CommonSandbox
-
-
- T.B. Development Language
- T.B. Application Framework
- DACAM
- DACM
- DBCM
- <<Asset at Risk>> Data
- <<Asset at Risk>> Application
- Asset at Risk
- <<Asset at Risk>> Reputation
- <<Asset at Risk>> Data (copy)
- <<Asset at Risk>> Application (copy)
- <<Asset at Risk>> Reputation (copy)
- <<Asset at Risk>> Finacial
- Personal Protective Equipment Supply Chain Security
- Ramp Up Contact Tracing & Testing
- CERB & Wage Subsidy Support
- Help Provinces Increase Testing Capacity
- Pursue Faster Testing Technology
- Canadian Forces Support in Long-Term Care Homes
- Target Additional Financial Support to Affected Businesses
- Support Health Care Systems Capacity
- Safe Return To Class Fund Investment
- Personal Support Worker Wage Top-Up
- COVID Alert app
- Secure Access To Vaccine Candidates
- Invest In Domestic Vaccine Manufacture
- Invest In Vaccine Distribution
- Canada Emergency Response Benefit
- Canada Emergency Wage Subsidy
- Social Sector & Infrastructure Investment
- Employer Incentives
- Youth Employment & Skills Strategy
- Eliminate Provincial Trade Barriers
- Canada Emergency Wage Subsidy
- Worker Training
- CERB-to-EI Canada Recovery Benefit
- A Modernized EI System
- Action Plan for Women in the Economy
- National Early Learning & Childcare System
- Before-and-After School Program Subsidy
- Women’s Entrepreneurship Strategy
- Canada Emergency Wage Subsidy
- Canada Emergency Business Account Expansion
- Business Credit Availability Program Improvement
- Support For Hardest-Hit Industries
- Address Extreme Wealth Inequality
- Ensure High Revenue Entity Wealth Sharing
- Update Canada's COVID-19 Economic Response Plan
- Support Seniors with Provinces & Territories
- Criminal Code Amendments
- Standardize National Long-Term Care
- Help People Remain In Their Homes Longer
- Increase Old Age Security
- Increase Canada Pension Plan Survivor Benefit
- Personal Support Worker Measures
- Disability Inclusion Plan
- Canadian Disability Benefit
- Employment Strategy
- Improve Eligibility Process
- Improve Access To Primary Care
- Address Opiod Epidemic
- Increase Mental Health Resource Access
- Improve Access To Medicine
- National, Universal Pharmacare Program
- Implement Firearms Policy
- National Action Plan Against Gender-Based Violence
- Invest In Infrastructure
- Universal Broadband Fund
- Support Regional Airline Routes
- Reduce Chronic Homelessness
- Increase National Housing Strategy Investment
- Address Food Insecurity
- Fair Supply Sector Compensation
- Worker Training
- Update Outdated IT Systems
- Introduce Free Tax Filing
- Legislate Net-Zero Emmissions By 2050
- Create Jobs Cutting Energy Costs
- Reduce Climate-Related Impacts
- Expand Urban Parks
- Ban Single-Use Plastics
- Create Canada Water Agency
- Invest In Blue Economy
- Deliver More Trainsit
- Make Zero-Emission Vehicles More Affordable
- Attract Zero-Emission Investment
- Move Forward With Clean Power Fund
- Support Renewable Energy Investment
- Support Sector Transformation Towards Net-Zero Future
- Recognize Key Partner Efforts To Reduce Emissions
- Continue To Put A Price On Pollution
- Black Entrepreneurship Program
- Anti-Racism Strategy for 2019-2022
- Action Online Hate
- GC-Wide Data Collection Approach
- Support Black Culture & Heritage
- Eliminate Discriminatory Justice
- Enhance Civilian Oversight of Law Enforcement
- Modernize Law Enforcement Training
- Shift To Community-Led Policing
- Co-Develop First Nations Policing Framework
- Strengthen the Official Languages Act
- Invest In International Development
- Ensure Worldwide Access To A Vaccine
- Stand Up For Human Rights & The Rule Of Law
- Fight For Free Trade
- Keep Canada Competitive
- Distinctions-Based Mental Health & Wellness Strategy
- Accelerate National Action Plan For The National Inquiry into Missing & Murdered Indigenous Women & Girls’ Calls For Justice
- Implement The Truth & Reconciliation Commission’s Calls To Action
- Indigenous Infrastructure
- Meet Clean Water Committments
- Support Capacity Building
- Enact UN Declaration
- CERB & Wage Subsidy Support
- Target Additional Financial Support to Affected Businesses
- Safe Return To Class Fund Investment
- Personal Support Worker Wage Top-Up
- Canada Emergency Response Benefit
- Canada Emergency Wage Subsidy
- Social Sector & Infrastructure Investment
- Employer Incentives
- Youth Employment & Skills Strategy
- Canada Emergency Wage Subsidy
- Worker Training
- CERB-to-EI Canada Recovery Benefit
- A Modernized EI System
- Action Plan for Women in the Economy
- National Early Learning & Childcare System
- Before-and-After School Program Subsidy
- Women’s Entrepreneurship Strategy
- Canada Emergency Wage Subsidy
- Canada Emergency Business Account Expansion
- Business Credit Availability Program Improvement
- Support For Hardest-Hit Industries
- Support Seniors with Provinces & Territories
- Criminal Code Amendments
- Increase Old Age Security
- Increase Canada Pension Plan Survivor Benefit
- Personal Support Worker Measures
- Disability Inclusion Plan
- Canadian Disability Benefit
- Employment Strategy
- Improve Eligibility Process
- Reduce Chronic Homelessness
- Worker Training
- Update Outdated IT Systems
- GC-Wide Data Collection Approach
- Strengthen the Official Languages Act
- B9.3 Investigations Management
- B9.3.1 Fraud Detection Management
- B10.4 Human Resources Management
- B10.4.2 Workforce Management
- B11.5 Risk & Internal Compliance Management
- B11.5.1 Risk Operations Management
- Pursue Service Improvements
- Integrity Case Management System
- Establish Necessary Internal Governance
- Safeguard Program Integrity
- Investigate Allegations of Benefits Non-Eligibility / Non-Entitlement
- Investigate SIN Fraud
- Investigate EI Fraud
- Detect & Refer To Investigate Pension Fraud
- <<Asset at Risk>> Data
- <<Asset at Risk>> Reputation
- <<Asset at Risk>> Finacial
- Asset
- Capability
- Security Capability
- Solution Capability
- Other Capability
- Asset
- 11 - Incorporate Digital Principles Into Operations, Programs & Service Design
- 74 - Introduce stronger project oversight at the concept phase
- 7 - Shift Culture & Processes Toward Open By Design
- 73 - Rationalize investments
- 70 - Evolve IM/IT management practices, processes and tools
- 57 - Promote digital literacy and collaboration
- Service orientation and user-centered
- Improving service delivery and compliance with the new Policy on Service and Digital as well as the OneGC Vision
- Open, collaborative and accessible
- Digital collaboration tools
- Digitally enabled delivery
- Departmental Application Strategy, data centre consolidation, and cloud adoption
- Data Strategy
- Good governance
- Early alignment and review discussions starting at the concept phase, and GCEARB
- Enhancing project oversight
- GC Enterprise Architecture Framework - Business Architecture Guide
- GC Enterprise Architecture Framework - Information Architecture Guide
- GC Enterprise Architecture Framework - Application Architecture Guide
- GC Enterprise Architecture Framework - Technology Architecture Guide
- GC Enterprise Architecture Framework - Security Architecture Guide
- Citizen First 8: An in depth look at how citizens experience government services (Resource)
- 2018-19 Survey of Canadians on Privacy (Resource)
- GC Digital Operations Strategic Plan (DOSP) 2021-2024 (Course of Action)
- 1. Invest In Easy‑To‑Use, Reliable, Modern and Secure IT Systems, Networks and Infrastructure That Support Operations (Course of Action)
- 2. Develop and Deliver Services That Put Users First (Course of Action)
- 3. Improve Data-Driven Decision‑Making (Course of Action)
- 4. Maximize Value From GC-Held Data and Information (Course of Action)
- 5. Modernize Funding and Procurement to Support Agile Execution Practices (Course of Action)
- 6. Act Ethically and In Environmentally Sustainable Ways (Course of Action)
- 2021–2024 DOSP Priorities And Actions (Course of Action)
- Enterprise Plans
- Enterprise Strategic Initiatives
- Promote Key Content To Base (Course of Action)
- Adopt SAFe (Scaled Agile Framework) (Course of Action)
- Apply Lean-Agile Transformation (Course of Action)
- Think Lean (Course of Action)
- Leverage the Agile Manifesto (Course of Action)
- Focus On Product Lifecycle and Organizational Value (Course of Action)
- Focus On Providing Insight To Inform and Deliver Organizational Value (Course of Action)
- Deliver A Minimum Viable Architecture (MVA) (Course of Action)
- Evolve and Mature The Architecture Roadmap (Course of Action)
- Achieve Business Outcomes and Deliver Value (Course of Action)
- Enterprise Strategies:
- Spoke and Hub Service Model
- Event Logging Standization
- Unified Log Management & Analytics Approach
- Leverage of AI, ML & Automation
- Data Masking Strategy
- SPOKE (ESDC): Centralized Log Monitoring Security Capabilities
- Network Monitoring
- Network IDS/IPS
- Secure Networks e.g. VPN
- Network Access Control
- Network Devices
- Network Flow e.g. Netflow
- Infrastructure Monitoring
- CASB
- Secure Web/Email Gateways
- DOS/DDOS Prevention
- APT/Anti-malware Detection
- Firewalls
- Vulnerability Management
- ICAM
- Servers
- Mainframes
- DNS/DHCP Security
- SIEM
- Endpoint Detection Response
- Data Security e.g. DLP
- HIDS/HIPS
- Application Monitoring
- Application Security
- Database Security
- Data Centre/Cloud Monitoring
- Data Centre Security
- Cloud Security
- Data Masking
- HUB: Centralized Log Monitoring Security Capabilities
- SIEM
- Infrastructure Visbility & Awareness for Security (IVAS)
- Event Correlation & Behaviour Analysis (ECBA)
- Securirty Orchestration, Automation & Response (SOAR)
- Central Logging Service
- CCCS Cyber Defence
- Cyber Threat Monitoring, Detection & Assessment
- Incident Response & Support
- CCCS Dynamic Defence (sensors)
- Improve Data Integration In The Enterprise
- List Relevant Data Integration Standards
- Publish In The Open All Reusable Common Artifacts (Course of Action)
- Develop and Leverage Cohesive Horizontal Enterprise Services (Capability)
- Follow Security and Privacy Best Practices (Course of Action)
- Set Up Your Environment (Course of Action)
- Stay in Control (Course of Action)
- Ensure Privacy (Course of Action)
- Manage Secrets (Course of Action)
- Manage Leaks (Course of Action)
- Open Up At Inception (Course of Action)
- Be Humble and Open Minded (Course of Action)
- Manage the Community (Course of Action)
- Government 2.0 (Resource)
- Common Components for DigitalBC (Resource)
- Re-use existing common components to create your product or service (Resource)
- Government as a Platform - Digital Government and Gov 2.0 (Resource)
- A working definition of Government as a Platform (Resource)
- Web Experience Toolkit (Resource)
- GC Service & Digital Target Enterprise Architecture (Resource)
- Lessons from Estonia on digital government (Resource)
- 1988 National Bureau of Standards’ Management Guide to Software Reuse (Resource)
- Keep SharePoint Access and Permissions Up-To-Date (Course of Action)
- Adaptive Identity (Capability)
- Context-Specific, Policy-Enforced Data Security (Capability)
- Threat Scope Reduction and Risk Avoidance (Capability)
- Real-Time/Near Real-Time Response (Capability)
- Separation of Concerns (Capability)
- Automated Audit (Capability)
- Secured Zones (Capability)
- Policy-Driven Access Control (Capability)
- Develop WLM-and-CE Roadmap (Course of Action)
- B10.6.2 IT Technical Management (Capability)
- B10.6.4 Channel Infrastructure Management (Capability)
- Capability
- B10.6.3 IT Service Management & Operations (Capability)
- Present ESDC's WLM Journey (Course of Action)
- Consider 2 Current State Diagrams, 1 For Each DC (Course of Action)
- Consider 2 Target State Diagrams, 1 For Each DC (Course of Action)
- Include Detailed List of All Applications In Annex (Course of Action)
- Consider Use of Tags (for Reporting) (Course of Action)
- Assign Epics To Managers, Features To Leads (Course of Action)
- Obtain Help From The SharePoint Migration Team (Course of Action)
- Investigate Harmonizing SP365 Folders With "SAS-SAS" Team (Course of Action)
- B10.4.3 Training and Development Management (Capability)
- B10.4.2 Workforce Management (Capability)
- B10.4.1 Workforce Planning and Analysis (Capability)
- Develop Employee Career (Value Stream)
- Develop More IT Fact-and-Evidence Based Analyses
- Improve ESDC’s Use of Data to Deliver on Priorities & Outcomes
- Focus Governance First On High-Value Data Across The Enterprise
- Focus Data Literacy Improvements On Key Staff Who Can Deliver Great Benefits
- Focus On Yielding Limited, Targeted, Consequential Results Over Those Without Long-Term Value
- Gartner's Data Governance Discussion Paper For ESDC (2014)
- Develop and Implement A Data Vision and Strategy
- Champion Greater Horizontality of ESDC's Data Flow
- Champion the Establishment of Data Governance and Data Policies to Improve Data Management
- Improve Partner Access to ESDC Data and Drive Innovation Via Uptake and Use
- Promote Awareness and Education Across ESDC On Data Management Best Practices and Processes, and Ensure Knowledge Transfer To Executives and to CDO Staff
- Service Management Use of Data
- Client Experience Use of Data
- Benefit Delivery Use of Data
- Client and Account Data
- Client Employment and Earnings History
- Analytical Insights and Reports
- Demographic Data Intake Partnerships - Obtain Improved Partner Data
- Data Policy - Consistently Towards Successful Strategy Implementation
- Surveys and Research - Identify Gaps In Available Data
- Data Governance - Define The Data Management Framework
- Data Strategy - Data As An Asset
- Build A Platform For Enterprise Interoperability
- Introduce A Strategy Or Use of Open Source Software and Open Standards
- Introduce A Mobile Application Strategy and Framework
- Develop An Application Programming Interface Strategy
- Introduce A Government API Store
- Determine the Feasibility of Developing a “Tell Us Once” Approach for Government
- Enhance Online Infrastructure To Enable Departments To Release Their Data and Information
- Develop A Master Data Management Program
- Advance Analytics
- Implement A Platform For External Collaboration
- Implement GCDOCS
- Migrate Websites to Canada.ca and Assess Options For A Single GC Digital Service Platform
- Identify a Business Lead to Develop a Data Lake Service Strategy
- 1. Develop Policies Ensure Canadians Can Use Their Talents, Skills and Resources to Participate in Learning, Work and Their Community
- 3. Provide Income Support To Seniors, Families With Children, and Those Unemployed Due to Job Loss, IIllness or Caregiving Responsibilities
- 5. Ensure Labour Relations Stability via Mediation Services
- 2. Deliver Programs To Help Canadians Move Through Life’s Transitions
- 4. Helping Canadians With Distinct Needs (Indigenous People, Persons with Disabilities, Homeless People, Travelers and Recent Immigrants)
- 7. Deliver Programs and Services On Behalf Of Other Departments and Agencies
- 6. Promote a Fair and Healthy Workplace
- 1. General
- 2. Solution Overview
- 3. Reporting
- 4. Support
- 5. Architecture
- 6. Data Conversion & Migration
- 7. Security
- 8. Data Exchange
- 9. Training
- 10. Cost
- 11. Timelines
- Auto Enrol (Value Stream)
- Agent Portal (Value Stream)
- IVR (Value Stream)
- Client Notification (Value Stream)
- TPA Partner Exchange (Value Stream)
- Reporting & Analytics (Value Stream)
- Pre-Qualified Candidate List (Capability)
- Find & View Cases (Capability)
- Receive Attestation (Capability)
- Update Case (Capability)
- Notify: Eligible / Not Eligible (Capability)
- Metrics (Capability)
- Data Exchange (Capability)
- Case Creation (Capability)
- Client Notification (Capability)
- Authenticate Cases (Capability)
- TPA Sync (Capability)
- Reports (Capability)
- Receive Attestation (Capability) (copy)
-
- Test
- Build
- Deploy
- Run
- Monitor
- Manage
- Intake
- Plan
- Define Success Criteria
- UX/ Design
- Solution Enablement
- Governnance
- Service Evaluation
- Service Direction
- Service Monitoring Oversight
- Service Architecture Standards
- Management
- Business Intake Management
- Service Procurement Management
- Service Contract Management
- Service Strategy Development
- Delivery
- Service Level Management
- Availability Management
- Continuity Management
- Financial Management
- Capacity Management
- Security Management
- Support
- Service Desk
- Problem Management
- Change Management
- Incident Management
- Release Management
- Configuration Management
- Solution Delivery
- SOA Service Architecture
- SOA Service Pattern Development
- SOA Service Deployment
- SOA Service CI/CD
- SOA Service Security
- API Design
- API Development
- API Publishing
- API Security
- API Scaling
- API Discovery
- API Testing
- API Exploring
- API Subscription
- MFT Solution Development
- Platform Operations
- Service Bus Operations
- API Gateway
- Message Fabric
- API Store Operations
- CI/CD Pipeline
- API Tooling Operations
- SOA Operations
- MFT Operations
- Infrastructure
- On-Premise Operations
- Cloud Infrastructure Operations
- Business Service Management
- SOA Services Monitoring
- SOA Service Analytics
- API Monitoring
- API Analytics
- MFT Monitoring
- MFT Analytics
- Build / Test
- Monitor/Support
- Approve Deployment
- Build
- CI/CD Pipeline
- Test
- Build
- Deploy
- Run
- Notify
- CI/CD Pipeline
- Feedback
- UAT
- Event Broker
- ESDC Interoperability Platform (EIP)
- Cloud Native Computing Foundation Landscape
- Plan
- Intake
- Define Success Criteria
- Architecture Standards
- Solution Demo
- User Story
- Definition of Done
- Client Journey Map
- Investment Agreement
- Design Thinking
- KPIs
- Solution Train
- Use Case
- Storyboarding
- Intake
- Plan
- Define Success Criteria
- UX/ Design
- Deploy
- Build / Test
- Monitor/Support
- Approve Deployment
- Outcome Evaluation
- Story Boarding
- Prototyping
- Test
- Build
- Deploy
- Run
- Monitor
- Manage
- Notify
- CI/CD Pipeline
- Platform Stewards
- Interoperability Service Division (ISD).
- API Lifecycle Management
- ESDC User
- Developer
- Operator
- Business Interface
- Representation
- User
- Identification and Authentication
- Access Control
- Privilege Management
- Consent Management
- Network Device and Infrastructure Protection
- Security Visibility and Real-time Threat Protection
- <<Threat Agent>> Attacker
- Threat Event
- Loss Event
- Implemented Control Measure
- <<Implemented Control Measure>> User Entity Behavior Analytics (UEBA)
- <<Implemented Control Measure>> Microsegmentation
- <<Implemented Control Measure>> Multi-factor authentication (MFA)
- <<Implemented Control Measure>> Conditional access
- <<Implemented Control Measure>> Single Sign-On (SSO)
- <<Implemented Control Measure>> Security Information and Event Management (SIEM)
- <<Implemented Control Measure>> Software Defined Perimeter
- <<Implemented Control Measure>> Data Loss Prevention (DLP)
- <<Implemented Control Measure>> API (Application Programming Interface) Gateway
- Identification and Authentication (copy)
- Privilege Management (copy)
- Access Control (copy)
- Consent Management (copy)
- Network Device and Infrastructure Protection (copy)
- Security Visibility and Real-time Threat Protection (copy)
- <<Implemented Control Measure>> Network policies aligned to app micro segments
- Threat Agent
- <<Threat Agent>> Td2 - Passive, casual adversary with minimal resources who is willing to take little risk
- <<Threat Event>> MSCA Account takeover
- <<Threat Event>> Application for Benefit (CERB & EI)
- <<Loss Event>> Fraudulent Payment
- <<Loss Event>> Trust / Client Confidence
- <<Threat Agent>> Td4 : Sophisticated adversary with moderate resources who is willing to take little risk (e.g., organized crime, sophisticated hackers, international corporations)
- <<Threat Agent>> Td3 - Adversary with minimal resources who is willing to take significant risk (e.g., unsophisticated hackers)
- <<Threat Event>> EI/CPP/OAS personal information changes
- Safe Restart Agreement (Provinces & Territories)
- Testing Assistance Response Team
- Vaccine Task Force
- Immunity Task Force
- Nadia Benoit
- Senior Project Manager
- Stakeholder Business Owner
- Stakeholder Branch Sponsor
- Kathleen Walford
- Jeremy Sales
- Nathalie Beaulieu
- Stakeholder Branch Sponsor
- (Fraud) Enforcement Investigation
- Compliance Investigation
- Enforcement Investigation Process
- Judiciary
- Case Management
- Business Analyst
- Integrity Operations
- Integrity Services Branch
- Employment Insurance (EI)
- Social Insurance Number (SIN)
- Employment and Social Development Canada
- Canada Pension Plan (CPP)
- Old Age Security (OAS)
- Temporary Foreign Workers Program (TFWP)
- International Mobility Program (IMP)
- Workload
- Intelligence Gathering
- Security of Information
- Operational Reporting
- Evidence Immutability
- ISB Staff
- Observation Management
- Case Creation
- Case Assignment
- Case Management
- Reporting
- Retention & Disposition
- ICST
- Regional Service Canada
- Benefits Delivery Services
- Policy Group
- System Administrator
- ICST Personnel
- NHQ Business Intelligence Personnel
- Regional Enformcement Personnel
- NHQ Training Personnel
- Compliance Personnel
- Benefits Delivery Services Personnel
- Enforcement Maturity Model (EMM)
- ISB Senior Management
- Integrity Services National Committee (InSNC)
- Integrity Operations
- TISMB Assistant Deputy Minister
- Benoit Long
- Mark Perlman
- ESDC Chief Financial Officer
- Benefits Delivery Modernization (BDM)
- Financial Management Advisor
- Project Management Advisor
- Peter Littlefield
- Chief Information Officer
- S Lacelle
- IITB Executive Director
- IITB Director
- Nathalie Bédard
- IITB Managers (Architecture, CRM, Interop, etc.)
- System Integrator (CRM, BDM)
- Deputy Project Manager
- Keith Milton (consultant)
- Project Control Officer
- Senior Business Analyst
- A. Mikelsons
- Business Analyst (consultant)
- Change Management Officer
- Functional Leads (Vendor, IITB, Training, etc.)
- Subject Matter Experts
- Jeremy Sales
- Linda André
- Nadia Benoit
- Business Owner
- Senior PM PDO
- PM PDO
- Regional Executives
- Regional Managers
- Executive Sponsor
- Elise Boisjoly
- Integrity Operations
- Kathleen Walford
- Executive Director, Enforcement
- Donna Blois
- Director, Business Solutions Management
- Director, Program Support
- Marc Lafontaine
- Sylvie Cyr
- Functional Manager
- Functional Manager, I/O Systems
- Functional Managers (EI / Pensions / Training / QM)
- Implemented Control Measure
- <<Threat Event>> MSCA Account takeover
- <<Threat Event>> Application for Benefit (CERB & EI)
- <<Threat Event>> EI/CPP/OAS personal information changes
- <<Loss Event>> Trust / Client Confidence
- <<Loss Event>> Fraudulent Payment
- <<Threat Agent>> Td4 : Sophisticated adversary with moderate resources who is willing to take little risk (e.g., organized crime, sophisticated hackers, international corporations)
- <<Threat Agent>> Td3 - Adversary with minimal resources who is willing to take significant risk (e.g., unsophisticated hackers)
- Pan Canadian Trust Framework
- Issuer
- Holder
- Verifier
- Subject
- Business Process
- Entity 1
- Principal
- Agent
- Entity 2
- Appont
- Relationship Continuity
- Balanced Relationship
- Entity 1
- Principal
- Agent
- Entity 2
- Appoint
- Relationship Continuity
- Balanced Relationship
- Nik
- Architect
- Person (Atomic Entity1)
- Person (Atomic Entity2)
- Person (Atomic Entity3)
- Organization (Compound Entity)
- Credential
- Content
- Witness
- Container
- Architecture Guardrails
- API Architecture Guardrails
- Business Architecture
- Application Architecture
- Data Architecture
- Technology Architecture
- Security Architecture
- API Guardrail Specification
- Developer View
- Operator View
- Executive View
- Enterprise Architecture
- Chief Architect
- UX Architecture Guardrails
- Data Management Architecture Guardrails
- IAM Architecture Guardrails
- Data Analytics Architecture Guardrails
- External
- Internal
- Business Case
- API Architecture Guardrails
- Business Intake Management
- Service Architecture Standards
- API Testing
- API Architecture Guardrails
- Business Intake Management
- Service Architecture Standards
- API Publishing
- API Development
- API Exploring
- ARC Presentation
- API Guardrail Document Representation
- Threat Agent
- Management Controls
- Threat Agent
- Management Security Controls
- Activities from EA domains including ESA
- Activities from IT Security (SA&A process)
- Threat Agent
- Management Security Controls
- Business Service
- Accessibility Guardrails
- Digital Experience Guardrails
- Product Management
- EA Requests EA Assessment
- [ESDC-EA] Provide EA Assessment <<ESDC EARB>>
- Facilitated EA Assessment Review & Meeting
- Draft EA Assessment
- Pre-Brief Review of EA Assessment
- Finalize EA Assessment
- EARB Deck Reviews (N Times)
- EARB Co-Chairs
- ESDC CIO
- EARB EA Assessment Group
- EARB Deck Review Attendees
- Lead Enterprise Architect
- EA Assessment <<EARB Deck Slide(s)>>
- EA Requests EA Assessment
- [ESDC-EA] Provide EA Assessment <<ESDC EARB>>
- Facilitated EA Assessment Review & Meeting
- Draft EA Recommendation, Assessment
- EA Assessment Peer Review By Domains
- Pre-Brief Review of EA Assessment
- Finalize EA Assessment
- EA Assessment Review Team
- (Lead) EA Assessor
- Business Architect Assessor
- Data Architect Assessor
- Applicaiton Architect Assessor
- Technology Architect Assessor
- Security Architect Assessor
- EARB Co-Chairs
- ESDC CIO
- EA Requests SAS Feedback
- [SAS] Provide EA Feedback <<Lite Projects>>
- BRM Facilitated Stakeholder Meeting
- SAS Peer Review
- Draft EA Assessment
- Finalize EA Assessment
- SAS Lite Project EA Assessment
- SAS Peer Review Team
- Assigned Enterprise Architect
- Peer Enterprise Architect
- BDM Architecture Playbook
- Lite Project Proposed
- Chief Information Officer of Canada (Business Role)
- Approve 3-Year DOSP (Business Process)
- Treasury Board of Canada Secretariat (TBS) (Business Role)
- Develop DOSP (Business Process)
- Enterprise Mission
- Development of EA Principles
- Quality Management
- Step 1- Identification of the EA Principles
- Step 2- Definition of the EA Principles
- Step 3 - Revision of EA Principles
- Step 4 - Govern and Communicate EA Principles
- Step 5 - Leverage EA Principles
- Additional Key Stakeholders
- Agreement of Revisions
- Govern Revisions
- Endorse Revisions
- Communicate Revisions
- Champion EA Principles
- Senior Management
- Enterprise Architecture Review Board (EARB)
- Architecture Review Committee (ARC)
- Architecture Practitioner
- Solution Designer
- Architecture Guardrails
- API Architecture Guardrails
- Architecture Standards
- UX Architecture Guardrails
- Accessibility Architecture Guardrails
- Digital Experience Architecture Guardrails
- Data Management Architecture Guardrails
- IAM Architecture Guardrails
- Internal Architecture Guardrails
- External Architecture Guardrails
- Data Analytics Architecture Guardrails
- Insight Reporting Architecture Guardrails
- Advanced Analytics Architecture Guardrails
- Open Data Architecture Guardrails
- Data Exchange Architecture Guardrails
- Architecture Guardrails
- API Architecture Guardrails
- Architecture Standards
- UX Architecture Guardrails
- Accessibility Architecture Guardrails
- Digital Experience Architecture Guardrails
- Data Management Architecture Guardrails
- Master DM Architecture Guardrails
- Reference DM Architecture Guardrails
- IAM Architecture Guardrails
- Internal User Architecture Guardrails
- External User Architecture Guardrails
- Data Analytics Architecture Guardrails
- Insight Reporting Architecture Guardrails
- Advanced Analytics Architecture Guardrails
- Open Data Architecture Guardrails
- MFT Architecture Guardrails
- SOA Architecture Guardrails
- QualiWare Cloud Provider (Business Role)
- ESDC QualiWare Application Management (Business Role)
- ESDC EA Content Creation
- BDM Architecture Content Creation (Business Collaboration)
- Benefits Application Delivery (BAD) (Business Role)
- Digital Expreience and Client Data (DECD) (Business Role)
- Technology Platform (Business Role)
- Service Delivery Hub (SDH) (Business Role)
- BDM EA Team (Business Role)
- BDM Enterprise Architecture Working Group (EA WG) (Business Collaboration)
- BDM Architecture Review Committee (ARC) (Business Collaboration)
- ArchiMate 3.1 Notation (Representation)
- BDM Architecture QualiWare Templates Suite (Representation)
- Chief Architect (Business Role)
- Daniel Desforges (Business Actor)
- EA Strategy and Roadmap Lead (Business Role)
- Paul Middleton (Business Actor)
- Director Responsible for the EA Strategy and Roadmap (Business Role)
- Christiane Faucher (Business Actor)
- EA Roadmap Workbook (Product)
- The Integrated Horizon 1 (H1) Work Plan (Product)
- EA Strategy (Executive Summary) (Product)
- EA Strategy (Detailed) (Product)
- EA Horizons Strategy Outcomes (Product)
- Structured Data
- Text
- Spreadsheet
- Image
- Video
- Voice
- Social
- Web Data
- Cloud Licensed
- Cloud: Public Open
- Cloud: Other Core Systems
- Ingest
- Data Quality
- Batch / ETL
- Message
- Syncronization
- Persist and Access
- Repository (Certified)
- Enterprise Data Warehouse
- Repository Data Mart
- Dependant Data Mart
- Conditional Data Mart
- Data Lake ( Non-Certified )
- Virtualization / Federation
- Integration
- Delivery
- In Memory Database
- Delivery
- Scheduled Report
- Scorecard
- Real Time Reporting
- Alert
- Dashboard
- Datasets
- Self Service
- Visualization
- Discovery
- Web API
- Advanced Analytics
- Decision Model Management
- Management
- Data Governance
- Governance, Risk and Compliance
- Data Reservoir Operations
- Data Quality Analyst
- Infrastructure Operator
- Enterprise Architect
- Information Steward
- Integration Developer
- Master Data Management
- Meta Data Management
- Information Curator
- Privacy and Security
- Technical Standards for Data Integration
- An Information Architecture Vision: Moving from Data Rich to Information Smart
- Data Management Body of Knowledge
- Encyclopedia of Computer Science
- Gartner Identifies Top Ten Data and Analytics Technology Trends for 2021
- Information Architecture: Business Intelligence & Analytics and Metadata Management Reference Models
- ISO-IEC 10646.2020 Information Technology - Universal Coded Character Set (UCS)
- ISO-IEC 11179-1.2015 Information Technology - Metadata Registries (MDR)
- Merriam-Webster Dictionary
- O-DEF The Open Data Element Framework
- The Rise of Big Data
- Dr. Chris Harding
- Data Planning
- Data Discover & Extract
- Data Transform & Integrate
- Data Verify
- Data Use
- Store Data
- Archive Data
- Data Disposition
- Information Technology Strategy Team (Business Role)
- Enterprise Architecture Practitioners
- Business Architect
- Information Architect
- Application Architect
- Technology Architect
- Security Architect
- Departmental SharePoint Site Administration and Support (Business Role)
- SharePoint Migration Project Team (SharePoint Role) (Business Role)
- Site Designer (SharePoint Role) (Business Role)
- IM Lead (SharePoint Role) (Business Role)
- Business Analyst (SharePoint Role) (Business Role)
- Site Owner (SharePoint Role) (Business Role)
- Technical Consultant (SharePoint Role) (Business Role)
- IITB IM Lead (Business Role)
- IITB IM Director (Business Role)
- Joanne Mayhew (Business Actor)
- Kristin Robertson (Business Actor)
- Marie-Claire Simard (Business Actor)
- Business Actor
- Meredith McNaughton (Business Actor)
- Melissa Cyr (Business Actor)
- Stephen Bisang (Business Actor)
- IM Planning (Business Process)
- Collection, Creation, Receipt and Capture (Business Process)
- Organization (Business Process)
- Use and Dissemination (Business Process)
- Maintenance, Protection and Preservation (Business Process)
- Disposition (Business Process)
- Evalutation (Business Process)
- OWNER (High Level SharePoint Role) (Business Role)
- MEMBER (High Level SharePoint Role) (Business Role)
- VISITOR (High Level SharePoint Role) (Business Role)
- Lifecycle Management
- Standard Generalized Markup Language (SGML) (Representation)
- HyperText Markup Language (HTML) (Representation)
- Open Document Format (ODF) (Representation)
- Microsoft Office Word (Representation)
- Business Object
- Business Process
- Susan Donavan Brown (Business Actor)
- Governance Authority (Business Role)
- Information Technology Services (Business Service)
- ESDC Employees (Business Role)
- ESDC Clients (Business Role)
- Canadian Citizens (Business Role)
- SharePoint Online Learning Essentials (Business Object)
- Resource Centre Frequently Asked Questions (FAQs) (Business Object)
- Full Control [NOT AVAILABLE] (SharePoint Permission) (Business Role)
- Design (SharePoint Permission) (Business Role)
- Limited Access [DEFAULT] (SharePoint Permission) (Business Role)
- View Web Site Statistics (SharePoint Permission) (Business Role)
- Everyone EXCEPT External Users (DOMAIN Group) (Business Role)
- NOT ACTIVE: ALL Users (includes PUBLIC) (SharePoint Group) (Business Role)
- Read (SharePoint Permission) (Business Role)
- Contribute (SharePoint Permission) (Business Role)
- DesignerPlus (SharePoint Permission) (Business Role)
- TOGAF Standard v9.2
- Data Encoding Standards
- Content Display Standards
- HyperText Markup Language (HTML)
- Standard Generalized Markup Language (SGML)
- Open Document Format (ODF)
- Microsoft Office Word
- Hybrid Data
- Generic Data Structure Standards
- Relational Data Standards
- Structured Query Language (SQL)
- SQL or Call-Level Interface (CLI)
- Open Database Connectivity (ODBC)
- Spreadsheets
- RDF Triple Stores Standards
- Resource Description Framework (RDF)
- SPARQL Protocol and RDF Query Language (SPARQL)
- RDF Mapping
- JSON and YAML Standards
- JavaScript Notation Object (JSON)
- YAML (YAML Ain’t Markup Language)
- XML Standards
- Extensible Markup Language (XML)
- Document Type Definition (DTD)
- XML Schema Definition (XSD) Language
- XML Query (XQuery)
- XML Path Language (XPath)
- XPath Data Model (XDM)
- Domain-Specific Standards
- Fast Healthcare Interoperability Resources (FHIR)
- Open Financial Exchange (OFX)
- Open Banking Standard
- UN Electronic Data Interchange for Administration, Commerce and Transport (UN-EDIFACT)
- Dictionaries
- ISO 22745
- ECCMA Open Technical Dictionary (EOTD)
- Relational Data Standards
- Metadata Registries
- O-DEF Standard
- ERA Models
- Standard Data Models
- RDF Triple Stores
- Dublin Core Vocabulary
- Friend Of A Friend (FOAF) Vocabulary Specification
- JSON and YAML
- XML Standard
- BNF Standard
- Domain-Specific Structures
- Hybrid Data
- DMBOK
- Data Science
- Structured Data Query Languages
- Transformation Utilities
- Description Source-URL
- Perl
- Turing eXtender Language (TXL)
- eXtensible Stylesheet Language (XSL)
- Template Languages
- Django Template Processor
- The Apache FreeMarker
- Hugo Templating
- Liquid Template Language
- Machine Learning
- Zero Trust Architecture Guardrails
- Consumption (business function)
- Decision Model Management (business role)
- Advanced Analytics (business service)
- Web API (business interface)
- Self Service (business interface)
- Visualization (business service)
- Alert (product)
- Scorecard (product)
- Real Time Reporting (product)
- Scheduled Report (product)
- Dashboard (business interface)
- Datasets (business object)
- Discovery (business service)
- Platform Operators (business role)
- Platform Stewards(business role)
- Data Stewards (business role)
- Business Use-Case Stewards (business role)
- Business Use-Case Contributors (business role)
- EA Manager (Business Role)
- EA Director (Business Role)
- EA Executive Director (Business Role)
- SABR Director General (Business Role)
- Enterprise Architecture Executive Management (Business Collaboration)
- ADO Epic (Representation)
- ADO Feature (Representation)
- ADO Task (Representation)
- EA-SAS Team Guide(s) On Use Of ADO (Product)
- SABR DG Report (Product)
- ADO Administration (Business Role)
- ADO Operations (Business Role)
- ADO User (Business Role)
- EA Administrative Assistant (Business Role)
- EA Training Coordination (Business Function)
- Team Management (Business Function)
- Workload Management (Business Function)
- Capacity Management (Business Function)
- Emergency / Fire Task Creation (Business Process)
- ADO User Story (Representation)
- Sprint Planning (Business Process)
- Backlog Grooming (Business Process)
- SA Strategic Planning (Business Service)
- SA Consulting (Business Service)
- SA Alignment (Business Service)
- ESDC Chief Architect (Business Role)
- SAS SharePoint Content Curator (Business Role)
- ATAG 2.0 Glossary
- SAS ADO Content Curator (Business Role)
- ADO CI/CD Steward (Business Role)
- "SAS_DesignerPlus" (Custom SharePoint Group) (Business Role)
- "SAS_Contributors" (Custom SharePoint Group) (Business Role)
- "SAS_Owners" (Custom SharePoint Group) (Business Role)
- Manager, Business Architecture (Business Role)
- Business Architecture Lead (Business Role)
- CSDContributers (SharePoint Permission) (Business Role)
- ContributeWithoutDelete (SharePoint Permission) (Business Role)
- APM_DesignerPlus (SharePoint Permission) (Business Role)
- Edit (SharePoint Permission) (Business Role)
- Restricted View (SharePoint Permission) (Business Role)
- View Only (SharePoint Permission) (Business Role)
- "SAS_Collaborators" (SharePoint Group) (Business Role)
- CSD_Contributers (Custom SharePoint Group) (Business Role)
- APM_DesignerPlus (Custom SharePoint Group) (Business Role)
- CSD_Designers (Custom SharePoint Group) (Business Role)
- CDO Contributors (Custom SharePoint Group) (Business Role)
- TechArch_Contributors (Custom SharePoint Group) (Business Role)
- CSD_Owners (Custom SharePoint Group) (Business Role)
- SecurityReponse_WG (Custom SharePoint Group) (Business Role)
- Viewers (Custom SharePoint Group) (Business Role)
- Business-Focussed Review
- Sr.ADM ISSD
- Technical Debt Risk Reduction Framework
- Solution Architecture
- *.archimate Files
- 1. [Archi] Prepare *.archimate File For Export
- 2. [Archi] Export *.XML File
- 3. [QLM] Tools, Import ArchiMate File
- 4. [QLM] Update / Modify Imported Views
- 5. [QLM] Publish New Content
- 6. [QLM] Promote New Content To Base
- Exported *.XML File
- Enterprise Data Warehouse
- Enterprise Data Lake
- Enterprise Data Catalog
- Data Science & Machine Learning (DS&ML)
- Reference Data Management
- Master Data Management
- Digital Experience & Client Data (DECD)
- B.A.D. Team
- Technology Platform
- Identity Management & Integrity
- Service Delivery Hub
- Business Role
- Business Role
- Office of the Chief Data Officer (OCDO)
- Chief Data Officer (CDO)
- Data & Analytics Services
- Data Foundations Programme
- BDM Analytics & BI
- BDM Workforce Management
- LMIA
- ESDC Cloud Reference Architecture
- BDM Enterprise Architecture Team
