Department Of Defense SharePoint Architecture Guide (DSAG) Part 8 Shared Computing Infrastructure

There are a variety of rules and principles that have to be established so that the IT investment allows for a program that will have the best security available according to the DIEA 1.0 structure. The information assurance process must be designed and ready for operations. It all needs to work rapidly too so that there are changes that can be implemented without it harming the flow of the resources that are part of that configuration.

Through the Department of Defense programs there is the demonstration of the network and the data it offers. The applications and setting have to be controlled so that the functions will all be enabled. They also have to be validated through the security system and engineering process.

These programs also work to ensure that the changes necessary to the configuration of the network or applications can be automated in many areas. That helps to streamline the implementation of the GIG configuration process. The global mission and dispersement allows the global network to reach the right operations so that there is a line of defense for the information process.

The various Department of Defense series that are in place have to offer both sharing and transferring of the various information. It has to be able to span over many levels of security. They also have to be centralized when it comes to the planning and coordination of the various levels.

Being able to digitally identify the different users and devices is important. They have to be authenticated so that the security can be enforced according to the controls and rules of quality that are in place. The protection of the organization has to be part of the controls of these devices.

With the metadata in place there is control over the attributes of the information. This also allows for top quality information to be part of the decisions within the DIEA 1.0.
With a shared infrastructure the resources have to be available for the needs and demands of all the missions and their requirements. There has to be a way for them to support the monitoring and the management of the GIG. The infrastructure needs the ability to design and to operate the many components. This also includes for disaster recovery in the event that there are any types of attacks or failures. Some of them can be man made and others can be natural but all need to be supported.

The capabilities of the infrastructure have to be able to survive. They can’t be lost due to some type of disaster recovery program. It needs to be able to connect to all of the different users that have been authorized. It also needs to be changed and managed to continue to meet expectations of any user.

The Computing Infrastructure Readiness, Communications Readiness, and the NetOps Agility all need to be part of the Department of Defense infrastructure environment. They all need to represent the hardware layers of the GIG. At the same time the management and operation facilities need to be able to deploy those resources to any locations. That means the resources are able to be used in critical applications and for services that involve different tactical environments.

The entire network can be deployed with a range of different capabilities so that they support the operations. There are challenges here that require a very detailed infrastructure. It has to be modular and it has to be secure so that it can work well in a variety of different environments that are located within that infrastructure.

Computing Infrastructure Readiness is referred to as CIR. For the Department of Defense the net centric vision requirements are so that it can all be trusted. The information is art of the enterprise asset and it is ready to be accessed with the various needs that have been identified. It is also ready for the unanticipated needs when new circumstances occur.

That environment is one that is often dedicated for the hardware of a given application. The information has to be tied to that particular application within the operating system. The goal is for efficient utilization of the resources of the hardware and the software to be dynamic in terms of how it is used.

The option for future growth needs to be there with a contingency plan in place. The department will move down the path for the net centric operations with that infrastructure serving as the underlying foundation. The core applications and services have to be part of it so that it won’t be just pieces of technology found here and there.

With the net centric leverage in place the GIG will be responsible for distributing the resources for computing. As a result the users of the applications will have shared computing information and access to all of the data that has been stored as long as they are authorized as a user on that level.

The ideals of virtualization in terms of how the users will view the infrastructure is important. The Department of Defense has to reduce the technical and administrative barriers that pertain to shared resources. The goal is to offer a support of information that can be shared across the GIG.

The evolution of the computing infrastructure helps to offer more support for the net centric operation. It has to look at the fact though that there are many users around the edges of the mission. They need to be able to take on the agile environment and its computations. This all has to be done so that users on the support end can adhere to various challenges including not enough bandwidth.

The priority is to make sure all of these challenges within the department are able to be cared for. That where there are levels guaranteed to offer certain capabilities to the consumers. This is all in regards to the data and services offered in the department. The need for a dynamic infrastructure that is shared, adaptable, and very sufficient in the area of support for a global net centric operation can happen.

