calculation of the total cost of ownership of application assets

and services over a given period (usually 5-7 years) including

depreciation, cost of capital, maintenance, licensing,

enhancements, and operating costs (business and technology)

for all components.

� � � �

Services and API Catalogue Catalogue of the agency specific services and APIs. � � � � � � ICT Service Inventory and Service

Management Model

ICT Service Inventory and Service Management Model. � �

Document Version 1.0 Page 77 of 80

Infrastructure In

fra

stru

ctu

re

Art

efa

ct

De

scri

pti

on

AR

T G

uid

es

/ In

form

s

Art

efa

ct

AR

T U

ses

/ C

on

sum

es

Art

efa

ct

AR

T C

ate

go

rise

s

AR

T D

esc

rib

es

AR

T A

ids

Tra

cea

bil

ity

AR

T A

ids

Pri

ori

tisa

tio

n

AR

T I

de

nti

fie

s In

ve

stm

en

t

Are

as

AR

T I

de

nti

fie

s D

up

lica

tio

n

AR

T I

de

nti

fie

s R

isk

Are

as

AR

T P

rov

ide

s C

om

mo

n

Lan

gu

ag

e

All of Government

AoG Infrastructure Asset

Catalogue

Catalogue maintained by DIA’s Commercial Strategy and

Delivery for generally available government common

infrastructure capabilities. � � � � � � � � � �

Infrastructure Reference

Taxonomy

The infrastructure reference taxonomy provides a

categorisation schema for IT infrastructure assets

Agency

Infrastructure Asset Catalogue Catalogue application and ICT services available to an agency

maintained by an agency's ICT department. � � � � � � � � � �

Infrastructure Asset Management The inventory and management of which applications exist and

their main characteristics such as flexibility, maintainability,

owner, operational cost, investment plan etc. �

� � � � � � � �

Total Cost of Ownership Models Calculation of the total cost of ownership of infrastructure

assets and services over a given period (usually 5-7 years)

including depreciation, cost of capital, maintenance, licensing,

enhancements, and operating costs (business and technology)

for all components.

� � � � � � � �

Agency Configuration

Management Database

The Agency Configuration Management Database (CMDB)

contains all relevant information about the components of the

information systems used in an agency's IT services and the

relationships between those components. Shown here as part

of the application and ICT services and infrastructure areas as it

typically maps the application and ICT services to the actual

platforms and hardware they are deployed on.

� � � �

� � �

Document Version 1.0 Page 78 of 80

Security and Privacy S

ecu

rity

an

d P

riv

acy

Art

efa

ct

De

scri

pti

on

AR

T G

uid

es

/ In

form

s

Art

efa

ct

AR

T U

ses

/ C

on

sum

es

Art

efa

ct

AR

T C

ate

go

rise

s

AR

T D

esc

rib

es

AR

T A

ids

Tra

cea

bil

ity

AR

T A

ids

Pri

ori

tisa

tio

n

AR

T I

de

nti

fie

s In

ve

stm

en

t

Are

as

AR

T I

de

nti

fie

s D

up

lica

tio

n

AR

T I

de

nti

fie

s R

isk

Are

as

AR

T P

rov

ide

s C

om

mo

n

Lan

gu

ag

e

All of Government

NZ Security and Privacy Policies,

Regulations and Laws

Privacy Act; NZISM 2014; PSR 2014 (incorporating SIGS, PSM

and NZISM); NZ Cyber Security Strategy (Jun 2011);

� � � �

National and International

Security and Privacy Standards

ISO/IEC-270xx:2011 series; AS/NZS ISO 31000:2009 Risk

Management; NIST-SP-800-53;

� � � �

Security and Privacy Guidelines

and Best Practice

CMU OCTAVE Allegro Risk Assessment methodology; SABSA

Security Maturity Framework; COBIT; OWASP

� � � �

AoG Guidelines and Assurance Risk Assessment Process – Information Security; Cloud