- Cloud Architecture Practitioners
- Cloud Center of Excellence
- Cloud Operations
- Cloud Archiect
- Data Hub
- Enterprise Canonical Model
- National Address Register
- Benefits Knowledge Hub (BKH)
- Business Delivery Modernization (BDM)
- Data Management
- PanCanadien Trust Framework v1.3 - Atomic Processes
- Identity Domain General - IDDG
- Identity Information Determination - IDID
- Identity Information Validation - IDIV
- Identity Resolution - IDRE
- Identity Evidence Determination - IDED
- Identity Verification - IDVE
- Identity Linking - IDLI
- Identity Evidence Acceptance - IDEA
- Identity Establishment - IDES
- Identity Continuity - IDCO
- Identity Maintenance - IDMA
- Relationship Domain General - REDG
- Relationship Information Determination - REIDRelationship Information Determination - REID
- Relationship Evidence Determination - REED
- Relationship Evidence Acceptance - REEA
- Relationship Information Validation - REIV
- Relationship Resolution - RERE
- Relationship Establishment - REES
- Relationship Verification - REVE
- Relationship Continuity - RECO
- Relationship Maintenance - REMA
- Relationship Suspension - RESU
- Relationship Reinstatement - RERI
- Relationship Revocation - RERV
- Credential Domain General - CRDG
- Credential Issuance - CRIS
- Credential Authenticator Binding - CRAB
- Credential Validation - CRVA
- Credential Verification - CRVE
- Credential Maintenance - CRMA
- Credential Suspension - CRSU
- Credential Recovery - CRRC
- Credential Revocation - CRRV
- Consent Domain General - CODG
- Consent Notice Formulation - CODG
- Consent Notice Presentation - CONP
- Consent Request - CORQ
- Consent Registration - CORG
- Consent Review - CORE
- Consent Renewal - CORN
- Consent Expiration - COEX
- Consent Revocation - CORV
- Signature Domain General - SIDG
- Signature Creation - SICR
- Signature Checking - SICH
- The College @ESDC
- Lite Project Team
- Create Teams Chat Group
- Find & View Cases (Business Object)
- Business Object
- Business Object
- Business Object
- Business Object
- Business Object
- Business Object
- Business Object
- High Level Solution Process Flow (Business Process)
-
-
-
- Requirement Catalog
- Business Requirements
- Functional Requirement
- Non - Functional Requirement
- Security Requirement
- Accessibility Requirement
- High Level Reqirements
- Constraints and Assumptions
- Feature Value
- Principles Catalog
- Feature Outcome
- Feature Success Critera
- <<Control Objective>> Enabling the establishment of a secure and resilient enterprise digital security ecosystem in which government services are delivered safely and securely
- <<Control Objective>> Providing a secure platform that ensures safety and protection of systems and data
- End-to-end safety and protection of GC’s information, applications, devices, network, hardware and physical facilities
- Develop, adopt, and enforce mature security processes, governance structure and standard
- Develop, adapt and implement the Security Control Framework (SCF) in order to enable key Government business activities
- Ensuring the confidentiality, integrity, and availability of the GC’s IT infrastructure and the Government’s critical business and customer data
- Users
- User Devices
- Vunerability
- Risk
- Control Objective
- Security Requirement
- <<Security Principle>> Zero Trust Principles
- Control Measure
- <<Security Requirement>> Comprehensive Identity, Credential and Access Management (ICAM)
- <<Security Requirement>> Centralized authentication
- <<Security Requirement>> Strong two-factor authentication (2FA) for all users, regardless of location
- <<Security Requirement>> Risk Adaptive Access Control
- <<Security Requirement>> Implement fine-grained, least privilege access control
- <<Security Requirement>> Implement effective user account management procedures
- <<Security Requirement>> Establish roles/group memberships
- <<Security Requirement>> Associate roles/group memberships with each user
- <<Security Requirement>> Add/remove memberships as required
- <<Security Requirement>> Maintain an update inventory of all user devices
- <<Security Requirement>> Assign each device with a verifiable unique identifier
- <<Security Requirement>> Keep the configuration/health of all managed user devices up to date
- <<Security Requirement>> Secure boot considerations
- <<Security Requirement>> Limit access in accordance with policy
- <<Security Requirement>> Use of Mobile Threat Defense (MTD) tools/integration
- <<Security Requirement>> Identify and catalogue all network devices/components
- <<Security Requirement>> Minimize unauthorized lateral movement using network segmentation
- <<Security Requirement>> Limit physical and logical access to authorized personnel
- <<Security Requirement>> Identify and catalogue all Applications and Services
- <<Security Requirement>> Implement micro-segmentation to isolate applications and workflows
- <<Security Requirement>> Implement resource obfuscation
- <<Security Requirement>> Secure application development
- <<Security Requirement>> Software assurance and supply chain risk management
- <<Security Requirement>> Automation and orchestration
- <<Security Requirement>> Identify and catalogue all data resources
- <<Security Requirement>> Label data to distinguish sensitive from non-sensitive data
- <<Security Requirement>> Encrypt sensitive data at rest
- <<Security Requirement>> Encrypt all end-to-end communication
- <<Security Requirement>> Security Information and Event Management (SIEM)
- <<Security Requirement>> Traffic flow inspection and analysis
- <<Security Requirement>> Traffic flow inspection and analysis
- <<Security Requirement>> Real-time correlation, assessment and response based on inputs from multiple sources (including data from automated monitoring tools)
- <<Control Measure>>Enable throttling and cache
- <<Control Measure>> Authentication using user identity, app identity, device identity
- <<Control Measure>>Enable identity context in the API traffic to authenticate all packets to the application (or service) whether the APIs are internal or external to the domain
- <<Security Requirement>> Comprehensive Identity, Credential and Access Management (ICAM) (copy)
- <<Security Requirement>> Centralized authentication (copy)
- <<Security Requirement>> Strong two-factor authentication (2FA) for all users, regardless of location (copy)
- <<Security Requirement>> Establish roles/group memberships (copy)
- <<Security Requirement>> Associate roles/group memberships with each user (copy)
- <<Security Requirement>> Add/remove memberships as required (copy)
- <<Security Requirement>> Risk Adaptive Access Control (copy)
- <<Security Requirement>> Implement fine-grained, least privilege access control (copy)
- <<Security Requirement>> Implement effective user account management procedures (copy)
- <<Security Requirement>> Maintain an update inventory of all user devices (copy)
- <<Security Requirement>> Assign each device with a verifiable unique identifier (copy)
- <<Security Requirement>> Keep the configuration/health of all managed user devices up to date (copy)
- <<Security Requirement>> Secure boot considerations (copy)
- <<Security Requirement>> Limit access in accordance with policy (copy)
- <<Security Requirement>> Use of Mobile Threat Defense (MTD) tools/integration (copy)
- <<Security Requirement>> Limit physical and logical access to authorized personnel (copy)
- <<Security Requirement>> Minimize unauthorized lateral movement using network segmentation (copy)
- <<Security Requirement>> Identify and catalogue all network devices/components (copy)
- <<Security Requirement>> Identify and catalogue all data resources (copy)
- <<Security Requirement>> Label data to distinguish sensitive from non-sensitive data (copy)
- <<Security Requirement>> Encrypt sensitive data at rest (copy)
- <<Security Requirement>> Encrypt all end-to-end communication (copy)
- <<Security Requirement>> Identify and catalogue all Applications and Services (copy)
- <<Security Requirement>> Implement resource obfuscation (copy)
- <<Security Requirement>> Automation and orchestration (copy)
- <<Security Requirement>> Implement micro-segmentation to isolate applications and workflows (copy)
- <<Security Requirement>> Secure application development (copy)
- <<Security Requirement>> Software assurance and supply chain risk management (copy)
- <<Security Requirement>> Traffic flow inspection and analysis (copy)
- <<Security Requirement>> Security Information and Event Management (SIEM) (copy)
- <<Security Requirement>> Traffic flow inspection and analysis (copy)
- <<Security Requirement>> Real-time correlation, assessment and response based on inputs from multiple sources (including data from automated monitoring tools) (copy)
- <<Security Requirement>> Zero Trust Requirements
- User Devices
- Network
- Resource Protection
- Users
- Continuous Monitoring
- <<Control Measure>> Enforce user/developer authentication using MFA to separate domain users for leastprivileged access to production and development system
- <<Control Measure>> Enforce segregation of duties
- <<Control Measure>> Enable audit logs
- <<Control Measure>> The permission should be short term and enforce MFA with jump boxes for Interactive access where applicable
- <<Control Measure>> Enforce authentication and authorization for short term access against Identity and Access Control
- <<Control Measure>> Whitelisting of traffic to deny all connections by default except specific connection that are enabled
- <<Control Measure>> Encryption in transit (e.g. Mutual TLS authentication, encrypting payload with JSON webtokens)
- <<Control Measure>> Server to server communication should be restricted (default deny) to only approvedinter application, server or hosts communication
- <<Control Measure>> Applications should be grouped into different zones (micro perimeters) based on the risk level and data within the application
- <<Control Measure>> Apply application level segmentation policies
- <<Control Measure>> Application segmentation should apply regardless of the physical location of the application
- <<Control Measure>> Applications are verified for proper authentication and authorization before eachsend/connect request
- <<Control Measure>> Ensure only known, allowed traffic or legitimate application communication is allowed by segmentation
- <<Control Measure>> Allow permissions only on a least privilege bases i.e. deny by default
- <<Control Measure>> Continuously log and monitor all traffic between applications and enforce security policies on an ongoing basis
- <<Control Measure>> Ensure data security through end to end encryption at the application level
- <<Control Measure>> Isolate workloads through implementation of micro segmentation and granularperimeters policy enforcement
- <<Control Measure>> Control access to content by allowing/blocking web requests through robust accesspolicies
- <<Control Measure>> Enable logging and alerting to monitor policy violation
- <<Control Measure>> Implement monitoring of user behavior and activities and detect anomalies
- <<Control Measure>> Intelligent network traffic monitoring, breach detection and proactive response
- <<Control Measure>> Reliable authentication of users and devices prior to granting access to the specific enterprise application
- <<Control Measure>> Users should not access an application until sufficient level of trust is established
- <<Control Measure>> Users authentication should be enhanced with the use of MFA
- <<Control Measure>> Least privilege authorization in place for in app permissions
- <<Control Measure>> Continuous monitoring of user actions for abnormal behavior
- <<Control Measure>> Encrypted traffic between authorized user and enterprise resource
- <<Control Measure>> Ensure real time assessment of device security prior to granting access to enterpriseresources
- <<Control Measure>> Privileged access for admin purposes should be leveraged by a centralized PAM solution
- <<Control Measure>> Users authentication should be enhanced with the use of MFA
- <<Control Measure>> Continuous monitoring of user actions for abnormal behavior
- <<Control Measure>> Least privilege principle in place for permissions within the enterprise resources
- <<Control Measure>> Limited access to the organization’s resources from unmanaged devices throughconditional access controls
- <<Control Measure>> Enforced device authentication prior to access corporate resources
- <<Control Measure>> Leverage multi factor authentication (MFA) as part of the authentication process for the user
- <<Control Measure>> Continuous visibility and control
- <<Control Measure>> End to end encryption of traffic
- <<Control Measure>> Device security assessment to ensure required security posture is in place prior togranting access
- Security Principle
- <<Vunerability>> Single factor of authentication
- <<Vunerability>> No bot detection
- <<Vunerability>> No risk based authentication
- Protecting Canadians From COVID-19
- Helping Canadians Through The Pandemic
- Building Back Better: A Resilience Agenda For the Middle Class
- The Canada We're Fighting For
- Livelihood of Every Single Canadian
- COVID-19 Economic Impacts
- Unemployment
- Underemployment
- Societal Vulnerability
- Workforce Inequality
- Protecting Canadians From COVID-19
- Helping Canadians Through The Pandemic
- Building Back Better: A Resilience Agenda For the Middle Class
- The Canada We're Fighting For
- Livelihood of Every Single Canadian
- COVID-19 Economic Impacts
- Unemployment
- Underemployment
- Societal Vulnerability
- Workforce Inequality
- Enforcement Investigation Conduct Guidance
- [MICM2] Solution For Enforcement Investigations
- Standardized Enforcement Business Processes
- Collect & Track Evidence
- Control System Access
- Protect Data
- Support Multi-Jurisdictional Collaboration
- Operate Within Legal & Charter Constraints
- 2016 Meunier Report Recommendations
- Real-Time Reporting
- Improved Evidence Data Leveraging
- Canadian Public
- Privacy Management Division (PMD)
- Public Prosecution Service of Canada (PPSC)
- Royal Canadian Mountain Police (RCMP)
- National Enforcement & Intelligence Division (NEID)
- Regional Enforcement Investigators
- 4.1 Increased Conformity of Investigation Outputs & Results Among Regional Enforcement
- ISB Conformity Standard Case Rate Change
- Increased consistency in the delivery of Integrity Services and standardized business processes (Consistency of Practice)
- 4.2 Improved Control Over Viewing, Creating & Updating Enforcement Case Information & Evidence By Authorized Personnel
- Increased Security & Control of Data / Evidence (Effectiveness)
- Data Consistency & Quality Control
- 4.3 Improve The Economic Viability of the Enforcement Group
- Overall Enforcement Cost Reduction
- Case Quality Provisioning To External Agencies
- Accurate & Consistent Service
- Garner Senior Level Commitment
- Business Improvement
- ESDC’s Strategic Framework Under Quality
- ESDC Mission: Build A Stronger, More Competitive Canada
- ISB Mission: Maintain Trust By Ensuring ESDC Protects Program Integrity, Services, People & Assets; Prevent. Detect, and Manage Costly Errors, Abuse & Fraud.
- Risk
- Control Objective
- Security Requirement
- Control Measure
- Security Principle
- <<Vunerability>> Single factor of authentication
- <<Vunerability>> No bot detection
- <<Vunerability>> No risk based authentication
- API Design Principles
- Value
- API Security
- API Encoding and Metadata
- API Documentation
- API Consumption
- API Lifecycle Management
- API Performance Management
- API Design Patterns
- Constraints and Assumptions (copy)
- API Value
- Digital Standards
- Simplicity and Reusability
- Consistency
- Security by Design
- Continuous Improvement
- Sustainability
- Quality
- Well Described
- Open Standards Based
- Secure Data in Transit
- Security by Design
- Do not put Sensitive Data in URIs
- Authenticate and Authorize
- Token management
- Restrict dynamic or open queries
- Restrict wildcard queries
- Use gateways and proxies instead of IP whitelists
- Integrate Security Testing
- Audit Access to Sensitive Data
- Monitor and Log API Activity
- API Load Testing
- Publish Performance Data
- Performance Monitoring
- API Throttling
- Use Standard Endpoints
- API Versioning
- URI vs Accept Header Versioning
- Respect Existing Consumer Dependencies
- API Ownership
- API Publishing
- Define an SLO up Front
- Build once for Multiple Channels
- Consume what you Build
- API Encoding and Metadata
- Use Unicode for Encoding
- Standardize Datetime Format
- Support Official Languages
- Non - Functional Requirement
- Digital Standards
- Use a RESTful Approach
- Use JSON
- Use URIs to represent resources
- Always Use HTTPS
- Don't overload verbs
- Follow properties according to RFC 7231 and RFC 5789:
- USE W3C HTTP Methods
- Respond with message schemas that are easy to understand and consume
- Use common information models
- Standardized error codes
- Abstract internal technical details
- Implement stateless interactions
- Prefer 'Pull' over 'Push'
- Bulk Dataset's via API's
- Value Stream
- API Documentation
- Publish OpenAPI Specification
- Publish code samples and test data
- Maintain concise documentation
- Gather Feedback
- Non - Functional Requirement
- Digital Standards
- Vulnerability
- Asset Value
- Threat
- Risk
- Security Requirements
- Vulnerability
- Asset Value
- Threat
- IT Security Risk
- Driver
- Business Requirements
- Constraint
- Goal
- IT Security Requirement
- Stakeholder
- Solution Recommended
- Statement of Sensitivity
- Security Analysis & Ranking
- Vulnerability
- Asset Value
- Threat
- IT Security Risk
- ESDC EA Assessment Criteria
- Technical Fit For Business Needs
- ESDC EA Assessment
- ESDC EA Assessment Criteria
- GC EA Framework Review Criteria
- ESDC EA Principles
- BDM Architecture Principles
- ESDC EA Assessment Slide (Score, Icons)
- GC EA Principles
- ESDC EA Principles
- Reduce Technical Debt
- SAS Lite Assessment
- GC EA Framework
- Build Security Into System life Cycle, All Architectural Layers
- Ensure Secure Access To Systems & Services
- Maintain Secure Operations
- Design End-to-End Services Digitally To Meet Needs
- Outcome-Driven Architecture & Strategic Alignment
- Promote Enterprise Horizontal Enablement
- Collect Data to Address Needs
- Manage & Reuse Data Strategically, Responsibly
- Use & Share Data Openly, Ethically, Securely
- Design With Privacy In Mind
- Use Cloud First
- Design For Performance, Availability & Scalability
- Follow DevSecOps Principles
- Use Public Cloud-Hosted Open Source Solutions
- Use Public Cloud-Hosted SaaS
- Design For Interoperability
- Enable Interoperability
- ESDC EA Principles
- Technology Standards
- Technology Bricks
- The Open Group Architecture Framework (TOGAF)
- European Interoperability Reference Architecture (EIRA)
- GC Digital Standards
- Rapidly Changing Digital Landscape (Assessment)
- Policy on Service and Digital (Driver)
- Establish Strategic Direction For Integrated Management of Service, Information, Data, IT and Cybersecurity (Requirement)
- Government of Canada Digital Standards
- Design With Users
- Iterate and Improve Frequently
- Work In The Open By Default
- Use Open Standards and Solutions
- Address Security and Privacy Risks
- Build In Accessibility From the Start
- Empower Staff to Deliver Better Services
- Be Good Data Stewards
- Design Ethical Services
- Collaborate Widely
- Value
- Provide Single Window Access To Government Services (Goal)
- Eliminate Long‑Standing Institutional Barriers to Digital Acceleration (Goal)
- Leverage Innovative Technologies (Goal)
- Put Users At The Heart Of All We Do (Goal)
- DOSP 2021-24 Goals
- Enterprise First
- Client Centric
- Digital First
- Mission-Driven
- Interoperability
- Business Continuity
- Accessibility
- Value
- Reliable
- Cohesiveness
- Optimize Services
- Accessible-By-Default
- Common Understanding and Trusted
- Shared Assets
- Fit-for-Purpose
- Managed Strategically
- Buy What We Can and Build What We Must
- Technology Independence
- Service Orientation
- Control Technical Diversity
- Responsive Change Management
- Quality Level Metrics (QLM) Approach
- Security-By-Design
- Privacy-By-Design
- Integrity-By-Design
- External Constraints
- Existing Legislation
- Potential Legislation
- Market Factors
- Time-To-Market Imperatives
- Customer Expectations
- Current Systems and Technology
- Emerging Industry Trends
- Understandable Principles
- Robust Principles
- Complete Principles
- Consistent Principles
- Stable Principles
- Do The Right Thing
- Do EA Right
- EA Principles Value
- 1. New Target Operating Model and service continuity during the transition
- 2. BDM will consume GC and ESDC Enterprise Solutions/Services where appropriate and available
- 3. Favour strategic over interim and tactical solutions
- 6. Open Solutions and standards
- 7. Security and Privacy-by-Design
- 8. Integrity & Quality-by-Design
- 9. Cloud First
- 4. Data is at the center of BDM
- 5. Digital First
- 10. Minimize changes to legacy
- 11. Architecting for Agility
- 12. Maximize Use of Core Technology
- 13. Adoption of Event-Driven Architecture
- 14. Outcome-Driven
- Open & Transparent Architecture Work (Goal)
- Non-GC Network Access To EA Repository (Requirement)
- Matured the EA Program (Outcome)
- Doing the Right Thing and Doing It Right (Outcome)
- Delivered Client-Centric and Client Self-Service (Outcome)
- Capitalized on Opportunities (Outcome)
- COVID-19 Impact (Constraint)
- Reduced Staffing Capacity (Constraint)
- Staffing Changes Across EA (Constraint)
- EA Demand Exceeds Supply (Constraint)
- Strategic EA (Goal)
- Understand and Demonstrate EA Value (Goal)
- Adopt EA By Design (Goal)
- Pulse of Canadians (Goal)
- Business Agility (Goal)
- Innovative Organization Capitalizing On Opportunities (Goal)
- EA Is The Fabric Of The Organization (Goal)
- BDM SI's Onboard To QualiWare (Outcome)
- BDM Data Architecture Developed (Outcome)
- BDM and EA Outcomes Linked (Outcome)
- Continue Research On BDM Ancillary Components (Goal)
- Develop Digital Government Platform Architecture (Goal)
- Connect to Benefits Delivery Modernization Milestones (Driver)
- EA Team Members As Trusted Advisors (Value)
- Deliver Client Value and Business Outcomes (Goal)
- Acceptance of Status Quo (Constraint)
- Analysis Paralysis Mindset (Constraint)
- Expect and Require Perfection (Constraint)
- Perception and Misconceptions of EA (Constraint)
- Principle 1 - Increase Return on Investment by Focusing on Making Continuous Flow of Value (Principle)
- Principle 2 - Engage Clients in Frequent Interactions and Shared Ownership (Principle)
- Principle 3 - Expect Uncertainty, Manage Through Iterations, Anticipation and Adaptation (Principle)
- Principle 4 - Unleash Creativity and Innovation, Recognize Individuals As The Ultimate Source of Value, Create an Environment Where They Can Make a Difference (Principle)
- Principle 5 - Boost Performance Through Group Accountability for Results and Shared Responsibility for Team Effectiveness (Principle)
- Principle 6 - Improve Effectiveness and Reliability Through Situation-Specific Strategies, Processes and Practices (Principle)
- Attain “We” Culture Between Business and IT (Goal)
- Respond Efficiently and Effectively To Changes in Business and IT Ecosystems, and Environmental Conditions (Goal)
- Improve Business Outcomes (Goal)
- Design Principles
- Drivers
- Efficiency
- Cost & Risk Sharing
- Leverage GC common services
- Assessments
- Log Data Growth & Proliferation
- Inadequate Event Logging Standardization
- Improve Data Masking
- Limited SOC Resources & Expertise
- Goals
- Reduce Resouces & Technical Dependence
- Balance TCO with SOC Investments
- Standardize Data logging
- Ensure Security & Privacy
- Stakeholders
- SSC
- ESDC
- CCCS
- Principle/Guidance
- Event Logging Guidance
- Enterprise Architecture Guidances
- IT Security Guidances
- Zero Trust Principle
- Boundaryless Information Flow
- Provides Basis For Future Data Integration Best Practices
- Provide Useful Body of Reference
- Make Efforts To Understand the Data
- Manage Complexity In Mapping Between Different Data Models
- Keep Data Synchronized
- Address Organizational and Cultural Issues
- Avoid Poor Data Quality
- Contribute To Data Defense
- View Data Integration As A Continuous Process
- Assessment
- CS-to-IT Classification Conversion (Constraint)
- SAS SharePoint 2010 Migration Report (Assessment)
- Evolving Business Models (Driver)
- Emerging Partnerships (Driver)
- Rapidly Changing Technology (Driver)
- Regulatory, Geopolitical, and Cultural Forces (Driver)
- Disruptive Events (Driver)
- Paradigm Shift to Remote Work (Driver)
- Exponentially Increasing Need for Agility (Requirement)
- Mounting Complexity Requiring Increasing Need to Simplify (Requirement)
- Support for Remote Work (Requirement)
- Regulatory Requirements (Requirement)
- Support for Unpredictability (Requirement)
- Real-Time/Near Real-Time Response (Requirement)
- Measurable Controls and Automated Audit (Requirement)
- Advantages of a Zero Trust-Driven Future (Value)
- 1. Modern Work Enablement (Principle)
- 2. Goal Alignment (Principle)
- 4. People Guidance and Inspiration (Principle)
- 3. Risk Alignment (Principle)
- 5. Risk and Complexity Reduction (Principle)
- 6. Alignment and Automation (Principle)
- 7. Security for the Full Lifecycle (Principle)
- 9. Least Privilege (Principle)
- 11. Explicit Trust Validation (Principle)
- 10. Simple and Pervasive (Principle)
- 8. Asset-Centric Security (Principle)
- No User Should Have Full Control Permissions (Principle)
- Document Scope
- Document Structure
- Document Acronyms and Abbreviations
- T.I.M.E. Application Disposition (Assessment)
- Increased Risk Due To Continued Legacy Data Centre Use (Assessment)
- Enable Effective and Timely Availability of Information (Goal)
- WLM-and-CE Business Context (Assessment)
- Applications Need To Be Hosted In A Secured and Stable Environment (Principle)
- 1. Align With Digital Transformation (Goal)
- 2. Improve ESDC Security Posture and IT Service Delivery (Goal)
- 3. Reduce Technical Debt and Modernize Applications (Goal)
- Work Closely With Partners To Align On Scope and Interdependencies (Requirement)
- Align With TBS Cloud Adoption Policy and GC Modernization Plan (Driver)
- Innovation, Information and Technology Branch (IITB) (Stakeholder)
- ESDC Business Lines (Stakeholder)
- ESDC CFOB-Legal-and-HR (Stakeholder)
- Shared Services Canada (SSC) (Stakeholder)
- Treasury Board of Canada Secretariat (Stakeholder)
- Reduction of Technical Debt (Outcome)
- Alignment to Cloud First GC Priority (Outcome)
- WLM-and-CE Metric - Number of Applications Migrated (Assessment)
- WLM-and-CE Metric - Cloud Usage (Assessment)
- Improve IT Security Posture and Compliance (Outcome)
- WLM-and-CE Metric - Increase Security Compliance (Assessment)
- Improve Agility & Scalability (Goal)
- Improved Agile Development Capability (Outcome)
- WLM-and-CE Metric - Time to Provision Environments (Assessment)
- Risk - Interdependencies With Partners (Assessment)
- Risk - Interoperability (Assessment)
- Risk - High Complexity Leading To Delays (Assessment)
- Risk - Insufficient Funding (Assessment)
- Risk - Change In Schedule (Assessment)
- Risk - Interdependencies With Other Projects (Assessment)
- Risk - Insufficient IITB Support (Assessment)
- Risk - High Network Complexity and Performance (Assessment)
- Risk - Delays In IT Security Policies and Procedures (Assessment)
- Risk - Unclear Scope (Assessment)
- Risk - Availability Of Capability and Capacity (Assessment)
- Risk - Application Decommissioning (Assessment)
- Ability To Implement WLM-and-CE is HIGH (Assessment)
- WLM-and-CE In Scope Functional Requirements (Requirement)
- WLM-and-CE Out Of Scope Functional Requirements (Requirement)
- Portfolio Backlog
- Product and Solution Backlog
- Team Backlog
- Capture Only Work Items (Constraint)
- Track All EA Work (SAS, ESA, IA) (Goal)
- Enable Team Work Management (Goal)
- Provide Easy Self-Serve Reporting (Goal)
- Design With Users (Principle) (copy)
- Iterate and Improve Frequently (Principle) (copy)
- Work In The Open By Default (Principle) (copy)
- Use Open Standards and Solutions (Principle) (copy)
- Address Security and Privacy Risks (Principle) (copy)
- Build In Accessibility From the Start (Principle) (copy)
- Empower Staff to Deliver Better Services (Principle) (copy)
- Be Good Data Stewards (Principle) (copy)
- Design Ethical Services (Principle) (copy)
- Collaborate Widely (Principle) (copy)
- Communication Of EA Work (Value)
- Improve Team Performance (Goal)
- Team Contribution Awareness (Value)
- Key Stakeholders (Stakeholder)
- EARB Co-Chair (CIO) (Stakeholder)
- EARB Co-Chair (Business) (Stakeholder)
- Capture ADO Items Of Value (Principle)
- Knowing WHO is Doing WHAT (Value)
- A.1: Authoring tool user interfaces follow applicable accessibility guidelines
- Guideline A.1.1: (For the authoring tool user interface) Ensure that web-based functionality is accessible
- Guideline A.1.2: (For the authoring tool user interface) Ensure that non-web-based functionality is accessible
- A.2: Editing-views are perceivable
- Guideline A.2.1: (For the authoring tool user interface) Make alternative content available to authors
- Guideline A.2.2: (For the authoring tool user interface) Ensure that editing-view presentation can be programmatically determined
- A.3: Editing-views are operable
- Guideline A.3.1: (For the authoring tool user interface) Provide keyboard access to authoring features
- Guideline A.3.2: (For the authoring tool user interface) Provide authors with enough time
- Guideline A.3.3: (For the authoring tool user interface) Help authors avoid flashing that could cause seizures
- Guideline A.3.4: (For the authoring tool user interface) Enhance navigation and editing via content structure
- Guideline A.3.7: (For the authoring tool user interface) Ensure that previews are at least as accessible as in-market user agents
- A.4: Editing-views are understandable
- Part A: Make the authoring tool user interface accessible
- Guideline A.3.5: (For the authoring tool user interface) Provide text search of the content
- Guideline A.3.6: (For the authoring tool user interface) Manage preference settings
- Guideline A.4.1: (For the authoring tool user interface) Help authors avoid and correct mistakes
- Guideline A.4.2: (For the authoring tool user interface) Document the user interface, including all accessibility features
- Part B: Support the production of accessible content
- Guideline B.1.1: Ensure that automatically-specified content is accessible
- Guideline B.1.2: Ensure that accessibility information is preserved
- Guideline B.2.1: Ensure that accessible content production is possible
- B.1: Fully automatic processes produce accessible content
- B.2: Authors are supported in producing accessible content
- B.3: Authors are supported in improving the accessibility of existing content
- Guideline B.2.3: Assist authors with managing alternative content for non-text content
- Guideline B.2.4: Assist authors with accessible templates
- Guideline B.2.5: Assist authors with accessible pre-authored content
- Guideline B.2.2: Guide authors to produce accessible content
- Guideline B.3.1: Assist authors in checking for accessibility problems
- Guideline B.3.2: Assist authors in repairing accessibility problems
- B.4: Authoring tools promote and integrate their accessibility features
- Guideline B.4.1: Ensure the availability of features that support the production of accessible content
- Guideline B.4.2: Ensure that documentation promotes the production of accessible content
- Add W3C ATAG 2.0 Into Selection Criteria When Purchasing New Web Authoring Tools
- "Simple Site" (Meaning)
- Business Architecture IAG Assessment Report [2021-08-30] (Assessment)
- Meet Accessibility Requirements (Constraint)
- Interoperate With Enterprise Solutions (Constraint)
- Comply With Accessible Canada Act (Driver)
- Comply With GC EA Framework - Use Cloud First (Driver)
- Skills & experience improved to match career opportunity (Value)
- Protected Cloud B (Requirement)
- System Configuration (Requirement)
- Competency Development (Requirement)
- Reporting (Requirement)
- Learning Administration (Requirement)
- Learning Delivery (Requirement)
- Accessibility (Requirement)
- Content Standards (Requirement)
- Digital Signature (Requirement)
- Data Location (Requirement)
- Third Party Assurance (Requirement)
- CSP IT Security Assessment (Requirement)
- Security Incident Management (Requirement)
- Protected B (Requirement)
- Data Protection (Requirement)
- Data Isolation (Requirement)
- Organizations (Requirement)
- Privacy Statement (Requirement)
- Log In (Requirement)
- System (Requirement)
- System Roles (Requirement)
- SKU Barcodes (Requirement)
- Profile (Requirement)
- Integration (Requirement)
- Security Incident Response (Requirement)
- Peronnel Security Screening (Requirement)
- Physical Data Security (Requirement)
- API (Requirement)
- Auditing (Requirement)
- Identity & Access Management (IAM) (Requirement)
- Key Management (Requirement)
- Data Transfer and Retrieval (Requirement)
- Secure Development (Requirement)
- Cryptographic Protection (Requirement)
- Privileged Access Management (Requirement)
- Endpoint Protection (Requirement)
- Network & Communications Security (Requirement)
- Data Disposition, In Canada (Requirement)
- Target Audience (Requirement)
- Reduces Technical Debt
- Following Enterprise SDLC
- Consolidate Solutions
- Standard Business Process
- Leverages Cloud Services
- Enterprise / Reusable
- IT Strategic Alignment
- TBS-Defined APM Assessment Scores for TIME
- Product / Service Type
- Solution Deployment
- Solution Integration
- Requirements Maturity
- Technology Expertise
- System Integrators / Professional Services
- Scheduling / Resources
- External Access
- Internal Access
- Edge Protection
- Secure Data Exchange
- Security Operations
- Policy Enforcement
- Asset Protection
- Stabilized Data and Analytics Capacity in CDO
- Increased Response Capacity To Data Foundations Gaps
- Ability To Trust And Use Data
- Program Performance Reporting Is Limited & Siloed
- Visualizations Are Dated & Fail To Leverage Modern Options
- Ad-Hoc Forecasting Is Done Rather Than Continuously
- Disparately Sourced Data Does Not Always Agree, Unlear Terminology Causes Doubt As To Meaning
- Executives Are Unsure Of What To Trust
- Crises Response Delayed In Getting Data Access
- Data Managers Cannot Quickly Ascertain Data Access (WHO-WHAT-WHY)
- Data Foundations Key Stakeholder 1
- Data Foundations Key Stakeholder 2
- Growing Need to Obtain & Integrate Data From Beyond ESDC
- Provinces & Territories, Municipalities & 3rd Party Org's
- Data To Understand Issues Is Scattered Across Stakeholders
- Provide Trusted, Horizontally Integrated Data
- Improve Management of Data To Ensure It Is Accessible & Organized To Support Analysis
- Improve Use Of Modern Techniques To Extract Full Value Of Data
- Better Enable People Performing Critical Data Functions
- Manage Privacy Effectively
- Deliver Greater Privacy & Transparency In WHO Accesses WHAT Data, WHY, and Using Which Tools
- Deliver Faster, Simpler, More Reliable and Less Costly Ethical, Authorized Access
- ESDC Needs To Mature Its Data Foundations To Support Accelerated Research, Policy and Decision-Making Cycles
- ESDC Needs To Mature Its Data Foundations To Address Significant Changes to Benefits Delivery Modernization
- ESDC Needs To Mature Its Data Foundations To Ensure Services To Those Most Vulnerable
- Lessons Learned In Response To COVID-19
- Need For Consistency With Department of Employment and Social Development Act (DESDA) And Other Relevant Legislation
- Apply Best Practices and Lessons Learned From Statistics Canada’s Trust Centre
- Statistics Canada’s Trust Centre
- Canadian Provinces and Territories
- Canadian Municipalities
- Legislative Authority
- Collection, Storage and Analysis of Data Is Widely Dispersed Across Multiple Branches, Program Areas and Regions
- Authorities' Tactical Data Priorities View of Program-Project First Stunts Advancement Toward Strategic Outcomes
- Low Data Literacy Is Limiting Data Value
- Executives Lack Understanding, Tools and Skills To Manage Data As A Resource
- Lack Of Enterprise Infrastructure To Support Advanced and Emerging Data & Analytics
- Data Collected From Surveys, Research and Partners Is Difficult To Integrate With Program Data
- Spreadmarts and Black Books Mean A Lack of Clarity Around Data Access and Use
- Information Management
- Information Technology
- 1: Client and Service-Centred Design
- 2: Open
- 4: Secure
- 5: Cloud First Approach
- 6: Enable A Modern Workplace: Anywhere, Anytime With Anyone
- 3: Enterprise First
- Business Intelligence
- Analytics
- Big Data
- 1: Service
- 2: Value
- 3: Security
- 4: Agility
- Strengthen Data Governance and Accountabilities
- Master Data Management
- Accessible Canada Act Compliance
- ESDC's Mission
- Change Attitudes, Behaviors and Mindsets and Give ESDC Employees the Tools and Confidence to Deliver Service Going Beyond Client Expectations
- MUST Include Bilingual (French and English) User Interface, Documentation and On-Line Support
- MUST Include Canadian Data Residency For Captured System Data
- MUST Meet GC Security Requirements for Protected-B, including 2FA
- MUST Interface With ESDC’s Corporate Financial System
- MUST Include Robust Backup and Recovery Including Replication
- a) Flexibility Across Access Points For Learning
- b) Platform and Device-Agnostic, Cloud-Based SaaS, Accessible By All Users
- c) Cloud-Based Solution Certified for PBMM Use As Per IT Security Standards for GC
- d) Complies With GC Accessibility Requirements, As Per Accessible Canada Act
- e) Any And All Upgrades Are Included In The Costs
- f) User-Created / Selected Course Material (English / French)
- g) Must Scale To At Least 40,000 Authorized Users And To Meet Needs Over Time
- h) Allow Learners and Special Access Rights Users To Login via Web Browsers or App On A Variety Of Devices
- i) Compatible With External 3rd Party E-Learning Content Suppliers Via Single Sign-On (SSO)
- j) Multiple SaaS Environments (Dev-Test-Prod) Hosted In A Secure Data Center Environment Located In Canada
- k) Multi-Tenancy Configurations With Granular Access, Individual Branding and RBAC
- l) Allows ESDC to Configure and Maintain the Solution As Required
- m) Solution Has Capacity To Host Over 200 Different Courses, XXXX Learning Objects (SCORM, MP4, MP3, etc.) and Provide 1 TB or More Storage
- n) Support A Variety of Delivery Methods (e.g. Virtual/In Person Classrooms, Blended Learning, Self-Paced, etc.)