Next >> Department Of Defense SharePoint Architecture Guide (DSAG) Part 9 Net Centric Computing Infrastructures


Department Of Defense SharePoint Architecture Guide (DSAG) Part 3 Global Principles, Rules and Priorities

The Department of Defense has resources that are designed to be operational in an attempt to successfully manage the missions that they have set as goals within the department. The ability for these various solutions to work across all of the different operations of the department. This type of goal is one that is very strategic in nature.

In order for it to work, the information has to be accessible and it has to follow the rules of the net centric sharing for the data. Then the services can be shared all across the entire enterprise. The Department of Defense infrastructure allows for the standards to be enforced in regards to the interface of the profiles offered for guidance.

All of the data assets as well as the services and the applications have to be both visible and accessible. They also have to be easily understood by the users that have been authorized to benefit from them. The Defense Information Enterprise services offers legal agreements that keep tabs on the performances. They also strive to continue making sure they operate in a way that meets all of the agreements that are in place.

There is a secure environment in place that offers a collaborative effort for sharing of information to take place. This is very important for the information and policies to be correctly shared with the external partners that the Department of Defense has in place. This includes many Federal agencies as well as various communities. The Department of Homeland Security and the Intelligence Community are here too.

There are quite a few state and local government agencies that also fall into this same category. Some of these external partners are also not government related in any way. Instead they are contracted to private businesses. Many of them are partners for academics or for research too.

Through the DIEA there is a set of core principles that are limited. These are where the rules come from. This determination is based on the collective policies and guidance of the Department of Defense. The guidelines used here are in place to offer net centric information sharing abilities. The result of this is a highly effective and efficient process throughout the different segments of the entire department.

The fact that everything is on the same universal level reduces problems within the department. This should be considered a very huge part of the applied process for the IT department and the series of decisions they are responsible for making. There are various rules that have to be introduced so that the priorities of the Defense Information Enterprise can be successfully implemented.

As this type of architecture is being created, there are several things that need to be evaluated as top priorities. That means more attention has to be invested in these areas so that the process you are looking for can be achieved without any problems. You don’t want glitches to arise in regards to the net centric information sharing process. This type of priority though isn’t focused on particular parts of the organization or even particular functions. Instead they offer a realistic way for the focus to be for the cross functioning areas of the department.

These priorities help with the transformation of the enterprise. That is accomplished by focusing on the major needs of the target state. The priorities are the fundamentals that the organization needs to have in place for the DIEA to be a success. The architecture can also be aligned with the investments of the various principles for the net centric roles. Here are several of the priorities that have to be addressed:

Data & Service Deployment (DSD) This takes the data and the services offered by the applications and systems. This allows them to become visible as well as accessible. They are also trusted and simple to understand. The DSD is responsible for guiding the overall delivery as well as the creating of the data and services. They are going to meet the needs that have been defined by the IT manager. At the same time they are able to adapt to the needs of users that may not have been anticipated initially. The foundation is put in place here for the Department of Defense to offer a structure that is completely service oriented.

Secured Availability (SA) This makes sure that the data is and services are able to be secured as well as trusted throughout the Department of Defense. Even though security is provided it won’t stop the users from being able to access various forms of information. Users are able to use the services to find data. However, they can only access those that are within the realm of their authorization. No matter which network that a user is on, they will have the same permission for authorization with all of them.

Computing Infrastructure Readiness (CIR) This makes sure the elements necessary for computing the infrastructure is there. It also allows the Department of Defense to have services for operating the net centric principles that have been established. This allows for the processing, storage, and various services of the infrastructure to be in place where they should be. The dynamics of the program will respond to the loads across there in a balanced way.

Communications Readiness (CR) It is important that the transport has an infrastructure that allows it to provide enough bandwidth. The functioning of the transport allows it to be from end to end without any problems. There is a seamless line for the net centric communications to occur throughout the department.

NetOps Agility (NOA) This allows for the ability of the easy access to be continuous in terms of sharing and managing the information. It can be done from any of the locations within the department at any time. The NOA allows for policies to be put into place that give priorities the accessible ability to operate within the system.

Next >> Department Of Defense SharePoint Architecture Guide (DSAG) Part 4 Applying Principles and Rules