Computing – Information Security and Privacy Considerations

[104 Questions]; � � � � �

� �

Common Threats and

Vulnerabilities Taxonomies7

DSD (ASD) Top 4 Mitigation Strategies8; ISO/IEC-27002; SANS;

GEA-NZ v3.0 Taxonomies; Cyber Critical Security Controls (Top

20)9;

� � � � � �

� �

Security and Privacy Maturity

Assessment Tools and Guidelines

GCPO Privacy Maturity Assessment Framework; ICT Security

Maturity Assessment; � � � �

Agency

Agency/Sector Specific Security

and Privacy Policies and

Guidelines

[Information] Security Strategy; Information Security Policy;

Security Risk Management Policy/Plan; System/Service Security

Policy/Plan.

Additional security and privacy regulations and guidelines for

an agency, such as: Business Continuity and Disaster Recovery

Plans; ICT Incident Management Plans; Standard Operating

Procedures; Audit reports; PKI Management Plans (CP, CPS,

etc.); Assurance/Performance metrics and reporting; Security

Architecture(s);

� �

Agency Specific Threats and

Vulnerabilities Taxonomies

Threats and vulnerability taxonomies are inputs to risk

assessments. Agencies should identify threats and

vulnerabilities specific to their business from the AoG

mandated and advisory sources (above, and as regularly

revised by GCSB/NCSC); Configuration Management Database

(CMDB); Asset Register; Approved Software Catalogue.

� � � � � �

� �

Agency Security and Privacy Risk

Artefacts

Risk Register: Agencies are required to maintain a hierarchy of

risk registers from agency to specific projects, teams and

system levels. Security related items to be included at each

level, in a suitable format.

Risk Action Plan: Agencies are required to produce risk action

(mitigation) plans for each system, project, service and other

unique environment or capabilities deemed critical to agency

operations.

� � � � �

� � �

Agency Security and Privacy

Maturity Assessment Results and

Improvement Plan

Results for all security and/or privacy maturity assessments

(including the Cloud Considerations Questionnaire) conducted

by the agency, and an associated plan to improve the maturity

level of security and privacy within the agency.

� � �

� �

Project Related Security and

Privacy Assessments

(Certification and Accreditation)

The Certificate and report (results) from the C&A process for

projects, systems, services deemed critical to the agency’s

operations, to ensure compliance with government and

agency’s security regulations.

Results for an agency specific project performing the security

and privacy maturity assessment to make sure the project is in

line with the government and agency’s regulations around

security and privacy.

� �

� � �

7 Threats and Vulnerability taxonomies are inputs to Information Security Risk Assessments.

8 http://www.asd.gov.au/infosec/mitigationstrategies.htm

9 http://www.cpni.gov.uk/advice/cyber/Critical-controls/ or; http://www.sans.org/critical-security-controls/ or; http://www.counciloncybersecurity.org/practice-areas/technology

Document Version 1.0 Page 79 of 80

Standards S

tan

da

rds

Art

efa

ct

De

scri

pti

on

AR

T G

uid

es

/ In

form

s

Art

efa

ct

AR

T U

ses

/ C

on

sum

es

Art

efa

ct

AR

T C

ate

go

rise

s

AR

T D

esc

rib

es

AR

T A

ids

Tra

cea

bil

ity

AR

T A

ids

Pri

ori

tisa

tio

n

AR

T I

de

nti

fie

s In

ve

stm

en

t

Are

as

AR

T I

de

nti

fie

s D

up

lica

tio

n

AR

T I

de

nti

fie

s R

isk

Are

as

AR

T P

rov

ide

s C

om

mo

n

Lan

gu

ag

e

All of Government

GEA-NZ Standards These are the technical interoperability standards for which the

Government Enterprise Architecture team are responsible to

manage, co-ordinate and publish. �

National and International

Standards and Guidelines

GEA-NZ aligned reference to National and International

Standards and Guidelines � � �

Agency

Agency Standards These are the technical standards for which the agency is

responsible to manage, co-ordinate and publish. � � � � �

Document Version 1.0 Page 80 of 80