- o) Support Social Learning via Blogs, Forums, Groups sites, Communities of Practice, File Sharing, etc.
- q) Product Roadmap and Releases (Minimum of Two Product Releases Per Year)
- s) Allow For User Community-Driven Enhancements and Features. Product Features and Releases, etc.
- r) Produces and Shares Product Roadmap
- p) Publish Content From Integrated Authoring Tool For Testing and Course Use
- a) Commercial-Off-The-Shelf (COTS) System Available As A SaaS, IAAS or Managed Service
- b) Transition Methodology To Migrate To Vendor Solution
- c) Proposed Solution Should Be Available Via Workstation, Laptop and Tablet Devices
- d) Solution Provides Standard and Ad Hoc Reporting Capabilities and API's for Corporate Analytics
- Official Languages Compliance
- CCCS Protected-B Accreditation
- API Capabilities To Interoperate With ESDC's HRMS
- Terminology
- Provide Canadians Ability To Apply, Be Considered Access to CDCP For Oral Heath Needs (Outcome)
- Seek Help and Guidance on Eligibility, How To Apply and Programme Information (Outcome)
- Maintain or Renew Their Status Throughout the Year (Outcome)
- Benefits and Integrated Services Branch (Stakeholder)
- Citizen Services Branch (Stakeholder)
- Integrity Services Branch (Stakeholder)
- Service Canada Regions (Stakeholder)
- Service Canada College (Stakeholder)
- Privacy Management Division (Stakeholder)
- Innovation and Information Technology Branch (Stakeholder)
- Health Canada (Stakeholder)
- Public Services and Procurement Canada (Stakeholder)
- Canada Revenue Agency (Stakeholder)
- Chief Data Officer (Stakeholder)
- 3 - Final Approved December 2023 Release Scope (Risk)
- 4 - BRs and IT Development (Risk)
- 6 - CDCP Implementation Date (Risk)
- 9 - Delay in TPA Contract (Risk)
- 11 - Aggressive Timelines for December 2023 Release (Risk)
- Ability for Canadians to Apply for CDCP (Requirement)
- [Service Canada] Find/View Client Appications, Assist Clients (Requirement)
- Process Client Applications, Adjudicate, Communicate Eligibility Status To Client (Requirement)
- Support Clients Via Specialized CDCP Call Centre (Requirement)
- Eligibility Appeals Portal and Services (Requirement)
- Further Program Enhancements (Requirement)
-
-
-
-
Peer Review
(Build / Test - Junction)
-
(UX/ Design - Build / Test)
-
(Define Success Criteria - UX/ Design)
-
(Plan - Define Success Criteria)
-
(Intake - Plan)
-
(Build / Test - Build)
-
(Build / Test - Test)
-
Yes
(Junction - Deploy)
-
(Deploy - Monitor/Support )
-
(Monitor/Support - Monitor)
-
(Monitor/Support - Support)
-
(Deploy - Run)
-
Fail
(Junction - Build / Test)
-
No
(Junction - Define Success Criteria)
-
(Approve Deployment - Junction)
-
Pass
(Junction - Approve Deployment)
-
(Intake - Governnance)
-
(Plan - Management)
-
(Java - Code)
-
(Continuous Delivery - CI/CD Pipeline)
-
(Continuous Integration - CI/CD Pipeline)
-
(Continuous Integration - Build)
-
(Code - Build)
-
(Application Portfolio Management / Microservice Management - Run)
-
(Postman - Load/Performance testing)
-
(API - Run)
-
(Microfocus Fortify Static Code Analyzer - Code Analysis)
-
(Mobile Testing - Test)
-
(Continuous Delivery - Run)
-
(Code Analysis - Test)
-
(Compliance Sheriff - Accessibility Testing)
-
(OS - Run)
-
(NPM - Repositories)
-
(Continuous Delivery - Deploy)
-
(Linux Mint - OS)
-
(GitLab.com - Service Desk)
-
(OS Ticket - Service Desk)
-
(Continuous Integration - Test)
-
(Confluence - Collaboration)
-
(GitLab On-prem - Code Project Management)
-
(JAWS - Accessibility Testing)
-
(Configuration Testing - Test)
-
(Kafka Connect and Streams - Messaging)
-
(Kubernetes - Orchestration)
-
(GitLab On-prem - Continuous Integration)
-
(GitHub - SCM & VCM)
-
(Azure KeyVault - Security)
-
(NuGet - Repositories)
-
(GitLab.com - Continuous Integration)
-
(Zoom - Collaboration)
-
(HCL Appscan - Security Testing)
-
(Code - Build)
-
(Continuous Integration - Build)
-
(Aqua - Security Testing)
-
(GitLab.com - Code Project Management)
-
(Slack - Collaboration)
-
(GitLab On-prem - Service Desk)
-
(SonarQube - Code Analysis)
-
(GitHub - Continuous Integration)
-
(Jfrog Xray - Security Testing)
-
(Protractor - Mobile Testing)
-
(Security Testing - Test)
-
(Axe-core - Accessibility Testing)
-
(CDN - Run)
-
(puppet - Infrastructure Provisioning)
-
(Loadrunner - Load/Performance testing)
-
(GitLab.com - SCM & VCM)
-
(Collaboration - Notify)
-
(Accessibility Testing - Test)
-
(TFS - SCM & VCM)
-
(Nomad - Orchestration)
-
(Odoo - CRM Helpdesk)
-
(Maven - Repositories)
-
(Jenkins - Continuous Integration)
-
(GitLab On-prem - SCM & VCM)
-
(mocha - Browser Testing)
-
(Confluence - Code Project Management)
-
(Jira - Continuous Integration)
-
SAFe
(Monitor/Support - Intake)
-
( JavaScript - Development Language)
-
(Spring boot (and Spring Cloud) - Application Framework)
-
(C# - Development Language)
-
(Java - Development Language)
-
(Eclipse - IDE)
-
(VSCode - IDE)
-
(Node.js - Application Framework)
-
(.Net Framework - Application Framework)
-
(OPENAPI - Application Framework)
-
( .Net Core - Application Framework)
-
(Loopback - Application Framework)
-
(.Net - Development Language)
-
(IDE - Build)
-
(TypeScript - Development Language)
-
(React - Application Framework)
-
(Angular - Application Framework)
-
(Packer - Configuration Management)
-
(Azure - Cloud Service Provider)
-
(AWS - Cloud Service Provider)
-
(Azure Resource Management Templates - Infrastructure Provisioning)
-
(AWS Cloud Formation Templates - Infrastructure Provisioning)
-
(OpenShift - Orchestration)
-
(Cloud Service Provider - Run)
-
(Trello - Collaboration)
-
(MS Teams - Collaboration)
-
(Monitor/Support - Manage)
-
(Monitor/Support - Business Service Management)
-
(Approve Deployment - Feedback)
-
(Approve Deployment - UAT)
-
(Governnance - Service Evaluation)
-
(Governnance - Service Direction)
-
(Governnance - Service Monitoring Oversight)
-
(Governnance - Service Architecture Standards)
-
(Management - Business Intake Management)
-
(Management - Service Procurement Management)
-
(Management - Service Contract Management)
-
(Management - Service Strategy Development)
-
(Solution Delivery - SOA Service Architecture)
-
(Solution Delivery - SOA Service Pattern Development)
-
(Solution Delivery - SOA Service Deployment)
-
(Solution Delivery - SOA Service CI/CD)
-
(Solution Delivery - SOA Service Security)
-
(Solution Delivery - API Design)
-
(Solution Delivery - API Development)
-
(Solution Delivery - API Publishing)
-
(Solution Delivery - API Security)
-
(Solution Delivery - API Scaling)
-
(Solution Delivery - API Discovery)
-
(Solution Delivery - API Testing)
-
(Solution Delivery - API Exploring)
-
(Solution Delivery - API Subscription)
-
(Solution Delivery - MFT Solution Development)
-
(Build / Test - Solution Delivery)
-
(Business Service Management - SOA Services Monitoring)
-
(Business Service Management - SOA Service Analytics)
-
(Business Service Management - API Monitoring)
-
(Business Service Management - API Analytics)
-
(Business Service Management - MFT Monitoring)
-
(Business Service Management - MFT Analytics)
-
(Platform Operations - Infrastructure)
-
(Infrastructure - Cloud Infrastructure Operations)
-
(Infrastructure - On-Premise Operations)
-
(Platform Operations - API Gateway)
-
(Platform Operations - API Store Operations)
-
(Platform Operations - API Tooling Operations)
-
(Platform Operations - Message Fabric)
-
(Platform Operations - CI/CD Pipeline)
-
(Platform Operations - MFT Operations)
-
(Platform Operations - SOA Operations)
-
(Delivery - Security Management)
-
(Delivery - Continuity Management)
-
(Delivery - Service Level Management)
-
(Delivery - Financial Management)
-
(Delivery - Capacity Management)
-
(Delivery - Availability Management)
-
(Support - Incident Management)
-
(Support - Change Management)
-
(Support - Problem Management)
-
(Support - Service Desk)
-
(Support - Release Management)
-
(Support - Configuration Management)
-
(Monitor/Support - Delivery)
-
(Solution Enablement - Governnance)
-
(Solution Enablement - Support)
-
(Solution Enablement - Delivery)
-
(Solution Enablement - Management)
-
(Deploy - Platform Operations)
-
(Messaging - Run)
-
(crushftp - Messaging)
-
(Kafka - Messaging)
-
(Camel - Messaging)
-
(Solace PubSub+ - Messaging)
-
(Swagger - API)
-
(Apigee - API)
-
(Azure DevOps - Continuous Integration)
-
(Azure DevOps - SCM & VCM)
-
(Azure DevOps - Service Desk)
-
(Azure DevOps - Code Project Management)
-
(Visual Studio - IDE)
-
(Browser Testing - Test)
-
(Load/Performance testing - Test)
-
(HCL Appscan - Security Testing)
-
(Continuous Integration - CI/CD Pipeline)
-
(Continuous Delivery - CI/CD Pipeline)
-
(Platform Operations - Service Bus Operations)
-
(Platform Operations - Event Broker)
-
(Jenkins X - Continuous Delivery)
-
(OpenShift - Continuous Delivery)
-
(Skaffold - Continuous Delivery)
-
(Jenkins - Continuous Delivery)
-
(Spring - Continuous Delivery)
-
(Azure DevOps - Continuous Delivery)
-
(Build / Test - Platform Operations)
-
(UX/ Design - Solution Delivery)
-
(ESDC Interoperability Platform (EIP) - Platform Operations)
-
(ESDC Interoperability Platform (EIP) - Business Service Management)
-
(ESDC Interoperability Platform (EIP) - Solution Delivery)
-
(ESDC Interoperability Platform (EIP) - Solution Enablement)
-
(Monitor/Support - Platform Operations)
-
(App Definition and Development - Application Definition & Image Build)
-
(App Definition and Development - Continuous Integration & Delivery)
-
(App Definition and Development - Database)
-
(App Definition and Development - Streaming & Messaging)
-
(Orchestration & Management - Scheduling & Orchestration)
-
(Requirement Catalog - Security Requirement)
-
Guardrails
(Intake - Plan)
-
(Plan - Define Success Criteria)
-
(Requirement Catalog - Business Requirements)
-
(Requirement Catalog - Accessibility Requirement)
-
(Requirement Catalog - Non - Functional Requirement)
-
(Requirement Catalog - Functional Requirement)
-
(Define Success Criteria - UX/ Design)
-
Peer Review
(Build / Test - Junction)
-
SAFe
(Monitor/Support - Intake)
-
(UX/ Design - Build / Test)
-
Guardrails
(Intake - Plan)
-
No
(Junction - Define Success Criteria)
-
(Approve Deployment - Junction)
-
(Deploy - Monitor/Support )
-
(Plan - Define Success Criteria)
-
Yes
(Junction - Deploy)
-
Fail
(Junction - Build / Test)
-
Pass
(Junction - Approve Deployment)
-
(Intake - Outcome Evaluation)
-
(Plan - Story Boarding)
-
(UX/ Design - Prototyping)
-
(Orchestration & Management - Coordinatioin & Service Discovery)
-
(Orchestration & Management - Remote Procedure Call)
-
(Orchestration & Management - Service Proxy)
-
(Orchestration & Management - API Gateway)
-
(Orchestration & Management - Service Mesh)
-
(Consul - Service Mesh)
-
(Istio - Service Mesh)
-
(CITRUS - Service Proxy)
-
(NGINX - Service Proxy)
-
(Traefik - Service Proxy)
-
(CoreDNS - Coordinatioin & Service Discovery)
-
(Kubernetes - Scheduling & Orchestration)
-
(Nomad - Scheduling & Orchestration)
-
(ArangoDB - Database)
-
(PostgresSQL - Database)
-
(Apache ZooKeeper - Coordinatioin & Service Discovery)
-
(Kafka - Streaming & Messaging)
-
(Camel - Streaming & Messaging)
-
(Solace PubSub+ - Streaming & Messaging)
-
(Kafka Connect and Streams - Streaming & Messaging)
-
(OPENAPI - Application Definition & Image Build)
-
(Helm - Application Definition & Image Build)
-
(Packer - Application Definition & Image Build)
-
(Skaffold - Application Definition & Image Build)
-
(GitLab On-prem - Continuous Integration & Delivery)
-
(GitLab.com - Continuous Integration & Delivery)
-
(Jenkins - Continuous Integration & Delivery)
-
(Jenkins X - Continuous Integration & Delivery)
-
(Envoy - Service Proxy)
-
(3Scale - API Gateway)
-
(Runtime - Cloud Native Storage)
-
(Runtime - Container Runtime)
-
(Runtime - Cloud Native Network)
-
(puppet - Automation and Configuration)
-
(Ansible - Automation and Configuration)
-
(Provisioning - Container Registry)
-
(JFrog Artifactory - Container Registry)
-
(Provisioning - Security and Compliance)
-
(Aqua - Security and Compliance)
-
(Sonatype Nexus Vulnerability Scanner Lifecycle - Security and Compliance)
-
(Provisioning - Key Management)
-
(Platform - Certified Kubernetes - Distribution)
-
(OpenShift - Certified Kubernetes - Distribution)
-
(Docker - Certified Kubernetes - Distribution)
-
(Platform - Certified Kubernetes - Hosted)
-
(Platform - Certified Kubernetes - Installer)
-
(Platform - PaaS/Container Service)
-
(Observability and Analysis - Monitoring)
-
(Grafana - Monitoring)
-
(Prometheus - Monitoring)
-
(Observability and Analysis - Logging)
-
(Fluentd - Logging)
-
(Elastic - Logging)
-
(Logstash - Logging)
-
(Observability and Analysis - Tracing)
-
(Jaeger - Tracing)
-
(Elastic - Tracing)
-
(Observability and Analysis - Chaos Engineering)
-
(GitLab On-prem - SCM & VCM)
-
(Spring boot (and Spring Cloud) - Application Framework)
-
(Content Delivery Network - Run)
-
(Azure DevOps - Code Project Management)
-
(OPENAPI - Application Framework)
-
(Jfrog Xray - Security Testing)
-
(Linux Mint - OS)
-
(AWS Cloud Formation Templates - Infrastructure Provisioning)
-
(Solace PubSub+ - Messaging)
-
(React - Application Framework)
-
(Azure DevOps - Continuous Integration)
-
(OpenShift - Continuous Delivery)
-
(Azure DevOps - Service Desk)
-
(SonarQube - Code Analysis)
-
(OS Ticket - Service Desk)
-
(CI/CD Pipeline - Run)
-
(Skaffold - Continuous Delivery)
-
(puppet - Infrastructure Provisioning)
-
(Accessibility Testing - Test)
-
(Azure DevOps - SCM & VCM)
-
(GitLab.com - Code Project Management)
-
( .Net Core - Application Framework)
-
(Continuous Integration - CI/CD Pipeline)
-
(Trello - Collaboration)
-
(OWASP Zed Attack Proxy (ZAP) - Security Testing)
-
(Node.js - Application Framework)
-
(TypeScript - Development Language)
-
(NuGet - Repositories)
-
(Angular - Application Framework)
-
(Jenkins - Continuous Delivery)
-
(Continuous Integration - Test)
-
(Confluence - Collaboration)
-
(MS Teams - Collaboration)
-
(Slack - Collaboration)
-
(.Net - Development Language)
-
(Azure - Cloud Service Provider)
-
(Kubernetes - Orchestration)
-
(Confluence - Code Project Management)
-
(OS - Run)
-
(Continuous Delivery - Run)
-
(CI/CD Pipeline - Test)
-
(Loadrunner - Load/Performance testing)
-
(Jenkins X - Continuous Delivery)
-
(Sonatype Nexus IQ Server - Security Testing)
-
(AWS - Cloud Service Provider)
-
(Azure KeyVault - Security)
-
(Axe-core - Accessibility Testing)
-
(Nomad - Orchestration)
-
(Microfocus Fortify Static Code Analyzer - Code Analysis)
-
(Collaboration - Notify)
-
(Compliance Sheriff - Accessibility Testing)
-
(CI/CD Pipeline - Build)
-
(Continuous Integration - Build)
-
( JavaScript - Development Language)
-
(Postman - Load/Performance testing)
-
(Code - Application Framework)
-
(Loopback - Application Framework)
-
(GitLab.com - Continuous Integration)
-
(Mobile Testing - Test)
-
(Azure DevOps - Continuous Delivery)
-
(GitLab On-prem - Service Desk)
-
(Spring - Continuous Delivery)
-
(NPM - Repositories)
-
(HCL Appscan - Security Testing)
-
(Aqua - Security Testing)
-
(C# - Development Language)
-
(Jenkins - Continuous Integration)
-
(HCL Appscan - Security Testing)
-
(Browser Testing - Test)
-
(Camel - Messaging)
-
(Zoom - Collaboration)
-
(Maven - Repositories)
-
(Configuration Testing - Test)
-
(.Net Framework - Application Framework)
-
(Kafka Connect and Streams - Messaging)
-
(CI/CD Pipeline - Deploy)
-
(Eclipse - IDE)
-
(Jira - Continuous Integration)
-
(Java - Development Language)
-
(VSCode - IDE)
-
(TFS - SCM & VCM)
-
(Code - Build)
-
(ThreadFix - Security Testing)
-
(IDE - Build)
-
(Messaging - Run)
-
(Mocha - Browser Testing)
-
(Fortify Static Code Analyzer(SCA) - Security Testing)
-
(GitLab On-prem - Continuous Integration)
-
(Application Portfolio Management / Microservice Management - Run)
-
(Azure Resource Management Templates - Infrastructure Provisioning)
-
(crushftp - Messaging)
-
(OpenShift - Orchestration)
-
(Load/Performance testing - Test)
-
(Security Testing - Test)
-
(Kafka - Messaging)
-
(Visual Studio - IDE)
-
(GitLab.com - SCM & VCM)
-
(GitLab.com - Service Desk)
-
(Continuous Delivery - CI/CD Pipeline)
-
(Code Analysis - Test)
-
(Packer - Configuration Management)
-
(Cloud Service Provider - Run)
-
(Code - Development Language)
-
(GitHub - Continuous Integration)
-
(GitLab On-prem - Code Project Management)
-
(Continuous Delivery - Deploy)
-
(GitHub - SCM & VCM)
-
(Protractor - Mobile Testing)
-
(Odoo - CRM Helpdesk)
-
(Sonatype Nexus Repository - Repositories)
-
(Interoperability Service Division (ISD). - Platform Stewards)
-
(Platform Stewards - ESDC Interoperability Platform (EIP))
-
(API Lifecycle Management - API Store Operations)
-
(API Lifecycle Management - API Gateway)
-
(Platform Operations - API Lifecycle Management)
-
(ESDC instance - ESDC Application Component)
-
(ESDC Application Component - API)
-
(ESDC instance - Cloud Service Provider)
-
(ESDC instance - ESDC Data Layer)
-
(ESDC Data Layer - ESDC Data)
-
(Partner Application - API)
-
(Certified Kubernetes - Hosted - Message Processor)
-
(Certified Kubernetes - Hosted - Syncronizer)
-
(Certified Kubernetes - Hosted - Universal Data Collection Agent (UDCA))
-
(Certified Kubernetes - Hosted - Management API for Runtime Data (MART))
-
(Message Processor - Syncronizer)
-
(Message Processor - Universal Data Collection Agent (UDCA))
-
(Message Processor - Management API for Runtime Data (MART))
-
(Certified Kubernetes - Hosted - Cassandra Datastore)
-
(Message Processor - Cassandra Datastore)
-
(Management API for Runtime Data (MART) - Cassandra Datastore)
-
(Cassandra Datastore - Management API for Runtime Data (MART))
-
(Certified Kubernetes - Management API for Runtime Data (MART))
-
(Certified Kubernetes - Universal Data Collection Agent (UDCA))
-
(Certified Kubernetes - Syncronizer)
-
(Certified Kubernetes - Message Processor)
-
(Certified Kubernetes - Cassandra Datastore)
-
(API Gateway Agent - Certified Kubernetes )
-
(<<Machine to Machine Interface>> ESDC API - API Gateway Agent)
-
(<<Machine to Machine Interface>>Partner API - API Gateway)
-
(ESDC Application Service - ESDC Data)
-
(ESDC Application - ESDC Data)
-
(ESDC Application Event - ESDC Data)
-
(ESDC Application Event - ESDC Application Component)
-
(ESDC Application Event - ESDC Application Service)
-
(ESDC Application Component - <<Machine to Machine Interface>> ESDC API )
-
(ESDC Application Component - <<Machine to Machine Interface>> ESDC API )
-
(<<Machine to Machine Interface>> ESDC API - ESDC Application Service)
-
(Partner Application - <<Machine to Machine Interface>>Partner API)
-
(Partner Application - <<Machine to Machine Interface>>Partner API)
-
(<<Machine to Machine Interface>>Partner API - Partner Service)
-
(Partner Event - Partner Service)
-
(<<Human to Machine >> Hybrid UI - Management Server)
-
(<<Human to Machine >> Hybrid UI - Unified Analytics Platform)
-
(Operator - ESDC User)
-
(Developer - ESDC User)
-
(<<Human to Machine >> Hybrid UI - Developer)
-
(<<Human to Machine >> Hybrid UI - Operator)
-
(<<Human to Machine>> ESDC User Interface - ESDC User)
-
(ESDC Application Component - <<Human to Machine>> ESDC User Interface)
-
(ESDC Application Component - <<Human to Machine>> ESDC User Interface)
-
(API Gateway Agent - API Security)
-
(API Gateway Agent - API Monitoring)
-
(API Gateway Agent - API Analytics)
-
(API Gateway Agent - API Lifecycle Management)
-
(<<Human to Machine>> ESDC User Interface - ESDC Application Service)
-
(Business Interface - Representation)
-
Peer Review
(Build / Test - Junction (copy) (copy))
-
Fail
(Junction (copy) (copy) - Build / Test)
-
Pass
(Junction (copy) (copy) - Approve Deployment)
-
No
(Junction (copy) (copy) (copy) - Define Success Criteria)
-
(Deploy - Monitor/Support )
-
SAFe
(Monitor/Support - Intake)
-
(Approve Deployment - Junction (copy) (copy) (copy))
-
(API Gateway - Management Server)
-
(API Gateway - Identity Credential Authentication )
-
(API Gateway - Management Plane)
-
(API Gateway - Role Access Management)
-
(API Gateway - Unified Analytics Platform)
-
(API Gateway - Metrics)
-
(API Gateway - Runtime Plane)
-
(API Gateway - Logging)
-
(Management Plane - Management Server)
-
(Management Plane - Unified Analytics Platform)
-
(Management Plane - <<Human to Machine >> Hybrid UI)
-
(API Gateway - Common Services)
-
(Common Services - Metrics)
-
(Common Services - Role Access Management)
-
(Common Services - Identity Credential Authentication )
-
(Common Services - Resource Hierarchy )
-
(Common Services - Logging)
-
(Runtime Plane - <<Machine to Machine Interface>> ESDC API )
-
(Runtime Plane - <<Machine to Machine Interface>>Partner API)
-
(API Gateway - API Security)
-
(API Gateway - API Monitoring)
-
(API Gateway - API Analytics)
-
(API Gateway - API Gateway)
-
(Common Services - Runtime Plane)
-
(Common Services - Management Plane)
-
(Resource Protection - <<Asset at Risk>> Data)
-
(Resource Protection - <<Asset at Risk>> Application)
-
(User Devices - Managed Devices)
-
(User Devices - Unmanaged Devices)
-
(Users - Identification and Authentication)
-
(Users - Access Control)
-
(Users - Privilege Management)
-
(Users - Consent Management)
-
(Network - Network Device and Infrastructure Protection)
-
(Continuous Monitoring - Security Visibility and Real-time Threat Protection )
-
(<<Threat Agent>> Attacker - Threat Event)
-
(Threat Event - Vunerability)
-
(Vunerability - Zero Trust Assets)
-
(Threat Event - Loss Event)
-
(Loss Event - Vunerability)
-
(Control Measure - <<Security Principle>> Zero Trust Principles)
-
(<<Security Principle>> Zero Trust Principles - Control Objective)
-
(Control Measure - Security Requirement)
-
(Security Requirement - Control Objective)
-
(Zero Trust Assets - UC6 Application Delivery Pipeline Security - Implemented Control Measures)
-
(Implemented Control Measures - Implemented Control Measure)
-
(Implemented Control Measures - Implemented Control Measure)
-
(Implemented Control Measures - Implemented Control Measures)
-
( UC6 Application Delivery Pipeline Security - Implemented Control Measures - Vunerability)
-
(Loss Event - Risk)
-
(Implemented Control Measures - Control Measure)
-
(Control Objective - Risk)
-
(Resource Protection - <<Asset at Risk>> Reputation )
-
(Identification and Authentication - <<Security Requirement>> Comprehensive Identity, Credential and Access Management (ICAM))
-
(Identification and Authentication - <<Security Requirement>> Centralized authentication )
-
(Identification and Authentication - <<Security Requirement>> Strong two-factor authentication (2FA) for all users, regardless of location)
-
(Access Control - <<Security Requirement>> Risk Adaptive Access Control)
-
(Access Control - <<Security Requirement>> Implement fine-grained, least privilege access control)
-
(Access Control - <<Security Requirement>> Implement effective user account management procedures )
-
(Privilege Management - <<Security Requirement>> Establish roles/group memberships)
-
(Privilege Management - <<Security Requirement>> Associate roles/group memberships with each user )
-
(Privilege Management - <<Security Requirement>> Add/remove memberships as required )
-
(Managed Devices - <<Security Requirement>> Maintain an update inventory of all user devices)
-
(Managed Devices - <<Security Requirement>> Assign each device with a verifiable unique identifier)
-
(Managed Devices - <<Security Requirement>> Keep the configuration/health of all managed user devices up to date)
-
(Managed Devices - <<Security Requirement>> Secure boot considerations)
-
(Unmanaged Devices - <<Security Requirement>> Limit access in accordance with policy )
-
(Unmanaged Devices - <<Security Requirement>> Use of Mobile Threat Defense (MTD) tools/integration )
-
(Network Device and Infrastructure Protection - <<Security Requirement>> Limit physical and logical access to authorized personnel)
-
(Network Device and Infrastructure Protection - <<Security Requirement>> Minimize unauthorized lateral movement using network segmentation )
-
(Network Device and Infrastructure Protection - <<Security Requirement>> Identify and catalogue all network devices/components)
-
(<<Asset at Risk>> Application - <<Security Requirement>> Identify and catalogue all Applications and Services)
-
(<<Asset at Risk>> Application - <<Security Requirement>> Implement resource obfuscation )
-
(<<Asset at Risk>> Application - <<Security Requirement>> Automation and orchestration)
-
(<<Asset at Risk>> Application - <<Security Requirement>> Implement micro-segmentation to isolate applications and workflows)
-
(<<Asset at Risk>> Application - <<Security Requirement>> Secure application development)
-
(<<Asset at Risk>> Application - <<Security Requirement>> Software assurance and supply chain risk management)
-
(<<Asset at Risk>> Data - <<Security Requirement>> Identify and catalogue all data resources)
-
(<<Asset at Risk>> Data - <<Security Requirement>> Label data to distinguish sensitive from non-sensitive data)
-
(<<Asset at Risk>> Data - <<Security Requirement>> Encrypt sensitive data at rest)
-
(<<Asset at Risk>> Data - <<Security Requirement>> Encrypt all end-to-end communication)
-
(Security Visibility and Real-time Threat Protection - <<Security Requirement>> Traffic flow inspection and analysis)
-
(Security Visibility and Real-time Threat Protection - <<Security Requirement>> Security Information and Event Management (SIEM))
-
(Security Visibility and Real-time Threat Protection - <<Security Requirement>> Traffic flow inspection and analysis)
-
(Security Visibility and Real-time Threat Protection - <<Security Requirement>> Real-time correlation, assessment and response based on inputs from multiple sources (including data from automated monitoring tools))
-
(RabbitMQ - Messaging)
-
(Identification and Authentication (copy) - <<Security Requirement>> Centralized authentication (copy))
-
(Network Device and Infrastructure Protection (copy) - <<Security Requirement>> Identify and catalogue all network devices/components (copy))
-
(<<Asset at Risk>> Data (copy) - <<Security Requirement>> Encrypt all end-to-end communication (copy))
-
(Access Control (copy) - <<Security Requirement>> Implement fine-grained, least privilege access control (copy))
-
(Privilege Management (copy) - <<Security Requirement>> Establish roles/group memberships (copy))
-
(Security Visibility and Real-time Threat Protection (copy) - <<Security Requirement>> Traffic flow inspection and analysis (copy))
-
(Access Control (copy) - <<Security Requirement>> Risk Adaptive Access Control (copy))
-
(Managed Devices (copy) - <<Security Requirement>> Maintain an update inventory of all user devices (copy))
-
(Managed Devices (copy) - <<Security Requirement>> Secure boot considerations (copy))
-
(<<Asset at Risk>> Data (copy) - <<Security Requirement>> Encrypt sensitive data at rest (copy))
-
(Managed Devices (copy) - <<Security Requirement>> Assign each device with a verifiable unique identifier (copy))
-
(Network Device and Infrastructure Protection (copy) - <<Security Requirement>> Limit physical and logical access to authorized personnel (copy))
-
(Identification and Authentication (copy) - <<Security Requirement>> Strong two-factor authentication (2FA) for all users, regardless of location (copy))
-
(<<Asset at Risk>> Application (copy) - <<Security Requirement>> Identify and catalogue all Applications and Services (copy))
-
(<<Asset at Risk>> Application (copy) - <<Security Requirement>> Implement micro-segmentation to isolate applications and workflows (copy))
-
(Security Visibility and Real-time Threat Protection (copy) - <<Security Requirement>> Real-time correlation, assessment and response based on inputs from multiple sources (including data from automated monitoring tools) (copy))
-
(<<Asset at Risk>> Data (copy) - <<Security Requirement>> Identify and catalogue all data resources (copy))
-
(Security Visibility and Real-time Threat Protection (copy) - <<Security Requirement>> Traffic flow inspection and analysis (copy))
-
(<<Asset at Risk>> Data (copy) - <<Security Requirement>> Label data to distinguish sensitive from non-sensitive data (copy))
-
(Privilege Management (copy) - <<Security Requirement>> Add/remove memberships as required (copy))
-
(Unmanaged Devices (copy) - <<Security Requirement>> Limit access in accordance with policy (copy))
-
(Unmanaged Devices (copy) - <<Security Requirement>> Use of Mobile Threat Defense (MTD) tools/integration (copy))
-
(<<Asset at Risk>> Application (copy) - <<Security Requirement>> Secure application development (copy))
-
(Identification and Authentication (copy) - <<Security Requirement>> Comprehensive Identity, Credential and Access Management (ICAM) (copy))
-
(Security Visibility and Real-time Threat Protection (copy) - <<Security Requirement>> Security Information and Event Management (SIEM) (copy))
-
(Privilege Management (copy) - <<Security Requirement>> Associate roles/group memberships with each user (copy))
-
(<<Asset at Risk>> Application (copy) - <<Security Requirement>> Implement resource obfuscation (copy))
-
(<<Asset at Risk>> Application (copy) - <<Security Requirement>> Automation and orchestration (copy))
-
(<<Asset at Risk>> Application (copy) - <<Security Requirement>> Software assurance and supply chain risk management (copy))
-
(Access Control (copy) - <<Security Requirement>> Implement effective user account management procedures (copy))
-
(Managed Devices (copy) - <<Security Requirement>> Keep the configuration/health of all managed user devices up to date (copy))
-
(Network Device and Infrastructure Protection (copy) - <<Security Requirement>> Minimize unauthorized lateral movement using network segmentation (copy))
-
(UC7 API Management - Control Measures - <<Control Measure>>Enable identity context in the API traffic to authenticate all packets to the application (or service) whether the APIs are internal or external to the domain)
-
(UC7 API Management - Control Measures - <<Control Measure>>Enable throttling and cache)
-
(UC7 API Management - Control Measures - <<Control Measure>> Authentication using user identity, app identity, device identity)
-
(Zero Trust Control Objectives - <<Control Objective>> Enabling the establishment of a secure and resilient enterprise digital security ecosystem in which government services are delivered safely and securely)
-
(Zero Trust Control Objectives - <<Control Objective>> Providing a secure platform that ensures safety and protection of systems and data)
-
( UC6 Application Delivery Pipeline Security - Implemented Control Measures - UC6 Application Delivery Pipeline Security)
-
( UC6 Application Delivery Pipeline Security - <<Security Requirement>> Zero Trust Requirements)
-
( UC6 Application Delivery Pipeline Security - <<Security Principle>> Zero Trust Principles)
-
(<<Security Principle>> Zero Trust Principles - Zero Trust Control Objectives)
-
(<<Security Requirement>> Zero Trust Requirements - Zero Trust Control Objectives)
-
(Zero Trust Control Objectives - Risk)
-
(Zero Trust Assets - <<Asset at Risk>> Data)
-
(Zero Trust Assets - <<Asset at Risk>> Application)
-
(Zero Trust Assets - <<Asset at Risk>> Reputation )
-
( UC6 Application Delivery Pipeline Security - Implemented Control Measures - <<Implemented Control Measure>> Multi-factor authentication (MFA))
-
( UC6 Application Delivery Pipeline Security - Implemented Control Measures - <<Implemented Control Measure>> Security Information and Event Management (SIEM))
-
( UC6 Application Delivery Pipeline Security - Implemented Control Measures - <<Implemented Control Measure>> Context based authentication)
-
( UC6 Application Delivery Pipeline Security - Implemented Control Measures - <<Implemented Control Measure>> Secrets Management)
-
( UC6 Application Delivery Pipeline Security - Implemented Control Measures - <<Implemented Control Measure>> Automation)
-
( UC6 Application Delivery Pipeline Security - <<Control Measure>> Enforce user/developer authentication using MFA to separate domain users for leastprivileged access to production and development system)
-
( UC6 Application Delivery Pipeline Security - <<Control Measure>> Enforce authentication and authorization for short term access against Identity and Access Control)
-
( UC6 Application Delivery Pipeline Security - <<Control Measure>> The permission should be short term and enforce MFA with jump boxes for Interactive access where applicable)
-
( UC6 Application Delivery Pipeline Security - <<Control Measure>> Enable audit logs)
-
( UC6 Application Delivery Pipeline Security - <<Control Measure>> Enforce segregation of duties)
-
(UC7 API Management - Implemented Control Measures - Vunerability)
-
(Zero Trust Assets - UC7 API Management - Implemented Control Measures)
-
(UC7 API Management - Implemented Control Measures - UC7 API Management - Control Measures)
-
(UC7 API Management - Control Measures - <<Security Principle>> Zero Trust Principles)
-
(UC7 API Management - Control Measures - <<Security Requirement>> Zero Trust Requirements)
-
(Asset at Risk - Implemented Control Measures)
-
(Vunerability - Asset at Risk)
-
(UC7 API Management - Control Measures - <<Security Requirement>> Zero Trust Requirements)
-
( UC5 Microservices - Implemented Control Measures - <<Implemented Control Measure>> Encryption in Transit)
-
( UC5 Microservices - Implemented Control Measures - <<Implemented Control Measure>> Application Whitelisting and Ring-fencing)
-
( UC5 Microservices - Implemented Control Measures - <<Implemented Control Measure>> Service Mesh)
-
( UC5 Microservices - Implemented Control Measures - <<Implemented Control Measure>> JSON Web Token (JWT))
-
( UC5 Microservices - Implemented Control Measures - <<Control Measure>> Whitelisting of traffic to deny all connections by default except specific connection that are enabled)
-
( UC5 Microservices - Implemented Control Measures - <<Control Measure>> Encryption in transit (e.g. Mutual TLS authentication, encrypting payload with JSON webtokens))
-
( UC5 Microservices - Implemented Control Measures - UC5 Microservices - Implemented Control Measures)
-
( UC5 Microservices - Implemented Control Measures - <<Security Requirement>> Zero Trust Requirements)
-
( UC5 Microservices - Implemented Control Measures - <<Security Principle>> Zero Trust Principles)
-
(Zero Trust Assets - UC5 Microservices - Implemented Control Measures)
-
( UC5 Microservices - Implemented Control Measures - Vunerability)
-
(UC4 Application to Application Communication - Implemented Control Measures - <<Implemented Control Measure>> Network policies aligned to app micro segments )
-
(UC4 Application to Application Communication - Implemented Control Measures - <<Implemented Control Measure>> In-app and session monitoring)
-
(UC4 Application to Application Communication - Implemented Control Measures - <<Implemented Control Measure>> Single Sign-On (SSO))
-
(UC4 Application to Application Communication - Implemented Control Measures - <<Implemented Control Measure>> Microsegmentation)
-
(UC4 Application to Application Communication - Implemented Control Measures - UC4 Application to Application Communication - Control Measure)
-
(UC4 Application to Application Communication - Implemented Control Measures - Vunerability)
-
(Zero Trust Assets - UC4 Application to Application Communication - Implemented Control Measures)
-
(UC4 Application to Application Communication - Control Measure - <<Security Requirement>> Zero Trust Requirements)
-
(UC4 Application to Application Communication - Control Measure - <<Security Principle>> Zero Trust Principles)
-
(UC8 On Premise Application to Cloud Application - Control Measures - <<Security Requirement>> Zero Trust Requirements)
-
(UC8 On Premise Application to Cloud Application - Control Measures - <<Security Principle>> Zero Trust Principles)
-
(UC8 On Premise Application to Cloud Application - Implemented Control Measures - <<Implemented Control Measure>> Microsegmentation)
-
(UC8 On Premise Application to Cloud Application - Implemented Control Measures - <<Implemented Control Measure>> API Security)
-
(UC8 On Premise Application to Cloud Application - Implemented Control Measures - <<Implemented Control Measure>> Single Sign-On (SSO))
-
(UC8 On Premise Application to Cloud Application - Implemented Control Measures - <<Implemented Control Measure>> Application Whitelisting and Ring-fencing)
-
(UC8 On Premise Application to Cloud Application - Implemented Control Measures - <<Implemented Control Measure>> In-app and session monitoring)
-
(Zero Trust Assets - UC8 On Premise Application to Cloud Application - Implemented Control Measures)
-
(UC8 On Premise Application to Cloud Application - Implemented Control Measures - Vunerability)
-
(UC8 On Premise Application to Cloud Application - Implemented Control Measures - UC8 On Premise Application to Cloud Application - Control Measures)
-
(<<Security Requirement>> Zero Trust Requirements - Resource Protection)
-
(<<Security Requirement>> Zero Trust Requirements - Continuous Monitoring)
-
(<<Security Requirement>> Zero Trust Requirements - Users)
-
(<<Security Requirement>> Zero Trust Requirements - Network)
-
(<<Security Requirement>> Zero Trust Requirements - User Devices)
-
(UC9 -Layer 7 Attacks and Lateral Movement Protection - Control Measures - <<Control Measure>> Implement monitoring of user behavior and activities and detect anomalies)
-
(UC9 -Layer 7 Attacks and Lateral Movement Protection - Control Measures - <<Control Measure>> Enable logging and alerting to monitor policy violation)
-
(UC9 -Layer 7 Attacks and Lateral Movement Protection - Control Measures - <<Control Measure>> Isolate workloads through implementation of micro segmentation and granularperimeters policy enforcement)
-
(UC9 -Layer 7 Attacks and Lateral Movement Protection - Control Measures - <<Control Measure>> Control access to content by allowing/blocking web requests through robust accesspolicies)
-
(UC9 -Layer 7 Attacks and Lateral Movement Protection - Control Measures - <<Control Measure>> Intelligent network traffic monitoring, breach detection and proactive response)
-
(UC8 On Premise Application to Cloud Application - Control Measures - <<Control Measure>> Applications are verified for proper authentication and authorization before eachsend/connect request)
-
(UC8 On Premise Application to Cloud Application - Control Measures - <<Control Measure>> Ensure only known, allowed traffic or legitimate application communication is allowed by segmentation)
-
(UC8 On Premise Application to Cloud Application - Control Measures - <<Control Measure>> Ensure data security through end to end encryption at the application level)
-
(UC8 On Premise Application to Cloud Application - Control Measures - <<Control Measure>> Allow permissions only on a least privilege bases i.e. deny by default)
-
(UC8 On Premise Application to Cloud Application - Control Measures - <<Control Measure>> Continuously log and monitor all traffic between applications and enforce security policies on an ongoing basis)
-
(UC4 Application to Application Communication - Control Measure - <<Control Measure>> Applications should be grouped into different zones (micro perimeters) based on the risk level and data within the application)
-
(UC4 Application to Application Communication - Control Measure - <<Control Measure>> Application segmentation should apply regardless of the physical location of the application)
-
(UC4 Application to Application Communication - Control Measure - <<Control Measure>> Apply application level segmentation policies)
-
(UC4 Application to Application Communication - Control Measure - <<Control Measure>> Server to server communication should be restricted (default deny) to only approvedinter application, server or hosts communication)
-
(UC1 Authorized User Access - <<Control Measure>> Reliable authentication of users and devices prior to granting access to the specific enterprise application)
-
(UC1 Authorized User Access - <<Control Measure>> Users should not access an application until sufficient level of trust is established)
-
(UC1 Authorized User Access - <<Control Measure>> Users authentication should be enhanced with the use of MFA)
-
(UC1 Authorized User Access - <<Control Measure>> Least privilege authorization in place for in app permissions)
-
(UC1 Authorized User Access - <<Control Measure>> Continuous monitoring of user actions for abnormal behavior)
-
(UC1 Authorized User Access - <<Control Measure>> Encrypted traffic between authorized user and enterprise resource)
-
(UC1 Authorized User Access - <<Control Measure>> Ensure real time assessment of device security prior to granting access to enterpriseresources)
-
(UC2 Administrator access through managed devices - Control Measures - <<Control Measure>> Privileged access for admin purposes should be leveraged by a centralized PAM solution)
-
(UC2 Administrator access through managed devices - Control Measures - <<Control Measure>> Users authentication should be enhanced with the use of MFA)
-
(UC2 Administrator access through managed devices - Control Measures - <<Control Measure>> Continuous monitoring of user actions for abnormal behavior)
-
(UC2 Administrator access through managed devices - Control Measures - <<Control Measure>> Least privilege principle in place for permissions within the enterprise resources)
-
(UC3 Authorized user access through unmanaged devices - Control Measures - <<Control Measure>> Limited access to the organization’s resources from unmanaged devices throughconditional access controls)
-
(UC3 Authorized user access through unmanaged devices - Control Measures - <<Control Measure>> Enforced device authentication prior to access corporate resources)
-
(UC3 Authorized user access through unmanaged devices - Control Measures - <<Control Measure>> End to end encryption of traffic)
-
(UC3 Authorized user access through unmanaged devices - Control Measures - <<Control Measure>> Device security assessment to ensure required security posture is in place prior togranting access)
-
(UC3 Authorized user access through unmanaged devices - Control Measures - <<Control Measure>> Leverage multi factor authentication (MFA) as part of the authentication process for the user)
-
(UC3 Authorized user access through unmanaged devices - Control Measures - <<Control Measure>> Continuous visibility and control)
-
(UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures - <<Implemented Control Measure>> User Entity Behavior Analytics (UEBA))
-
(UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures - <<Implemented Control Measure>> Threat Intelligence)
-
(UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures - <<Implemented Control Measure>> Data Loss Prevention (DLP))
-
(UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures - <<Implemented Control Measure>> Microsegmentation)
-
(UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures - <<Implemented Control Measure>> Web application Firewall)
-
(UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures - <<Implemented Control Measure>> Security Information and Event Management (SIEM))
-
(UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures - <<Implemented Control Measure>> Conditional access)
-
(UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures - <<Implemented Control Measure>> Network Monitoring)
-
(UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures - UC9 -Layer 7 Attacks and Lateral Movement Protection - Control Measures)
-
(Zero Trust Assets - UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures)
-
(UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures - Vunerability)
-
(UC9 -Layer 7 Attacks and Lateral Movement Protection - Control Measures - <<Security Requirement>> Zero Trust Requirements)
-
(UC9 -Layer 7 Attacks and Lateral Movement Protection - Control Measures - <<Security Principle>> Zero Trust Principles)
-
(UC1 Authorized User Access - <<Security Requirement>> Zero Trust Requirements)
-
(UC1 Authorized User Access - <<Security Principle>> Zero Trust Principles)
-
(UC7 API Management - Implemented Control Measures - <<Implemented Control Measure>> Application Whitelisting and Ring-fencing)
-
(UC7 API Management - Implemented Control Measures - <<Implemented Control Measure>> API (Application Programming Interface) Gateway)
-
(UC1 Authorized User Access- Implemented Control Measures - <<Implemented Control Measure>> Endpoint protection)
-
(UC1 Authorized User Access- Implemented Control Measures - <<Implemented Control Measure>> Automated remediation)
-
(UC1 Authorized User Access- Implemented Control Measures - <<Implemented Control Measure>> Device directory)
-
(UC1 Authorized User Access- Implemented Control Measures - <<Implemented Control Measure>> Single Sign-On (SSO))
-
(UC1 Authorized User Access- Implemented Control Measures - <<Implemented Control Measure>> Multi-factor authentication (MFA))
-
(UC1 Authorized User Access- Implemented Control Measures - <<Implemented Control Measure>> Conditional access policies)
-
(UC1 Authorized User Access- Implemented Control Measures - <<Implemented Control Measure>> In-app and session monitoring)
-
(UC1 Authorized User Access- Implemented Control Measures - <<Implemented Control Measure>> User Entity Behavior Analytics (UEBA))
-
(UC1 Authorized User Access- Implemented Control Measures - <<Implemented Control Measure>> End-to-end encryption)
-
(UC1 Authorized User Access- Implemented Control Measures - <<Implemented Control Measure>> Data Loss Prevention (DLP))
-
(UC1 Authorized User Access- Implemented Control Measures - UC1 Authorized User Access)
-
(UC1 Authorized User Access- Implemented Control Measures - Zero Trust Assets)
-
(UC1 Authorized User Access- Implemented Control Measures - Vunerability)
-
(UC2 Administrator access through managed devices - Control Measures - <<Security Requirement>> Zero Trust Requirements)
-
(UC2 Administrator access through managed devices - Control Measures - <<Security Principle>> Zero Trust Principles)
-
(UC2 Administrator access through managed devices - Implemented Control Measures - <<Implemented Control Measure>> Multi-factor authentication (MFA))
-
(UC2 Administrator access through managed devices - Implemented Control Measures - <<Implemented Control Measure>> In-app and session monitoring)
-
(UC2 Administrator access through managed devices - Implemented Control Measures - <<Implemented Control Measure>> Identity Provider)
-
(UC2 Administrator access through managed devices - Implemented Control Measures - <<Implemented Control Measure>> Conditional access policies)
-
(UC2 Administrator access through managed devices - Implemented Control Measures - <<Implemented Control Measure>> Least privilege access)
-
(UC2 Administrator access through managed devices - Implemented Control Measures - UC2 Administrator access through managed devices - Control Measures)
-
(UC2 Administrator access through managed devices - Implemented Control Measures - Zero Trust Assets)
-
(UC2 Administrator access through managed devices - Implemented Control Measures - Vunerability)
-
(UC3 Authorized user access through unmanaged devices - Implemented Control Measures - <<Implemented Control Measure>> Multi-factor authentication (MFA))
-
(UC3 Authorized user access through unmanaged devices - Implemented Control Measures - <<Implemented Control Measure>> In-app and session monitoring)
-
(UC3 Authorized user access through unmanaged devices - Implemented Control Measures - <<Implemented Control Measure>> Data Loss Prevention (DLP))
-
(UC3 Authorized user access through unmanaged devices - Implemented Control Measures - <<Implemented Control Measure>> End-to-end encryption)
-
(UC3 Authorized user access through unmanaged devices - Implemented Control Measures - <<Implemented Control Measure>> User Entity Behavior Analytics (UEBA))
-
(UC3 Authorized user access through unmanaged devices - Implemented Control Measures - <<Implemented Control Measure>> Device Management)
-
(UC3 Authorized user access through unmanaged devices - Implemented Control Measures - Zero Trust Assets)
-
(UC3 Authorized user access through unmanaged devices - Implemented Control Measures - UC3 Authorized user access through unmanaged devices - Control Measures)
-
(UC3 Authorized user access through unmanaged devices - Control Measures - <<Security Requirement>> Zero Trust Requirements)
-
(UC3 Authorized user access through unmanaged devices - Control Measures - <<Security Principle>> Zero Trust Principles)
-
(UC3 Authorized user access through unmanaged devices - Implemented Control Measures - Vunerability)
-
(Threat Agent - Threat Event)
-
(Implemented Control Measures - Vunerability)
-
(Control Measure - Security Principle)
-
(Security Principle - Control Objective)
-
(Threat Agents - Threat Events)
-
(Threat Events - Loss Events)
-
(Implemented Control Measures - Vunerabilities)
-
(Loss Events - Risk)
-
(Threat Agents - Threat Events)
-
(VACCINE EFFORTS - Secure Access To Vaccine Candidates)
-
(FISCAL SUSTAINABILITY - Address Extreme Wealth Inequality)
-
(ADDRESSING SYSTEMIC RACISM - Shift To Community-Led Policing)
-
(Protecting Canadians From COVID-19 - CANADA'S TOP SCIENTIFIC MINDS)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Increase Old Age Security)
-
(TAKING ACTION ON EXTREME RISKS FROM CLIMATE CHANGE - Support Sector Transformation Towards Net-Zero Future)
-
(Canada Emergency Wage Subsidy - Helping Canadians Through The Pandemic)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Universal Broadband Fund)
-
(Personal Support Worker Wage Top-Up - Protecting Canadians From COVID-19)
-
(Helping Canadians Through The Pandemic - WOMEN IN THE ECONOMY)
-
(TAKING ACTION ON EXTREME RISKS FROM CLIMATE CHANGE - Legislate Net-Zero Emmissions By 2050)
-
(The Canada We're Fighting For - PROTECTING TWO OFFICIAL LANGUAGES)
-
(RECONCILIATION - Enact UN Declaration)
-
(A STRONGER WORKFORCE - Introduce Free Tax Filing)
-
(RECONCILIATION - Support Capacity Building)
-
(CREATING JOBS - Eliminate Provincial Trade Barriers)
-
(SUPPORTING BUSINESSES - Canada Emergency Wage Subsidy)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Reduce Chronic Homelessness)
-
(TAKING ACTION ON EXTREME RISKS FROM CLIMATE CHANGE - Make Zero-Emission Vehicles More Affordable)
-
(Pursue Faster Testing Technology - Protecting Canadians From COVID-19)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Disability Inclusion Plan)
-
(CREATING JOBS - Worker Training)
-
(Canada Emergency Response Benefit - Helping Canadians Through The Pandemic)
-
(SUPPORTING WORKERS AND THEIR FAMILIES - CERB-to-EI Canada Recovery Benefit)
-
(CANADA'S TOP SCIENTIFIC MINDS - Vaccine Task Force)
-
(FISCAL SUSTAINABILITY - Update Canada's COVID-19 Economic Response Plan)
-
(The Canada We're Fighting For - CANADA IN THE WORLD)
-
(Support Health Care Systems Capacity - Protecting Canadians From COVID-19)
-
(ADDRESSING SYSTEMIC RACISM - Enhance Civilian Oversight of Law Enforcement)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Invest In Infrastructure)
-
(WOMEN IN THE ECONOMY - Action Plan for Women in the Economy)
-
(TAKING ACTION ON EXTREME RISKS FROM CLIMATE CHANGE - Support Renewable Energy Investment)
-
(Testing Assistance Response Team - Pursue Faster Testing Technology)
-
(CREATING JOBS - Social Sector & Infrastructure Investment)
-
(CANADA'S TOP SCIENTIFIC MINDS - Immunity Task Force)
-
(Disability Inclusion Plan - Improve Eligibility Process)
-
(CREATING JOBS - Canada Emergency Wage Subsidy)
-
(SUPPORTING BUSINESSES - Canada Emergency Business Account Expansion)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Support Regional Airline Routes)
-
(Safe Restart Agreement (Provinces & Territories) - Support Health Care Systems Capacity)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Personal Support Worker Measures)
-
(TAKING ACTION ON EXTREME RISKS FROM CLIMATE CHANGE - Continue To Put A Price On Pollution)
-
(The Canada We're Fighting For - A WELCOMING CANADA)
-
(SUPPORTING BUSINESSES - Support For Hardest-Hit Industries)
-
(CANADA'S TOP SCIENTIFIC MINDS - VACCINE EFFORTS)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - National, Universal Pharmacare Program)
-
(Testing Assistance Response Team - Protecting Canadians From COVID-19)
-
(TAKING ACTION ON EXTREME RISKS FROM CLIMATE CHANGE - Recognize Key Partner Efforts To Reduce Emissions)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Increase Mental Health Resource Access)
-
(Building Back Better: A Resilience Agenda For the Middle Class - TAKING ACTION ON EXTREME RISKS FROM CLIMATE CHANGE)
-
(RECONCILIATION - Implement The Truth & Reconciliation Commission’s Calls To Action)
-
(TAKING ACTION ON EXTREME RISKS FROM CLIMATE CHANGE - Create Jobs Cutting Energy Costs)
-
(COVID Alert app - Protecting Canadians From COVID-19)
-
(ADDRESSING SYSTEMIC RACISM - Black Entrepreneurship Program)
-
(ADDRESSING SYSTEMIC RACISM - Eliminate Discriminatory Justice)
-
(TAKING ACTION ON EXTREME RISKS FROM CLIMATE CHANGE - Attract Zero-Emission Investment)
-
(TAKING ACTION ON EXTREME RISKS FROM CLIMATE CHANGE - Invest In Blue Economy)
-
(TAKING ACTION ON EXTREME RISKS FROM CLIMATE CHANGE - Expand Urban Parks)
-
(CERB & Wage Subsidy Support - Protecting Canadians From COVID-19)
-
(Helping Canadians Through The Pandemic - CREATING JOBS)
-
(The Canada We're Fighting For - RECONCILIATION)
-
(Helping Canadians Through The Pandemic - SUPPORTING WORKERS AND THEIR FAMILIES)
-
(A STRONGER WORKFORCE - Worker Training)
-
(TAKING ACTION ON EXTREME RISKS FROM CLIMATE CHANGE - Create Canada Water Agency)
-
(RECONCILIATION - Accelerate National Action Plan For The National Inquiry into Missing & Murdered Indigenous Women & Girls’ Calls For Justice)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Help People Remain In Their Homes Longer)
-
(Building Back Better: A Resilience Agenda For the Middle Class - A STRONGER WORKFORCE)
-
(FISCAL SUSTAINABILITY - Ensure High Revenue Entity Wealth Sharing)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Address Food Insecurity)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - National Action Plan Against Gender-Based Violence)
-
(Protecting Canadians From COVID-19 - VACCINE EFFORTS)
-
(CANADA IN THE WORLD - Stand Up For Human Rights & The Rule Of Law)
-
(Helping Canadians Through The Pandemic - FISCAL SUSTAINABILITY)
-
(RECONCILIATION - Meet Clean Water Committments)
-
(A STRONGER WORKFORCE - Update Outdated IT Systems)
-
(Target Additional Financial Support to Affected Businesses - Protecting Canadians From COVID-19)
-
(Help Provinces Increase Testing Capacity - Protecting Canadians From COVID-19)
-
(Canadian Forces Support in Long-Term Care Homes - Protecting Canadians From COVID-19)
-
(CREATING JOBS - Youth Employment & Skills Strategy)
-
(Safe Restart Agreement (Provinces & Territories) - Protecting Canadians From COVID-19)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Implement Firearms Policy)
-
(ADDRESSING SYSTEMIC RACISM - Co-Develop First Nations Policing Framework)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Criminal Code Amendments)
-
(PROTECTING TWO OFFICIAL LANGUAGES - Strengthen the Official Languages Act)
-
(TAKING ACTION ON EXTREME RISKS FROM CLIMATE CHANGE - Reduce Climate-Related Impacts)
-
(TAKING ACTION ON EXTREME RISKS FROM CLIMATE CHANGE - Ban Single-Use Plastics)
-
(CANADA IN THE WORLD - Fight For Free Trade)
-
(Building Back Better: A Resilience Agenda For the Middle Class - ADDRESSING GAPS IN OUR SOCIAL SYSTEMS)
-
(Personal Protective Equipment Supply Chain Security - Protecting Canadians From COVID-19)
-
(ADDRESSING SYSTEMIC RACISM - Anti-Racism Strategy for 2019-2022)
-
(A WELCOMING CANADA - Keep Canada Competitive)
-
(TAKING ACTION ON EXTREME RISKS FROM CLIMATE CHANGE - Deliver More Trainsit)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Support Seniors with Provinces & Territories)
-
(The Canada We're Fighting For - ADDRESSING SYSTEMIC RACISM)
-
(RECONCILIATION - Distinctions-Based Mental Health & Wellness Strategy)
-
(Ramp Up Contact Tracing & Testing - Protecting Canadians From COVID-19)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Standardize National Long-Term Care)
-
(SUPPORTING BUSINESSES - Business Credit Availability Program Improvement)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Improve Access To Primary Care)
-
(Helping Canadians Through The Pandemic - SUPPORTING BUSINESSES)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Improve Access To Medicine)
-
(WOMEN IN THE ECONOMY - Women’s Entrepreneurship Strategy)
-
(CREATING JOBS - Employer Incentives)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Fair Supply Sector Compensation)
-
(CANADA IN THE WORLD - Invest In International Development)
-
(TAKING ACTION ON EXTREME RISKS FROM CLIMATE CHANGE - Move Forward With Clean Power Fund)
-
(ADDRESSING SYSTEMIC RACISM - Action Online Hate)
-
(CANADA IN THE WORLD - Ensure Worldwide Access To A Vaccine)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Address Opiod Epidemic)
-
(WOMEN IN THE ECONOMY - National Early Learning & Childcare System)
-
(ADDRESSING SYSTEMIC RACISM - Support Black Culture & Heritage)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Increase Canada Pension Plan Survivor Benefit)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Increase National Housing Strategy Investment)
-
(VACCINE EFFORTS - Invest In Domestic Vaccine Manufacture)
-
(Disability Inclusion Plan - Employment Strategy)
-
(SUPPORTING WORKERS AND THEIR FAMILIES - A Modernized EI System)
-
(VACCINE EFFORTS - Invest In Vaccine Distribution)
-
(WOMEN IN THE ECONOMY - Before-and-After School Program Subsidy)
-
(Safe Return To Class Fund Investment - Protecting Canadians From COVID-19)
-
(ADDRESSING SYSTEMIC RACISM - GC-Wide Data Collection Approach)
-
(RECONCILIATION - Indigenous Infrastructure)
-
(ADDRESSING SYSTEMIC RACISM - Modernize Law Enforcement Training)
-
(Disability Inclusion Plan - Canadian Disability Benefit)
-
(CANADA'S TOP SCIENTIFIC MINDS - VACCINE EFFORTS)
-
(Target Additional Financial Support to Affected Businesses - Protecting Canadians From COVID-19)
-
(Helping Canadians Through The Pandemic - FISCAL SUSTAINABILITY)
-
(ADDRESSING SYSTEMIC RACISM - GC-Wide Data Collection Approach)
-
(SUPPORTING BUSINESSES - Business Credit Availability Program Improvement)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Criminal Code Amendments)
-
(The Canada We're Fighting For - CANADA IN THE WORLD)
-
(SUPPORTING BUSINESSES - Support For Hardest-Hit Industries)
-
(CREATING JOBS - Youth Employment & Skills Strategy)
-
(WOMEN IN THE ECONOMY - National Early Learning & Childcare System)
-
(Helping Canadians Through The Pandemic - SUPPORTING BUSINESSES)
-
(Helping Canadians Through The Pandemic - CREATING JOBS)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Increase Canada Pension Plan Survivor Benefit)
-
(The Canada We're Fighting For - ADDRESSING SYSTEMIC RACISM)
-
(Building Back Better: A Resilience Agenda For the Middle Class - ADDRESSING GAPS IN OUR SOCIAL SYSTEMS)
-
(Helping Canadians Through The Pandemic - SUPPORTING WORKERS AND THEIR FAMILIES)
-
(WOMEN IN THE ECONOMY - Before-and-After School Program Subsidy)
-
(SUPPORTING WORKERS AND THEIR FAMILIES - CERB-to-EI Canada Recovery Benefit)
-
(PROTECTING TWO OFFICIAL LANGUAGES - Strengthen the Official Languages Act)
-
(SUPPORTING BUSINESSES - Canada Emergency Business Account Expansion)
-
(CREATING JOBS - Employer Incentives)
-
(Disability Inclusion Plan - Improve Eligibility Process)
-
(Disability Inclusion Plan - Canadian Disability Benefit)
-
(The Canada We're Fighting For - A WELCOMING CANADA)
-
(WOMEN IN THE ECONOMY - Women’s Entrepreneurship Strategy)
-
(WOMEN IN THE ECONOMY - Action Plan for Women in the Economy)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Disability Inclusion Plan)
-
(Personal Support Worker Wage Top-Up - Protecting Canadians From COVID-19)
-
(Canada Emergency Wage Subsidy - Helping Canadians Through The Pandemic)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Personal Support Worker Measures)
-
(Canada Emergency Response Benefit - Helping Canadians Through The Pandemic)
-
(Helping Canadians Through The Pandemic - WOMEN IN THE ECONOMY)
-
(The Canada We're Fighting For - PROTECTING TWO OFFICIAL LANGUAGES)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Support Seniors with Provinces & Territories)
-
(A STRONGER WORKFORCE - Update Outdated IT Systems)
-
(CREATING JOBS - Canada Emergency Wage Subsidy)
-
(Protecting Canadians From COVID-19 - VACCINE EFFORTS)
-
(Building Back Better: A Resilience Agenda For the Middle Class - A STRONGER WORKFORCE)
-
(CERB & Wage Subsidy Support - Protecting Canadians From COVID-19)
-
(The Canada We're Fighting For - RECONCILIATION)
-
(CREATING JOBS - Social Sector & Infrastructure Investment)
-
(Building Back Better: A Resilience Agenda For the Middle Class - TAKING ACTION ON EXTREME RISKS FROM CLIMATE CHANGE)
-
(SUPPORTING WORKERS AND THEIR FAMILIES - A Modernized EI System)
-
(Safe Return To Class Fund Investment - Protecting Canadians From COVID-19)
-
(Disability Inclusion Plan - Employment Strategy)
-
(SUPPORTING BUSINESSES - Canada Emergency Wage Subsidy)
-
(Protecting Canadians From COVID-19 - CANADA'S TOP SCIENTIFIC MINDS)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Reduce Chronic Homelessness)
-
(ADDRESSING GAPS IN OUR SOCIAL SYSTEMS - Increase Old Age Security)
-
(A STRONGER WORKFORCE - Worker Training)
-
(CREATING JOBS - Worker Training)
-
(Nadia Benoit - Senior Project Manager)
-
(Kathleen Walford - Stakeholder Business Owner)
-
(Jeremy Sales - Stakeholder Branch Sponsor)
-
(Nathalie Beaulieu - Stakeholder Branch Sponsor)
-
(Integrity Services Branch - Service Canada - Kathleen Walford)
-
(Integrity Services Branch - Service Canada - Stakeholder Business Owner)
-
(Integrity Services Branch - Service Canada - Nadia Benoit)
-
(Integrity Services Branch - Service Canada - Senior Project Manager)
-
(Integrity Services Branch - Service Canada - Jeremy Sales)
-
(Integrity Services Branch - Service Canada - Stakeholder Branch Sponsor)
-
(Innovation, Information and Technology Branch - Nathalie Beaulieu)
-
(Innovation, Information and Technology Branch - Stakeholder Branch Sponsor)
-
((Fraud) Enforcement Investigation - Enforcement Investigation Process)
-
((Fraud) Enforcement Investigation - Case Management)
-
([MICM2] Solution For Enforcement Investigations - Collect & Track Evidence)
-
([MICM2] Solution For Enforcement Investigations - Control System Access)
-
([MICM2] Solution For Enforcement Investigations - Protect Data)
-
([MICM2] Solution For Enforcement Investigations - Support Multi-Jurisdictional Collaboration)
-
([MICM2] Solution For Enforcement Investigations - Operate Within Legal & Charter Constraints)
-
(Integrity Services Branch - Service Canada - Business Analyst)
-
(Integrity Services Branch - Integrity Operations)
-
(Employment and Social Development Canada - Social Insurance Number (SIN))
-
(Employment and Social Development Canada - Employment Insurance (EI))
-
(Employment and Social Development Canada - Canada Pension Plan (CPP))
-
(Employment and Social Development Canada - Old Age Security (OAS))
-
(Employment and Social Development Canada - Temporary Foreign Workers Program (TFWP))
-
(Employment and Social Development Canada - International Mobility Program (IMP))
-
((Fraud) Enforcement Investigation - Workload)
-
((Fraud) Enforcement Investigation - Intelligence Gathering)
-
((Fraud) Enforcement Investigation - Security of Information)
-
((Fraud) Enforcement Investigation - Operational Reporting)
-
((Fraud) Enforcement Investigation - Evidence Immutability)
-
([MICM2] Solution For Enforcement Investigations - Real-Time Reporting)
-
([MICM2] Solution For Enforcement Investigations - Improved Evidence Data Leveraging)
-
(EXTERNAL CLIENTS - Canadian Public)
-
(EXTERNAL CLIENTS - Privacy Management Division (PMD))
-
(EXTERNAL CLIENTS - Public Prosecution Service of Canada (PPSC))
-
(EXTERNAL CLIENTS - Royal Canadian Mountain Police (RCMP))
-
(INTERNAL CLIENTS - National Enforcement & Intelligence Division (NEID))
-
(INTERNAL CLIENTS - Regional Enforcement Investigators)
-
(4.1 Increased Conformity of Investigation Outputs & Results Among Regional Enforcement - Increased consistency in the delivery of Integrity Services and standardized business processes (Consistency of Practice))
-
(Increased consistency in the delivery of Integrity Services and standardized business processes (Consistency of Practice) - ISB Conformity Standard Case Rate Change)
-
(4.2 Improved Control Over Viewing, Creating & Updating Enforcement Case Information & Evidence By Authorized Personnel - Increased Security & Control of Data / Evidence (Effectiveness))
-
(Increased Security & Control of Data / Evidence (Effectiveness) - Data Consistency & Quality Control)
-
(4.3 Improve The Economic Viability of the Enforcement Group - Overall Enforcement Cost Reduction)
-
(Overall Enforcement Cost Reduction - Case Quality Provisioning To External Agencies)
-
(Increased consistency in the delivery of Integrity Services and standardized business processes (Consistency of Practice) - Standardized Enforcement Business Processes)
-
(Increased Security & Control of Data / Evidence (Effectiveness) - Standardized Enforcement Business Processes)
-
(Overall Enforcement Cost Reduction - Standardized Enforcement Business Processes)
-
(MICM2 BENEFITS - 4.1 Increased Conformity of Investigation Outputs & Results Among Regional Enforcement)
-
(MICM2 BENEFITS - 4.2 Improved Control Over Viewing, Creating & Updating Enforcement Case Information & Evidence By Authorized Personnel)
-
(MICM2 BENEFITS - 4.3 Improve The Economic Viability of the Enforcement Group)
-
(Integrity Services Branch - Service Canada - ISB Staff)
-
(ISB Staff - MICM2 BENEFITS)
-
(B9.3.1 Fraud Detection Management - B9.3 Investigations Management)
-
(B10.4.2 Workforce Management - B10.4 Human Resources Management)
-
(B11.5.1 Risk Operations Management - B11.5 Risk & Internal Compliance Management)
-
(REQUIRED CAPABILITIES (LEVEL 3) - B9.3.1 Fraud Detection Management)
-
(REQUIRED CAPABILITIES (LEVEL 3) - B10.4.2 Workforce Management)
-
(REQUIRED CAPABILITIES (LEVEL 3) - B11.5.1 Risk Operations Management)
-
(Enforcement Investigation Process - Observation Management)
-
(Enforcement Investigation Process - Case Creation)
-
(Enforcement Investigation Process - Case Assignment)
-
(Enforcement Investigation Process - Case Management)
-
(Enforcement Investigation Process - Reporting)
-
(Enforcement Investigation Process - Retention & Disposition)
-
(Observation Management - Case Creation)
-
(Case Creation - Case Assignment)
-
(Case Assignment - Case Management)
-
(Case Management - Reporting)
-
(Reporting - Retention & Disposition)
-
(MICM2 INPUTS - IBAD / IITB / Tips / Escalated Compliance Cases)
-
(MICM2 INPUTS - ICST)
-
(MICM2 INPUTS - Security Model)
-
(MICM2 OUTPUTS - Regional Service Canada)
-
(MICM2 OUTPUTS - Benefits Delivery Services)
-
(MICM2 OUTPUTS - Integrity Business Analytics Division)
-
(MICM2 OUTPUTS - Policy Group)
-
(MICM2 Solution Users - System Administrator)
-
(MICM2 Solution Users - ICST Personnel)
-
(MICM2 Solution Users - NHQ Business Intelligence Personnel)
-
(MICM2 Solution Users - Regional Enformcement Personnel)
-
(MICM2 Solution Users - NHQ Training Personnel)
-
(MICM2 Solution Users - Compliance Personnel)
-
(MICM2 Solution Users - Benefits Delivery Services Personnel)
-
(MICM2 INPUTS - (Fraud) Enforcement Investigation)
-
((Fraud) Enforcement Investigation - MICM2 OUTPUTS)
-
(Enforcement Investigation Process - MICM2 Solution Users)
-
(Enforcement Investigation Process - Judiciary)
-
(Employment and Social Development Canada - Integrity Services Branch)
-
(Pursue Service Improvements - Accurate & Consistent Service)
-
(Integrity Case Management System - Accurate & Consistent Service)
-
(Integrity Services Branch - Service Canada - ISB Senior Management)
-
(ISB Senior Management - Senior Project Manager)
-
(ISB Senior Management - Stakeholder Business Owner)
-
(ISB Senior Management - Stakeholder Branch Sponsor)
-
(Enforcement Maturity Model (EMM) - ISB Senior Management)
-
(Safeguard Program Integrity - ESDC’s Strategic Framework Under Quality)
-
(Safeguard Program Integrity - ESDC Mission: Build A Stronger, More Competitive Canada)
-
(Safeguard Program Integrity - ISB Mission: Maintain Trust By Ensuring ESDC Protects Program Integrity, Services, People & Assets; Prevent. Detect, and Manage Costly Errors, Abuse & Fraud.)
-
(MISSION FULFILLMENT - Investigate Allegations of Benefits Non-Eligibility / Non-Entitlement)
-
(MISSION FULFILLMENT - Investigate SIN Fraud)
-
(MISSION FULFILLMENT - Investigate EI Fraud)
-
(MISSION FULFILLMENT - Detect & Refer To Investigate Pension Fraud)
-
(MISSION FULFILLMENT - ISB Mission: Maintain Trust By Ensuring ESDC Protects Program Integrity, Services, People & Assets; Prevent. Detect, and Manage Costly Errors, Abuse & Fraud.)
-
(Integrity Operations - MISSION FULFILLMENT)
-
(PARTNERS / ENABLERS - TISMB Assistant Deputy Minister)
-
(PARTNERS / ENABLERS - Benoit Long)
-
(PARTNERS / ENABLERS - Mark Perlman)
-
(PARTNERS / ENABLERS - ESDC Chief Financial Officer)
-
(PARTNERS / ENABLERS - Benefits Delivery Modernization (BDM))
-
(PARTNERS / ENABLERS - Financial Management Advisor)
-
(PARTNERS / ENABLERS - Project Management Advisor)
-
(ESDC Chief Financial Officer - Financial Management Advisor)
-
(ESDC Chief Financial Officer - Project Management Advisor)
-
(PARTNERS / ENABLERS - Peter Littlefield)
-
(PARTNERS / ENABLERS - Chief Information Officer)
-
(Benoit Long - TISMB Assistant Deputy Minister)
-
(Mark Perlman - ESDC Chief Financial Officer)
-
(TISMB Assistant Deputy Minister - Benefits Delivery Modernization (BDM))
-
(Peter Littlefield - Chief Information Officer)
-
(PARTNERS / ENABLERS - S Lacelle)
-
(PARTNERS / ENABLERS - IITB Executive Director)
-
(S Lacelle - IITB Executive Director)
-
(IITB Executive Director - Chief Information Officer)
-
(PARTNERS / ENABLERS - IITB Director)
-
(IITB Director - Chief Information Officer)
-
(PARTNERS / ENABLERS - Nathalie Bédard)
-
(Nathalie Bédard - IITB Director)
-
(PARTNERS / ENABLERS - IITB Managers (Architecture, CRM, Interop, etc.))
-
(IITB Managers (Architecture, CRM, Interop, etc.) - IITB Director)
-
(PARTNERS / ENABLERS - System Integrator (CRM, BDM))
-
(System Integrator (CRM, BDM) - IITB Managers (Architecture, CRM, Interop, etc.))
-
(PROJECT / PROGRAMME - TASK TEAM / PROJECT TEAM)
-
(TASK TEAM / PROJECT TEAM - Deputy Project Manager)
-
(TASK TEAM / PROJECT TEAM - Keith Milton (consultant))
-
(Keith Milton (consultant) - Deputy Project Manager)
-
(TASK TEAM / PROJECT TEAM - Project Control Officer)
-
(TASK TEAM / PROJECT TEAM - Senior Business Analyst)
-
(TASK TEAM / PROJECT TEAM - A. Mikelsons)
-
(A. Mikelsons - Senior Business Analyst)
-
(TASK TEAM / PROJECT TEAM - Business Analyst (consultant))
-
(Business Analyst (consultant) - Senior Business Analyst)
-
(TASK TEAM / PROJECT TEAM - Change Management Officer)
-
(TASK TEAM / PROJECT TEAM - Functional Leads (Vendor, IITB, Training, etc.))
-
(TASK TEAM / PROJECT TEAM - Subject Matter Experts)
-
(PROJECT / PROGRAMME - Jeremy Sales)
-
(PROJECT / PROGRAMME - Linda André)
-
(PROJECT / PROGRAMME - Nadia Benoit)
-
(PROJECT / PROGRAMME - Business Owner)
-
(PROJECT / PROGRAMME - Senior PM PDO)
-
(PROJECT / PROGRAMME - PM PDO)
-
(Jeremy Sales - Business Owner)
-
(Linda André - Senior PM PDO)
-
(Nadia Benoit - PM PDO)
-
(IITB Managers (Architecture, CRM, Interop, etc.) - Senior PM PDO)
-
(PARTNERS / ENABLERS - REGIONS)
-
(REGIONS - Regional Executives)
-
(REGIONS - Regional Managers)
-
(Elise Boisjoly - Executive Sponsor)
-
(Business Owner - Executive Sponsor)
-
(TASK TEAM / PROJECT TEAM - PM PDO)
-
(PM PDO - Senior PM PDO)
-
(Senior PM PDO - Business Owner)
-
(PARTNERS / ENABLERS - Integrity Operations)
-
(PARTNERS / ENABLERS - Kathleen Walford)
-
(Kathleen Walford - Integrity Operations)
-
(PARTNERS / ENABLERS - Executive Director, Enforcement)
-
(PARTNERS / ENABLERS - Donna Blois)
-
(PARTNERS / ENABLERS - Director, Business Solutions Management)
-
(PARTNERS / ENABLERS - Director, Program Support)
-
(Executive Director, Enforcement - Integrity Operations)
-
(Director, Business Solutions Management - Integrity Operations)
-
(Director, Program Support - Integrity Operations)
-
(Donna Blois - Executive Director, Enforcement)
-
(PARTNERS / ENABLERS - Marc Lafontaine)
-
(PARTNERS / ENABLERS - Sylvie Cyr)
-
(PARTNERS / ENABLERS - Functional Manager)
-
(PARTNERS / ENABLERS - Functional Manager, I/O Systems)
-
(PARTNERS / ENABLERS - Functional Managers (EI / Pensions / Training / QM))
-
(Marc Lafontaine - Director, Business Solutions Management)
-
(Sylvie Cyr - Director, Program Support)
-
(Functional Manager - Executive Director, Enforcement)
-
(Functional Managers (EI / Pensions / Training / QM) - Director, Program Support)
-
(REGIONS - Integrity Operations)
-
(Control Objective - Risk)
-
(Security Requirement - Control Objective)
-
(Loss Events - <<Loss Event>> Fraudulent Payment)
-
(Vunerabilities - <<Vunerability>> No risk based authentication)
-
(Implemented Control Measures - Implemented Control Measure)
-
(Security Principle - Control Objective)
-
(Threat Events - <<Threat Event>> EI/CPP/OAS personal information changes)
-
(Implemented Control Measures - Implemented Control Measure)
-
(Assets at Risk - <<Asset at Risk>> Data)
-
(Loss Events - Risk)
-
(Implemented Control Measures - Control Measure)
-
(Threat Events - Vunerabilities)
-
(Implemented Control Measures - Implemented Control Measures)
-
(Threat Agents - Threat Events)
-
(Assets at Risk - <<Asset at Risk>> Finacial)
-
(Vunerabilities - <<Vunerability>> No bot detection)
-
(Assets at Risk - <<Asset at Risk>> Reputation )
-
(Control Measure - Security Principle)
-
(Loss Events - <<Loss Event>> Trust / Client Confidence)
-
(Assets at Risk - Implemented Control Measures)
-
(Vunerabilities - <<Vunerability>> Single factor of authentication)
-
(Vunerabilities - Assets at Risk)
-
(Control Measure - Security Requirement)
-
(Threat Events - Loss Events)
-
(Threat Events - <<Threat Event>> MSCA Account takeover )
-
(Threat Events - <<Threat Event>> Application for Benefit (CERB & EI))
-
(Implemented Control Measures - Vunerabilities)
-
(Azure Monitor - Cloud infrastructure)
-
(Azure Sentinel - Events & Alerts)
-
(20201201-0930-touch-point - Browser Testing)
-
(20201201-0930-touch-point - chai)
-
(deleteme1 - Code Analysis)
-
(Work Package - Code Analysis)
-
( - Configuration Testing)
-
( - Load/Performance testing)
-
( - Application Framework)
-
( - Application Framework)
-
( - Application Framework)
-
( - CRM Helpdesk)
-
( - Configuration Management)
-
( - Configuration Management)
-
( - Orchestration)
-
( - Continuous Delivery)
-
( - DB)
-
( - Infrastructure Provisioning)
-
( - Infrastructure Provisioning)
-
( - Logs Management)
-
( - Messaging)
-
( - Mobile Testing)
-
( - OS)
-
( - Repositories)
-
( - Repositories)
-
( - Security)
-
( - Security Testing)
-
( - Security Testing)
-
( - Security Testing)
-
( - Service Desk)
-
( - Cloud infrastructure)
-
( - Events & Alerts)
-
( - Tracing)
-
(Issuer - Pan Canadian Trust Framework)
-
(Pan Canadian Trust Framework - Subject)
-
(Pan Canadian Trust Framework - Verifier)
-
(Pan Canadian Trust Framework - Holder)
-
(Appont - Balanced Relationship)
-
(Relationship Continuity - Balanced Relationship)
-
(Entity 1 - Principal)
-
(Appoint - Agent)
-
(Appoint - Balanced Relationship)
-
(Appoint - Principal)
-
(Entity 2 - Agent)
-
(Relationship Continuity - Balanced Relationship)
-
(Entity 1 - Balanced Relationship)
-
(Entity 2 - Balanced Relationship)
-
(Person (Atomic Entity2) - Organization (Compound Entity))
-
(Person (Atomic Entity3) - Organization (Compound Entity))
-
(Credential - Content )
-
(Architecture Standards - Architecture Guardrails)
-
(EA Repository - API Guardrail Specification)
-
(EA Repository - Developer View)
-
(EA Repository - Operator View)
-
(EA Repository - Executive View)
-
(Chief Architect - Enterprise Architecture)
-
(Enterprise Architecture - Business Architecture)
-
(Enterprise Architecture - Application Architecture)
-
(Enterprise Architecture - Data Architecture)
-
(Enterprise Architecture - Technology Architecture)
-
(Enterprise Architecture - Security Architecture)
-
(Requirement Catalog - High Level Reqirements)
-
(Developer - Developer View)
-
(Architecture Guardrails - Data Management Architecture Guardrails)
-
(Architecture Guardrails - Data Analytics Architecture Guardrails)
-
(Architecture Guardrails - IAM Architecture Guardrails)
-
(Architecture Guardrails - UX Architecture Guardrails)
-
(API Design Principles - Security by Design )
-
(API Design Principles - Continuous Improvement )
-
(API Design Principles - Sustainability )
-
(API Design Principles - Simplicity and Reusability )
-
(API Design Principles - Well Described )
-
(API Design Principles - Consistency )
-
(API Design Principles - Quality )
-
(API Design Principles - Open Standards Based)
-
(API Design - API Design Principles)
-
(API Architecture Guardrails - API Design Principles)
-
(API Design Principles - Service Architecture Standards)
-
(API Design Principles - Business Intake Management)
-
(API Security - Security by Design)
-
(API Security - Audit Access to Sensitive Data)
-
(API Security - Token management)
-
(API Security - Authenticate and Authorize)
-
(API Security - Secure Data in Transit)
-
(API Security - Restrict dynamic or open queries)
-
(API Security - Restrict wildcard queries)
-
(API Security - Use gateways and proxies instead of IP whitelists)
-
(API Security - Do not put Sensitive Data in URIs)
-
(API Security - Monitor and Log API Activity)
-
(API Security - Integrate Security Testing )
-
(API Architecture Guardrails - API Security)
-
(Service Architecture Standards - API Security)
-
(Business Intake Management - API Security)
-
(API Security - API Security)
-
(API Lifecycle Management - API Security)
-
(API Monitoring - API Security)
-
(Security Requirement - API Security)
-
(API Performance Management - API Load Testing)
-
(API Performance Management - Publish Performance Data)
-
(API Performance Management - Performance Monitoring)
-
(API Performance Management - API Throttling )
-
(API Performance Management - Non - Functional Requirement)
-
(API Architecture Guardrails - API Performance Management)
-
(Service Architecture Standards - API Performance Management)
-
(Business Intake Management - API Performance Management)
-
(API Testing - API Performance Management)
-
(API Monitoring - API Performance Management)
-
(API Lifecycle Management - API Performance Management)
-
(Principles Catalog - API Design Principles)
-
(Architecture Guardrails - API Architecture Guardrails)
-
(API Lifecycle Management - URI vs Accept Header Versioning )
-
(API Lifecycle Management - Respect Existing Consumer Dependencies)
-
(API Lifecycle Management - Use Standard Endpoints)
-
(API Lifecycle Management - API Ownership )
-
(API Lifecycle Management - API Publishing )
-
(API Lifecycle Management - API Versioning)
-
(API Architecture Guardrails - API Lifecycle Management)
-
(API Lifecycle Management - Non - Functional Requirement)
-
( Digital Standards - API Lifecycle Management)
-
(API Lifecycle Management - Define an SLO up Front )
-
(API Consumption - Build once for Multiple Channels )
-
(API Consumption - Consume what you Build)
-
(Business Intake Management - API Consumption)
-
(Non - Functional Requirement - API Consumption)
-
(API Encoding and Metadata - Use Unicode for Encoding )
-
( Digital Standards - API Encoding and Metadata)
-
(API Encoding and Metadata - Non - Functional Requirement)
-
(API Encoding and Metadata - Support Official Languages )
-
(API Architecture Guardrails - API Encoding and Metadata)
-
(API Encoding and Metadata - Standardize Datetime Format)
-
(Respond with message schemas that are easy to understand and consume - Implement stateless interactions )
-
(Respond with message schemas that are easy to understand and consume - Use common information models )
-
(Respond with message schemas that are easy to understand and consume - Abstract internal technical details)
-
(Respond with message schemas that are easy to understand and consume - Prefer 'Pull' over 'Push')
-
(Respond with message schemas that are easy to understand and consume - Bulk Dataset's via API's)
-
(Respond with message schemas that are easy to understand and consume - Standardized error codes )
-
(API Design Patterns - Use URIs to represent resources)
-
(API Design Patterns - Always Use HTTPS )
-
(API Design Patterns - Use a RESTful Approach )
-
(API Design Patterns - Respond with message schemas that are easy to understand and consume )
-
(API Design Patterns - USE W3C HTTP Methods )
-
(API Design Patterns - Don't overload verbs )
-
(API Design Patterns - Use JSON )
-
(API Design Patterns - Follow properties according to RFC 7231 and RFC 5789:)
-
(Constraints and Assumptions - API Design Patterns)
-
(Principles Catalog - API Design Principles)
-
(Constraints and Assumptions - API Design Patterns)
-
(API Architecture Guardrails - API Design Patterns)
-
(Service Architecture Standards - API Design Patterns)
-
(Business Intake Management - API Design Patterns)
-
(API Design - API Design Patterns)
-
(API Development - API Design Patterns)
-
(API Scaling - API Design Patterns)
-
(API Security - API Design Patterns)
-
(API Documentation - Publish code samples and test data)
-
(API Documentation - Gather Feedback)
-
(API Documentation - Publish OpenAPI Specification )
-
(API Architecture Guardrails - API Documentation)
-
(API Documentation - Maintain concise documentation )
-
(Constraints and Assumptions (copy) - API Design Patterns)
-
( Digital Standards - API Value)
-
(Developer View - Developer)
-
(Operator View - Operator)
-
(API Guardrail Specification - API Guardrail Document Representation)
-
(Executive View - ARC Presentation)
-
has
(IT Asset - Vulnerability)
-
pose
(Threat Agent - Threat)
-
mitigate
(Recommended Security Controls - Risk)
-
exploit
(Threat - Vulnerability)
-
realize
(Recommended Security Controls - Security Requirements)
-
(Asset Value - Risk)
-
has
(IT Asset - Security Requirements)
-
has
(IT Asset - Risk)
-
has
(IT Asset - Asset Value)
-
(Vulnerability - Risk)
-
(Threat - Risk)
-
(IT Security Requirement - Business Requirements)
-
(Statement of Sensitivity - Business Requirements)
-
has
(Asset - Asset Value)
-
(Recommended Security Control (SA&A process) - Technical Security Control)
-
pose
(Threat Agent - Threat)
-
( Capability - Other Capability )
-
( Capability - Business Requirements)
-
(Constraint - Goal)
-
(Constraint - Business Requirements)
-
(Business Requirements - Solution Recommended)
-
(Asset Value - IT Security Risk)
-
realize
(Recommended Security Control (SA&A process) - IT Security Requirement)
-
(Driver - Goal)
-
(Asset - Capability)
-
exploit
(Threat - Vulnerability)
-
has
(Asset - Vulnerability)
-
(Solution Recommended - Goal)
-
(Vulnerability - IT Security Risk)
-
( Capability - Solution Capability)
-
( Capability - Security Capability)
-
(Recommended Security Control (SA&A process) - Management Security Controls)
-
(Threat - IT Security Risk)
-
( Implemented Security Control - IT Security Requirement)
-
(Security Analysis & Ranking - Solution Recommended)
-
Implement and test
(Recommended Security Control (SA&A process) - Security Capability)
-
(Recommended Security Control (SA&A process) - Operational Security Control)
-
(Stakeholder - Driver)
-
(Recommended Security Control (SA&A process) - IT Security Risk)
-
has
(Asset - Vulnerability)
-
(Vulnerability - IT Security Risk)
-
(Recommended Security Control (SA&A process) - Technical Security Control)
-
(Recommended Security Control (SA&A process) - Management Security Controls)
-
pose
(Threat Agent - Threat)
-
exploit
(Threat - Vulnerability)
-
(Asset Value - IT Security Risk)
-
has
(Asset - Asset Value)
-
(Recommended Security Control (SA&A process) - IT Security Risk)
-
(Threat - IT Security Risk)
-
(Recommended Security Control (SA&A process) - Operational Security Control)
-
(Service Architecture Standards - API Consumption)
-
(Business Intake Management - API Consumption)
-
(API Subscription - API Consumption)
-
(API Publishing - API Consumption)
-
(API Discovery - API Consumption)
-
(API Consumption - API Architecture Guardrails)
-
( Digital Standards - API Consumption)
-
(Service Architecture Standards - API Documentation)
-
(Business Intake Management - API Documentation)
-
(API Publishing - API Documentation)
-
(API Development - API Documentation)
-
(API Exploring - API Documentation)
-
(API Documentation - Non - Functional Requirement)
-
(API Documentation - Digital Standards)
-
(Service Architecture Standards - API Encoding and Metadata)
-
(Business Intake Management - API Encoding and Metadata)
-
(API Testing - API Encoding and Metadata)
-
(Service Architecture Standards - API Lifecycle Management)
-
(Business Intake Management - API Lifecycle Management)
-
(API Lifecycle Management - API Lifecycle Management)
-
(API Monitoring - API Lifecycle Management)
-
(API Security - API Lifecycle Management)
-
(Requirements Management - Plan)
-
(Enterprise Architecture - Plan)
-
(Client Journey Mapping - UX/ Design)
-
(Qualiware - Enterprise Architecture)
-
(Client Journey Mapping - Plan)
-
(O365 - Enterprise Architecture)
-
(Archi - Enterprise Architecture)
-
(Modern Requirements - Requirements Management)
-
(Governance - Intake)
-
(Business Processs Modling - UX/ Design)
-
(Wireframe Design - UX/ Design)
-
(Feature Management - Define Success Criteria)
-
(User Story Management - Define Success Criteria)
-
(EARB Deck Reviews (N Times) - [ESDC-EA] Provide EA Assessment <<ESDC EARB>>)
-
(ESDC EA Assessment Criteria - Technical Fit For Business Needs)
-
(EARB Co-Chairs - Pre-Brief Review of EA Assessment)
-
(Facilitated EA Assessment Review & Meeting - [ESDC-EA] Provide EA Assessment <<ESDC EARB>>)
-
(ESDC EA Assessment Criteria - Draft EA Assessment)
-
(Pre-Brief Review of EA Assessment - [ESDC-EA] Provide EA Assessment <<ESDC EARB>>)
-
(Facilitated EA Assessment Review & Meeting - [ESDC-EA] Provide EA Assessment <<ESDC EARB>>)
-
(Draft EA Assessment - EARB Deck Reviews (N Times))
-
(EARB EA Assessment Group - EARB Deck Review Attendees)
-
(Junction - Draft EA Assessment)
-
(Finalize EA Assessment - [ESDC-EA] Provide EA Assessment <<ESDC EARB>>)
-
(Facilitated EA Assessment Review & Meeting - Draft EA Assessment)
-
(EARB EA Assessment Group - Lead Enterprise Architect)
-
(EARB Co-Chairs - ESDC CIO)
-
(Lead Enterprise Architect - Draft EA Assessment)
-
(Draft EA Assessment - [ESDC-EA] Provide EA Assessment <<ESDC EARB>>)
-
(Finalize EA Assessment - EA Assessment <<EARB Deck Slide(s)>>)
-
(Pre-Brief Review of EA Assessment - Finalize EA Assessment)
-
([ESDC-EA] Provide EA Assessment <<ESDC EARB>> - ESDC EA Assessment)
-
(EARB Deck Reviews (N Times) - Pre-Brief Review of EA Assessment)
-
(EA Requests EA Assessment - Junction)
-
(Junction - Facilitated EA Assessment Review & Meeting)
-
(Digital Operations Strategic Plan - Strategic Actions (PARTIAL) - 11 - Incorporate Digital Principles Into Operations, Programs & Service Design)
-
(Digital Operations Strategic Plan - Modernization Priorities (PARTIAL) - Open, collaborative and accessible)
-
(Digitally enabled delivery - Data Strategy)
-
(EA Assessment Review Team - (Lead) EA Assessor)
-
(Junction - Draft EA Recommendation, Assessment)
-
(EARB Co-Chairs - ESDC CIO)
-
(EA Assessment Review Team - Applicaiton Architect Assessor)
-
(EA Assessment Review Team - Business Architect Assessor)
-
(ESDC EA Assessment Criteria - BDM Architecture Principles)
-
(EARB Co-Chairs - Pre-Brief Review of EA Assessment)
-
(Facilitated EA Assessment Review & Meeting - [ESDC-EA] Provide EA Assessment <<ESDC EARB>>)
-
(Finalize EA Assessment - [ESDC-EA] Provide EA Assessment <<ESDC EARB>>)
-
(EA Assessment Peer Review By Domains - Pre-Brief Review of EA Assessment)
-
(Open, collaborative and accessible - Digital collaboration tools)
-
(Digital Operations Strategic Plan - Strategic Actions (PARTIAL) - 7 - Shift Culture & Processes Toward Open By Design)
-
(Digital Operations Strategic Plan - Modernization Priorities (PARTIAL) - Good governance)
-
(ESDC EA Assessment Criteria - ESDC EA Assessment Slide (Score, Icons))
-
(Good governance - Early alignment and review discussions starting at the concept phase, and GCEARB)
-
(Digital Operations Strategic Plan - Strategic Actions (PARTIAL) - 74 - Introduce stronger project oversight at the concept phase)
-
(Digital Operations Strategic Plan - Strategic Actions (PARTIAL) - 57 - Promote digital literacy and collaboration)
-
(Finalize EA Assessment - ESDC Initiative EA Assessment, EARB Deck)
-
(ESDC EA Assessment Criteria - ESDC EA Principles)
-
([ESDC-EA] Provide EA Assessment <<ESDC EARB>> - ESDC EA Assessment Slide (Score, Icons))
-
(ESDC 2020-2023 Departmental Information Technology (IT) Plan (PARTIAL) - ESDC EA Assessment Criteria)
-
(EA Assessment Review Team - EA Assessment Peer Review By Domains)
-
(Digital Operations Strategic Plan - Strategic Actions (PARTIAL) - 70 - Evolve IM/IT management practices, processes and tools)
-
(Digital Operations Strategic Plan - Strategic Actions (PARTIAL) - 73 - Rationalize investments)
-
(Facilitated EA Assessment Review & Meeting - [ESDC-EA] Provide EA Assessment <<ESDC EARB>>)
-
(Digital Operations Strategic Plan - Modernization Priorities (PARTIAL) - Digitally enabled delivery)
-
(ESDC EA Repository - ESDC Initiative EA Assessment, EARB Deck)
-
(EA Assessment Review Team - Facilitated EA Assessment Review & Meeting)
-
(EA Requests EA Assessment - Junction)
-
(ESDC EA Assessment Criteria - GC EA Framework Review Criteria)
-
((Lead) EA Assessor - Finalize EA Assessment)
-
(ESDC 2020-2023 Departmental Information Technology (IT) Plan (PARTIAL) - Digital Operations Strategic Plan - Strategic Actions (PARTIAL))
-
(Good governance - Enhancing project oversight)
-
(Junction - Facilitated EA Assessment Review & Meeting)
-
(Digital Operations Strategic Plan - Modernization Priorities (PARTIAL) - Service orientation and user-centered)
-
(EA Assessment Review Team - Technology Architect Assessor)
-
(Pre-Brief Review of EA Assessment - Finalize EA Assessment)
-
(Service orientation and user-centered - Improving service delivery and compliance with the new Policy on Service and Digital as well as the OneGC Vision)
-
(Draft EA Recommendation, Assessment - [ESDC-EA] Provide EA Assessment <<ESDC EARB>>)
-
(EA Assessment Review Team - Data Architect Assessor)
-
(Draft EA Recommendation, Assessment - EA Assessment Peer Review By Domains)
-
(Facilitated EA Assessment Review & Meeting - Draft EA Recommendation, Assessment)
-
(EA Assessment Review Team - Security Architect Assessor)
-
(EA Assessment Peer Review By Domains - [ESDC-EA] Provide EA Assessment <<ESDC EARB>>)
-
(ESDC 2020-2023 Departmental Information Technology (IT) Plan (PARTIAL) - Digital Operations Strategic Plan - Modernization Priorities (PARTIAL))
-
(Pre-Brief Review of EA Assessment - [ESDC-EA] Provide EA Assessment <<ESDC EARB>>)
-
((Lead) EA Assessor - Draft EA Recommendation, Assessment)
-
(Digitally enabled delivery - Departmental Application Strategy, data centre consolidation, and cloud adoption)
-
(Finalize EA Assessment - [SAS] Provide EA Feedback <<Lite Projects>>)
-
(ESDC EA Principles - Draft EA Assessment)
-
(SAS Peer Review Team - Assigned Enterprise Architect)
-
(SAS Peer Review Team - Finalize EA Assessment)
-
(Draft EA Assessment - Reduce Technical Debt)
-
(GC EA Principles - Draft EA Assessment)
-
(BRM Facilitated Stakeholder Meeting - Draft EA Assessment)
-
(Assigned Enterprise Architect - Draft EA Assessment)
-
(SAS Peer Review - Finalize EA Assessment)
-
(BRM Facilitated Stakeholder Meeting - [SAS] Provide EA Feedback <<Lite Projects>>)
-
(SAS Peer Review Team - Peer Enterprise Architect)
-
(SAS Peer Review Team - BRM Facilitated Stakeholder Meeting)
-
(SAS Peer Review - [SAS] Provide EA Feedback <<Lite Projects>>)
-
(EA Requests SAS Feedback - Junction)
-
([SAS] Provide EA Feedback <<Lite Projects>> - SAS Lite Assessment)
-
(Draft EA Assessment - SAS Peer Review)
-
(Draft EA Assessment - [SAS] Provide EA Feedback <<Lite Projects>>)
-
(SAS Peer Review Team - SAS Peer Review)
-
(Finalize EA Assessment - SAS Lite Project EA Assessment)
-
(Junction - BRM Facilitated Stakeholder Meeting)
-
(Junction - Create Teams Chat Group)
-
(APPLICATION ARCHITECTURE - Use Public Cloud-Hosted SaaS)
-
(INFORMATION ARCHITECTURE - Use & Share Data Openly, Ethically, Securely)
-
(INFORMATION ARCHITECTURE - Design With Privacy In Mind)
-
(GC EA Framework - SECURITY ARCHITECTURE)
-
(GC EA Framework - INFORMATION ARCHITECTURE)
-
(SECURITY ARCHITECTURE - Build Security Into System life Cycle, All Architectural Layers)
-
(TECHNOLOGY ARCHITECTURE - Use Cloud First)
-
(APPLICATION ARCHITECTURE - Enable Interoperability)
-
(BUSINESS ARCHITECTURE - Promote Enterprise Horizontal Enablement)
-
(BUSINESS ARCHITECTURE - Design End-to-End Services Digitally To Meet Needs)
-
(GC EA Framework - BUSINESS ARCHITECTURE)
-
(BUSINESS ARCHITECTURE - Outcome-Driven Architecture & Strategic Alignment)
-
(GC EA Framework - APPLICATION ARCHITECTURE)
-
(SECURITY ARCHITECTURE - Ensure Secure Access To Systems & Services)
-
(TECHNOLOGY ARCHITECTURE - Design For Performance, Availability & Scalability)
-
(SECURITY ARCHITECTURE - Maintain Secure Operations)
-
(APPLICATION ARCHITECTURE - Use Public Cloud-Hosted Open Source Solutions)
-
(TECHNOLOGY ARCHITECTURE - Follow DevSecOps Principles)
-
(INFORMATION ARCHITECTURE - Collect Data to Address Needs)
-
(GC EA Framework - TECHNOLOGY ARCHITECTURE)
-
(INFORMATION ARCHITECTURE - Manage & Reuse Data Strategically, Responsibly)
-
(APPLICATION ARCHITECTURE - Design For Interoperability)
-
(Principles Catalog - GC EA Framework)
-
(Architecture Standards - Principles Catalog)
-
(Principles Catalog - ESDC EA Principles)
-
(Principles Catalog - BDM Architecture Principles)
-
(The Open Group Architecture Framework (TOGAF) - Principles Catalog)
-
(European Interoperability Reference Architecture (EIRA) - Principles Catalog)
-
(BDM Architecture Playbook - BDM Architecture Principles)
-
(Lite Project Proposed - EA Requests SAS Feedback)
-
(GC Enterprise Architecture Framework - Information Architecture Guide - INFORMATION ARCHITECTURE)
-
(GC Enterprise Architecture Framework - Business Architecture Guide - BUSINESS ARCHITECTURE)
-
(GC Enterprise Architecture Framework - Application Architecture Guide - APPLICATION ARCHITECTURE)
-
(GC Enterprise Architecture Framework - Technology Architecture Guide - TECHNOLOGY ARCHITECTURE)
-
(GC Enterprise Architecture Framework - Security Architecture Guide - SECURITY ARCHITECTURE)
-
(GC Digital Operations Strategic Plan (DOSP) 2021-2024 (Course of Action) - Establish Strategic Direction For Integrated Management of Service, Information, Data, IT and Cybersecurity (Requirement))
-
(Approve 3-Year DOSP (Business Process) - Establish Strategic Direction For Integrated Management of Service, Information, Data, IT and Cybersecurity (Requirement))
-
(Chief Information Officer of Canada (Business Role) - Approve 3-Year DOSP (Business Process))
-
(Develop DOSP (Business Process) - Approve 3-Year DOSP (Business Process))
-
(Treasury Board of Canada Secretariat (TBS) (Business Role) - Develop DOSP (Business Process))
-
(Government of Canada Digital Standards - Design With Users)
-
(Government of Canada Digital Standards - Iterate and Improve Frequently)
-
(Government of Canada Digital Standards - Work In The Open By Default)
-
(Government of Canada Digital Standards - Use Open Standards and Solutions)
-
(Government of Canada Digital Standards - Address Security and Privacy Risks)
-
(Government of Canada Digital Standards - Build In Accessibility From the Start)
-
(Government of Canada Digital Standards - Empower Staff to Deliver Better Services)
-
(Government of Canada Digital Standards - Be Good Data Stewards)
-
(Government of Canada Digital Standards - Design Ethical Services)
-
(Government of Canada Digital Standards - Collaborate Widely)
-
(Develop DOSP (Business Process) - Design With Users)
-
(2021–2024 DOSP Priorities And Actions (Course of Action) - 2. Develop and Deliver Services That Put Users First (Course of Action))
-
(2021–2024 DOSP Priorities And Actions (Course of Action) - 4. Maximize Value From GC-Held Data and Information (Course of Action))
-
(2021–2024 DOSP Priorities And Actions (Course of Action) - 1. Invest In Easy‑To‑Use, Reliable, Modern and Secure IT Systems, Networks and Infrastructure That Support Operations (Course of Action))
-
(2021–2024 DOSP Priorities And Actions (Course of Action) - 5. Modernize Funding and Procurement to Support Agile Execution Practices (Course of Action))
-
(2021–2024 DOSP Priorities And Actions (Course of Action) - 3. Improve Data-Driven Decision‑Making (Course of Action))
-
(2021–2024 DOSP Priorities And Actions (Course of Action) - 6. Act Ethically and In Environmentally Sustainable Ways (Course of Action))
-
(Launch of OneGC Platform (Plateau) - OneGC Platform (Application Service))
-
(OneGC Platform (Application Service) - Provide Single Window Access To Government Services (Goal))
-
(DOSP 2021-24 Goals - Eliminate Long‑Standing Institutional Barriers to Digital Acceleration (Goal))
-
(DOSP 2021-24 Goals - Leverage Innovative Technologies (Goal))
-
(DOSP 2021-24 Goals - Put Users At The Heart Of All We Do (Goal))
-
(DOSP 2021-24 Goals - Government of Canada Digital Standards)
-
(ESDC EA Principles - Enterprise Architecture Principles)
-
(Enterprise Architecture Principles - Enterprise First)
-
(Enterprise Architecture Principles - Client Centric)
-
(Enterprise Architecture Principles - Digital First)
-
(Enterprise Architecture Principles - Mission-Driven)
-
(Enterprise Architecture Principles - Interoperability)
-
(ESDC EA Principles - Business Architecture Principles)
-
(Business Architecture Principles - Business Continuity)
-
(Business Architecture Principles - Accessibility)
-
(Business Architecture Principles - Value)
-
(Business Architecture Principles - Reliable)
-
(Business Architecture Principles - Cohesiveness)
-
(Business Architecture Principles - Optimize Services)
-
(ESDC EA Principles - Information Architecture Principles)
-
(Information Architecture Principles - Accessible-By-Default)
-
(Information Architecture Principles - Common Understanding and Trusted)
-
(Information Architecture Principles - Shared Assets)
-
(Information Architecture Principles - Fit-for-Purpose)
-
(Information Architecture Principles - Managed Strategically)
-
(ESDC EA Principles - Application Architecture Principles)
-
(ESDC EA Principles - Technology Architecture Principles)
-
(ESDC EA Principles - Security and Privacy Architecture Principles)
-
(Application Architecture Principles - Buy What We Can and Build What We Must)
-
(Application Architecture Principles - Technology Independence)
-
(Application Architecture Principles - Service Orientation)
-
(Technology Architecture Principles - Control Technical Diversity)
-
(Technology Architecture Principles - Responsive Change Management)
-
(Technology Architecture Principles - Quality Level Metrics (QLM) Approach)
-
(Security and Privacy Architecture Principles - Security-By-Design)
-
(Security and Privacy Architecture Principles - Privacy-By-Design)
-
(Security and Privacy Architecture Principles - Integrity-By-Design)
-
(Chief Architect - Enterprise Architecture)
-
(Architecture Principles Influencers - Enterprise Mission)
-
(Architecture Principles Influencers - Enterprise Plans)
-
(Architecture Principles Influencers - Enterprise Strategic Initiatives)
-
(Process Improvement - Enterprise Strategic Initiatives)
-
(Quality Management - Enterprise Strategic Initiatives)
-
(External Constraints - Existing Legislation)
-
(External Constraints - Potential Legislation)
-
(Market Factors - Time-To-Market Imperatives)
-
(Market Factors - Customer Expectations)
-
(External Constraints - Market Factors)
-
(Architecture Principles Influencers - External Constraints)
-
(Architecture Principles Influencers - Current Systems and Technology)
-
(Architecture Principles Influencers - Emerging Industry Trends)
-
(Architecture Principles Influencers - ESDC EA Principles)
-
(Step 2- Definition of the EA Principles - Understandable Principles)
-
(Step 2- Definition of the EA Principles - Robust Principles)
-
(Step 2- Definition of the EA Principles - Complete Principles)
-
(Step 2- Definition of the EA Principles - Consistent Principles)
-
(Step 2- Definition of the EA Principles - Stable Principles)
-
(Step 1- Identification of the EA Principles - Step 2- Definition of the EA Principles)
-
(Step 2- Definition of the EA Principles - Step 3 - Revision of EA Principles)
-
(Step 3 - Revision of EA Principles - Step 4 - Govern and Communicate EA Principles)
-
(Step 4 - Govern and Communicate EA Principles - Step 5 - Leverage EA Principles)
-
(Additional Key Stakeholders - Step 3 - Revision of EA Principles)
-
(Step 4 - Govern and Communicate EA Principles - Agreement of Revisions)
-
(Step 4 - Govern and Communicate EA Principles - Govern Revisions)
-
(Agreement of Revisions - Govern Revisions)
-
(Step 4 - Govern and Communicate EA Principles - Endorse Revisions)
-
(Govern Revisions - Endorse Revisions)
-
(Step 4 - Govern and Communicate EA Principles - Communicate Revisions)
-
(Endorse Revisions - Communicate Revisions)
-
(Step 4 - Govern and Communicate EA Principles - Champion EA Principles)
-
(Communicate Revisions - Champion EA Principles)
-
(Senior Management - Champion EA Principles)
-
(EA Principles Value - Do The Right Thing)
-
(EA Principles Value - Do EA Right)
-
(EA Principles Value - ESDC EA Principles)
-
(BDM Architecture Principles - 1. New Target Operating Model and service continuity during the transition)
-
(BDM Architecture Principles - 2. BDM will consume GC and ESDC Enterprise Solutions/Services where appropriate and available)
-
(BDM Architecture Principles - 3. Favour strategic over interim and tactical solutions)
-
(BDM Architecture Principles - 6. Open Solutions and standards)
-
(BDM Architecture Principles - 7. Security and Privacy-by-Design)
-
(BDM Architecture Principles - 8. Integrity & Quality-by-Design)
-
(BDM Architecture Principles - 9. Cloud First)
-
(BDM Architecture Principles - 4. Data is at the center of BDM)
-
(BDM Architecture Principles - 5. Digital First)
-
(BDM Architecture Principles - 10. Minimize changes to legacy)
-
(BDM Architecture Principles - 11. Architecting for Agility)
-
(BDM Architecture Principles - 12. Maximize Use of Core Technology)
-
(BDM Architecture Principles - 13. Adoption of Event-Driven Architecture)
-
(BDM Architecture Principles - 14. Outcome-Driven)
-
(Architecture Guardrails - Data Management Architecture Guardrails)
-
(Architecture Guardrails - IAM Architecture Guardrails)
-
(Architecture Standards - Architecture Guardrails)
-
(Architecture Guardrails - UX Architecture Guardrails)
-
(Architecture Guardrails - Data Analytics Architecture Guardrails)
-
(Architecture Guardrails - Data Management Architecture Guardrails)
-
(Data Analytics Architecture Guardrails - Advanced Analytics Architecture Guardrails)
-
(Data Analytics Architecture Guardrails - Open Data Architecture Guardrails)
-
(IAM Architecture Guardrails - Internal User Architecture Guardrails)
-
(UX Architecture Guardrails - Digital Experience Architecture Guardrails)
-
(IAM Architecture Guardrails - External User Architecture Guardrails)
-
(Architecture Guardrails - Data Exchange Architecture Guardrails)
-
(Architecture Guardrails - IAM Architecture Guardrails)
-
(Architecture Standards - Architecture Guardrails)
-
(UX Architecture Guardrails - Accessibility Architecture Guardrails)
-
(Architecture Guardrails - UX Architecture Guardrails)
-
(Architecture Guardrails - Data Analytics Architecture Guardrails)
-
(Data Analytics Architecture Guardrails - Insight Reporting Architecture Guardrails)
-
(ESDC EA Content Creation - Business Architecture)
-
(ESDC EA Content Creation - Data Architecture)
-
(ESDC EA Content Creation - Technology Architecture)
-
(ESDC EA Content Creation - Security Architecture)
-
(ESDC EA Content Creation - Application Architecture)
-
(QualiWare On Premises - QualiWare 10.4)
-
(QualiWare Cloud - QualiWare 10.4 (System Software))
-
(EA Repository-Related Principles (Grouping) - Open Standards Based)
-
(EA Repository-Related Principles (Grouping) - Collaborate Widely)
-
(EA Repository-Related Principles (Grouping) - Common Understanding and Trusted)
-
(EA Repository-Related Principles (Grouping) - Consistency )
-
(EA Repository-Related Principles (Grouping) - Continuous Improvement )
-
(EA Repository-Related Principles (Grouping) - Design For Interoperability)
-
(EA Repository-Related Principles (Grouping) - Ensure Secure Access To Systems & Services)
-
(EA Repository-Related Principles (Grouping) - Enterprise First)
-
(EA Repository-Related Principles (Grouping) - Promote Enterprise Horizontal Enablement)
-
(EA Repository-Related Principles (Grouping) - Reliable)
-
(EA Repository-Related Principles (Grouping) - Responsive Change Management)
-
(EA Repository-Related Principles (Grouping) - Shared Assets)
-
(EA Repository-Related Principles (Grouping) - Simplicity and Reusability )
-
(EA Repository-Related Principles (Grouping) - Use & Share Data Openly, Ethically, Securely)
-
(EA Repository-Related Principles (Grouping) - Use Cloud First)
-
(EA Repository-Related Principles (Grouping) - Use Public Cloud-Hosted SaaS)
-
(EA Repository-Related Principles (Grouping) - Work In The Open By Default)
-
(QualiWare Cloud (Consolidated) - QualiWare 10.X+ (System Software))
-
(QualiWare On Premises - QualiWare Cloud)
-
Bi-Directional QualiWare Cloud-and-On Prem Synchronization
(QualiWare Cloud - QualiWare On Premises)
-
(ESDC EA Repository Topology (CURRENT) (Grouping) - QualiWare On Premises)
-
(ESDC EA Repository Topology (CURRENT) (Grouping) - QualiWare Cloud)
-
(ESDC EA Repository Topology (FUTURE) (Grouping) - QualiWare Cloud (Consolidated))
-
(Protected-B Certification (Gap) - QualiWare Cloud)
-
(Protected-B Certification of QualiWare Cloud - Future State QualiWare Topology (Plateau))
-
(Current State QualiWare Topology (Plateau) - Protected-B Certification of QualiWare Cloud)
-
(QualiWare Cloud (Consolidated) - QualiWare Cloud Provider (Business Role))
-
(QualiWare Cloud - QualiWare Cloud Provider (Business Role))
-
(QualiWare Cloud Provider (Business Role) - Protected-B Certification of QualiWare Cloud)
-
(QualiWare 10.X+ (System Software) - ESDC EA Content Creation)
-
(QualiWare 10.4 - ESDC QualiWare Application Management (Business Role))
-
(QualiWare 10.X+ (System Software) - ESDC QualiWare Application Management (Business Role))
-
(BDM Architecture Content Creation (Business Collaboration) - Benefits Application Delivery (BAD) (Business Role))
-
(BDM Architecture Content Creation (Business Collaboration) - Digital Expreience and Client Data (DECD) (Business Role))
-
(BDM Architecture Content Creation (Business Collaboration) - Technology Platform (Business Role))
-
(BDM Architecture Content Creation (Business Collaboration) - Service Delivery Hub (SDH) (Business Role))
-
(Procurement of Additional Licenses (Implementation Event) - QualiWare 10.4 (System Software))
-
(QualiWare 10.4 (System Software) - BDM Architecture Content Creation (Business Collaboration))
-
(QualiWare 10.X+ (System Software) - BDM Architecture Content Creation (Business Collaboration))
-
(QualiWare 10.4 (System Software) - ESDC QualiWare Application Management (Business Role))
-
Governance & Oversight
(BDM Architecture Content Creation (Business Collaboration) - BDM EA Team (Business Role))
-
(QualiWare 10.4 (System Software) - BDM EA Team (Business Role))
-
(QualiWare 10.X+ (System Software) - BDM EA Team (Business Role))
-
(BDM Architecture Review Committee (ARC) (Business Collaboration) - Technology Platform (Business Role))
-
(BDM Architecture Review Committee (ARC) (Business Collaboration) - Benefits Application Delivery (BAD) (Business Role))
-
(BDM Architecture Review Committee (ARC) (Business Collaboration) - Digital Expreience and Client Data (DECD) (Business Role))
-
(BDM Architecture Review Committee (ARC) (Business Collaboration) - Service Delivery Hub (SDH) (Business Role))
-
(BDM Architecture Review Committee (ARC) (Business Collaboration) - BDM EA Team (Business Role))
-
(ESDC EA Content Creation - BDM Enterprise Architecture Working Group (EA WG) (Business Collaboration))
-
(BDM EA Team (Business Role) - BDM Enterprise Architecture Working Group (EA WG) (Business Collaboration))
-
(BDM Enterprise Architecture Working Group (EA WG) (Business Collaboration) - BDM Architecture Review Committee (ARC) (Business Collaboration))
-
(SAVE-D - QualiWare QLM)
-
(ESDC EA Content Creation - SAVE-D)
-
(ArchiMate 3.1 Notation (Representation) - ESDC EA Content Creation)
-
(BDM Architecture QualiWare Templates Suite (Representation) - BDM Architecture Content Creation (Business Collaboration))
-
(QualiWare On Premises - QualiWare QLM)
-
(Daniel Desforges (Business Actor) - Chief Architect (Business Role))
-
(Horizon 1 Outcomes (Grouping) - Capitalized on Opportunities (Outcome))
-
(Horizon 1 Outcomes (Grouping) - Doing the Right Thing and Doing It Right (Outcome))
-
(Horizon 1 Outcomes (Grouping) - Matured the EA Program (Outcome))
-
(Horizon 1 Outcomes (Grouping) - Delivered Client-Centric and Client Self-Service (Outcome))
-
(Horizon 2 Goals (Grouping) - Strategic EA (Goal))
-
(Horizon 2 Goals (Grouping) - Adopt EA By Design (Goal))
-
(Horizon 2 Goals (Grouping) - Understand and Demonstrate EA Value (Goal))
-
(Horizon 3 Goals (Grouping) - Pulse of Canadians (Goal))
-
(Horizon 3 Goals (Grouping) - Innovative Organization Capitalizing On Opportunities (Goal))
-
(Horizon 3 Goals (Grouping) - Business Agility (Goal))
-
(Horizon 3 Goals (Grouping) - EA Is The Fabric Of The Organization (Goal))
-
(Horizon 1 Constraints (Grouping) - EA Demand Exceeds Supply (Constraint))
-
(Horizon 1 Constraints (Grouping) - Reduced Staffing Capacity (Constraint))
-
(Horizon 1 Constraints (Grouping) - Staffing Changes Across EA (Constraint))
-
(Horizon 1 Constraints (Grouping) - COVID-19 Impact (Constraint))
-
(BDM Milestones, Year 1 (Grouping) - BDM and EA Outcomes Linked (Outcome))
-
(BDM Milestones, Year 1 (Grouping) - BDM Data Architecture Developed (Outcome))
-
(BDM Milestones, Year 1 (Grouping) - BDM SI's Onboard To QualiWare (Outcome))
-
(BDM Milestones, Year 1 (Grouping) - Horizon 1 Outcomes (Grouping))
-
(BDM Milestones, Year 2 (Grouping) - Continue Research On BDM Ancillary Components (Goal))
-
(BDM Milestones, Year 2 (Grouping) - Horizon 2 Goals (Grouping))
-
(BDM Milestones, Year 3 (Grouping) - Develop Digital Government Platform Architecture (Goal))
-
(BDM Milestones, Year 3 (Grouping) - Horizon 3 Goals (Grouping))
-
(Paul Middleton (Business Actor) - EA Strategy and Roadmap Lead (Business Role))
-
(Christiane Faucher (Business Actor) - Director Responsible for the EA Strategy and Roadmap (Business Role))
-
(EA Roadmap Resources (Grouping) - EA Roadmap Workbook (Product))
-
(EA Roadmap Resources (Grouping) - The Integrated Horizon 1 (H1) Work Plan (Product))
-
(EA Strategy Resources (Grouping) - EA Horizons Strategy Outcomes (Product))
-
(EA Strategy Resources (Grouping) - EA Strategy (Executive Summary) (Product))
-
(EA Strategy Resources (Grouping) - EA Strategy (Detailed) (Product))
-
(Lean Or Agile? That Is The Question (Grouping) - Apply Lean-Agile Transformation (Course of Action))
-
(Lean Or Agile? That Is The Question (Grouping) - Think Lean (Course of Action))
-
(Lean Or Agile? That Is The Question (Grouping) - Adopt SAFe (Scaled Agile Framework) (Course of Action))
-
(Lean Or Agile? That Is The Question (Grouping) - Leverage the Agile Manifesto (Course of Action))
-
(Barriers Hindering EA (Grouping) - Perception and Misconceptions of EA (Constraint))
-
(Barriers Hindering EA (Grouping) - Acceptance of Status Quo (Constraint))
-
(Barriers Hindering EA (Grouping) - Expect and Require Perfection (Constraint))
-
(Barriers Hindering EA (Grouping) - Analysis Paralysis Mindset (Constraint))
-
("Lean" and "Agile" Expected Outcomes (Grouping) - Deliver Client Value and Business Outcomes (Goal))
-
("Lean" and "Agile" Expected Outcomes (Grouping) - Respond Efficiently and Effectively To Changes in Business and IT Ecosystems, and Environmental Conditions (Goal))
-
("Lean" and "Agile" Expected Outcomes (Grouping) - Improve Business Outcomes (Goal))
-
("Lean" and "Agile" Expected Outcomes (Grouping) - Attain “We” Culture Between Business and IT (Goal))
-
(Lean and Agile Architectural Philosophy (Grouping) - Achieve Business Outcomes and Deliver Value (Course of Action))
-
(Lean and Agile Architectural Philosophy (Grouping) - Evolve and Mature The Architecture Roadmap (Course of Action))
-
(Lean and Agile Architectural Philosophy (Grouping) - Deliver A Minimum Viable Architecture (MVA) (Course of Action))
-
(Lean and Agile Architectural Philosophy (Grouping) - Focus On Product Lifecycle and Organizational Value (Course of Action))
-
(Lean and Agile Architectural Philosophy (Grouping) - Focus On Providing Insight To Inform and Deliver Organizational Value (Course of Action))
-
(Horizon 1 Constraints (Grouping) - Horizon 1: Stones in EA Shoes (Plateau))
-
(Horizon 1 Outcomes (Grouping) - Horizon 1: Stones in EA Shoes (Plateau))
-
(Horizon 2 Goals (Grouping) - Horizon 2: Stones in the Department's Shoes (Plateau))
-
(Horizon 3 Goals (Grouping) - Horizon 3: Evolving the Organization (Plateau))
-
(Horizon 1: Stones in EA Shoes (Plateau) - Deliver H2 (Work Package))
-
(Deliver H2 (Work Package) - Horizon 2: Stones in the Department's Shoes (Plateau))
-
(Horizon 2: Stones in the Department's Shoes (Plateau) - Deliver H3 (Work Package))
-
(Deliver H3 (Work Package) - Horizon 3: Evolving the Organization (Plateau))
-
(Azure DevOps ( - Feature Management)
-
(Azure DevOps - User Story Management)
-
(Design Principles - API Design Principles)
-
(Assessments - Improve Data Masking)
-
Realization
(SPOKE (ESDC): Centralized Log Monitoring Security Capabilities - Enterprise Strategies: )
-
(Infrastructure Monitoring - Secure Web/Email Gateways)
-
(Infrastructure Monitoring - Servers)
-
(Drivers - Leverage GC common services)
-
Data Feed
(Data Masking - HUB: Centralized Log Monitoring Security Capabilities)
-
(Infrastructure Monitoring - Firewalls)
-
(Stakeholders - Drivers)
-
(Stakeholders - SSC)
-
(SSC - CCCS)
-
Data feed
( SIEM - CCCS Cyber Defence )
-
(Data Logs - Infrastructure Logs)
-
(Enterprise Strategies: - Spoke and Hub Service Model)
-
(Infrastructure Monitoring - DOS/DDOS Prevention)
-
(Cloud/DC Logs - Data Centre/Cloud Monitoring)
-
(Infrastructure Monitoring - CASB)
-
(Infrastructure Monitoring - Vulnerability Management)
-
(Network Logs - Network Monitoring)
-
(Data Logs - Data Masking)
-
(Infrastructure Monitoring - SIEM)
-
(Infrastructure Monitoring - Endpoint Detection Response)
-
(SPOKE (ESDC): Centralized Log Monitoring Security Capabilities - Data Masking)
-
(ESDC - SSC)
-
(HUB: Centralized Log Monitoring Security Capabilities - SIEM)
-
(Enterprise Strategies: - Leverage of AI, ML & Automation)
-
Realization
(Principle/Guidance - Goals)
-
Realization
(Enterprise Strategies: - Principle/Guidance)
-
(Goals - Reduce Resouces & Technical Dependence)
-
(Application Monitoring - Database Security )
-
(Network Monitoring - Network Access Control)
-
(Goals - Ensure Security & Privacy)
-
(SPOKE (ESDC): Centralized Log Monitoring Security Capabilities - Network Monitoring)
-
(Stakeholders - ESDC)
-
(Enterprise Strategies: - Unified Log Management & Analytics Approach)
-
(Enterprise Strategies: - Event Logging Standization)
-
(Data Centre/Cloud Monitoring - Data Centre Security)
-
Realization
(HUB: Centralized Log Monitoring Security Capabilities - Enterprise Strategies: )
-
(Assessments - Limited SOC Resources & Expertise)
-
(Stakeholders - ESDC)
-
(Infrastructure Monitoring - HIDS/HIPS)
-
(Application Monitoring - Application Security)
-
(Drivers - Goals)
-
(ESDC - CCCS)
-
(Enterprise Strategies: - Data Masking Strategy)
-
(SPOKE (ESDC): Centralized Log Monitoring Security Capabilities - Infrastructure Monitoring)
-
Realization
(Enterprise Strategies: - Goals)
-
(Data Logs - Application Logs)
-
(Network Monitoring - Network IDS/IPS)
-
(Network Monitoring - Secure Networks e.g. VPN)
-
(Infrastructure Logs - Infrastructure Monitoring)
-
(Assessments - Goals)
-
(Drivers - Assessments)
-
(Goals - Balance TCO with SOC Investments)
-
(SPOKE (ESDC): Centralized Log Monitoring Security Capabilities - Data Centre/Cloud Monitoring)
-
(Drivers - Cost & Risk Sharing)
-
(Data Logs - Cloud/DC Logs)
-
(Infrastructure Monitoring - APT/Anti-malware Detection)
-
(SPOKE (ESDC): Centralized Log Monitoring Security Capabilities - Application Monitoring)
-
(Infrastructure Monitoring - Mainframes)
-
(HUB: Centralized Log Monitoring Security Capabilities - CCCS Cyber Defence )
-
(Network Monitoring - Network Flow e.g. Netflow)
-
(Network Monitoring - Network Devices)
-
(Application Logs - Application Monitoring)
-
(Assessments - Log Data Growth & Proliferation)
-
(Data Logs - Network Logs)
-
(Assessments - Inadequate Event Logging Standardization )
-
(Infrastructure Monitoring - ICAM)
-
(Infrastructure Monitoring - DNS/DHCP Security)
-
(Data Centre/Cloud Monitoring - Cloud Security)
-
(Infrastructure Monitoring - Data Security e.g. DLP)
-
(Goals - Standardize Data logging)
-
(Drivers - Efficiency)
-
(Improve Data Integration In The Enterprise - Boundaryless Information Flow)
-
(List Relevant Data Integration Standards - Provide Useful Body of Reference)
-
(Boundaryless Information Flow - Enterprise Architect)
-
(Technical Standards for Data Integration - Improve Data Integration In The Enterprise)
-
(Technical Standards for Data Integration - List Relevant Data Integration Standards)
-
(Technical Standards for Data Integration - Provides Basis For Future Data Integration Best Practices)
-
(References - An Information Architecture Vision: Moving from Data Rich to Information Smart)
-
(References - Data Management Body of Knowledge)
-
(References - Encyclopedia of Computer Science)
-
(References - Gartner Identifies Top Ten Data and Analytics Technology Trends for 2021)
-
(References - Information Architecture: Business Intelligence & Analytics and Metadata Management Reference Models)
-
(References - ISO-IEC 10646.2020 Information Technology - Universal Coded Character Set (UCS))
-
(References - ISO-IEC 11179-1.2015 Information Technology - Metadata Registries (MDR))
-
(References - Merriam-Webster Dictionary)
-
(References - O-DEF The Open Data Element Framework)
-
(References - The Rise of Big Data)
-
(Dr. Chris Harding - Technical Standards for Data Integration)
-
(Data Integration Challenges - Avoid Poor Data Quality)
-
(Data Integration Challenges - Keep Data Synchronized)
-
(Data Integration Challenges - Manage Complexity In Mapping Between Different Data Models)
-
(Data Integration Challenges - Make Efforts To Understand the Data)
-
(Data Integration Challenges - Address Organizational and Cultural Issues)
-
(Data Integration Challenges - Contribute To Data Defense)
-
(Data Integration Challenges - View Data Integration As A Continuous Process)
-
(Data Planning - Data Discover & Extract)
-
(Data Discover & Extract - Data Transform & Integrate)
-
(Data Transform & Integrate - Data Verify)
-
Go Live
(Data Verify - Lifecycle Management)
-
(SAS-Identified Constraints (Grouping) - CS-to-IT Classification Conversion (Constraint))
-
(Enterprise Architecture - Publish In The Open All Reusable Common Artifacts (Course of Action))
-
(Publish In The Open All Reusable Common Artifacts (Course of Action) - Develop and Leverage Cohesive Horizontal Enterprise Services (Capability))
-
(Set Up Your Environment (Course of Action) - Stay in Control (Course of Action))
-
(Set Up Your Environment (Course of Action) - Ensure Privacy (Course of Action))
-
(Set Up Your Environment (Course of Action) - Manage Secrets (Course of Action))
-
(Set Up Your Environment (Course of Action) - Manage Leaks (Course of Action))
-
(Set Up Your Environment (Course of Action) - Open Up At Inception (Course of Action))
-
(Set Up Your Environment (Course of Action) - Be Humble and Open Minded (Course of Action))
-
(Set Up Your Environment (Course of Action) - Manage the Community (Course of Action))
-
(Further Readings (Grouping) - Government 2.0 (Resource))
-
(Further Readings (Grouping) - Common Components for DigitalBC (Resource))
-
(Further Readings (Grouping) - Re-use existing common components to create your product or service (Resource))
-
(Further Readings (Grouping) - Government as a Platform - Digital Government and Gov 2.0 (Resource))
-
(Further Readings (Grouping) - A working definition of Government as a Platform (Resource))
-
(Further Readings (Grouping) - GC Service & Digital Target Enterprise Architecture (Resource))
-
(Further Readings (Grouping) - 1988 National Bureau of Standards’ Management Guide to Software Reuse (Resource))
-
(Further Readings (Grouping) - Web Experience Toolkit (Resource))
-
(Further Readings (Grouping) - Lessons from Estonia on digital government (Resource))
-
(Enterprise Architecture Practitioners - Enterprise Architect)
-
(Enterprise Architecture Practitioners - Business Architect)
-
(Enterprise Architecture Practitioners - Information Architect)
-
(Enterprise Architecture Practitioners - Application Architect)
-
(Enterprise Architecture Practitioners - Technology Architect)
-
(Enterprise Architecture Practitioners - Security Architect)
-
(SharePoint 2010 Permission Levels (Grouping) - Full Control [NOT AVAILABLE] (SharePoint Permission) (Business Role))
-
(Departmental SharePoint Site Administration and Support (Business Role) - Full Control [NOT AVAILABLE] (SharePoint Permission) (Business Role))
-
Basic Permission
(Enterprise Architect - "SAS_Contributors" (Custom SharePoint Group) (Business Role))
-
(IITB IM Lead (Business Role) - IITB IM Director (Business Role))
-
(Joanne Mayhew (Business Actor) - IITB IM Director (Business Role))
-
(Kristin Robertson (Business Actor) - IITB IM Lead (Business Role))
-
(Marie-Claire Simard (Business Actor) - IITB IM Lead (Business Role))
-
(Melissa Cyr (Business Actor) - IITB IM Lead (Business Role))
-
(Stephen Bisang (Business Actor) - IITB IM Lead (Business Role))
-
(Meredith McNaughton (Business Actor) - IITB IM Lead (Business Role))
-
(Information Management Office Portal (Application Service) - IITB IM Lead (Business Role))
-
(IM Planning (Business Process) - Collection, Creation, Receipt and Capture (Business Process))
-
(Collection, Creation, Receipt and Capture (Business Process) - Organization (Business Process))
-
(Organization (Business Process) - Use and Dissemination (Business Process))
-
(Use and Dissemination (Business Process) - Maintenance, Protection and Preservation (Business Process))
-
(Maintenance, Protection and Preservation (Business Process) - Disposition (Business Process))
-
(Disposition (Business Process) - Evalutation (Business Process))
-
(Information Management Lifecycle (Grouping) - IM Planning (Business Process))
-
(Information Management Lifecycle (Grouping) - Collection, Creation, Receipt and Capture (Business Process))
-
(Information Management Lifecycle (Grouping) - Organization (Business Process))
-
(Information Management Lifecycle (Grouping) - Use and Dissemination (Business Process))
-
(Information Management Lifecycle (Grouping) - Maintenance, Protection and Preservation (Business Process))
-
(Information Management Lifecycle (Grouping) - Disposition (Business Process))
-
(Information Management Lifecycle (Grouping) - Evalutation (Business Process))
-
(ESDC User - Everyone EXCEPT External Users (DOMAIN Group) (Business Role))
-
(Zero Trust Key Drivers (Grouping) - Emerging Partnerships (Driver))
-
(Zero Trust Key Drivers (Grouping) - Evolving Business Models (Driver))
-
(Zero Trust Key Drivers (Grouping) - Rapidly Changing Technology (Driver))
-
(Zero Trust Key Drivers (Grouping) - Regulatory, Geopolitical, and Cultural Forces (Driver))
-
(Zero Trust Key Drivers (Grouping) - Disruptive Events (Driver))
-
(Zero Trust Key Drivers (Grouping) - Paradigm Shift to Remote Work (Driver))
-
(Zero Trust Key Requirements (Grouping) - Regulatory Requirements (Requirement))
-
(Zero Trust Key Requirements (Grouping) - Mounting Complexity Requiring Increasing Need to Simplify (Requirement))
-
(Zero Trust Key Requirements (Grouping) - Support for Unpredictability (Requirement))
-
(Zero Trust Key Requirements (Grouping) - Measurable Controls and Automated Audit (Requirement))
-
(Zero Trust Key Requirements (Grouping) - Real-Time/Near Real-Time Response (Requirement))
-
(Zero Trust Key Requirements (Grouping) - Exponentially Increasing Need for Agility (Requirement))
-
(Zero Trust Key Requirements (Grouping) - Support for Remote Work (Requirement))
-
(Zero Trust Capabilities (Grouping) - Separation of Concerns (Capability))
-
(Zero Trust Capabilities (Grouping) - Secured Zones (Capability))
-
(Zero Trust Capabilities (Grouping) - Context-Specific, Policy-Enforced Data Security (Capability))
-
(Zero Trust Capabilities (Grouping) - Threat Scope Reduction and Risk Avoidance (Capability))
-
(Zero Trust Capabilities (Grouping) - Adaptive Identity (Capability))
-
(Zero Trust Capabilities (Grouping) - Policy-Driven Access Control (Capability))
-
(Zero Trust Capabilities (Grouping) - Automated Audit (Capability))
-
(Zero Trust Capabilities (Grouping) - Real-Time/Near Real-Time Response (Capability))
-
(Zero Trust Core Principles (Grouping) - Organizational Value and Risk Alignment (Grouping))
-
(Organizational Value and Risk Alignment (Grouping) - 1. Modern Work Enablement (Principle))
-
(Organizational Value and Risk Alignment (Grouping) - 2. Goal Alignment (Principle))
-
(Organizational Value and Risk Alignment (Grouping) - 3. Risk Alignment (Principle))
-
(Zero Trust Core Principles (Grouping) - Guardrails and Governance (Grouping))
-
(Guardrails and Governance (Grouping) - 4. People Guidance and Inspiration (Principle))
-
(Guardrails and Governance (Grouping) - 5. Risk and Complexity Reduction (Principle))
-
(Guardrails and Governance (Grouping) - 6. Alignment and Automation (Principle))
-
(Guardrails and Governance (Grouping) - 7. Security for the Full Lifecycle (Principle))
-
(Zero Trust Core Principles (Grouping) - Technology (Grouping))
-
(Technology (Grouping) - 8. Asset-Centric Security (Principle))
-
(Technology (Grouping) - 9. Least Privilege (Principle))
-
(Zero Trust Core Principles (Grouping) - Security Controls (Grouping))
-
(Security Controls (Grouping) - 10. Simple and Pervasive (Principle))
-
(Security Controls (Grouping) - 11. Explicit Trust Validation (Principle))
-
(SharePoint Online Roles (From Migration Page) (Grouping) - IM Lead (SharePoint Role) (Business Role))
-
(SharePoint Online Roles (From Migration Page) (Grouping) - Technical Consultant (SharePoint Role) (Business Role))
-
(SharePoint Online Roles (From Migration Page) (Grouping) - Site Designer (SharePoint Role) (Business Role))
-
(SharePoint Online Roles (From Migration Page) (Grouping) - Site Owner (SharePoint Role) (Business Role))
-
(SharePoint Online Roles (From Migration Page) (Grouping) - SharePoint Migration Project Team (SharePoint Role) (Business Role))
-
(SharePoint Online Roles (From Migration Page) (Grouping) - Business Analyst (SharePoint Role) (Business Role))
-
(SharePoint (365) Online Groups (Grouping) - SharePoint 2010 Permission Levels (Grouping))
-
(No User Should Have Full Control Permissions (Principle) - Full Control [NOT AVAILABLE] (SharePoint Permission) (Business Role))
-
(SharePoint 2010 High-Level Roles (From SharePoint 2010 Support Team) (Grouping) - OWNER (High Level SharePoint Role) (Business Role))
-
(SharePoint 2010 High-Level Roles (From SharePoint 2010 Support Team) (Grouping) - MEMBER (High Level SharePoint Role) (Business Role))
-
(SharePoint 2010 High-Level Roles (From SharePoint 2010 Support Team) (Grouping) - VISITOR (High Level SharePoint Role) (Business Role))
-
Some EA's
(Enterprise Architect - "SAS_DesignerPlus" (Custom SharePoint Group) (Business Role))
-
(Lifecycle Management - Data Disposition)
-
(Lifecycle Management - Archive Data)
-
(Lifecycle Management - Store Data)
-
(Lifecycle Management - Data Use)
-
(Data Integration Context - Data Discover & Extract)
-
(Data Integration Context - Data Transform & Integrate)
-
(Data Integration Context - Data Planning)
-
(Data Integration Context - Data Verify)
-
(Data Integration Context - Lifecycle Management)
-
(Document Scope - Technical Standards for Data Integration)
-
(Contextual Metadata - Analysis and Transformation)
-
(Source Data - Analysis and Transformation)
-
(Integrated Data - Analysis and Transformation)
-
(How Data Integration Works - Analysis and Transformation)
-
(How Data Integration Works - Source Data)
-
(How Data Integration Works - Contextual Metadata)
-
(How Data Integration Works - Integrated Data)
-
(Document Structure - Technical Standards for Data Integration)
-
(Data Fabric and Data Mesh - Data Fabric)
-
(Data Fabric and Data Mesh - Data Mesh)
-
(Data Fabric and Data Mesh - Data Platforms)
-
(Document Acronyms and Abbreviations - Technical Standards for Data Integration)
-
(Peter Littlefield - ESDC CIO)
-
(Susan Donavan Brown (Business Actor) - Business Owner)
-
(ESDC CIO - Executive Sponsor)
-
(WLM-and-CE Objectives (Grouping) - 1. Align With Digital Transformation (Goal))
-
(WLM-and-CE Objectives (Grouping) - 2. Improve ESDC Security Posture and IT Service Delivery (Goal))
-
(WLM-and-CE Objectives (Grouping) - 3. Reduce Technical Debt and Modernize Applications (Goal))
-
(Workload Migration and Cloud Enablement (Work Package) - ESDC Employees (Business Role))
-
(Workload Migration and Cloud Enablement (Work Package) - ESDC Clients (Business Role))
-
(Workload Migration and Cloud Enablement (Work Package) - Canadian Citizens (Business Role))
-
(WLM-and-CE Stakeholders (Grouping) - Innovation, Information and Technology Branch (IITB) (Stakeholder))
-
(WLM-and-CE Stakeholders (Grouping) - Treasury Board of Canada Secretariat (Stakeholder))
-
(WLM-and-CE Stakeholders (Grouping) - Shared Services Canada (SSC) (Stakeholder))
-
(WLM-and-CE Stakeholders (Grouping) - ESDC Business Lines (Stakeholder))
-
(WLM-and-CE Stakeholders (Grouping) - ESDC CFOB-Legal-and-HR (Stakeholder))
-
(Reduction of Technical Debt (Outcome) - 3. Reduce Technical Debt and Modernize Applications (Goal))
-
(Innovation, Information and Technology Branch (IITB) (Stakeholder) - Reduction of Technical Debt (Outcome))
-
(Alignment to Cloud First GC Priority (Outcome) - 1. Align With Digital Transformation (Goal))
-
(Innovation, Information and Technology Branch (IITB) (Stakeholder) - Alignment to Cloud First GC Priority (Outcome))
-
(WLM-and-CE Metric - Cloud Usage (Assessment) - 1. Align With Digital Transformation (Goal))
-
(WLM-and-CE Metric - Number of Applications Migrated (Assessment) - 1. Align With Digital Transformation (Goal))
-
(Improve IT Security Posture and Compliance (Outcome) - 2. Improve ESDC Security Posture and IT Service Delivery (Goal))
-
(Innovation, Information and Technology Branch (IITB) (Stakeholder) - Improve IT Security Posture and Compliance (Outcome))
-
(WLM-and-CE Metric - Increase Security Compliance (Assessment) - Improve IT Security Posture and Compliance (Outcome))
-
(WLM-and-CE Metric - Time to Provision Environments (Assessment) - Improved Agile Development Capability (Outcome))
-
(Innovation, Information and Technology Branch (IITB) (Stakeholder) - Improved Agile Development Capability (Outcome))
-
(WLM-and-CE Required Capabilities (Grouping) - B10.6.2 IT Technical Management (Capability))
-
(WLM-and-CE Required Capabilities (Grouping) - B10.6.3 IT Service Management & Operations (Capability))
-
(WLM-and-CE Required Capabilities (Grouping) - B10.6.4 Channel Infrastructure Management (Capability))
-
(WLM-and-CE Preliminary Risk Identification (Grouping) - Risk - Interdependencies With Partners (Assessment))
-
(WLM-and-CE Preliminary Risk Identification (Grouping) - Risk - Interoperability (Assessment))
-
(WLM-and-CE Preliminary Risk Identification (Grouping) - Risk - Availability Of Capability and Capacity (Assessment))
-
(WLM-and-CE Preliminary Risk Identification (Grouping) - Risk - Interdependencies With Other Projects (Assessment))
-
(WLM-and-CE Preliminary Risk Identification (Grouping) - Risk - Insufficient Funding (Assessment))
-
(WLM-and-CE Preliminary Risk Identification (Grouping) - Risk - Unclear Scope (Assessment))
-
(WLM-and-CE Preliminary Risk Identification (Grouping) - Risk - Delays In IT Security Policies and Procedures (Assessment))
-
(WLM-and-CE Preliminary Risk Identification (Grouping) - Risk - High Complexity Leading To Delays (Assessment))
-
(WLM-and-CE Preliminary Risk Identification (Grouping) - Risk - Insufficient IITB Support (Assessment))
-
(WLM-and-CE Preliminary Risk Identification (Grouping) - Risk - Change In Schedule (Assessment))
-
(WLM-and-CE Preliminary Risk Identification (Grouping) - Risk - High Network Complexity and Performance (Assessment))
-
(WLM-and-CE Preliminary Risk Identification (Grouping) - Risk - Application Decommissioning (Assessment))
-
(Ability To Implement WLM-and-CE is HIGH (Assessment) - Workload Migration and Cloud Enablement (Work Package))
-
(WLM-and-CE Solution Scope (Grouping) - WLM-and-CE In Scope Functional Requirements (Requirement))
-
(WLM-and-CE Solution Scope (Grouping) - WLM-and-CE Out Of Scope Functional Requirements (Requirement))
-
(SharePoint 2010 Permission Levels (Grouping) - View Web Site Statistics (SharePoint Permission) (Business Role))
-
(SharePoint 2010 Permission Levels (Grouping) - Limited Access [DEFAULT] (SharePoint Permission) (Business Role))
-
(SharePoint 2010 Permission Levels (Grouping) - Design (SharePoint Permission) (Business Role))
-
(SharePoint (365) Online Groups (Grouping) - Everyone EXCEPT External Users (DOMAIN Group) (Business Role))
-
(SharePoint (365) Online Groups (Grouping) - NOT ACTIVE: ALL Users (includes PUBLIC) (SharePoint Group) (Business Role))
-
(SharePoint 2010 Permission Levels (Grouping) - Read (SharePoint Permission) (Business Role))
-
(SharePoint 2010 Permission Levels (Grouping) - Contribute (SharePoint Permission) (Business Role))
-
(SharePoint 2010 Permission Levels (Grouping) - DesignerPlus (SharePoint Permission) (Business Role))
-
(SharePoint (365) Online Groups (Grouping) - Manage & Reuse Data Strategically, Responsibly)
-
(SharePoint (365) Online Groups (Grouping) - Use & Share Data Openly, Ethically, Securely)
-
(References - TOGAF Standard v9.2)
-
(Representation Standards - Data Encoding Standards)
-
(Content Display Standards - HyperText Markup Language (HTML))
-
(Content Display Standards - Standard Generalized Markup Language (SGML))
-
(Content Display Standards - Open Document Format (ODF))
-
(Content Display Standards - Microsoft Office Word)
-
(Representation Standards - Content Display Standards)
-
(Representation Standards - Hybrid Data)
-
(Relational Data Standards - Structured Query Language (SQL))
-
(Relational Data Standards - SQL or Call-Level Interface (CLI))
-
(Relational Data Standards - Open Database Connectivity (ODBC))
-
(Generic Data Structure Standards - Relational Data Standards)
-
(Generic Data Structure Standards - Spreadsheets)
-
(RDF Triple Stores Standards - Resource Description Framework (RDF))
-
(RDF Triple Stores Standards - SPARQL Protocol and RDF Query Language (SPARQL))
-
(RDF Triple Stores Standards - RDF Mapping)
-
(Generic Data Structure Standards - RDF Triple Stores Standards)
-
(JSON and YAML Standards - JavaScript Notation Object (JSON))
-
(JSON and YAML Standards - YAML (YAML Ain’t Markup Language))
-
(XML Standards - XML Path Language (XPath))
-
(XML Standards - Document Type Definition (DTD))
-
(XML Standards - Extensible Markup Language (XML))
-
(XML Standards - XML Query (XQuery))
-
(XML Standards - XPath Data Model (XDM))
-
(XML Standards - XML Schema Definition (XSD) Language)
-
(Generic Data Structure Standards - JSON and YAML Standards)
-
(Generic Data Structure Standards - XML Standards)
-
(Domain-Specific Standards - UN Electronic Data Interchange for Administration, Commerce and Transport (UN-EDIFACT))
-
(Domain-Specific Standards - Open Banking Standard)
-
(Domain-Specific Standards - Open Financial Exchange (OFX))
-
(Domain-Specific Standards - Fast Healthcare Interoperability Resources (FHIR))
-
(Structure Standards - Generic Data Structure Standards)
-
(Structure Standards - Domain-Specific Standards)
-
(Data Storage Systems - UNIX File Store)
-
(Data Storage Systems - Apache Hadoop Distributed File System (HDFS))
-
(Data Storage Systems - Blockchain System)
-
(Identification Codes - United Nations Standard Products and Services Code (UNSPSC))
-
(Identification Codes - Standard Industrial Classification (SIC) Codes)
-
(Identification Codes - Global Trade Item Numbers (GTIN))
-
(Identification Codes - Harmonized System (HS) Codes)
-
(Identification Codes - ISO 3166 Country Codes)
-
(Dictionaries - ISO 22745)
-
(Dictionaries - ECCMA Open Technical Dictionary (EOTD))
-
(Data Warehouse Metadata - Common Warehouse Metamodel (CWM))
-
(Structure-Independent Metadata - Data Warehouse Metadata)
-
(Structure-Independent Metadata - Identification Codes)
-
(Structure-Independent Metadata - Dictionaries)
-
(Spreadsheets - Relational Data Standards)
-
(Relational Data Standards - Metadata Registries)
-
(Relational Data Standards - O-DEF Standard)
-
(Relational Data Standards - ERA Models)
-
(Relational Data Standards - Standard Data Models)
-
(Metadata Standards - Structure-Independent Metadata)
-
(Metadata Standards - Data Storage Systems)
-
(Metadata Standards - Relational Data Standards)
-
(Metadata Standards - RDF Triple Stores)
-
(RDF Triple Stores - Dublin Core Vocabulary)
-
(RDF Triple Stores - Friend Of A Friend (FOAF) Vocabulary Specification)
-
(Metadata Standards - XML Standard)
-
(Metadata Standards - JSON and YAML)
-
(Metadata Standards - Hybrid Data)
-
(Metadata Standards - BNF Standard)
-
(Metadata Standards - Domain-Specific Structures)
-
(Transformation Utilities - Description Source-URL)
-
(Transformation Utilities - Perl)
-
(Transformation Utilities - eXtensible Stylesheet Language (XSL))
-
(Transformation Utilities - Turing eXtender Language (TXL))
-
(Template Languages - Django Template Processor)
-
(Template Languages - The Apache FreeMarker)
-
(Template Languages - Hugo Templating)
-
(Template Languages - Liquid Template Language)
-
(Data Analysis and Transformation Standards - DMBOK)
-
(Data Analysis and Transformation Standards - Template Languages)
-
(Data Analysis and Transformation Standards - Transformation Utilities)
-
(Data Analysis and Transformation Standards - Data Science)
-
(Data Analysis and Transformation Standards - Structured Data Query Languages)
-
(Data Analysis and Transformation Standards - Machine Learning)
-
(IAM Architecture Guardrails - Zero Trust Architecture Guardrails)
-
(EA CoP Presentation 2021-09-09 (Grouping) - Present ESDC's WLM Journey (Course of Action))
-
(EA CoP Presentation 2021-09-09 (Grouping) - Consider 2 Current State Diagrams, 1 For Each DC (Course of Action))
-
(EA CoP Presentation 2021-09-09 (Grouping) - Consider 2 Target State Diagrams, 1 For Each DC (Course of Action))
-
(EA CoP Presentation 2021-09-09 (Grouping) - Include Detailed List of All Applications In Annex (Course of Action))
-
(EDC (Grouping) - High Performance EDC (Dorval) (Facility))
-
(EDC (Grouping) - Borden EDC (Facility))
-
(Legacy Data Centres (Grouping) - Montreal Data Centre (Facility))
-
(Legacy Data Centres (Grouping) - Moncton Data Centre (Facility))
-
(Analytic Tools (application collaboration) - Advanced Analytics (business service))
-
(Real-time Analytics (application collaboration) - Event Correlation (application collaboration))
-
(Junction - Business Use-Case Contributors (business role))
-
(VBI SandBoxes (technology collaboration) - View Based Interaction (application function))
-
(Real-time Analytics (application collaboration) - Consumption (business function))
-
(Object Cache (technology collaboration) - View Based Interaction (application function))
-
(Junction - Platform Stewards(business role))
-
(Raw data interaction (application function) - Advanced Analytics (business service))
-
(Dashboard (business interface) - Consumption (business function))
-
(Real Time Interfaces (application collaboration) - Consumption (business function))
-
(Dashboard (business interface) - Junction)
-
(Junction - Data Stewards (business role))
-
(Analytical Insight Applications (application collaboration) - Advanced Analytics (business service))
-
(Simple, Ad Hoc Discovery and Analysis (application collaboration) - Consumption (business function))
-
(Reporting (application collaboration) - Consumption (business function))
-
(Scorecard (product) - Consumption (business function))
-
(Self Service (business interface) - Junction)
-
(Alert (product) - Consumption (business function))
-
(Consumption (business function) - Visualization (business service))
-
(Real Time Reporting (product) - Consumption (business function))
-
(Web API (business interface) - Junction)
-
(Decision Model Management (business role) - Consumption (business function))
-
(Scheduled Report (product) - Consumption (business function))
-
(Web API (business interface) - Consumption (business function))
-
(View Based Interaction (application function) - Consumption (business function))
-
(Advanced Analytics Sandboxes (technology collaboration) - Raw data interaction (application function))
-
(Decision Model Management (business role) - Advanced Analytics (business service))
-
(Self Service (business interface) - Consumption (business function))
-
(Publishing Feeds (application collaboration) - Consumption (business function))
-
(Consumption (business function) - Datasets (business object))
-
(Consumption (business function) - Discovery (business service))
-
(Junction - Platform Operators (business role))
-
(Information Access and Feedback (technology collaboration) - View Based Interaction (application function))
-
(Real-time Analytics (application collaboration) - Streaming Analytics (application collaboration))
-
(Junction - Business Use-Case Stewards (business role))
-
(Enterprise Architecture Executive Management (Business Collaboration) - EA Manager (Business Role))
-
(Enterprise Architecture Executive Management (Business Collaboration) - EA Director (Business Role))
-
(Enterprise Architecture Executive Management (Business Collaboration) - EA Executive Director (Business Role))
-
(Enterprise Architecture Executive Management (Business Collaboration) - SABR Director General (Business Role))
-
(ADO Epic (Representation) - ADO Feature (Representation))
-
(ADO Feature (Representation) - ADO Task (Representation))
-
(SABR DG Report (Product) - SABR Director General (Business Role))
-
(EA Administrative Assistant (Business Role) - EA Training Coordination (Business Function))
-
(EA-SAS Team Guide(s) On Use Of ADO (Product) - Enterprise Architecture Practitioners)
-
([Management] Self-Discover Who Is Doing What (Gap) - Provide Easy Self-Serve Reporting (Goal))
-
(Track All EA Work (SAS, ESA, IA) (Goal) - Enterprise Architecture Executive Management (Business Collaboration))
-
(Track All EA Work (SAS, ESA, IA) (Goal) - Enterprise Architecture Practitioners)
-
(Enable Team Work Management (Goal) - Enterprise Architecture Practitioners)
-
(Enable Team Work Management (Goal) - EA Manager (Business Role))
-
(Provide Easy Self-Serve Reporting (Goal) - Enterprise Architecture Executive Management (Business Collaboration))
-
([Team] Able To Manage & Track Training Tasks (Gap) - Track All EA Work (SAS, ESA, IA) (Goal))
-
(EA Manager (Business Role) - Improve Team Performance (Goal))
-
(Communication Of EA Work (Value) - Team Contribution Awareness (Value))
-
(Team Management (Business Function) - Workload Management (Business Function))
-
(Team Management (Business Function) - Capacity Management (Business Function))
-
(Key Stakeholders (Stakeholder) - EARB Co-Chair (CIO) (Stakeholder))
-
(Key Stakeholders (Stakeholder) - EARB Co-Chair (Business) (Stakeholder))
-
(SA Services (Grouping) - SA Consulting (Business Service))
-
(SA Services (Grouping) - SA Alignment (Business Service))
-
(SA Services (Grouping) - SA Strategic Planning (Business Service))
-
(EA Executive Director (Business Role) - ESDC Chief Architect (Business Role))
-
(Communication Of EA Work (Value) - Knowing WHO is Doing WHAT (Value))
-
(ESDC Network (On Premises) (Communication Network) - SharePoint 2010 (System Software))
-
(SharePoint 2010 (System Software) - SAS Team SharePoint Sub-Site (SAS-SAS) (Artifact))
-
(SharePoint 2010 (System Software) - SAS Team's Current SharePoint Files and Folders (Artifact))
-
(Enterprise Architect - SharePoint 2010 (System Software))
-
(Microsoft Azure Tenant (Cloud) (Communication Network) - Microsoft 365 SharePoint (Online) (System Software))
-
(Microsoft 365 SharePoint (Online) (System Software) - INTERIM SAS Team SharePoint Files and Folders (Artifact))
-
(CURRENT State SharePoint Topology (Plateau) - SAS Team Prep Work (Work Package))
-
(SAS Team Prep Work (Work Package) - Wave 3 IM Migration (Work Package))
-
(Wave 3 IM Migration (Work Package) - MIGRATED State SharePoint Topology (Plateau))
-
(Microsoft 365 SharePoint (Online) (System Software) - SAS Team SharePoint (New) Main-Site (SAS-SAS) (Artifact))
-
(Microsoft 365 SharePoint (Online) (System Software) - SAS Team's Current (Same) SharePoint Files and Folders (SAS-SAS2) (Artifact))
-
(SAS Team SharePoint Sub-Site (SAS-SAS) (Artifact) - SAS Team SharePoint (New) Main-Site (SAS-SAS) (Artifact))
-
(SAS Team's Current SharePoint Files and Folders (Artifact) - SAS Team's Current (Same) SharePoint Files and Folders (SAS-SAS2) (Artifact))
-
(Microsoft Azure Tenant (Cloud) (Communication Network) - Microsoft 365 Teams (System Software))
-
(Microsoft 365 Teams (System Software) - Microsoft Teams Team: DGIIT - SARA / IITB - SABR (Artifact))
-
(Microsoft Teams Team: DGIIT - SARA / IITB - SABR (Artifact) - Microsoft Teams Channel: SARA-SA - SABR-SA (Artifact))
-
(Enterprise Architect - Microsoft 365 Teams (System Software))
-
(Microsoft 365 Teams (System Software) - Microsoft Teams Team: SAS-SAS (Artifact))
-
(Microsoft Teams Team: SAS-SAS (Artifact) - Microsoft Teams Channel: General (Artifact))
-
(Microsoft Teams Team: SAS-SAS (Artifact) - Microsoft Teams Channel: DA CoP (Artifact))
-
(Microsoft Teams Team: SAS-SAS (Artifact) - Microsoft Teams Channel: GC EARB (Artifact))
-
(Microsoft Teams Team: SAS-SAS (Artifact) - Microsoft Teams Channel: PROJECT (Artifact))
-
(Microsoft Teams Team: SAS-SAS (Artifact) - Microsoft Teams Channel: SA ONBOARDING (Artifact))
-
(Microsoft Teams Team: SAS-SAS (Artifact) - Microsoft Teams Channel: <OTHERS> (Artifact))
-
(SAS Team's Current (Same) SharePoint Files and Folders (SAS-SAS2) (Artifact) - Microsoft Teams Team: SAS-SAS (Artifact))
-
(Microsoft Azure Tenant (Cloud) (Communication Network) - Microsoft 365 Stream (System Software))
-
(Microsoft Azure Tenant (Cloud) (Communication Network) - Microsoft 365 OneNote (System Software))
-
(Microsoft Azure Tenant (Cloud) (Communication Network) - Microsoft 365 Lists (System Software))
-
(Microsoft Azure Tenant (Cloud) (Communication Network) - Microsoft 365 OneDrive (System Software))
-
(Microsoft Azure Tenant (Cloud) (Communication Network) - Microsoft 365 Forms (System Software))
-
(Microsoft Azure Tenant (Cloud) (Communication Network) - Microsoft 365 Azure DevOps (System Software))
-
(Microsoft 365 Teams (System Software) - Microsoft Teams Meeting Chats: <ANY,ALL> (Artifact))
-
(Microsoft 365 Teams (System Software) - Microsoft Teams Group Chats: <ANY,ALL> (Artifact))
-
(Microsoft 365 Teams (System Software) - Microsoft Teams 1-to-1 Chats: <ANY,ALL> (Artifact))
-
(SAS Team's Current (Same) SharePoint Files and Folders (SAS-SAS2) (Artifact) - SAS SharePoint Content Curator (Business Role))
-
(SAS Team SharePoint (New) Main-Site (SAS-SAS) (Artifact) - SAS SharePoint Content Curator (Business Role))
-
(A.1: Authoring tool user interfaces follow applicable accessibility guidelines - Guideline A.1.1: (For the authoring tool user interface) Ensure that web-based functionality is accessible)
-
(A.1: Authoring tool user interfaces follow applicable accessibility guidelines - Guideline A.1.2: (For the authoring tool user interface) Ensure that non-web-based functionality is accessible)
-
(A.2: Editing-views are perceivable - Guideline A.2.1: (For the authoring tool user interface) Make alternative content available to authors)
-
(A.2: Editing-views are perceivable - Guideline A.2.2: (For the authoring tool user interface) Ensure that editing-view presentation can be programmatically determined)
-
(A.3: Editing-views are operable - Guideline A.3.1: (For the authoring tool user interface) Provide keyboard access to authoring features)
-
(A.3: Editing-views are operable - Guideline A.3.2: (For the authoring tool user interface) Provide authors with enough time)
-
(A.3: Editing-views are operable - Guideline A.3.3: (For the authoring tool user interface) Help authors avoid flashing that could cause seizures)
-
(A.3: Editing-views are operable - Guideline A.3.4: (For the authoring tool user interface) Enhance navigation and editing via content structure)
-
(A.3: Editing-views are operable - Guideline A.3.5: (For the authoring tool user interface) Provide text search of the content)
-
(A.3: Editing-views are operable - Guideline A.3.6: (For the authoring tool user interface) Manage preference settings)
-
(A.3: Editing-views are operable - Guideline A.3.7: (For the authoring tool user interface) Ensure that previews are at least as accessible as in-market user agents)
-
(A.4: Editing-views are understandable - Guideline A.4.1: (For the authoring tool user interface) Help authors avoid and correct mistakes)
-
(A.4: Editing-views are understandable - Guideline A.4.2: (For the authoring tool user interface) Document the user interface, including all accessibility features)
-
(Part A: Make the authoring tool user interface accessible - A.1: Authoring tool user interfaces follow applicable accessibility guidelines)
-
(Part A: Make the authoring tool user interface accessible - A.4: Editing-views are understandable)
-
(Part A: Make the authoring tool user interface accessible - A.3: Editing-views are operable)
-
(Part A: Make the authoring tool user interface accessible - A.2: Editing-views are perceivable)
-
(Part B: Support the production of accessible content - B.3: Authors are supported in improving the accessibility of existing content)
-
(Part B: Support the production of accessible content - B.1: Fully automatic processes produce accessible content)
-
(Part B: Support the production of accessible content - B.2: Authors are supported in producing accessible content)
-
(B.1: Fully automatic processes produce accessible content - Guideline B.1.1: Ensure that automatically-specified content is accessible)
-
(B.1: Fully automatic processes produce accessible content - Guideline B.1.2: Ensure that accessibility information is preserved)
-
(B.2: Authors are supported in producing accessible content - Guideline B.2.1: Ensure that accessible content production is possible)
-
(B.2: Authors are supported in producing accessible content - Guideline B.2.2: Guide authors to produce accessible content)
-
(B.2: Authors are supported in producing accessible content - Guideline B.2.3: Assist authors with managing alternative content for non-text content)
-
(B.2: Authors are supported in producing accessible content - Guideline B.2.4: Assist authors with accessible templates)
-
(B.2: Authors are supported in producing accessible content - Guideline B.2.5: Assist authors with accessible pre-authored content)
-
(B.3: Authors are supported in improving the accessibility of existing content - Guideline B.3.1: Assist authors in checking for accessibility problems)
-
(B.3: Authors are supported in improving the accessibility of existing content - Guideline B.3.2: Assist authors in repairing accessibility problems)
-
(Part B: Support the production of accessible content - B.4: Authoring tools promote and integrate their accessibility features)
-
(B.4: Authoring tools promote and integrate their accessibility features - Guideline B.4.1: Ensure the availability of features that support the production of accessible content)
-
(B.4: Authoring tools promote and integrate their accessibility features - Guideline B.4.2: Ensure that documentation promotes the production of accessible content)
-
("Simple Site" (Meaning) - SAS SharePoint 2010 Migration Report (Assessment))
-
(MIGRATED State SharePoint Topology (Plateau) - Validate and GO! (Work Package))
-
(Enterprise Architect - Microsoft 365 SharePoint (Online) (System Software))
-
(Microsoft 365 Azure DevOps (System Software) - SAS ADO Content Curator (Business Role))
-
(ESDC Network (On Premises) (Communication Network) - SharePoint 2010 READ-ONLY (System Software))
-
(SharePoint 2010 READ-ONLY (System Software) - SAS Team's READ-ONLY SharePoint Files and Folders (Artifact))
-
(SharePoint 2010 READ-ONLY (System Software) - SAS Team SharePoint Sub-Site REDIRECT TO NEW (SAS-SAS) (Artifact))
-
(Microsoft 365 SharePoint (Online) (System Software) - SA Team Calendar in SharePoint Online (Artifact))
-
(SharePoint Online (365) SAS Custom Groups (Grouping) - "SAS_Contributors" (Custom SharePoint Group) (Business Role))
-
(SharePoint Online (365) SAS Custom Groups (Grouping) - "SAS_DesignerPlus" (Custom SharePoint Group) (Business Role))
-
(SharePoint Online (365) SAS Custom Groups (Grouping) - "SAS_Owners" (Custom SharePoint Group) (Business Role))
-
(DesignerPlus (SharePoint Permission) (Business Role) - "SAS_DesignerPlus" (Custom SharePoint Group) (Business Role))
-
(Contribute (SharePoint Permission) (Business Role) - "SAS_Contributors" (Custom SharePoint Group) (Business Role))
-
(Design (SharePoint Permission) (Business Role) - "SAS_Contributors" (Custom SharePoint Group) (Business Role))
-
TechArch_Contributors
(Technology Architect - Contribute (SharePoint Permission) (Business Role))
-
CDO Contributors
(Information Architect - Contribute (SharePoint Permission) (Business Role))
-
(Enterprise Architect - SAS SharePoint Content Curator (Business Role))
-
(SAS SharePoint Content Curator (Business Role) - Keep SharePoint Access and Permissions Up-To-Date (Course of Action))
-
(Manager, Business Architecture (Business Role) - Business Architecture IAG Assessment Report [2021-08-30] (Assessment))
-
(Use Cloud First - Comply With GC EA Framework - Use Cloud First (Driver))
-
(Design For Interoperability - Interoperate With Enterprise Solutions (Constraint))
-
(Enable Interoperability - Interoperate With Enterprise Solutions (Constraint))
-
(Comply With Accessible Canada Act (Driver) - Meet Accessibility Requirements (Constraint))
-
(Build In Accessibility From the Start - Comply With Accessible Canada Act (Driver))
-
(HL Solution Requirements (Grouping) - Protected Cloud B (Requirement))
-
(HL Solution Requirements (Grouping) - System Configuration (Requirement))
-
(HL Business Requirements (Grouping) - Reporting (Requirement))
-
(HL Business Requirements (Grouping) - Competency Development (Requirement))
-
(HL Business Requirements (Grouping) - Accessibility (Requirement))
-
(HL Business Requirements (Grouping) - Learning Administration (Requirement))
-
(HL Business Requirements (Grouping) - Learning Delivery (Requirement))
-
(Protected Cloud B (Requirement) - Protected B (Requirement))
-
(Protected Cloud B (Requirement) - Third Party Assurance (Requirement))
-
(Protected Cloud B (Requirement) - CSP IT Security Assessment (Requirement))
-
(Protected Cloud B (Requirement) - Data Protection (Requirement))
-
(Protected Cloud B (Requirement) - Data Isolation (Requirement))
-
(Protected Cloud B (Requirement) - Data Location (Requirement))
-
(Protected Cloud B (Requirement) - Data Transfer and Retrieval (Requirement))
-
(Protected Cloud B (Requirement) - Data Disposition, In Canada (Requirement))
-
(Protected Cloud B (Requirement) - Cryptographic Protection (Requirement))
-
(Protected Cloud B (Requirement) - Key Management (Requirement))
-
(Protected Cloud B (Requirement) - Endpoint Protection (Requirement))
-
(Protected Cloud B (Requirement) - Secure Development (Requirement))
-
(Protected Cloud B (Requirement) - Identity & Access Management (IAM) (Requirement))
-
(Protected Cloud B (Requirement) - Privileged Access Management (Requirement))
-
(Protected Cloud B (Requirement) - Network & Communications Security (Requirement))
-
(Protected Cloud B (Requirement) - Security Incident Management (Requirement))
-
(Protected Cloud B (Requirement) - Security Incident Response (Requirement))
-
(Protected Cloud B (Requirement) - Peronnel Security Screening (Requirement))
-
(Protected Cloud B (Requirement) - Physical Data Security (Requirement))
-
(System Configuration (Requirement) - API (Requirement))
-
(System Configuration (Requirement) - Profile (Requirement))
-
(System Configuration (Requirement) - Privacy Statement (Requirement))
-
(System Configuration (Requirement) - Integration (Requirement))
-
(System Configuration (Requirement) - Log In (Requirement))
-
(System Configuration (Requirement) - SKU Barcodes (Requirement))
-
(System Configuration (Requirement) - System Roles (Requirement))
-
(System Configuration (Requirement) - Organizations (Requirement))
-
(System Configuration (Requirement) - Digital Signature (Requirement))
-
(System Configuration (Requirement) - System (Requirement))
-
(System Configuration (Requirement) - Content Standards (Requirement))
-
(System Configuration (Requirement) - Auditing (Requirement))
-
(System Configuration (Requirement) - Target Audience (Requirement))
-
(SharePoint (365) Online Groups (Grouping) - ContributeWithoutDelete (SharePoint Permission) (Business Role))
-
(SharePoint (365) Online Groups (Grouping) - APM_DesignerPlus (SharePoint Permission) (Business Role))
-
(SharePoint (365) Online Groups (Grouping) - DesignerPlus (SharePoint Permission) (Business Role))
-
(SharePoint (365) Online Groups (Grouping) - CSDContributers (SharePoint Permission) (Business Role))
-
(SharePoint (365) Online Groups (Grouping) - Full Control [NOT AVAILABLE] (SharePoint Permission) (Business Role))
-
(SharePoint (365) Online Groups (Grouping) - Edit (SharePoint Permission) (Business Role))
-
(SharePoint (365) Online Groups (Grouping) - Restricted View (SharePoint Permission) (Business Role))
-
(SharePoint (365) Online Groups (Grouping) - View Only (SharePoint Permission) (Business Role))
-
(SharePoint Online (365) Permission Levels (Grouping) - DesignerPlus (SharePoint Permission) (Business Role))
-
(SharePoint Online (365) Permission Levels (Grouping) - Restricted View (SharePoint Permission) (Business Role))
-
(SharePoint Online (365) Permission Levels (Grouping) - APM_DesignerPlus (SharePoint Permission) (Business Role))
-
(SharePoint Online (365) Permission Levels (Grouping) - View Only (SharePoint Permission) (Business Role))
-
(SharePoint Online (365) Permission Levels (Grouping) - CSDContributers (SharePoint Permission) (Business Role))
-
(SharePoint Online (365) Permission Levels (Grouping) - ContributeWithoutDelete (SharePoint Permission) (Business Role))
-
(SharePoint Online (365) Permission Levels (Grouping) - Edit (SharePoint Permission) (Business Role))
-
(SharePoint Online (365) Permission Levels (Grouping) - Full Control [NOT AVAILABLE] (SharePoint Permission) (Business Role))
-
(SharePoint Online (365) Permission Levels (Grouping) - Design (SharePoint Permission) (Business Role))
-
(SharePoint Online (365) Permission Levels (Grouping) - Limited Access [DEFAULT] (SharePoint Permission) (Business Role))
-
(SharePoint Online (365) Permission Levels (Grouping) - Read (SharePoint Permission) (Business Role))
-
(SharePoint Online (365) Permission Levels (Grouping) - Contribute (SharePoint Permission) (Business Role))
-
(SharePoint Online (365) Permission Levels (Grouping) - View Web Site Statistics (SharePoint Permission) (Business Role))
-
(SharePoint Online (365) SAS Custom Groups (Grouping) - "SAS_Collaborators" (SharePoint Group) (Business Role))
-
("SAS_Collaborators" (SharePoint Group) (Business Role) - ContributeWithoutDelete (SharePoint Permission) (Business Role))
-
("SAS_Contributors" (Custom SharePoint Group) (Business Role) - Design (SharePoint Permission) (Business Role))
-
("SAS_Contributors" (Custom SharePoint Group) (Business Role) - Contribute (SharePoint Permission) (Business Role))
-
("SAS_DesignerPlus" (Custom SharePoint Group) (Business Role) - DesignerPlus (SharePoint Permission) (Business Role))
-
("SAS_Owners" (Custom SharePoint Group) (Business Role) - Full Control [NOT AVAILABLE] (SharePoint Permission) (Business Role))
-
(SharePoint (365) Online Groups (Grouping) - CSD_Owners (Custom SharePoint Group) (Business Role))
-
(SharePoint (365) Online Groups (Grouping) - APM_DesignerPlus (Custom SharePoint Group) (Business Role))
-
(SharePoint (365) Online Groups (Grouping) - CSD_Designers (Custom SharePoint Group) (Business Role))
-
(SharePoint (365) Online Groups (Grouping) - CDO Contributors (Custom SharePoint Group) (Business Role))
-
(SharePoint (365) Online Groups (Grouping) - CSD_Contributers (Custom SharePoint Group) (Business Role))
-
(SharePoint (365) Online Groups (Grouping) - Viewers (Custom SharePoint Group) (Business Role))
-
(SharePoint (365) Online Groups (Grouping) - TechArch_Contributors (Custom SharePoint Group) (Business Role))
-
(SharePoint (365) Online Groups (Grouping) - SecurityReponse_WG (Custom SharePoint Group) (Business Role))
-
Collaboration
(Enterprise Architecture Practitioners - "SAS_Collaborators" (SharePoint Group) (Business Role))
-
(APM_DesignerPlus (Custom SharePoint Group) (Business Role) - APM_DesignerPlus (SharePoint Permission) (Business Role))
-
(CDO Contributors (Custom SharePoint Group) (Business Role) - Contribute (SharePoint Permission) (Business Role))
-
(CSD_Contributers (Custom SharePoint Group) (Business Role) - CSDContributers (SharePoint Permission) (Business Role))
-
(CSD_Designers (Custom SharePoint Group) (Business Role) - Design (SharePoint Permission) (Business Role))
-
(CSD_Designers (Custom SharePoint Group) (Business Role) - View Web Site Statistics (SharePoint Permission) (Business Role))
-
(CSD_Owners (Custom SharePoint Group) (Business Role) - Full Control [NOT AVAILABLE] (SharePoint Permission) (Business Role))
-
(Everyone EXCEPT External Users (DOMAIN Group) (Business Role) - Read (SharePoint Permission) (Business Role))
-
(SecurityReponse_WG (Custom SharePoint Group) (Business Role) - Design (SharePoint Permission) (Business Role))
-
(TechArch_Contributors (Custom SharePoint Group) (Business Role) - ContributeWithoutDelete (SharePoint Permission) (Business Role))
-
(Viewers (Custom SharePoint Group) (Business Role) - View Only (SharePoint Permission) (Business Role))
-
BASIC DEFAULT
(SharePoint (365) Online Groups (Grouping) - Limited Access [DEFAULT] (SharePoint Permission) (Business Role))
-
(SharePoint Online (365) SAS Custom Groups (Grouping) - Limited Access [DEFAULT] (SharePoint Permission) (Business Role))
-
(Microsoft 365 Teams (System Software) - Microsoft Teams Team: EA CoP's (Artifact))
-
(Microsoft Teams Team: EA CoP's (Artifact) - Microsoft Teams Channel: DA-CoP (Artifact))
-
(Microsoft 365 Teams (System Software) - Microsoft Teams Team: ESA WG (Artifact))
-
(Microsoft Teams Team: ESA WG (Artifact) - Microsoft Teams Channels: [VARIOUS] (Artifact))
-
(Microsoft 365 SharePoint (Online) (System Software) - ESDC EA CoP's SharePoint Files and Folders (ESDC EA CoP's) (Artifact))
-
(Microsoft Teams Team: EA CoP's (Artifact) - ESDC EA CoP's SharePoint Files and Folders (ESDC EA CoP's) (Artifact))
-
SharePoint Tab
(Microsoft Teams Team: SAS-SAS (Artifact) - SAS Team SharePoint (New) Main-Site (SAS-SAS) (Artifact))
-
(EA Assessment Peer Review By Domains - Business-Focussed Review)
-
(Business-Focussed Review - EA Assessment Peer Review By Domains)
-
(Facilitated EA Assessment Review & Meeting - Business-Focussed Review)
-
(Business-Focussed Review - Facilitated EA Assessment Review & Meeting)
-
(EARB Co-Chairs - Sr.ADM ISSD)
-
(Enterprise Architecture Alignment - Reduces Technical Debt)
-
(Enterprise Architecture Alignment - Following Enterprise SDLC)
-
(Enterprise Architecture Alignment - Consolidate Solutions)
-
(Enterprise Architecture Alignment - Standard Business Process)
-
(Enterprise Architecture Alignment - Leverages Cloud Services)
-
(Enterprise Architecture Alignment - Enterprise / Reusable)
-
(Enterprise Architecture Alignment - IT Strategic Alignment)
-
(IT Complexity - Product / Service Type)
-
(IT Complexity - Solution Deployment)
-
(IT Complexity - Solution Integration)
-
(IT Complexity - Requirements Maturity)
-
(IT Complexity - Technology Expertise)
-
(IT Complexity - System Integrators / Professional Services)
-
(IT Complexity - Scheduling / Resources)
-
(Security Architecture - External Access)
-
(Security Architecture - Internal Access)
-
(Security Architecture - Edge Protection)
-
(Security Architecture - Secure Data Exchange)
-
(Security Architecture - Security Operations)
-
(Security Architecture - Policy Enforcement)
-
(Security Architecture - Asset Protection)
-
(Maintain Secure Operations - Security Operations)
-
(Ensure Secure Access To Systems & Services - External Access)
-
(Ensure Secure Access To Systems & Services - Internal Access)
-
(Ensure Secure Access To Systems & Services - Edge Protection)
-
(Shared Assets - Asset Protection)
-
(ESDC EA Content Creation - Solution Architecture)
-
(github.com - Github Repository)
-
(Archi 4.9.1 - *.archimate Files)
-
(Solution Architecture - Archi 4.9.1)
-
(*.archimate Files - Github Desktop for Windows 2.9.4)
-
(Github Desktop for Windows 2.9.4 - github.com)
-
(1. [Archi] Prepare *.archimate File For Export - 2. [Archi] Export *.XML File)
-
(2. [Archi] Export *.XML File - 3. [QLM] Tools, Import ArchiMate File)
-
(3. [QLM] Tools, Import ArchiMate File - 4. [QLM] Update / Modify Imported Views)
-
(4. [QLM] Update / Modify Imported Views - 5. [QLM] Publish New Content)
-
(5. [QLM] Publish New Content - 6. [QLM] Promote New Content To Base)
-
(*.archimate Files - 1. [Archi] Prepare *.archimate File For Export)
-
(2. [Archi] Export *.XML File - Exported *.XML File)
-
(Exported *.XML File - QualiWare QLM)
-
(3. [QLM] Tools, Import ArchiMate File - Exported *.XML File)
-
(Data Foundations Programme - Data Science & Machine Learning (DS&ML))
-
(Data Foundations Programme - Enterprise Data Lake)
-
(Data Foundations Programme - Enterprise Data Warehouse)
-
(Data Foundations Programme - Enterprise Data Catalog)
-
(Data Foundations Programme - Reference Data Management)
-
(Data Foundations Programme - Master Data Management)
-
(Technology Platform - BDM Enterprise Architecture Team)
-
(Cloud Architecture Practitioners - Cloud Center of Excellence)
-
(Cloud Architecture Practitioners - Cloud Operations)
-
(Cloud Architecture Practitioners - Cloud Archiect)
-
(Enterprise Architecture Practitioners - Cloud Archiect)
-
(Cloud Archiect - ESDC Cloud Reference Architecture)
-
(Data Foundations Programme - Enterprise Canonical Model)
-
(Data Foundations Programme - National Address Register)
-
(Enterprise Data Warehouse - Benefits Knowledge Hub (BKH))
-
(ESDC Chief Data Officer (CDO) Directives - Develop and Implement A Data Vision and Strategy)
-
(ESDC Chief Data Officer (CDO) Directives - Champion Greater Horizontality of ESDC's Data Flow)
-
(ESDC Chief Data Officer (CDO) Directives - Champion the Establishment of Data Governance and Data Policies to Improve Data Management)
-
(ESDC Chief Data Officer (CDO) Directives - Improve Partner Access to ESDC Data and Drive Innovation Via Uptake and Use)
-
(ESDC Chief Data Officer (CDO) Directives - Promote Awareness and Education Across ESDC On Data Management Best Practices and Processes, and Ensure Knowledge Transfer To Executives and to CDO Staff)
-
(Statistics Canada’s Trust Centre - Apply Best Practices and Lessons Learned From Statistics Canada’s Trust Centre)
-
(BDM Capabilities and Enablers - Legislative Authority)
-
(BDM Capabilities and Enablers - Data Management)
-
(Business Delivery Modernization (BDM) - BDM Capabilities and Enablers)
-
(BDM Capabilities and Enablers - Service Management Use of Data)
-
(BDM Capabilities and Enablers - Client Experience Use of Data)
-
(BDM Capabilities and Enablers - Benefit Delivery Use of Data)
-
(BDM Capabilities and Enablers - Client and Account Data)
-
(BDM Capabilities and Enablers - Security and Integrity Data)
-
(BDM Capabilities and Enablers - Partner and Relationship Data)
-
(BDM Capabilities and Enablers - Client Employment and Earnings History)
-
(BDM Capabilities and Enablers - Benefit Processing Data: Evidence, Activity, Interactions, Decisions, Payments)
-
(BDM Capabilities and Enablers - Knowledge-Reference and Document Data)
-
(BDM Capabilities and Enablers - Analytical Insights and Reports)
-
(Data Foundations Drivers For Change - Collection, Storage and Analysis of Data Is Widely Dispersed Across Multiple Branches, Program Areas and Regions)
-
(Data Foundations Drivers For Change - Authorities' Tactical Data Priorities View of Program-Project First Stunts Advancement Toward Strategic Outcomes)
-
(Data Foundations Drivers For Change - Data Collected From Surveys, Research and Partners Is Difficult To Integrate With Program Data)
-
(Data Foundations Drivers For Change - Low Data Literacy Is Limiting Data Value)
-
(Data Foundations Drivers For Change - Executives Lack Understanding, Tools and Skills To Manage Data As A Resource)
-
(Data Foundations Drivers For Change - Lack Of Enterprise Infrastructure To Support Advanced and Emerging Data & Analytics)
-
(Data Foundations Drivers For Change - Spreadmarts and Black Books Mean A Lack of Clarity Around Data Access and Use)
-
(Research, Vision and Strategy Activities - Demographic Data Intake Partnerships - Obtain Improved Partner Data)
-
(Research, Vision and Strategy Activities - Data Strategy - Data As An Asset)
-
(Research, Vision and Strategy Activities - Surveys and Research - Identify Gaps In Available Data)
-
(Research, Vision and Strategy Activities - Data Governance - Define The Data Management Framework)
-
(Research, Vision and Strategy Activities - Data Policy - Consistently Towards Successful Strategy Implementation)
-
(Appendix E: Definitions - Information Management)
-
(Appendix E: Definitions - Information Technology)
-
(Guiding Principles - 5: Cloud First Approach)
-
(Guiding Principles - 6: Enable A Modern Workplace: Anywhere, Anytime With Anyone)
-
(Guiding Principles - 3: Enterprise First)
-
(Guiding Principles - 4: Secure)
-
(Guiding Principles - 1: Client and Service-Centred Design)
-
(Guiding Principles - 2: Open)
-
(Strategic Actions: Information and Data Sharing - Determine the Feasibility of Developing a “Tell Us Once” Approach for Government)
-
(Strategic Actions: Information and Data Sharing - Build A Platform For Enterprise Interoperability)
-
(Strategic Actions: Information and Data Sharing - Introduce A Strategy Or Use of Open Source Software and Open Standards)
-
(Strategic Actions: Information and Data Sharing - Introduce A Mobile Application Strategy and Framework)
-
(Strategic Actions: Information and Data Sharing - Develop An Application Programming Interface Strategy)
-
(Strategic Actions: Information and Data Sharing - Introduce A Government API Store)
-
(Strategic Actions: Information and Data Sharing - Enhance Online Infrastructure To Enable Departments To Release Their Data and Information)
-
(Strategic Actions: Information and Data Sharing - Develop A Master Data Management Program)
-
(Strategic Actions: Information and Data Sharing - Advance Analytics)
-
(Strategic Actions: Information and Data Sharing - Implement A Platform For External Collaboration)
-
(Strategic Actions: Information and Data Sharing - Implement GCDOCS)
-
(Strategic Actions: Information and Data Sharing - Migrate Websites to Canada.ca and Assess Options For A Single GC Digital Service Platform)
-
(Identify a Business Lead to Develop a Data Lake Service Strategy - Advance Analytics)
-
(Business Intelligence - Advance Analytics)
-
(Analytics - Advance Analytics)
-
(Big Data - Advance Analytics)
-
(GC Strategic Plan for IM/IT: Strategic Coals - 1: Service)
-
(GC Strategic Plan for IM/IT: Strategic Coals - 2: Value)
-
(GC Strategic Plan for IM/IT: Strategic Coals - 3: Security)
-
(GC Strategic Plan for IM/IT: Strategic Coals - 4: Agility)
-
(2: Value - Strengthen Data Governance and Accountabilities)
-
(Develop A Master Data Management Program - Master Data Management)
-
(Signature Domain General - SIDG - Signature Checking - SICH)
-
(Consent Domain General - CODG - Consent Request - CORQ)
-
(Identity Domain General - IDDG - PanCanadien Trust Framework v1.3 - Atomic Processes)
-
(Consent Domain General - CODG - Consent Notice Presentation - CONP)
-
(Identity Domain General - IDDG - Identity Continuity - IDCO)
-
(Identity Domain General - IDDG - Identity Information Determination - IDID)
-
(Relationship Domain General - REDG - Relationship Establishment - REES)
-
(Credential Domain General - CRDG - PanCanadien Trust Framework v1.3 - Atomic Processes)
-
(Credential Domain General - CRDG - Credential Validation - CRVA)
-
(Relationship Domain General - REDG - PanCanadien Trust Framework v1.3 - Atomic Processes)
-
(Relationship Domain General - REDG - Relationship Verification - REVE)
-
(Consent Domain General - CODG - Consent Registration - CORG)
-
(Identity Domain General - IDDG - Identity Evidence Determination - IDED)
-
(Relationship Domain General - REDG - Relationship Information Determination - REIDRelationship Information Determination - REID)
-
(Consent Domain General - CODG - Consent Renewal - CORN)
-
(Consent Domain General - CODG - Consent Review - CORE)
-
(PanCanadien Trust Framework v1.3 - Atomic Processes - Signature Domain General - SIDG)
-
(Identity Domain General - IDDG - Identity Evidence Acceptance - IDEA)
-
(Credential Domain General - CRDG - Credential Recovery - CRRC)
-
(Credential Domain General - CRDG - Credential Suspension - CRSU)
-
(Relationship Domain General - REDG - Relationship Resolution - RERE)
-
(Identity Domain General - IDDG - Identity Verification - IDVE)
-
(Relationship Domain General - REDG - Relationship Revocation - RERV)
-
(Credential Domain General - CRDG - Credential Revocation - CRRV)
-
(Relationship Domain General - REDG - Relationship Reinstatement - RERI)
-
(Identity Domain General - IDDG - Identity Linking - IDLI)
-
(Identity Domain General - IDDG - Identity Maintenance - IDMA)
-
(Identity Domain General - IDDG - Identity Establishment - IDES)
-
(Credential Domain General - CRDG - Credential Issuance - CRIS)
-
(Credential Domain General - CRDG - Credential Verification - CRVE)
-
(Identity Domain General - IDDG - Identity Resolution - IDRE)
-
(Identity Domain General - IDDG - Identity Information Validation - IDIV)
-
(Relationship Domain General - REDG - Relationship Suspension - RESU)
-
(Relationship Domain General - REDG - Relationship Maintenance - REMA)
-
(Relationship Domain General - REDG - Relationship Information Validation - REIV)
-
(Relationship Domain General - REDG - Relationship Continuity - RECO)
-
(Relationship Domain General - REDG - Relationship Evidence Acceptance - REEA)
-
(Consent Domain General - CODG - PanCanadien Trust Framework v1.3 - Atomic Processes)
-
(Relationship Domain General - REDG - Relationship Evidence Determination - REED)
-
(Credential Domain General - CRDG - Credential Maintenance - CRMA)
-
(Consent Domain General - CODG - Consent Revocation - CORV)
-
(Credential Domain General - CRDG - Credential Authenticator Binding - CRAB)
-
(Consent Domain General - CODG - Consent Notice Formulation - CODG)
-
(Consent Domain General - CODG - Consent Expiration - COEX)
-
(Signature Domain General - SIDG - Signature Creation - SICR)
-
(ADO Feature (Representation) - ADO User Story (Representation))
-
(ADO User Story (Representation) - ADO Task (Representation))
-
(ESDC's Mandate and Role - 1. Develop Policies Ensure Canadians Can Use Their Talents, Skills and Resources to Participate in Learning, Work and Their Community)
-
(ESDC's Mandate and Role - 2. Deliver Programs To Help Canadians Move Through Life’s Transitions)
-
(ESDC's Mandate and Role - 3. Provide Income Support To Seniors, Families With Children, and Those Unemployed Due to Job Loss, IIllness or Caregiving Responsibilities)
-
(ESDC's Mandate and Role - 4. Helping Canadians With Distinct Needs (Indigenous People, Persons with Disabilities, Homeless People, Travelers and Recent Immigrants))
-
(ESDC's Mandate and Role - 5. Ensure Labour Relations Stability via Mediation Services)
-
(ESDC's Mandate and Role - 6. Promote a Fair and Healthy Workplace)
-
(ESDC's Mandate and Role - 7. Deliver Programs and Services On Behalf Of Other Departments and Agencies)
-
(The College @ESDC - Change Attitudes, Behaviors and Mindsets and Give ESDC Employees the Tools and Confidence to Deliver Service Going Beyond Client Expectations)
-
(LMS-R Expected Compulsory Requirements - MUST Meet GC Security Requirements for Protected-B, including 2FA)
-
(LMS-R Expected Compulsory Requirements - MUST Include Robust Backup and Recovery Including Replication)
-
(LMS-R Expected Compulsory Requirements - MUST Interface With ESDC’s Corporate Financial System)
-
(LMS-R Expected Compulsory Requirements - MUST Include Canadian Data Residency For Captured System Data)
-
(LMS-R Expected Compulsory Requirements - MUST Include Bilingual (French and English) User Interface, Documentation and On-Line Support)
-
(LMS-R Business Requirements - m) Solution Has Capacity To Host Over 200 Different Courses, XXXX Learning Objects (SCORM, MP4, MP3, etc.) and Provide 1 TB or More Storage)
-
(LMS-R Business Requirements - p) Publish Content From Integrated Authoring Tool For Testing and Course Use)
-
(LMS-R Business Requirements - s) Allow For User Community-Driven Enhancements and Features. Product Features and Releases, etc.)
-
(LMS-R Business Requirements - k) Multi-Tenancy Configurations With Granular Access, Individual Branding and RBAC)
-
(LMS-R Business Requirements - g) Must Scale To At Least 40,000 Authorized Users And To Meet Needs Over Time)
-
(LMS-R Business Requirements - a) Flexibility Across Access Points For Learning)
-
(LMS-R Business Requirements - q) Product Roadmap and Releases (Minimum of Two Product Releases Per Year))
-
(LMS-R Business Requirements - l) Allows ESDC to Configure and Maintain the Solution As Required)
-
(LMS-R Business Requirements - c) Cloud-Based Solution Certified for PBMM Use As Per IT Security Standards for GC)
-
(LMS-R Business Requirements - n) Support A Variety of Delivery Methods (e.g. Virtual/In Person Classrooms, Blended Learning, Self-Paced, etc.))
-
(LMS-R Business Requirements - e) Any And All Upgrades Are Included In The Costs)
-
(LMS-R Business Requirements - b) Platform and Device-Agnostic, Cloud-Based SaaS, Accessible By All Users)
-
(LMS-R Business Requirements - d) Complies With GC Accessibility Requirements, As Per Accessible Canada Act)
-
(LMS-R Business Requirements - h) Allow Learners and Special Access Rights Users To Login via Web Browsers or App On A Variety Of Devices)
-
(LMS-R Business Requirements - f) User-Created / Selected Course Material (English / French))
-
(LMS-R Business Requirements - r) Produces and Shares Product Roadmap)
-
(LMS-R Business Requirements - i) Compatible With External 3rd Party E-Learning Content Suppliers Via Single Sign-On (SSO))
-
(LMS-R Business Requirements - o) Support Social Learning via Blogs, Forums, Groups sites, Communities of Practice, File Sharing, etc.)
-
(LMS-R Business Requirements - j) Multiple SaaS Environments (Dev-Test-Prod) Hosted In A Secure Data Center Environment Located In Canada)
-
(LMS-R Non-Functional Requirements - c) Proposed Solution Should Be Available Via Workstation, Laptop and Tablet Devices)
-
(LMS-R Non-Functional Requirements - d) Solution Provides Standard and Ad Hoc Reporting Capabilities and API's for Corporate Analytics)
-
(LMS-R Non-Functional Requirements - b) Transition Methodology To Migrate To Vendor Solution)
-
(LMS-R Non-Functional Requirements - a) Commercial-Off-The-Shelf (COTS) System Available As A SaaS, IAAS or Managed Service)
-
(LMS-R Key Drivers - Accessible Canada Act Compliance)
-
(LMS-R Key Drivers - Official Languages Compliance)
-
(LMS-R Key Drivers - API Capabilities To Interoperate With ESDC's HRMS)
-
(LMS-R Key Drivers - CCCS Protected-B Accreditation)
-
(LMS-R Question Sections - 2. Solution Overview)
-
(LMS-R Question Sections - 7. Security)
-
(LMS-R Question Sections - 8. Data Exchange)
-
(LMS-R Question Sections - 9. Training)
-
(LMS-R Question Sections - 3. Reporting)
-
(LMS-R Question Sections - 11. Timelines)
-
(LMS-R Question Sections - 6. Data Conversion & Migration)
-
(LMS-R Question Sections - 10. Cost)
-
(LMS-R Question Sections - 1. General)
-
(LMS-R Question Sections - 5. Architecture)
-
(LMS-R Question Sections - 4. Support)
-
(Lite Project Team - BRM Facilitated Stakeholder Meeting)
-
(Create Teams Chat Group - Draft EA Assessment)
-
(Create Teams Chat Group - Lite Project Team)
-
(Create Teams Chat Group - SAS Peer Review Team)
-
(Azure DevOps - EA Requests SAS Feedback)
-
(PMIS (Project Management Info System) - Lite Project Proposed)
-
(IN SCOPE - Process Client Applications, Adjudicate, Communicate Eligibility Status To Client (Requirement))
-
(IN SCOPE - Ability for Canadians to Apply for CDCP (Requirement))
-
(IN SCOPE - Support Clients Via Specialized CDCP Call Centre (Requirement))
-
(IN SCOPE - [Service Canada] Find/View Client Appications, Assist Clients (Requirement))
-
(OUT OF SCOPE - Further Program Enhancements (Requirement))
-
(OUT OF SCOPE - Eligibility Appeals Portal and Services (Requirement))
-